The FDCC mandate, put in place one year ago by the U.S. Office of Management and Budget, requires that all federal agencies standardize the configuration of approximately 300 settings on each of their Windows-based PCs. The reason for this standardization is to strengthen federal IT security by reducing opportunities for hackers to access and exploit government computer systems. While agencies across the government support the goal, many have found compliance to be a significant challenge, especially given the complexity of federal IT environments. Most federal agencies employ thousands of workers in multiple divisions spread across diverse geographic regions. In defense-related departments, the complexity is further compounded by a variety of security protocols and regulations.
"In the 21st Century, federal agencies can't afford to have government computers taken out of commission by a virus, malware, or the downloading of an unauthorized program " whether it's a result of a malicious attack or from accidental misuse," declared Joe Loughry, CEO of Persystent Technologies. "The spirit behind the FDCC rules is to encourage agencies to avoid such disasters. At Persystent Technologies, we're offering to be a partner to government IT leaders by delivering both a roadmap to help guide implementation, as well as software tools to ensure ongoing compliance."
In its white paper, "How IT Can Enforce the Federal Desktop Core Configuration (FDCC) Mandate," authored by Jamie Cerra, senior sales engineer, Persystent Technologies offers four simple steps for adopting the year-old rules. According to the company, agencies should: