Windows Vista: Security and Protection
Applies To: Windows Vista
This collection contains detailed information about security products and features for the IT professional to design, deploy, and maintain Windows Vista. If you need help and how-to information for using Windows Vista at home, see Windows Help and How-to.
Threats and Vulnerabilities Mitigation
Features and technologies that provide layered defenses against malicious software threats and intrusions through a strategy of prevention, isolation, and recovery.
Threats and Vulnerabilities Mitigation provides in-depth information about the following technologies:
Controlling Communication with the Internet
Internet Explorer Security
Microsoft Forefront
Network Access Protection
User Account Control
Windows Defender
Windows Firewall with Advanced Security
Secure Configuration Assessment and Management
Tools to administer security throughout a layered defense and manage ongoing threats.
Secure Configuration Assessment and Management provides in-depth information about the following technologies:
Authorization Manager
Group Policy
Security Auditing
Security Policies
Software Restriction Policies
WMI Scripting for Security
Identity Management and Access Control
Features and technologies that provide a central way of managing credentials and technologies to allow only legitimate users access to devices, applications, and data.
Identity Management and Access Control provides in-depth information about the following technologies:
Access Control and Authorization
Identity and Authentication
Information Protection
Features and technologies that provide ways of securing information and technologies to allow only legitimate users access to devices, applications, and data.
Information Protection provides in-depth information about the following technologies:
Active Directory Rights Management Services
Backup and Restore
BitLocker Drive Encryption
Encrypting File System
Public Key Infrastructure
Trusted Platform Module
Security Tools
Security Tools provides information about tools that can be used to administer security throughout a layered defense.
Additional Resources
See Also
Other Resources
Windows Server 2008: Security and Protection
Security Developer Center