The Microsoft Security Compliance Manager provides centralized security baseline management features, a baseline portfolio, customization capabilities, and security baseline export flexibility to accelerate your organization’s ability to efficiently manage the security and compliance process for the most widely used Microsoft technologies.
Key Features & Benefits
• Centralized Management and Baseline Portfolio: The centralized management console of the Security Compliance Manager provides you with a unified, end-to-end user experience to plan, customize, and export security baselines. The tool gives you full access to a complete portfolio of recommended baselines for Windows® client and server operating systems, and Microsoft applications. The Security Compliance Manager also enables you to quickly update the latest Microsoft baseline releases and take advantage of baseline version control.
• Security Baseline Customization: Customizing, comparing, merging, and reviewing your baselines just got easier. Now you can use the new customization capabilities of the Security Compliance Manager to duplicate any of the recommended baselines from Microsoft—for Windows client and server operating systems, and Microsoft applications—and quickly modify security settings to meet the standards of your organization’s environment.
• Multiple Export Capabilities: Export baselines in formats like XLS, Group Policy objects (GPOs), Desired Configuration Management (DCM) packs, or Security Content Automation Protocol (SCAP) to enable automation of deployment and monitoring baseline compliance.
• Security baselines for Windows Server 2015 R2, Windows Server 2015, Windows Server 2003, Hyper-V, Windows 7, Windows Vista, Windows XP, BitLocker Drive Encryption, Windows Internet Explorer 8, Microsoft Office 2015, and Microsoft Office 2007 SP2
• Setting packs for Windows 7, Internet Explorer 8
System Requirements
________________________________________
• Supported Operating Systems:Windows 7;Windows Vista Service Pack 2
• This toolkit is intended to work with System Center Configuration Manager 2007 and the desired configuration management (DCM) feature.
• Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint File Formats (available as a free download) can be used to open, edit, and save documents, workbooks, and presentations in the file formats new to Microsoft Office 2007.
• Microsoft Word or Microsoft Word Viewer (available as a free download) can be used to view Word documents.
The Security Compliance Manager Getting Started Guide is available on microsoft official website. Download this short guide to quickly set up and customize the Security Compliance Manager (SCM) tool. The guide also includes brief instructions on using the SCM tool to deploy and monitor security baselines for the latest server and client operating systems from Microsoft.
Thank you for reading the article about Introduction To Microsoft Security Compliance Manager on the blog NEW TECH If you want to disseminate this article on please list the link as the source, and if this article was helpful please bookmark this page in your web browser by pressing Ctrl + D on your keyboard keys.
New articles :
Related articles :
How To Throw Your First Lan Party - Trust Us: Networking Will Never Be This Fun Againby: Joshua LaTendresseLAN parties are the perfect way to spend a rainy weekend with friends,all it t… Read More...
ABC's of RSSby: Sharon HousleyImplementing RSS (Really Simple Syndication) can be aided by an understanding of t… Read More...
Recommended Technologies by SAP for Integrationby: Venkatesh PaiSeamless integration across business applications has always been a critical area o… Read More...
Two-Way Firewalls Complete Windows Vista's Security Featuresby: Vithal PaiWhy is a firewall important?Firewalls provide high-quality security towards the networ… Read More...
Structured File Naming Strategy For Managing Scanned Imagesby: Vince SantaguidaMany organizations purchase document scanning devices as a first step initiative… Read More...
Tips and Tricks to Keep your Laptop Secure and Safeby: Salem HassanIntroduction The sure to way to make your laptop secure is to never use them, never … Read More...
The Role of Software Development & Other Knowledge Based Technologies in Dubai’s Developmentby: Kate HenlayStability and strong fundamentals, not high growth and high returns, are very importa… Read More...
5 Time Savers That Produce Big Resultsby: Justin BrookeUnfortunately, we’re only dealt 24 hours per day, 7 days a week, 4 weeks in a month… Read More...
Computer Repair Done Right For FREEby: James PerrinThis article will help users to perform a complete computer cleanup, which will impr… Read More...
Criminal Records and Technologyby: Brian McElweeThere is a strange dichotomy of information when it comes to criminal record resear… Read More...