From Windows 8/8.1 Security Technical Implementation Guide
Part of WN08-GE-000021
Associated with IA controls: ECSC-1
Associated with: CCI-000381
Allowing other operating systems to run on a secure system may allow users to circumvent security.
Verify the Hyper-V platform has not been installed on the system. Open Control Panel. Select "Programs and Features". Select "Turn Windows features on or off". If "Hyper-V Platform" is selected, this is a finding. (Hyper-V Platform is a subcategory under Hyper-V) If Hyper-V is installed on a workstation, the organization must have an approved use case for it. Any virtual OS's must be secured. This would not be a finding.
Uninstall the Hyper-V platform through "Turn Windows Features on or off".
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer