![]() The document assumes that the reader has experience installing and administering applications on Windows-based systems in domain or standalone configurations. ![]() This checklist has been created for IT professionals, particularly Windows system administrators and information security personnel. This guidance supports DoD system design, development, implementation, certification, and accreditation efforts. These requirements are designed to assist Security Managers (SMs), Information System Security Managers (ISSMs), Information System Security Officers (ISSOs), and System Administrators (SAs) with configuring and maintaining security controls. This document is a requirement for all DoD-administered systems and all systems connected to DoD networks. The Microsoft Office System 2016 STIG must also be applied when any Office 2016 package is installed. ![]() This Microsoft OneNote 2016 Security Technical Implementation Guide (STIG) provides the technical security policies, requirements, and implementation details for applying security concepts to Microsoft OneNote 2016 application.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |