NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
NIST SP 800-69 (draft) Guidance for Securing Microsoft Windows XP Home Edition
A NIST Security Configuration Checklist
on Monday 14 August 2006 print the content item {PDF=create pdf file of the content item^plugin:content.58}
in NIST.gov Publications > Special Publications - SP 800 series

SP 800-69 should be considered essential reading for all Windows XP Home Edition users. It does a very good job of summarizing the various threats facing home computer users and lists simple ways for users to mitigate them without having to be technically proficient.

You can download the NIST Special Publication 800-69 from NIST.gov

This document should be considered essential reading for all Windows XP Home Edition users. But that is asking a lot, the SP 800-69 document is 169 pages. However it does a very good job of summarizing the various threats facing home computer users and lists simple ways for users to mitigate them without having to be technically proficient. Surprisingly the document also goes out on a limb in a few places such as listing services that users can disable. It won't make anyone a security expert but it will give the average computer user a much better understanding of the threats they face every time they use their computer online. It even covers wireless networking, re-installation of the operating system, backups, and step-by-step instructions on how configure many of the security features that are built-in to Windows XP Home Edition.


(The below is a short description of SP 800-69 from NIST.gov, edited)

The draft SP 800-69 provides a checklist and guidance to home users, such as telecommuting Federal employees, on improving the security of their home computers that run Windows XP Home Edition. These computers face many threats from people wanting to cause mischief and disruption, commit fraud, and perform identity theft. The publication explains the need to use a combination of security protections to achieve a defense in depth. Thee protections include such as: antivirus software, antispyware software, a personal firewall, limited user accounts, and automatic software updates, to secure a computer against threats and maintain its security. It also emphasizes the importance of performing regular backups to ensure that user data is available after an adverse event such as an attack against the computer, a hardware failure, or human error. The publication contains a detailed step-by-step directions for securing Windows XP Home Edition computers that can be performed by experienced Windows XP Home Edition users.

Users of Windows XP Home Edition need to be aware of the threats that their computers face and the security protections available to protect their computers so that they can operate their computers more securely. Security protections are measures used to thwart threats.

Summary:

One of the most important parts of securing a Windows XP Home Edition computer is eliminating known weaknesses, because attackers could attempt to take advantage of them. Five categories of methods for eliminating weaknesses are as follows:
  • Limiting access to the computer through separate password-protected user accounts for each person, with different accounts for administrative and daily tasks (a limited user account)
  • Applying software updates to the computer on a regular basis, including Windows XP Home Edition and software applications
  • Limiting network access by disabling unneeded networking features, limiting the use of remote access utilities and Internet Connection Sharing, and configuring wireless networking securely
  • Modifying default file associations and the display of default file extensions
  • Disabling services that are not needed.


The five most important protections that should be used for Windows XP Home Edition computers connecting to the Internet are as follows:
  • Using a personal firewall that is configured to restrict incoming network activity to only that which is required
  • Using a limited user account for typical daily use of the computer
  • Running up-to-date antivirus software and antispyware software that is configured to monitor the computer and applications often used to spread malware (e.g., e-mail, Web) and to quarantine or delete any identified malware
  • Applying updates to the operating system and major applications (e.g., e-mail clients, Web browsers) regularly, preferably through automated means that check for updates frequently
  • Performing regular backups so that data can be restored in case an adverse event occurs.


---
The SP 800-69 document was created by the National Institute of Standards and Technology and is public domain (not subject to copyright).


NIST Special Publication # 800-69


Translate to: French German Italian Spanish Portuguese GTM_LAN_DUTCH Russian Chinese Arabic Korean English
Google Ads




Headlines

»Seeing 3D Shapes with SEM
»Commerce Acting Under Secretary Encourages Business to take Active Role in Corporate Cyber Security
»NCCoE Speaker Series May 2015
»NIST Requests Comments for Revising Its Electronic Authentication Guideline
»New Report: Online Identity Projects are Creating More Options for Businesses, Individuals
»NIST Tightens the Bounds on the Quantum Information aposSpeed Limitapos
»Securing a Public Safety Broadband Network with Identity Management
»Vendors Sought to Develop Model System for Identity and Access Management for Financial Services Companies
»NIST Request Comments on Its Big Data Framework Development
»NIST Calls for Final Comments on Guide to Protecting Sensitive Information on Nonfederal Systems
»NIST Invites Comments on Challenges in Protecting Consumer Data
»Comments Sought on Access Control Building Block
»Federal Funding Opportunity Solicits Projects That Support Online Privacy
»Spotlight on Commerce: Donna F. Dodson
»Lack of Effective Timing Signals Could Hamper Internet of Things Development


Date published: not known
Details

»Nepal Earthquake Disaster Email Scams
Original release date: April 30, 2015 US-CERT warns users of potential email scams citing the ...
»Google Releases Security Update for Chrome
Original release date: April 29, 2015 Google has released Chrome version 42.0.2311.135 for Wi ...
»WordPress Releases Security Update
Original release date: April 27, 2015 WordPress 4.2 and prior versions contain critical cross ...
»WordPress Releases Security Update
Original release date: April 23, 2015 WordPress 4.1.2 has been released to address multiple v ...
»IC3 Warns of Cyber Attacks Focused on Law Enforcement and Public Officials
Original release date: April 21, 2015 The Internet Crime Complaint Center (IC3) has issued an ...
»Mozilla Releases Security Update for Firefox
Original release date: April 21, 2015 The Mozilla Foundation has released Firefox 37.0.2 to a ...
»Oracle Releases April 2015 Security Advisory
Original release date: April 15, 2015 | Last revised: April 16, 2015 Oracle has released secu ...
»Google Releases Security Update for Chrome
Original release date: April 15, 2015 Google has released Chrome 42.0.2311.90 for Windows, Ma ...
»Adobe Releases Security Updates for Flash Player, ColdFusion, and Flex
Original release date: April 15, 2015 Adobe has released three security updates to address mu ...
»Microsoft Releases April 2015 Security Bulletin
Original release date: April 14, 2015 Microsoft has released eleven updates to address vulner ...


Date published: not known
Details

»You are your own threat model
For most people, the biggest security threat is that of themselves doing something they shouldn't do ...
»Report: six anti-virus solutions pass annual Linux test
Clean sweep of passes in VB100 test on Red Hat Enterprise Linux. 2015 will yet again not be the 'Yea ...
»Throwback Thursday: Regina v Christopher Pile: The Inside Story & Off with his Head!
This Throwback Thursday, we bring you not one but two (related) pieces from the archives as VB heads ...
»POODLE is the brown M&Ms of security
Just because it won't be exploited, doesn't mean you shouldn't patch it. There is a famous story abo ...
»Report: 15 solutions achieve VBSpam award
Test process also uncovers job spam illustrative of trend. Last week, we published our 36th comparat ...
»VB2015 offer for new security companies
Write an article for the Bulletin, get a half-price ticket for the conference. Things are going well ...
»Throwback Thursday: Through the Administrator's Eye
This Throwback Thursday, VB heads back to 1997 with 'Through the Administrator's Eye'. Over the last ...
»Registration for VB2015 has opened
Early bird discounts available for registrations made before 30 June. Today, we have opened registra ...
»Ross Anderson awarded BCS Lovelace Medal
Cambridge professor to deliver VB2015 keynote. Yesterday, the British Computer Society (BCS) announc ...


Date published: not known
Details

»3 Ways Attackers Will Own Your SAP
SAP vulnerabilities that have been highlighted for years are now becoming attackers' favorite means ...
»Law Enforcement Finding Few Allies On Encryption
Cloud providers, mobile device manufacturers, private citizens, and a bipartisan Congressional commi ...
»Deconstructing Mobile Fraud Risk
Today's enterprise security solutions don't do enough to manage BYOD risk, credit card theft and the ...
»Rapid7 Picks Up NTObjectives
Adds 25 new employees and further diversifies testing capabilities.
»Security Product Liability Protections Emerge
WhiteHat Security, FireEye each offer product liability protections to their customers.
»Defenses Outside the Wall
Protecting the Internet of Things means protecting the privacy of customers and colleagues.
»Building a Stronger Security Strategy: 6 Tips
CIO offers his formula for achieving the right balance between data security and employee productivi ...
»Nine Years Later, IT Security Is Even More Important To Business
As Dark Reading celebrates its ninth year of publication, the security industry prepares for its nex ...
»Dyre Trojan Adds New Sandbox-Evasion Feature
New tactic makes it that much harder to detect, says Seculert.


Date published: Tue, 05 May 2015 22:31:39 EDT
Details
Main Menu
· Home
Current Security News
 
SANS Internet Storm Center, InfoCON: green

» Infocon: green

» ISC StormCast for Tuesday, May 5th 2015 http://isc.sans.edu/podcastdetail.html?id=4469, (Tue, May 5th)
[04 May 2015 09:44pm]

» Upatre/Dyre - the daily grind of botnet-based malspam, (Tue, May 5th)
[04 May 2015 06:15pm]

» Traffic pattern change noted in Fiesta exploit kit, (Mon, May 4th)
[03 May 2015 09:40pm]

» ISC StormCast for Monday, May 4th 2015 http://isc.sans.edu/podcastdetail.html?id=4467, (Mon, May 4th)
[03 May 2015 08:42pm]

» VolDiff, for memory image differential analysis, (Sun, May 3rd)
[02 May 2015 10:35pm]

» New release of Samurai Web Testing Framework http://sourceforge.net/projects/samurai/, (Sat, May 2nd)
[02 May 2015 03:47pm]

» Massive malware spam campain to corporate domains in Colombia, (Fri, May 1st)
[01 May 2015 12:46pm]

» ISC StormCast for Friday, May 1st 2015 http://isc.sans.edu/podcastdetail.html?id=4465, (Fri, May 1st)
[30 Apr 2015 06:17pm]

» ISC StormCast for Thursday, April 30th 2015 http://isc.sans.edu/podcastdetail.html?id=4463, (Thu, Apr 30th)
[29 Apr 2015 06:44pm]

» Dalexis/CTB-Locker malspam campaign, (Thu, Apr 30th)
[29 Apr 2015 06:01pm]

***
CNET News.com

» Microsoft defends opening Hotmail account of blogger in espionage case
[20 Mar 2014 06:47pm]

» Syria's Internet goes dark for several hours
[20 Mar 2014 04:25pm]

» Symantec fires CEO Steve Bennett
[20 Mar 2014 03:07pm]

» Microsoft sniffed blogger's Hotmail account to trace leak
[20 Mar 2014 01:28pm]

» Microsoft sniffed private Hotmail account to trace trade secret leak
[20 Mar 2014 01:28pm]

» IBM's new services zero in on fraud, financial crime
[20 Mar 2014 07:31am]

» Despite assault on privacy, Page sees value in online openness
[19 Mar 2014 08:00pm]

» Hackers transform EA Web page into Apple ID phishing scheme
[19 Mar 2014 05:21pm]

» NSA top lawyer says tech giants knew about data collection
[19 Mar 2014 02:57pm]

» Microsoft touts study showing the cost of pirated software
[19 Mar 2014 06:55am]

» Microsoft touts study showing cost of malware in pirated software
[19 Mar 2014 06:55am]

» How to spy on your lover, the smartphone way
[18 Mar 2014 01:24pm]

» Mt. Gox update lets users see their Bitcoin balances
[18 Mar 2014 06:38am]

» Fake Malaysia Airlines links spread malware
[17 Mar 2014 05:12pm]

» IBM: No, we did not help NSA spy on customers
[17 Mar 2014 01:15pm]

***

***



***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf
Symantec News

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}