19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Networked Systems Windows NT Network<br />

_________________________________________________________________________________________<br />

Communications:<br />

- S 5.36 (3) Encryption under UNIX and Windows NT (optional)<br />

- S 5.37 (3) Restricting Peer-to-Peer functions when using WfW, Windows 95 or Windows NT in<br />

a server-supported network<br />

- S 5.40 (1) Secure integration of DOS-PCs to a Windows NT network<br />

- S 5.41 (2) Secure configuration of remote access under Windows NT<br />

- S 5.42 (2) Secure configuration of TCP/IP network administration under Windows NT<br />

- S 5.43 (2) Secure configuration of TCP/IP network services under Windows NT<br />

Contingency Planning:<br />

- S 6.32 (1) Regular data backup<br />

- S 6.42 (2) Creating start-up disks for Windows NT<br />

- S 6.43 (3) Use of redundant Windows NT servers (optional)<br />

- S 6.44 (1) Data back-up under Windows NT<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!