U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Microsoft Windows 7 Version 1, Release 36 Checklist Details (Checklist Revisions)

SCAP 1.0 Content:

Supporting Resources:

Target:

Target CPE Name
Microsoft Windows 7 cpe:/o:microsoft:windows_7 (View CVEs)

Checklist Highlights

Checklist Name:
Microsoft Windows 7
Checklist ID:
332
Version:
Version 1, Release 36
Type:
Compliance
Review Status:
Under Review
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
04/26/2010

Checklist Summary:

The Windows 7 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements were developed from Federal and DoD consensus, as well as the Windows 7 Security Guide and security templates published by Microsoft Corporation. The vulnerabilities discussed in this document are applicable to Windows 7 Business, Enterprise and Ultimate Editions.

Checklist Role:

  • Operating System

Known Issues:

Not provided.

Target Audience:

These requirements are designed to assist Security Managers (SMs), Information Assurance Managers (IAMs), IAOs, and System Administrators (SAs) with configuring and maintaining security controls. This guidance supports DoD system design, development, implementation, certification, and accreditation efforts.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

The vulnerabilities discussed in this document are applicable to Windows 7 Business, Enterprise and Ultimate Editions.

Regulatory Compliance:

Department of Defense [DoD] Directive 8500

Comments/Warnings/Miscellaneous:

Comments or proposed revisions to this document should be sent via e-mail to the following address: fso_spt@disa.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Disclaimer:

Not provided.

Product Support:

Comments or proposed revisions to this document should be sent via e-mail to the following address: fso_spt@disa.mil

Point of Contact:

Comments or proposed revisions to this document should be sent via e-mail to the following address: fso_spt@disa.mil

Sponsor:

Not provided.

Licensing:

Not provided.

Change History:

V1R11 - 05-31-12
V1R10 - 04-06-12
V1R9 - 03-12-12
V1R8 - 02-28-2012
V1R7 - 01-27-2012
V1R6 - 10-28-2011
V1R5 - 07-29-2011
V1R4 - 04-29-2011
V1R3 - 01-28-2011
V1R2 - 08-27-2010
V1R1 - 04-26-2010 (initial release)

Dependency/Requirements:

URL Description
http://iase.disa.mil/stigs/Documents/win2k-XP-03-vista-addendumv6r1-052107.doc DISA Windows 2003/XP/2000/Vista Addendum, Version 6.1, May 21, 2007
http://www.dtic.mil/cjcs_directives/cdata/unlimit/m651001_v1.pdf CJCSM 6510.01, "Defense-in-Depth: Information Assurance (IA) and Computer Network Defense (CND)", March 25, 2003
http://www.niap-ccevs.org/policy/dod/d85001p.pdf DoD Directive 8500.1, "Information Assurance", October 24, 2002
http://www.niap-ccevs.org/policy/dod/d85002p.pdf DoD Instruction 8500.2, "Information Assurance (IA) Implementation", February 6, 2003

References:

Reference URL Description

NIST checklist record last modified on 06/07/2012


* This checklist is still undergoing review for inclusion into the NCP.