Technical info for admins... ...and other tech gurus.
Use in any app deployment manager. Comes in both .EXE and .MSI file formats.
Small footprint so you can run it at start-up for your local or remote users.
Changes made to your exisiting computer image can be rolled back individually.
One .exe for all operating systems.
Because a lot of the changes that PROimage makes are Windows registry and local GPO settings, PROimage never needs updating, there are no subscriptions or ads of any kind, and you can re-apply it whenever you make system changes or install new software.
Eliminates DDoS attacks
15min account lockout on 3 failed login attempts
Eliminates SYN attacks
Automatic permissionless connections disabled
Last user info cleared
Disables unused services like Telnet
Simple file sharing disabled
USB auto-run disabled
Reduce network traffic noise and increase bandwidth
More detailed attack auditing
And a lot more...
Download NIST Documents and Settings Guides
NIST Win7 Guide
Here is the reccomended system settings guide (998 pages) for Microsoft Windows 7 as published by the National Institute for Standards and Technology.
DownloadNIST Win8/8.1 Guide
Here is the reccomended system settings guide (1024 pages) for Microsoft Windows 8/8.1 as published by the NIST.
DownloadPROimage Guide
Here are all the settings, protocols, and system changes that make up PROimage For Windows.
We've gone through those other 1000 page documents with a fine-toothed comb.
DownloadIn January 2008, the Office of Management and Budget (OMB) instituted a security initiative called the Federal Desktop Core Configuration (or FDCC).
The FDCC iscomprised of about 300 settings on Windows PCs. The objective is to create a standard federal desktop configuration that eases operations and improves security. All Federal agencies were required to implement FDCC settings by February 4, 2008.
Continue readingWhite House Sets Single Security Configuration For Windows Computers.
"A White House mandate to conform to one security configuration on Windows XP and Windows Vista systems should "radically reduce" vulnerabilities. A White House directive is forcing federal government agencies, which currently use perhaps hundreds of different security configurations, to conform to a single one that was designed by the U.S. Air Force."
Vital to every organization that finds it difficult to install security patches quickly.
"A formal deadline for federal agencies and all application vendors to ensure their systems and applications are fully compatible with the federal desktop core configuration (FDCC). Agencies that led the way with FDCC are already saving many tens of millions of dollars while radically improving security and reducing patching time by more than 90%."
Continue readingThe Office of Management and Budget (OMB) has mandated adoption of the Federal Desktop Core Configuration (FDCC) for Windows computers at all agencies.
"FDCC requires changes in system settings, and removes administrative rights. You will still be able to change network settings and many other preferences. Your computer will be safer from hackers, viruses, and spyware as a result."
This frequently asked questions (FAQ) document addresses subjects associated with the March 2007 OMB-mandated Federal Desktop Core Configuration (FDCC).
Topics include the FDCC, laboratory testing of the FDCC, agency testing of the FDCC, use of the Security Content Automation Protocol (SCAP) to evaluate computers for FDCC compliance, deploying the FDCC, and reporting deviations to the FDCC.
The FDCC mandate, issued by the Office of Management and Budget (OMB), requires federal agencies to standardize desktop configurations to meet FDCC standards.
The FDCC is designed to provide a single, standard, enterprise-wide, managed environment for desktops and laptops. By using a common configuration developed for the enterprise rather than hundreds of costly locally created configurations, the federal government will improve security, reduce costs, and decrease application-compatibility issues.
Continue readingFrequently Asked Questions (FAQs)
Privacy Policy and Terms of Use
The only info we keep is the email address that you supplied at purchase. We keep that so that we can send you any update notices, for a free upgrade for the upcoming Windows 11 release, for example, and for our purchase records. All customer data of this sort is immediately removed from, and archived off, our web servers.
We don't store cookies of any kind on your machine.
We do collect IP information from website visitors so that we can see where our web traffic is coming from.
We also use PayPal rather than our own shopping cart for two reasons. Anyone can use PayPal as a 'guest' and make a purchase through PayPal with just about any other payment system available. The other reason is that we just don't want your CC info.
We worked really hard getting our certifications and experience to put together PROimage For Windows. We took a lot of over-priced classes, and spent a lot on the equipment to build and run everything to bring enterprise level security to everyone else at what we think is a really fair price.
We toiled in grey cubes and cold server rooms, and ate leftover donuts and pizza at 3am, and slept on the floor under our desks during holiday roll-outs and go-lives to earn our bones. We have waded through more 'strategy' and 'production' meetings that we can count, and we did it without complaint (mostly) - all to advance desktop and mobile security.
So, we would really appreciate it if you didn't post PROimage on some P2P site somewhere. It's likely not going to work without a validation key anyway, which is hashed and built into the app itself.
If you do want to give a copy to Aunt Edna who got her new PC for her birthday so she can Skype with the grandkids - go for it. We won't mind.
Although the settings in PROimage For Windows have been thoroughly tested by both the NIST and by the tech team at BlueSky Codeworx, the creators of PROimage For Windows, please realize that every computer system, with it's own brand and mix of hardware, software, drivers, periperals, etc. is quite unique.
We have done our best to ensure that PROimage For Windows has a small footprint, is easy to deploy and/or install, and is unlikely to break your system. If anything does arise, we promise that we will do our best to work with you to resolve the issue. Most things can be resolved quite easily with a reverse systems setting change and about as quick as we can get a reply to you. We've never had an issue come up that we couldn't resolve almost immediately.
That said, take some care and caution here. These are powerful system settings that sometimes reside in the core of your Windows operating system and we cannot be held responsible for complete universal system configuration compatibility. the combinations of disparate PCs are now in the trillions.
We strongly recommend backing up your Windows Registry and saving the file on to a thumbdrive before starting. See how to do that on our Tech Info page.