Managing Image Security

It is important to properly secure boot and installation images to prevent their unauthorized use. A fully configured image might include corporate applications and data, proprietary configurations, and even codes and keys required to activate line of business (LOB) applications.

One way to prevent unauthorized installations is by controlling the clients that are allowed to receive images. You can accomplish this through pre-staging, where clients are registered with Active Directory through the use of a globally unique identification number (GUID). Another way is to enable administrative approval for client installations.

To configure an image file’s access control list

  1. Right-click the image and then click Properties.

  2. On the ...

Get Windows Vista® Resource Kit, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.