Export (0) Print
Expand All

System Integrity: Ensuring Integrity

Published: December 29, 2005

Summary

System integrity begins with selecting and deploying the right hardware and software components to authenticate a user’s identity—and help prevent others from assuming it. In doing so, it needs to offer efficient administrative functions to restrict access to administrator-level functions, and give administrators processes and controls to manage changes to the system. There are many individual components to system integrity, such as vulnerability assessment, antivirus, and anti-malware solutions. However, the ultimate goal from an access control standpoint is to prevent the installation and execution of malicious code—while protecting valuable data—from the outset.

This white paper provides an overview of the Microsoft technologies that help safeguard critical information and offers typical real-life examples.

Included in This Document

  • Introduction

  • System Integrity Issues

  • The Technologies Supporting System Integrity

  • Conclusion

  • Additional Resources

Download
System Integrity: Ensuring Integrity

SystemIntegrity.doc
338 KB
Microsoft Word file

Get Office File Viewers

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
Show:
© 2014 Microsoft