Add Security Features to a Run-Time Image
Windows XP Embedded supports the same configurable security options as Microsoft Windows XP Professional. This section provides an overview of the Windows XP security options and shows how you can configure the security settings for your Windows XP Embedded run-time image. For more information about the security features, see the Windows XP online documentation.
In This Section
- How to Protect your Run-Time Image
Describes the procedure for protecting your run-time image, including components to add and requirements to consider. - Administrator and User Accounts
Describes how to configure the user and administrator accounts - Authentication Security Components
Describes the security components that you can include in your run-time image to support authentication, such as LSASS. - Authorization Security Components
Describes the security components that you can include in your run-time image to support authorization, such as ACL. - Best Practices for Security
Describes different areas of consideration for adding security features to your run-time image. - Digital Rights Management and Content Protection
Describes Windows Media Player components and technology that you can include to protect digital media content on your device. - Domain Participation
Describes the Domain Participation component. - File System and Local Access Security Components
Describes the security components that you can include in your run-time image to support file system access and local security, such as EFS. - Internet Connection Security Components
Describes the security components that you can include in your run-time image to support Internet security options, such as SSL and IPSec. - Network Security Components
Describes the security components that you can include in your run-time image to support network security, such as secure RPC. - Secure API Components
Describes the security components that you can include in your run-time image to support network security, such as Crypto API. - Security Management Components
Describes the security components that you can include in your run-time image to support security management policies. - Security Templates
Describes how to create a custom security template for your run-time image. - Windows Firewall
Describes the Windows Firewall component and how to configure it on a run-time image.
Related Sections
- Development Process
Describes the order and phases in the overall run-time image development process. - Servicing
Describes the different servicing scenarios to consider when building your run-time image.
Last updated on Wednesday, October 18, 2006
© 2006 Microsoft Corporation. All rights reserved.