Microsoft identity and access management News
October 26, 2010
Security researchers from Trustwave's Spiderlabs research team demonstrated malware,--including a Windows credential stealer--that uses automated processes to avoid detection and dupe forensics investigators.
March 23, 2010
First American Title Insurance Company cuts identity management user provisioning time from days to seconds with Microsoft Forefront Identity Manager 2010.
March 03, 2010
After reading Joel Snyder's article on Active Directory backup strategies, a reader asked the author about the pros and cons of using ...
April 14, 2009
Microsoft continues to meld security and identity management, with the Beta 2 release this week of Stirling, the next generation of its Forefront Security Suite.
Microsoft identity and access management Get Started
Bring yourself up to speed with our introductory content
This podcast will synthesize the high-level security challenges of ID and access management into a 10-minute discussion. Continue Reading
Find out how much you've learned about building an identity and access management architecture in Identity and Access Management Security School. Continue Reading
Evaluate Microsoft identity and access management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
In this learning guide, various experts review how to use Active Directory to secure your organization. Continue Reading
Role-based access control in Microsoft Exchange Server 2010 enforces the principle of least privilege, and allows companies to delegate email management efficiently. Continue Reading
Discover how Microsoft's Windows 7 DirectAccess can help midsized companies obtain secure remote end-to-edge and end-to-end access, tunneled through a Windows Server 2008 R2 DirectAccess Server. Plus, examine the advantages and limitations of this ... Continue Reading
Product ReviewsPowered by IT Central Station
My customers are always impressed by its central management, reporting, and options to do more. But, the policies and rules at deployment take time if you don't know the product.Powered by IT Central Station
Valuable Features: The central management solution by far. There can be like a religious war between the large antivirus systems, but I do...Continue Reading
Powered by IT Central Station
Valuable Features: Having experienced the frustrations of poorly designed/executed interfaces first-hand, one of the most valuable features...Continue Reading
The way that it automates the provisioning of accounts is valuable but there were some deployment issues.Powered by IT Central Station
Valuable Features: The way that it automated the provisioning of accounts for employees and students and the quick response time. •...Continue Reading
Manage Microsoft identity and access management
Learn to apply best practices and optimize your operations.
Phil Cox reviews how to allow your remote users to access RMS-protected documents. Continue Reading
David Shackleford reviews authorization rules that will help you secure your IIS 7 Web server. Continue Reading
If you lose your Active Directory, you lose everything. Expert Joel Snyder lays out a plan to help you backup and restore AD. Continue Reading
Problem Solve Microsoft identity and access management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform. Continue Reading
Learn how hard disk defragment tools can play a critical role in securing your virtual disks. Continue Reading
In the second installment of his two part series, Phil Cox reviews recommended BitLocker To Go settings that should be configured in your organization. Continue Reading