Chapter 8. Securing the Windows® Environment
This chapter describes how best to implement the security controls that you have selected as part of your ISO27001-based ISMS.
The details in this chapter will focus on the key operating systems of Windows Server® 2008 and Windows® 7. While other Microsoft systems and applications may be referred to, the scope of this book does not provide the same level of technical detail for these other systems. Where possible, references to Microsoft resources will be made to enable the reader to research the information further.
Furthermore, the reader is advised to ensure that all recommendations outlined in this book are fully tested and compatible with their own production environment before they are set to ‘live’. ...