By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Microsoft security integration and centralized management News
October 14, 2010
SDL RegEx Fuzzer examines regular expression patterns and whether they can be exploited causing a denial-of-service (DoS) attack.
May 05, 2010
Microsoft's recent decision to not release Forefront Protection Manager will likely provide deployment benefits in the long run, but at least one midmarket pro will need to adjust to his new management console.
March 10, 2010
Early adopters share why their moves to Microsoft Forefront Security will offer value once the kinks have been worked out.
July 21, 2009
Microsoft Essential Business Server solves major security and network management issues for midmarket companies that are outgrowing Microsoft Small Business Server 2003 and are too small for enterprise solutions.
Evaluate Microsoft security integration and centralized management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Are you preparing for a Windows 7 upgrade? Our latest learning guide reviews the new and improved security features of the new and improved operating system. Continue Reading
In this learning guide, various experts review how to use Active Directory to secure your organization. Continue Reading
Microsoft's Forefront Threat Management Gateway (TMG) adds HTTP and HTTPs antimalware inspection, application vulnerability and Web filtering. TMG will integrate tightly with other Microsoft Security products under the upcoming Forefront Security ... Continue Reading
Manage Microsoft security integration and centralized management
Learn to apply best practices and optimize your operations.
Adding vulnerable applications to the Microsoft Enhanced Mitigation Experience Toolkit is simple once you've mastered the command line configuration tool. Continue Reading
If you lose your Active Directory, you lose everything. Expert Joel Snyder lays out a plan to help you backup and restore AD. Continue Reading
Jennifer Jabbusch reviews how four Windows components will help you with various access control and authentication needs. Continue Reading
Problem Solve Microsoft security integration and centralized management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this two part series, Phil Cox first reviews the features of BitLocker To Go in Windows 7. Continue Reading
If you're using 32-bit Windows, you have other options when Microsoft stops its support for machines running Windows XP SP2. Continue Reading
Software restriction policies are one way to prevent known malware and file-sharing applications from taking control of your network. Continue Reading