Export (0) Print
Expand All

Add Security Features to a Run-Time Image (Windows Embedded Standard 2009)

4/23/2012

Windows Embedded Standard supports the same configurable security options as Microsoft Windows XP Professional. This section provides an overview of the Windows XP security options and shows how you can configure the security settings for your Windows Embedded Standard run-time image. For more information about the security features, see the Windows XP online documentation.

How to Protect your Run-Time Image

Describes the procedure for protecting your run-time image, including components to add and requirements to consider.

Administrator and User Accounts

Describes how to configure the user and administrator accounts

Authentication Security Components

Describes the security components that you can include in your run-time image to support authentication, such as LSASS.

Authorization Security Components

Describes the security components that you can include in your run-time image to support authorization, such as ACL.

Best Practices for Security

Describes different areas of consideration for adding security features to your run-time image.

Digital Rights Management and Content Protection

Describes Windows Media Player components and technology that you can include to protect digital media content on your device.

Domain Participation

Describes the Domain Participation component.

File System and Local Access Security Components

Describes the security components that you can include in your run-time image to support file system access and local security, such as EFS.

Internet Connection Security Components

Describes the security components that you can include in your run-time image to support Internet security options, such as SSL and IPSec.

Network Security Components

Describes the security components that you can include in your run-time image to support network security, such as secure RPC.

Secure API Components

Describes the security components that you can include in your run-time image to support network security, such as Crypto API.

Security Management Components

Describes the security components that you can include in your run-time image to support security management policies.

Security Templates

Describes how to create a custom security template for your run-time image.

Windows Firewall

Describes the Windows Firewall component and how to configure it on a run-time image.

User Permission Settings

Describes how to set different types of permissions to provide levels of functionality to users according to their needs.

Developer Reference

Describes the order and phases in the overall run-time image development process.

Servicing

Describes the different servicing scenarios to consider when building your run-time image.

Community Additions

ADD
Show:
© 2014 Microsoft