You are on page 1of 16

United States Army Golden Master Program Configuration Summary of the AGM Windows 7 build

Microsoft Windows 7 Enterprise Edition for the United States Army May 2011
DISCLAIMER
The contents of this document and/or media are not to be construed as an official Department of the Army position unless so designated by other authorized documents. The use of trade names in this document and/or media does not constitute an official endorsement or approval of the use of such commercial hardware or software. Do not cite this document for the purpose of advertisement. Do not release to other than the intended recipient(s).

CHANGES
Refer requests for all changes that affect this document to: Director, NETCOM/ESTA, ATTN: NETC-EST-G, Fort Huachuca, AZ 85613-7070.

DISPOSITION INSTRUCTIONS
If this document/media is no longer required then it should be destroyed rather than returned to the issuing organization. Safeguard and/or destroy this document with consideration given to its classification or distribution statement requirements.

ADDITIONAL INFORMATION
For additional information please contact us at: AGM.Support@us.army.mil or 1-800-966-7176 https://www.us.army.mil/suite/page/130061

This is a Sensitive but UNCLASSIFIED document.

Subject: Title: Audience:

Army Golden Master AGM Windows 7 10.0.1 Configuration Summary US Army Field IT Support staff tasked to deploy the AGM Desktop and Laptop standard build products

Build Version: Author: Effective Date:

10.0.1 AGM Staff 01 May 2011

Template Version 1.0.1

Page 1 of 16

Release Date: 12/28/2009

United States Army Golden Master Program


Purpose This document provides a brief overview of the deployment configuration, security profile, IAVA hotfixes, and software applications included in the United States Army Golden Master Windows 7 Build version 10.0.1. Deployment Overview The AGM Windows 7 Build version 10.0.1 release has been engineered using the Microsoft Deployment Toolkit (MDT) utilizing a Lite-Touch deployment mechanism along with several custom features. The deployment of AGM Windows 7 build has been tailored to meet the security requirements of the U.S. Army and FDCC. The AGM Windows 7 deployment mechanism has been configured using the Microsoft WAIK, WSIM and MDT toolkits. It has been packaged to be portable into a variety of enterprise management deployment solutions. While not thoroughly tested in every scenario, each component should be able to support integration into alternate deployment solutions. The custom deployment of the AGM Windows 7 build is comprised of four (4) components:
A U.S. Army custom Windows 7 Enterprise Install.wim image file. Lite Touch deployment framework used to configure the various components of the Windows 7 to AGM 10.0.1 specifications. o o o Unattend.xml script. Scriptroot reference pointer and Environment variable. Application Installation.

Configuration Overview The AGM Windows 7 10.0.1 build does not support an in-place upgrade of an existing platform. It is recommended that the installation process be performed on a new or newly formatted computer. The AGM Windows 7 10.0.1 deployment does not require a pre-existing installation of Microsoft Windows Operating System. All data on the target computer WILL be erased by the AGM Windows 7 10.0.1 installation process. Please ensure that you have taken adequate steps to backup any data on the target computer prior to beginning the build process.
Page 2 of 16

Template Version 1.0.1

Release Date: 12/28/2009

United States Army Golden Master Program

The AGM Windows 7 10.0.1 Installation will NOT support multiple partition hard drive configurations. The AGM Windows 7 10.0.1 custom install.wim is a Sysprepd image file that contains the Army Windows systems security profile and IAVA hotfixes and patches as of March 2011. The AGM Windows 7 10.0.1 build includes a U.S. Army login desktop background and user icon picture.

Configuration Limitation The AGM Windows 7 10.0.1 build only includes device drivers available in the default Windows 7 driver stores, and does not include any platform specific inf or exe device drivers. Hardware device drivers will have to be installed as a post installation task. The AGM Windows 7 10.0.1 installation reboots several times during the build process with no recursive login built into the scripts to pick up where it left off. If the computer is powered off during the deployment, the process may have to be reinitiated from the beginning.

Security Template The AGM security template is a single executable file that configures a Desktop or Laptop workstation to the current FDCC and U.S. ARMY defined Security standards. Operating System The AGM Windows 7 10.0.1 Install.wim contains the following Security Configuration settings:
Configured Windows Firewall Computer System Security template Apply the MSS Security settings to the System Security configuration Apply computer Auditing security rules Set the Local Group Policy Set the local machine Internet Explorer Trusted Sites list Add the AGM Program branding Information Install DoD Root Certificates
Page 3 of 16

Template Version 1.0.1

Release Date: 12/28/2009

United States Army Golden Master Program


Install AGM program Login Background and user icon.

Configuration (Post Installation Security Install) Because the custom image file has been prepared with Sysprep, some security settings are configured during deployment. During the first login phase of the AGM Windows 7 deployment, Win7_Post_Inst.EXE is run to configure the following settings:
Rename the guest account to xGuest Set the password restrictions on the administrator and xGuest accounts Set the AGM Program support information in favorites in Internet Explorer Set the Login Warning Banner

NOTE: The specific security template and local group policy settings that comprise the AGM Windows 7 10.0.1 are documented in a spreadsheet located on the AGM KCC website.

Internet Trusted Sites The locally defined Internet Trusted Sites list is configured through the Sites to Zone Mapping key within the local group policy. AGM Trusted Sites List as of: 01 May 2011
*.AFRICOM.MIL *.NGA.MIL *.SKILLSOFT.com https://miap.csd.disa.mil https://web.mail.mil mnf-iraq.com us.army.mil/akoim us.army.mil/armyweb us.army.mil/mes1.dr1 us.army.mil/mes1.ps1 us.army.mil/mes2.dr1 us.army.mil/mes2.ps1 us.army.mil/mes3.dr1 us.army.mil/mes3.ps1 us.army.mil/mes4.dr1 us.army.mil/mes4.ps1 us.army.mil/mes5.dr1 us.army.mil/mes5.ps1 us.army.mil/mes6.dr1 us.army.mil/mes6.ps1 us.army.mil/webmail
Template Version 1.0.1

*.DARPA.MIL *.DAU.MIL *.DC3.MIL *.DCAA.MIL *.DCMA.MIL *.DECA.MIL *.DEFENDAMERICA.MIL *.DEFENSELINK.MIL *.DEPLOYMENTHEALTH.MIL *.DFAS.MIL *.DIA.MIL *.DISA.MIL *.DISAGRID.MIL *.DLA.MIL *.DMSO.MIL *.DOD.MIL *.DODED.MIL *.DODTechnopedia.mil *.DSM.MIL *.DSS.MIL *.DTEPI.MIL
Page 4 of 16

*.JSF.MIL *.JSIMS.MIL *.JTFGNO.MIL *.JWAC.MIL *.KNOWLEDGENET.MIL *.KOREA50.MIL *.MAIL.MIL *.NAVY.MIL *.NEWHORIZONS.COM *.NCSC.MIL *.NIC.MIL *.NIMA.MIL *.NIPR.MIL *.NORAD.MIL *.NORTHCOM.MIL *.NOSC.MIL *.NRO.MIL *.OSD.MIL *.PACOM.MIL *.PCSTRAVEL.MIL *.PDHEALTH.MIL
Release Date: 12/28/2009

United States Army Golden Master Program


*.ACOM.MIL *.AF.MIL *.AFMS.MIL *.ANTHRAX.MIL *.ARL.MIL *.ARMY.MIL *.ARPA.MIL *.ASBCA.MIL *.ASSIST.MIL *.BTA.MIL *.CAC.MIL *.CENTCOM.MIL *.CERT.MIL *.DAPS.MIL *.DTIC.MIL *.DTRA.MIL *.EB.MIL *.EUCOM.MIL *.HPC.MIL *.IA.MIL *.JAST.MIL *.JCMOTF.MIL *.JCS.MIL *.JCSE.MIL *.JFCOM.MIL *.JOINTMODELS.MIL *.JS.MIL *.JSC.MIL *.PENTAGON.MIL *.SKILLPORT.COM *.SKILLSOFT.COM *.SOC.MIL *.SOCDS.MIL *.SOCOM.MIL *.SOUTHCOM.MIL *.SPACECOM.MIL *.STRATCOM.MIL *.TEST.MIL *.TRANSCOM.MIL *.TTSC.NET *.USBANK.COM *.USCG.MIL *.USMC.MIL *.USUHS.MIL *.WHMO.MIL *.WHS.MIL

IAVA / Security Vulnerability Hotfixes The AGM Windows 7 10.0.1 Desktop workstation build applies Microsoft Security Vulnerability hotfix files for the Microsoft Windows 7 Enterprise as of 12 April 2011 are described below:
Rellease Datte Re ease Da e October 13, 2009 October 13, 2009 October 13, 2009 October 13, 2009 December 8, 2009 Tiittlle T e MS09-054
974455

Descriipttiion Descr p on Cumulative Security Update for Internet Explorer Cumulative Security Update of ActiveX Kill Bits Vulnerabilities in Windows CryptoAPI Could Allow Spoofing Vulnerability in Local Security Authority Subsystem Service Could Allow Denial of Service Cumulative Security Update for Internet Explorer

Severiitty Sever y Critical Critical

MS09-055
973525

MS09-056
974571

Important

MS09-059
975467

Important

MS09-072 976325

Critical

Template Version 1.0.1

Page 5 of 16

Release Date: 12/28/2009

United States Army Golden Master Program


Rellease Datte Re ease Da e January 12, 2010 January 21, 2010 Tiittlle T e MS10-001 972270 MS10-002
978207

Descriipttiion Descr p on Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code Execution Vulnerabilities in Internet Explorer Could Allow Remote Code Execution (Superseeds MS09-072) Vulnerabilities in SMB Client Could Allow Remote Code Execution (Superseeds MS08068) Cumulative Security Update of ActiveX Kill Bits (Superseeds MS09-055) Vulnerabilities in SMB Server Could Allow Remote Code Execution (Superseeds MS09001) Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution (Superseeds MS09-038, MS09-028) Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (Superseeds MS09058) Cumulative Security Update for Internet Explorer (Superseeds MS10-002) Vulnerabilities in Windows Could Allow Remote Code Execution Vulnerabilities in SMB Client Could Allow Remote Code Execution (Superseeds MS10006)

Severiitty Sever y Low

Critical

February 9, 2010

MS10-006
978251

Critical

February 9, 2010 February 9, 2010

MS10-008
978262

Moderate

MS10-012
971468

Important

February 9, 2010

MS10-013
977914,975560

Critical

February 9, 2010

MS10-015
977165

Important

April 13, 2010

MS10-018
880182

Critical

April 13, 2010 April 13, 2010

MS10-019
981210

Critical Critical

MS10-020
980232

Template Version 1.0.1

Page 6 of 16

Release Date: 12/28/2009

United States Army Golden Master Program


Rellease Datte Re ease Da e April 13, 2010 Tiittlle T e MS10-021
979683

Descriipttiion Descr p on Vulnerabilities in Windows Kernel could allow Elevation of Privilege (Superseeds MS10015) Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution Vulnerability in Outlook Express and Windows Mail Could Allow Remote Code Execution (Superseeds MS08-048,MS09037) Vulnerability in Windows KernelMode Drivers Could Allow Elevation of Privilege (Superseeds MS09-065) Vulnerability in Media Decompression Could Allow Remote Code Execution Security Update for ActiveX Kill Bits (Superseeds MS10-008) Cumulative Security Update for Internet Explorer (Superseeds MS10-018) Vulnerability in OpenType Compact Font Format (CFF) Driver Could Allow Elevation of Privilege Vulnerability in Microsoft .NET Framework Could Allow Tampering Reliability Update Vulnerability in Windows Shell Could Allow Remote Code Execution

Severiitty Sever y Important

April 13, 2010

MS10-022
981169

Important

May 11, 2010

MS10-030
978542

Critical

June 8, 2010

MS10-032
979559

Important

June 8, 2010

MS10-033
979482

Critical

June 8, 2010 June 8, 2010

MS10-034
980195

Critical Critical

MS10-035
982381

June 8, 2010

MS10-037
980218

Important

June 8, 2010

MS10-041
982865, 979909

Important

July 1, 2010 August 2, 2010

KB977074 MS10-046
2286198

Critical

Template Version 1.0.1

Page 7 of 16

Release Date: 12/28/2009

United States Army Golden Master Program


Rellease Datte Re ease Da e August 10, 2010 Tiittlle T e MS10-047
981852

Descriipttiion Descr p on Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (Superseeds MS10021) Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (Superseeds MS10-032) Vulnerabilities in S Channel Could Allow Remote Code Execution Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (Superseeds MS08-069) Vulnerabilities in SMB Server Could Allow Remote Code Execution (Superseeds MS10012) Vulnerability in Cinepak Codec Could Allow Remote Code Execution Vulnerabilities in TCP/IP Could Allow Elevation of Privilege (Superseeds MS10-029) Vulnerabilities in the Tracing Feature for Services Could Allow an Elevation of Privilege Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution (Superseeds MS09-061) Vulnerability in Print Spooler Service Could Allow Remote Code Execution
Page 8 of 16

Severiitty Sever y Important

August 10, 2010

MS10-048
2160329

Important

August 10, 2010 August 10, 2010

MS10-049
980436

Important

MS10-051
2079403

Critical

August 10, 2010

MS10-054
982214

Critical

August 10, 2010 August 10, 2010 August 10, 2010 August 10, 2010

MS10-055
982665

Critical

MS10-058
978886

Important

MS10-059
982799

Important

MS10-060
2265906

Critical

September 14, 2010

MS10-061
2347290

Important

Template Version 1.0.1

Release Date: 12/28/2009

United States Army Golden Master Program


Rellease Datte Re ease Da e September 29, 2010 October 12, 2010 October 12, 2010 Tiittlle T e MS10-070
2418042

Descriipttiion Descr p on Vulnerability in ASP.NET Cold Allow Information Disclosure Cumulative Security Update for Internet Explorer Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (Superseeds MS10-048) Vulnerability in Microsoft Foundation Classes Could Allow Remote Code Execution Vulnerability in Media Player Network Sharing Service Could Cause Remote Code Execution Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code Execution Vulnerability in the OpenType Font Format (OTF) Driver Could Allow Elevation of Privilege Vulnerability in Windows Common Control Library Could Allow Remote Code Execution Vulnerability in Windows Media Player Could Allow Remote Code Execution Vulnerability in COM Validation in Windows Shell and WordPad Could Allow Remote Code Execution Vulnerabilities in SChannel could allow Denial of Service (Superseeds MS10-049) Vulnerabilities in the OpenType Font (OTF) Driver Could Allow
Page 9 of 16

Severiitty Sever y Important Critical Important

MS10-071
2360131

MS10-073
981957

October 12, 2010 October 12, 2010 October 12, 2010 October 12, 2010 October 12, 2010 October 12, 2010 October 12, 2010

MS10-074
2387149

Moderate

MS10-075
2281679

Critical

MS10-076
982132

Critical

MS10-078
2279986

Important

MS10-081
2296011

Important

MS10-082
2378111

Important

MS10-083
979688

Important

October 12, 2010 December 14, 2010


Template Version 1.0.1

MS10-085
2207566

Important

MS10-091
2296199

Critical

Release Date: 12/28/2009

United States Army Golden Master Program


Rellease Datte Re ease Da e Tiittlle T e Descriipttiion Descr p on Remote Code Execution Vulnerability in the OpenType Font Format (OTF) Driver Could Allow Elevation of Privilege Vulnerability in Microsoft Windows Could Allow Remote Code Execution Vulnerability in Windows Address Book Could Allow Remote Code Execution Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege Vulnerability in Consent User Interface Could Allow Elevation of Privilege Vulnerabilities in Microsoft Data Access Components Could Allow Remote Code Execution Cumulative Security Update for Internet Explorer Vulnerability in the OpenType Compact Font Format (CFF) Driver Could Allow Remote Code Execution Vulnerability in JScript and VBScript Scripting Engines Could Allow Information Disclosure Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege Severiitty Sever y

December 14, 2010

MS10-092
2279986

Important

December 14, 2010

MS10-095
2385678

Important

December 14, 2010

MS10-096
2423089

Important

December 14, 2010

MS10-098
2436673

Important

December 14, 2010

MS10-100
2242962

Important

January 11, 2011 February 8, 2011 February 8, 2011

MS11-002
2451910

Critical

MS11-003
2416400

Critical

MS11-007
2485376

Critical

February 8, 2011

MS11-009
2475792

Important

February 8, 2011

MS11-011
2393082

Important

Template Version 1.0.1

Page 10 of 16

Release Date: 12/28/2009

United States Army Golden Master Program


Rellease Datte Re ease Da e February 8, 2011 February 8, 2011 March 8, 2011 Tiittlle T e MS11-012
2479628

Descriipttiion Descr p on Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege Vulnerabilities in Kerberos Could Allow Elevation of Privilege Vulnerabilities in Windows Media Could Allow Remote Code Execution Vulnerability in Remote Desktop Client Could Allow Remote Code Execution Vulnerabilities in Internet Explorer Vulnerability in Microsoft Windows. Vulnerability in Microsoft Windows Vulnerabilities in Microsoft Windows

Severiitty Sever y Important

MS11-013
2496930

Important

MS11-015
2479943

Critical

March 8, 2011

MS11-017
2483614

Important

April 12, 2011 April 12, 2011 April 12, 2011 April 12, 2011

MS11-018
KB2497640

Critical Critical Critical Important

MS11-019
KB2511455

MS11-020
KB2508429

MS11-024
KB2506212,KB2491683

In addition to the Windows 7 system security vulnerability hotfix files, the AGM Windows 7 10.0.1 Desktop build also includes additional hotfix files to address specific operational concerns in Microsoft Office System 2007 SP2. The additional hotfixes are configured as of 12 April 2011 and are described below.
Rellease Re ease Datte Da e October 13, 2009 October 13, 2009 Tiittlle T e Descriipttiion Descr p on Vulnerabilities in Microsoft Active Template Library (ATL) ActiveX Controls for Microsoft Office Could Allow Remote Code Execution Vulnerabilities in GDI+ Could Allow Remote Code Execution Severiitty Sever y

MS09-060
973965,973709

Critical

MS09-062
972581

Critical

Template Version 1.0.1

Page 11 of 16

Release Date: 12/28/2009

United States Army Golden Master Program


Rellease Re ease Datte Da e November 10, 2009 March 9, 2010 Apr 13, 2010 Tiittlle T e MS09-067
973593,973704

Descriipttiion Descr p on Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution Vulnerability in Microsoft Office Publisher Could Allow Remote Code Execution (981160) Vulnerability in Microsoft Visual Basic for Applications Could Allow Remote Code Execution (Superseeds MS08013, MS06-47) Vulnerability in COM Validation in Microsoft Office Could Allow Remote Code Execution (Superseeds MS08055, MS10-017, MS09-017, MS10-023, MS10-027) Vulnerabilities in Microsoft Office Excel Could Allow Remote Code Execution (Superseeds MS10-017) Vulnerabilities in Microsoft Office Access ActiveX Controls Could Allow Remote Code Execution Vulnerability in Microsoft Office Outlook Could Allow Remote Code Execution (Superseeds MS09-060) Vulnerabilities in Microsoft Office Word Could Allow Remote Code Execution (Superseeds MS09-027 and MS10-036) Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution Vulnerability in Microsoft Outlook Could Allow Remote Code Execution (Superseeds MS10-045)

Severiitty Sever y Important Important

MS10-017
980150, 978380, 978382

MS10-023
980470

Important

May 11, 2010

MS10-031
976321

Important

June 8, 2010

MS10-036
983235

Important

June 8, 2010

MS10-038
982331

Important

July 13, 2010

MS10-044
979440

Critical

July 13, 2010

MS10-045
980376

Important

August 10, 2010 September 14, 2010 September 14, 2010

MS10-056
2269638

Critical

MS10-063
2288621

Important

MS10-064
2288953

Important

Template Version 1.0.1

Page 12 of 16

Release Date: 12/28/2009

United States Army Golden Master Program


Rellease Re ease Datte Da e Tiittlle T e KB981399 Descriipttiion Descr p on An Office application does not open or save documents from the SharePoint site on a client computer that is running Windows Vista SP2 or Windows Server 2008 SP2. Vulnerabilities in Microsoft Word Could Allow Remote Code Execution Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (Superseeds MS10-056, MS10-038, MS10-037) Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (Superseeds MS10-036) Vulnerabilities in Microsoft Powerpoint Could Allow Remote Code Execution (Superseeds MS10-036) Vulnerabilities in Microsoft Publisher Could Allow Remote Code Execution Vulnerabilities in Microsoft Office Graphics Filters Could Allow Remote Code Execution Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution Vulnerabilities in Microsoft Office Could Allow Remote Code Execution Important Important Severiitty Sever y

October 12, 2010 October 12, 2010

MS10-079
2345043, 2344993

MS10-080
2345035, 2344875, 2345088, 2345015

November 9, 2010 November 9, 2010 December 14, 2010 December 14, 2010 April 12, 2011 April 12, 2011 April 12, 2011 April 12, 2011 April 12, 2011

MS10-087
2289158

Critical

MS10-088
2413381

Important

MS10-103
2292970

Important Important

MS10-105
2455005

MS11-021
2464583

Critical Critical Important Important Critical

MS11-021
2466156

MS11-022
2464594

MS11-022
2464623

MS11-023
2509488

Template Version 1.0.1

Page 13 of 16

Release Date: 12/28/2009

United States Army Golden Master Program


Anti-Virus Application Definition Updates McAfee VirusScan Enterprise 8.7.0i - Is an anti-virus program for detecting and removing viruses and other security threats on Windows desktop computers and servers. The i in the version number refers to the intrusion protection that has been added to VirusScan. o McAfee Virus Definitions 20110421 o Virus Definitions 04/21/2011 Symantec Endpoint Protection 11.0.4000 - Symantec Endpoint Protection delivers multi-tiered enterprise protection at the gateway, network server, and workstation. The suite provides Symantec's industryleading virus protection, content filtering, and spam prevention technologies as a single, comprehensive solution. o Symantec Virus Definitions 20110421 o Virus Definitions 04/21/2011

Template Version 1.0.1

Page 14 of 16

Release Date: 12/28/2009

United States Army Golden Master Program


Applications ActivIdentity ActivClient CAC 6.2- ActivClient is the latest smart card and USB token middleware from ActivIdentity that allows enterprise and government customers to easily use smart cards and USB tokens for a wide variety of desktop, network security and productivity applications. Adobe Flash Player 10.2.153.1 ActiveX - Flash Player is free software that lets you view web content created by Flash. This content may be interactive content such as menus that slide, or may be complex applications, games, or animations. Adobe Acrobat Reader X - Adobe Reader is free software that lets you open, view, search, digitally sign, verify, and print Portable Document Format (PDF) files. Adobe Shockwave 11.5.9.620 - The Shockwave Player allows you to view interactive web content like games, business presentations, entertainment, and advertisements from your web browser. Gradkell DBsign Web Signer 3.0.0.5- DBsign Web Signer enables "dropin" integration of Public Key security into existing applications and databases. IBM Lotus Forms Viewer 3.5.1.123 - A feature-rich desktop application used to view, fill, sign, submit, and route e-forms, able to function on the desktop or within a browser. McAfee VirusScan Enterprise 8.7.0i - Is an anti-virus program for detecting and removing viruses and other security threats on Windows NT/2000/XP desktop computers and Windows NT/2000/2003 servers. The i in the version number refers to the intrusion protection that has been added to VirusScan. Microsoft Office Professional Plus 2007 Service Pack 2 Microsoft Office Professional Plus 2007 will help you and your organization work more efficiently and effectively with a new set of powerful tools for creating, managing, analyzing, and sharing information. Microsoft Office Outlook DCR Outlook DCR is a code fix that introduces direct smartcard authentication to Exchange 2010 email services. Microsoft Office 2007 Save As PDF or XPS Add-In The Microsoft 2007 Office Save As PDF or XPF add-in allows you to export and save to the PDF and XPS formats in eight 2007 Microsoft Office programs. It also allows you to send as e-mail attachment in the PDF and XPS formats in a subset of these programs. Specific features vary by program.

Template Version 1.0.1

Page 15 of 16

Release Date: 12/28/2009

United States Army Golden Master Program


Microsoft Silverlight 4.0 - Silverlight is a programmable web browser plugin that enables features such as animation, vector graphics and audiovideo playback that characterize rich internet applications. Microsoft Visio Viewer 2010 - The Visio 2010 Viewer allows anyone to view Visio drawings and diagrams (created with Visio 5.0, 2000, 2002, 2003, or 2007) inside their Internet Explorer version 7.0 or later Web browser. Sun JRE 1.6.0.24- Java software allows you to run applications called "applets" that are written in the Java programming language. These applets allow you to play online games, chat with people around the world, calculate your mortgage interest, and view images in 3D. Symantec Endpoint Protection 11.0.5002 - Symantec Endpoint Protection delivers multi-tiered enterprise protection at the gateway, network server, and workstation. The suite provides Symantec's industryleading virus protection, content filtering, and spam prevention technologies as a single, comprehensive solution. Tumbleweed Desktop Validator v4.10 Dec10 Desktop Validator (DV) is a client solution enabling digital certificate validation in the most commonly used Microsoft Windows applications. The application update includes new location configuration files as 14Nov2008. US Army Message Classification Addin for Microsoft Outlook 3.0.0.5 The US Army Enterprise Classification Banner (ECB) is an efficient and effective tool for marking classifications of electronic mail messages. The software is designed to operate with Microsoft Outlook, presenting the user with prompts to ensure electronic content is properly classified and marked as it travels through the electronic mail system. The prompts allow users to mark the classification of email message as well as the attachments contained in the email package.

Template Version 1.0.1

Page 16 of 16

Release Date: 12/28/2009

You might also like