Common Security Configurations. The provider of information technology shall certify applications are fully functional and operate correctly as intended on systems using the Federal Desktop Core Configuration (FDCC). This includes Internet Explorer 7 configured to operate on Windows XP and Vista (in Protected Mode on Vista). For the Windows XP settings, see: xxxx://xxxx.xxxx.xxx/itsec/guidance_WinXP.html, and for the Windows Vista settings, see: xxxx://xxxx.xxxx.xxx/itsec/guidance_vista.html. The standard software installation, operation, maintenance, update, and/or patching processes shall not alter the approved FDCC configuration settings. The information technology provider should also use the Windows Installer Service for installation to the default “program files” directory and should be able to silently install and uninstall. Applications designed for normal end users shall run in the standard user context without elevated system administration privileges.
Appears in 3 contracts
Samples: Blanket Purchase Agreement, Blanket Purchase Agreement, Blanket Purchase Agreement
Common Security Configurations. The provider of information technology shall certify applications are fully functional and operate correctly as intended on systems using the Federal Desktop Core Configuration (FDCC). This includes Internet Explorer 7 configured to operate on Windows XP and Vista (in Protected Mode on Vista). For the Windows XP settings, see: xxxx://xxxx.xxxx.xxx/itsec/guidance_WinXP.html, and for the Windows Vista settings, see: xxxx://xxxx.xxxx.xxx/itsec/guidance_vista.html. The standard software installation, operation, maintenance, update, and/or patching of processes shall not alter the approved FDCC configuration settings. The information technology provider should also use the Windows Installer Service for installation to the default “program files” directory and should be able to silently install and uninstall. Applications designed for normal end users shall run in the standard user context without elevated system administration privileges.
Appears in 2 contracts
Samples: Blanket Purchase Agreement, Blanket Purchase Agreement
Common Security Configurations. The provider of information technology shall certify applications are fully functional and operate correctly as intended on systems using the Federal Desktop Core Configuration (FDCC). This includes Internet Explorer 7 configured to operate on Windows XP and Vista (in Protected Mode on Vista). For the Windows XP settings, see: xxxx://xxxx.xxxx.xxx/itsec/guidance_WinXP.html, and for the Windows Vista settings, see: xxxx://xxxx.xxxx.xxx/itsec/guidance_vista.html. The standard software installation, operation, maintenance, updateupdates, and/or patching processes of software shall not alter the configuration settings from the approved FDCC configuration settingsconfiguration. The information technology provider should also use the Windows Installer Service an installer service for installation to the default “"program files” " directory and should be able to silently install and uninstall. Applications designed for normal end users shall run in the standard user context without elevated system administration privileges.
Appears in 2 contracts
Samples: Blanket Purchase Agreement, Blanket Purchase Agreement