Windows 10 in Year Two – Creators Update Windows 10  Changes Expected in Near Future Two Years out – Fall Creators Update

Total Page:16

File Type:pdf, Size:1020Kb

Windows 10 in Year Two – Creators Update Windows 10  Changes Expected in Near Future Two Years out – Fall Creators Update For the next 90 minutes… Major changes to Windows 10 in year two – Creators Update Windows 10 Changes expected in near future two years out – Fall Creators Update Chris Taylor Growth of Windows 10 Major “feature” releases Microsoft announcement date Monthly active devices Name Release date Version Build Codename July 29, 2015 (first 24 hours) 14 million Original release * 2015-07-29 1507 10240 Threshold 1 August 26, 2015 75 million November Update 2015-11-12 1511 10586 Threshold 2 October 6, 2015 110 million (2 months to 100 m) Anniversary Update 2016-08-02 1607 14393 Redstone January 4, 2016 200 million (+ 3 months to 200 m) Creators Update 2017-04-11 1703 15063 Redstone 2 March 30, 2016 270 million Fall Creators Update 2017-10-17 1709 Redstone 3 May 5, 2016 300 million (+ 4 months to 300 m) 2018-04 1803 Redstone 4 June 29, 2016 350 million September 26, 2016 400 million (+ 5 months to 400 m) May 10, 2017 500 million (+ 7 months to 500 m) * No longer receiving any updates Find your version/build Free upgrade ended Microsoft offered a free upgrade from Windows 7/8 Free upgrade ended July, 2016 1 … or did it? Clean install Creators Update using Win7/8.1 Version 1703 product key Build 15063 Upgrade for those who Released 2017-04-11 use assistive Codename “Redstone 2” technologies Settings More migrated from Control Panel to Changes to Settings Settings – not everything … yet New top level – Apps was under System – Gaming – Mixed reality If you have a VR headset Settings | System Settings | System | |Display Storage Custom scaling Storage Sense – Very useful to those with high-dpi displays – Delete temporary files Night Light – reduce blue light Off by default – Delete items in – “Thank you” says every photographer on earth! recycle bin over 30 Also available in Action Centre as a Quick Action days 2 Settings | Devices Settings | Personalization If you have a Themes migrated Precision touchpad from Control Panel – Many adjustments Can now set to gestures custom accent colour Settings | Apps Settings | Accounts Moved from under Sign-in options | Dynamic lock System to top level – Lock computer if paired Bluetooth phone Can block non-Store loses connection apps from installing Walk away with your paired phone “A minute or two” later, computer locks – Does anyone do this?? – No Dynamic Unlock Internet Explorer has an Uninstall option! – Under Manage optional features Settings | Gaming Settings | Gaming New top level option Okay, one option I looked at … I am not a gamer, so Use Game Mode – Enhancements include the following… – “we make gaming your PC's top priority so you get the best game quality and performance” And why wouldn’t I want this turned on? 3 Settings | Ease of access Settings | Privacy New braille support Feedback & diagnostics – Now just Basic and Full Enhanced removed – Waiting for None? don’t hold your breath… Settings | Update & Settings | Update & security security Update changes Update changes – Updates up to 35% smaller – Active hours up to 18 hours (up from 12) – Pause updates up to 6 days (once updates found) – Restart options |Show more notifications might help to catch new updates & delay reboot – Should detect if you are using a projector and not reboot not that I trust it… Settings | Update & Settings | Update & security security | Troubleshoot Update changes 19 – Can set a wired network connection as trouble-shooters metered WTF??? “We don’t plan to send large updates over metered connections, but could use this for critical fixes if needed in the future.” 4 Settings | Update & Settings | Mixed reality security Windows New top level icon Defender moved Only appears if you have a virtual to separate app: reality headset Windows – I don’t so… Defender Security Centre Reset PC or Fresh Start? Settings | Update & Security | Recovery – Reset this PC Keep my files – removes all apps and settings App changes Remove everything – pristine new setup – Uses device’s recovery media Windows Defender Security Centre | Device Performance & health – Fresh start Keeps files, “some” Windows settings, removes all apps not standard in Windows or manufacturer’s store apps – Uses a fresh OS downloaded from Microsoft Edge enhancements Edge enhancements Set aside tabs More extensions (at least 42) – Add tabs to favourites Read ePub ebooks (with “read aloud”) Tab preview Jump lists on Taskbar Uses less battery than competition Reduced attack surface Doesn’t run Flash content by default 5 Edge items still MIA Cortana Create web apps on taskbar “Full screen experience!” Drag address to desktop to create a – If computer idle and unlocked shortcut – I hate when things become random… Sync bookmarks across devices Can do initial Windows Setup using Full screen mode Cortana – No F11 (like every other browser) – Not sure why… – But Shift-Win-Enter works Calculator Movies & TV Currency conversion Mini View (picture in picture) – Small window that always floats over other windows Paint 3D Yes, it works… – Okay, it is kinda cool Other changes I can’t draw – This slide shows all the great objects I have created … 6 Microsoft Start menu What were you thinking? Show/hide app list Still can’t uninstall some apps – Settings | – Edge, People, Photos, Calendar, Maps, Personalisation | Mail Start | Show app Ads in File Explorer! list in Start menu Vertical scroll bars Start menu groups – From bad to worse! (ugh) I didn’t think that would be possible Fall Creators Update App changes Version 1709 Release 2017-10-17 Codename “Redstone 3” Edge Edge Pin web sites to taskbar PDF files Full screen mode using F11 – Form filling Add tabs to favourites (creates a folder) – Table of contents – Rotate page ePUB books – Annotations – Annotate – More highlight colours Highlight, underline, comments (keyboard or ink) – Copy & ask Cortana – Ask Cortana – Share Microsoft Store books across devices Progress, bookmarks, annotations synced 7 My People My People For your chosen few (up to 3) BFFs Runs on taskbar – Allows you to quickly communicate / share Includes “pops” (animated emoji) – really?? When you need to annoy keep in touch with someone constantly My People OneDrive Online-only OneDrive Files On-Demand – Replacement for Placeholders Locally – Robust notifications available Always – Transparent to applications available – Supports automatic versioning for all file types – Versions kept 90 days – Deleted files kept 90 days New update cadence Two major feature updates per year Other changes – March and September Hence my guess Redstone 4 – Will come out in April, 2018 – Will be version 1803 8 Power Fluent Design System Power throttling New user interface paradigm – Background apps run in “more power- Light efficient manner” Depth – 13% improved battery life Motion Material Scale Acrylic – Translucent blurring New Aero Glass? Start menu Task Manager Fluid horizontal resize Performance tab Easier to use “grips” for resizing – New GPU graph Diagonal resize Processes tab – Grouped processes e.g. – all Edge processes grouped together Reset Password Storage Sense Reset your password from login screen Delete files in – If you log on using Microsoft Account download directory unchanged in 30 days Delete previous versions of Windows 9 Windows Update Windows Update Settings Delivery Optimization – Update & security – Limit % bandwidth used to download Windows Update updates in background – Advanced Options – Limit % bandwidth for Choose how updates are uploading updates to delivered PCs on the Internet – Limit monthly GB of bandwidth for uploading updates to PCs on the Internet Windows Update Cortana Report on updates Configuration moves to new top-level – Downloaded from icon in Settings Microsoft Pick up where you left off when PCs on your network switching devices PCs on Internet Create a reminder – Uploaded to – From picture of an event poster PCs on your network PCs on Internet – Circle event with pen Handwriting Handwriting Continuous writing Where’s my pen – As panel fills, lift pen to recognize text and allow you to continue writing Corrections – Just write over incorrect suggested text – Ink gestures – strikethrough, scratch, join, split Panel next to where you are writing Select and Scroll using pen 10 Touch keyboard Touch keyboard One-handed layout Enhanced text prediction Touch keyboard Touch keyboard “improved emoji experience” Shape writing – swiping – No this does not mean removal of them – For now English US keyboard only Touch keyboard Accessiblity Voice dictation Eye Control – Includes commands such as “press – Type and operate mouse using eyes backspace”, “delete last 3 words”, “go Improved braille support after <word>”, “go to end of sentence”, (lots more) Improved Magnifier – Better bitmap scaling on text Improved Narrator – Auto-captioning images without alt text 11 Colour filters Phone For 3 types of colour blindness Link your phone (Android or iPhone) to Windows – Deuteranopia, Protanopia, Tritanopia Browse on phone and choose Continue on PC – Edge opens immediately on PC or – Shows up in Action Centre on PC Must be logged into Microsoft Account on each device One way (must initiate from phone) Video Chrome (just sayin’…) History | Tabs from other devices (on desktop) Menu | Recent Tabs (on phone) Must be using Chrome and signed in with same Google Account on each device Can go either direction Security Windows Defender Enterprise enhancements Controlled folder access – Windows Defender Application
Recommended publications
  • Windows - Run/Kör Kommando
    Windows - Run/Kör kommando Accessibility Controls - access.cpl Network Connections - ncpa.cpl Add Hardware Wizard - hdwwiz.cpl Network Setup Wizard - netsetup.cpl Add/Remove Programs - appwiz.cpl Notepad - notepad Administrative Tools - control admintools Nview Desktop Manager - nvtuicpl.cpl Automatic Updates - wuaucpl.cpl Object Packager - packager Bluetooth Transfer Wizard - fsquirt ODBC Data Source Administrator - odbccp32.cpl Calculator - calc On Screen Keyboard - osk Certificate Manager - certmgr.msc Opens AC3 Filter - ac3filter.cpl Character Map - charmap Password Properties - password.cpl Check Disk Utility - chkdsk Performance Monitor - perfmon.msc Clipboard Viewer - clipbrd Performance Monitor - perfmon Command Prompt - cmd Phone and Modem Options - telephon.cpl Component Services - dcomcnfg Power Configuration - powercfg.cpl Computer Management - compmgmt.msc Printers and Faxes - control printers Control Panel - control panel Printers Folder - printers Date and Time Properties - timedate.cpl Private Character Editor - eudcedit DDE Share - ddeshare Quicktime (If Installed) - QuickTime.cpl Device Manager - devmgmt.msc Regional Settings - intl.cpl Direct X Control Panel -directx.cpl Registry Editor - regedit Direct X Troubleshooter - dxdiag Registry Editor - regedit32 Disk Cleanup Utility - cleanmgr Remote Desktop - mstsc Disk Defragment - dfrg.msc Removable Storage - ntmsmgr.msc Disk Management - diskmgmt.msc Removable Storage Operator Requests - ntmsoprq.msc Disk Partition Manager - diskpart Resultant Set of Policy (XP Prof)
    [Show full text]
  • Logs & Event Analysis and Password Cracking
    Logs & Event Analysis and Password Cracking MODULE 6 Page 1 of 29 Contents 6.1 Learning Objectives ............................................................................................................. 4 6.2 Introduction .......................................................................................................................... 4 6.3 Windows registry ................................................................................................................. 5 6.3.1 Registry and forensics ................................................................................................... 5 6.3.1.1 System information ................................................................................................ 5 6.4 Windows event log file ........................................................................................................ 9 6.4.1 Windows Event Log File Format .................................................................................. 9 6.4.2 Reading from Windows event log file ........................................................................ 11 6.4.3 Using Microsoft log parser ......................................................................................... 11 6.4.4 Understanding Windows user account management logs .......................................... 13 6.4.5 Understanding Windows file and other object Access sets ........................................ 14 6.4.6 Auditing policy change ..............................................................................................
    [Show full text]
  • Scribbler Windows Agent
    Reach us [email protected] | [email protected] www.syskeysoftlabs.com Follow us Copyright © 2020 Syskey Softlabs Pvt Ltd. Trademarks Windows and Windows Server are either trademarks or registered trademarks of their respective owners in the United States and/or other countries. Contents Scribbler Windows Agent ...................................................................................................... 2 Installing Scribbler Windows Agent ........................................................................................ 2 Configuring Scribbler Windows Agent .................................................................................... 3 How to configure Windows Event Logs ...................................................................................... 3 How to set Event Log Filter ......................................................................................................... 4 How to configure Windows Firewall Logs ................................................................................... 8 How to forward Windows logs to Syslog Server ......................................................................... 9 Reference Links ................................................................................................................... 10 Scribbler Windows Agent Scribbler Windows Agent is one of the easiest and light weighted tools for gathering Windows Logs from Windows machines. It enables system administrators to easily monitor key metrics and change activities over the
    [Show full text]
  • Program Name Run Command About Windows Winver Add a Device
    List of Run Commands in Win7/8 to Windows Managment By Shree Krishna Maharjan in some commands need to use .msc Program Name Run Command About Windows winver Add a Device devicepairingwizard Add Hardware Wizard hdwwiz Advanced User Accounts netplwiz Authorization Manager azman Backup and Restore sdclt Bluetooth File Transfer fsquirt Calculator calc Certificates certmgr Change Computer Performance Settings systempropertiesperformance Change Data Execution Prevention Settings systempropertiesdataexecutionprevention Change Printer Settings printui Character Map charmap ClearType Tuner cttune Color Management colorcpl Command Prompt cmd Component Services comexp Component Services dcomcnfg Computer Management compmgmt.msc Computer Management compmgmtlauncher Connect to a Network Projector netproj Connect to a Projector displayswitch Control Panel control Create A Shared Folder Wizard shrpubw Create a System Repair Disc recdisc Credential Backup and Restore Wizard credwiz Data Execution Prevention systempropertiesdataexecutionprevention Default Location locationnotifications Device Manager devmgmt.msc Device Pairing Wizard devicepairingwizard Diagnostics Troubleshooting Wizard msdt Digitizer Calibration Tool tabcal DirectX Diagnostic Tool dxdiag Disk Cleanup cleanmgr Disk Defragmenter dfrgui Disk Management diskmgmt.msc Display dpiscaling Display Color Calibration dccw Display Switch displayswitch DPAPI Key Migration Wizard dpapimig Driver Verifier Manager verifier Ease of Access Center utilman EFS REKEY Wizard rekeywiz Encrypting File System
    [Show full text]
  • Microsoft Windows NT
    Microsoft Windows NT Securing Windows NT Installation October 23, 1997 Microsoft Corporation Contents Abstract Establishing Computer Security Levels of Security Off-the-Shelf vs. Custom Software Minimal Security Standard Security High-Level Security High-Level Software Security Considerations User Rights Protecting Files and Directories Protecting the Registry Secure EventLog Viewing Secure Print Driver Installation The Schedule Service (AT Command) Secure File Sharing FTP Service NetBios Access From Internet Hiding the Last User Name Restricting the Boot Process Allowing Only Logged-On Users to Shut Down the Computer Controlling Access to Removable Media Securing Base System Objects Enabling System Auditing Enhanced Protection for Security Accounts Manager Database Restricting Anonymous network access to Registry Restricting Anonymous network access to lookup account names and groups and network shares Enforcing strong user passwords Disabling LanManager Password Hash Support Wiping the System Page File during clean system shutdown Disable Caching of Logon Credentials during interactive logon. C2 Security Evaluation vs. Certification Setting up a C2-compliant System Abstract Microsoft® Windows NT® operating system provides a rich set of security features. However, the default out-of-the-box configuration is highly relaxed, especially on the Workstation product. This is because the operating system is sold as a shrink-wrapped product with an assumption that an average customer may not want to worry about a highly restrained but secure system on their desktop. This assumption has changed over the years as Windows NT gains popularity largely because of its security features. Microsoft is investigating a better secured default configuration for future releases. In the meantime, this white paper talks about various security issues with respect to configuring all Windows NT version 4.0 OS products for a highly secure computing environment.
    [Show full text]
  • Syskey Password Cracker Software Free Download Syskey.Exe Utility Is No Longer Supported in Windows 10, Windows Server 2016, and Later Versions
    syskey password cracker software free download Syskey.exe utility is no longer supported in Windows 10, Windows Server 2016, and later versions. Windows 10, version 1709, Windows Server, version 2004 and later versions of Windows no longer support the syskey.exe utility. Applies to: Windows 10 - all editions, Windows Server 2019, Windows Server 2016 Original KB number: 4025993. Changes detail. The following changes are made: The syskey.exe utility is no longer included in Windows. Windows will never prompt for a syskey password during startup. Windows will no longer support installing an Active Directory domain controller by using Install-From-Media (IFM) that was externally encrypted by the syskey.exe utility. If an operating system (OS) was externally encrypted by the syskey.exe utility, you can't upgrade it to Windows 10 version 1709, Windows Server version 2004, or a later version of Windows. Workaround. If you want to use boot-time OS security, we recommend that you use BitLocker or similar technologies instead of the syskey.exe utility. If you use Active Directory IFM media to install replica Active Directory domain controllers, we recommend that you use BitLocker or other file encryption utilities to protect all IFM media. To upgrade an OS that's externally encrypted by the syskey.exe utility to Windows 10 RS3 or Windows Server 2016 RS3, the OS should be configured not to use an external syskey password. For more information, see step 5 in How to use the SysKey utility to secure the Windows Security Accounts Manager database. More information. Syskey is a Windows internal root encryption key that's used to encrypt other sensitive OS state data, such as user account password hashes.
    [Show full text]
  • Use Syskey on Windows 7 to Encrypt the Sam to Hardening System
    USE SYSKEY ON WINDOWS 7 TO ENCRYPT THE SAM TO HARDENING SYSTEM Very few netbook computers support BitLocker, which means that they are Date: 25/10/2013 vulnerable to utilities that allow you to boot from a USB device and reset the local Source: LINK Permalink: LINK administrator password. The way to ensure that this type of attack doesn’t work is Document Version: 1.0 to use SYSKEY to encrypt the SAM database. Total Chars: 1937 Total Words: 369 Created by: HeelpBook Page: 1 Obviously this solution can be used even on laptops and desktop computers. SYSKEY is a tool that has been around for some time on Windows client operating systems, but most administrators don’t bother using it because it makes recovering a computer difficult in the event that auser forgets their password. In some cases you want to do all that you can do to protect the data on a netbook computer. To do this, you should use SYSKEY to encrypt the SAM database and use EFS to encrypt any locally stored files and folders. To accomplish this, perform the following steps: Log on to Windows 7 with an account that has local administrator access. Type SYSKEY into the textbox on the start menu. Click OK at the UAC prompt. Select the Encryption Enabled Option. Select the Password Startup Option. Enter the Startup Password that must be entered each time. Reboot the computer. From now on the Startup Password must be entered to unlock the SAM database before local logon will be allowed. Visit Us: http://www.heelpbook.net Follow Us: https://twitter.com/HeelpBook CHECK IF SYSKEY IS ENABLED The easiest way to find out whether an NT machine has Syskey enabled is to type… Date: 25/10/2013 syskey Source: LINK Permalink: LINK Document Version: 1.0 Total Chars: 1937 …at the command prompt (cmd.exe).
    [Show full text]
  • Advantages and Disadvantages of EFS and Effective Recovery of Encrypted Data Whitepaper
    advantages and disadvantages of efs and effective recovery of encrypted data whitepaper Copyright (c) 2007 ElcomSoft Co.Ltd. Contents What is eFs? 3 eFs advantages and disadvantages 4 Data can be lost for good 5 how can one lose access to eFS-encrypted data? what is the eFS recovery agent? What to do in case of system failure? 7 possible actions to take Data decryption scheme Advanced eFs Data Recovery 8 About elcomsoft 10 AdvAntAges And disAdvAntAges of efs whitepaper 2 WhAt is eFs? One of the innovations in the Microsoft Windows 2000 and the NTFS 5.0 file system was the Encrypting File System (EFS) technology, which is designed to quickly encrypt files on the com- puter hard drive. NTFS by itself has built-in protection. However, as is frequently the case, it very quickly required additional security. The reason was the wide-spread use of NTFSDos-type utilities, which made it easy to circumvent the NTFS security system, gaining access to it through DOS, thus ignoring the set access rights. The EFS system uses both public and private key encryption and CryptoAPI architecture. EFS can use any symmetrical file encryption algorithm from the following list: Microsoft Windows 2000 used DESX, Windows XP used 3DES, and Windows XP SP1, 2003 and the new Windows Vista use AES. File encryption does not require the user to execute any preliminary operations. During the first encryption of the file, an encryption certificate and a private key are automatically issued for the user. One of the distinguishing convenient features of EFS is that the files remain encrypted when they are transferred to a different folder or to a different NTFS drive.
    [Show full text]
  • Review NTFS Basics
    Australian Journal of Basic and Applied Sciences, 6(7): 325-338, 2012 ISSN 1991-8178 Review NTFS Basics Behzad Mahjour Shafiei, Farshid Iranmanesh, Fariborz Iranmanesh Bardsir Branch, Islamic Azad University, Bardsir, Iran Abstract: The Windows NT file system (NTFS) provides a combination of performance, reliability, and compatibility not found in the FAT file system. It is designed to quickly perform standard file operations such as read, write, and search - and even advanced operations such as file-system recovery - on very large hard disks. Key words: Format, NTFS, Volume, Fat, Partition INTRODUCTION Formatting a volume with the NTFS file system results in the creation of several system files and the Master File Table (MFT), which contains information about all the files and folders on the NTFS volume. The first information on an NTFS volume is the Partition Boot Sector, which starts at sector 0 and can be up to 16 sectors long. The first file on an NTFS volume is the Master File Table (MFT). The following figure illustrates the layout of an NTFS volume when formatting has finished. Fig. 5-1: Formatted NTFS Volume. This chapter covers information about NTFS. Topics covered are listed below: NTFS Partition Boot Sector NTFS Master File Table (MFT) NTFS File Types NTFS File Attributes NTFS System Files NTFS Multiple Data Streams NTFS Compressed Files NTFS & EFS Encrypted Files . Using EFS . EFS Internals . $EFS Attribute . Issues with EFS NTFS Sparse Files NTFS Data Integrity and Recoverability The NTFS file system includes security features required for file servers and high-end personal computers in a corporate environment.
    [Show full text]
  • Configuring Microsoft Windows 8.1
    MCSA 70-687 Cert Guide: Confi guring Microsoft Windows 8.1 Don Poulton Randy Bellet Harry Holt 800 East 96th Street Indianapolis, Indiana 46240 USA MCSA 70-687 Cert Guide: Confi guring Microsoft Windows 8.1 Associate Publisher Copyright © 2015 by Pearson IT Certifi cation Dave Dusthimer All rights reserved. No part of this book shall be reproduced, stored in a retrieval Acquisitions Editor system, or transmitted by any means, electronic, mechanical, photocopying, record- Betsy Brown ing, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although Development Editors every precaution has been taken in the preparation of this book, the publisher and Christopher Cleveland authors assume no responsibility for errors or omissions. Nor is any liability assumed Eleanor Bru for damages resulting from the use of the information contained herein. ISBN-13: 978-0-7897-4879-9 Managing Editor ISBN-10: 0-7897-4879-7 Sandra Schroeder Library of Congress Control Number: 2014944426 Project Editor Printed in the United States of America Seth Kerney First Printing: July 2014 Copy Editor Trademarks Chuck Hutchinson All terms mentioned in this book that are known to be trademarks or service marks Indexer have been appropriately capitalized. Pearson IT Certifi cation cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as Heather McNeill affecting the validity of any trademark or service mark. Proofreader Windows is a registered trademark of Microsoft Corporation. Anne Goebel Warning and Disclaimer Technical Editor Every effort has been made to make this book as complete and as accurate as pos- Chris Crayton sible, but no warranty or fi tness is implied.
    [Show full text]
  • SOLUTION: “This Is Microsoft Support” Telephone Scam – Computer Ransom Lockout
    SOLUTION: “This is Microsoft Support” telephone scam – Computer ransom lockout Posted on April 10, 2013 A trend of the past couple of years has been for scammers to contact computer owners directly via telephone in the United States in an effort to convince them that there is a problem with their PC and they’ll need to pay to have it fixed. In general, these people cannot fix anything, and instead they merely charge exorbitant fees for absolutely nothing. In other words, they scam you. The call generally goes something like this: 1. A foreigner with a thick Indian accent identifies himself as a member of Microsoft Support or similar. 2. He informs you that you have a number of critical problems with your PC and that you will need to have it fixed. 3. To convince you, he offers to connect remotely and pulls up your Event Log (eventvwr.msc). He then filters for Warnings, Errors, and Critical events and uses that as evidence that your PC will soon fail to work correctly if you do not pay him to correct it. The astute among you have probably already sensed that something here is seriously wrong, and it’s not your PC. It’s the fact that someone is calling you to tell you there is a problem with your computer. No one will ever do that. The only way they could possibly know there is a problem is by hacking or guessing. In this case, it’s mere guesswork, and it’s not even correct most of the time.
    [Show full text]
  • Microsoft Solutions for Security and Compliance Windows Server 2003 Security Guide
    Microsoft Solutions for Security and Compliance Windows Server 2003 Security Guide April 26, 2006 © 2006 Microsoft Corporation. This work is licensed under the Creative Commons Attribution-Non Commercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.5/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA. Table of Contents iii Contents Chapter 1: Introduction to the Windows Server 2003 Security Guide ............. 1 Overview....................................................................................................1 Executive Summary .....................................................................................1 Who Should Read This Guide.........................................................................2 Scope of this Guide......................................................................................2 Chapter Summaries .....................................................................................3 Chapter 1: Introduction to the Windows Server 2003 Security Guide .............4 Chapter 2: Windows Server 2003 Hardening Mechanisms ............................4 Chapter 3: The Domain Policy..................................................................4 Chapter 4: The Member Server Baseline Policy ...........................................4 Chapter 5: The Domain Controller Baseline Policy .......................................5 Chapter 6: The Infrastructure Server Role .................................................5
    [Show full text]