Microsoft Windows Vista Security Checklist Version 6 Release 1.19 Checklist Details (Checklist Revisions)
NOTE
This is not the current revision of this Checklist, view the current revision.
SCAP 1.0 Content:
-
Download SCAP 1.0 Content - Microsoft Windows Vista
- Author: Defense Information Systems Agency
Supporting Resources:
-
Download Prose - http://iase.disa.mil/stigs/checklist/windows_vista_checklist_v6-1-13_20090828.zip
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
Microsoft Internet Explorer | cpe:/a:microsoft:ie (View CVEs) |
Microsoft Windows Vista | cpe:/o:microsoft:windows_vista (View CVEs) |
Checklist Highlights
- Checklist Name:
- Microsoft Windows Vista Security Checklist
- Checklist ID:
- 224
- Version:
- Version 6 Release 1.19
- Type:
- Compliance
- Review Status:
- Under Review
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 04/08/2009
Checklist Summary:
This document is designed to instruct the reviewer on how to assess Windows Vista configurations in a Windows domain. In addition, the security settings recommended can also be used to configure Group Policy in a Windows Active Directory environment.
Checklist Role:
- Operating System
Known Issues:
Not provided.
Target Audience:
DISA Field Security Operations- Sites are required to secure the Microsoft Windows Vista operating system in accordance with DoD Directive 8500.1, Section 4.18 (and related footnote). The checks in this document were developed from DISA and NSA guidelines specified in the above reference, as well as the Windows Server 2003/XP/Vista security guides and security templates published by the Microsoft Corporation.
Target Operational Environment:
Testing Information:
Not provided.
Regulatory Compliance:
Not provided.
Comments/Warnings/Miscellaneous:
The settings in this checklist are directed towards securing a native Windows environment (i.e. Windows 2000 or later OSs). If the environment is a mixed one, with down-level OSs, or maintains trusts with down-level OSs, then the following checks should be reviewed. Configuring them to the required setting could cause compatibility problems.
Disclaimer:
Not provided.
Product Support:
Not provided.
Point of Contact:
Not provided.
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
Version 6.1.6 May 2008 Version 6.1.5 March 2008 Version 6.1.4 January 2008 Version 6.1.3 November 2007 Version 6.1.2 September 2007 Version 6.1.1 May 2007 Version 6.1.8 July 2008 Version 6.1.9 December 2008 Version 6.1.10 February 2009
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|
NIST checklist record last modified on 01/06/2010
* This checklist is still undergoing review for inclusion into the NCP.