Microsoft security integration and centralized management News
October 14, 2010
SDL RegEx Fuzzer examines regular expression patterns and whether they can be exploited causing a denial-of-service (DoS) attack.
May 05, 2010
Microsoft's recent decision to not release Forefront Protection Manager will likely provide deployment benefits in the long run, but at least one midmarket pro will need to adjust to his new management console.
March 10, 2010
Early adopters share why their moves to Microsoft Forefront Security will offer value once the kinks have been worked out.
July 21, 2009
Microsoft Essential Business Server solves major security and network management issues for midmarket companies that are outgrowing Microsoft Small Business Server 2003 and are too small for enterprise solutions.
Evaluate Microsoft security integration and centralized management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Are you preparing for a Windows 7 upgrade? Our latest learning guide reviews the new and improved security features of the new and improved operating system. Continue Reading
In this learning guide, various experts review how to use Active Directory to secure your organization. Continue Reading
Microsoft's Forefront Threat Management Gateway (TMG) adds HTTP and HTTPs antimalware inspection, application vulnerability and Web filtering. TMG will integrate tightly with other Microsoft Security products under the upcoming Forefront Security ... Continue Reading
Product ReviewsPowered by IT Central Station
My customers are always impressed by its central management, reporting, and options to do more. But, the policies and rules at deployment take time if you don't know the product.Powered by IT Central Station
Valuable Features: The central management solution by far. There can be like a religious war between the large antivirus systems, but I do...Continue Reading
Powered by IT Central Station
Valuable Features: Having experienced the frustrations of poorly designed/executed interfaces first-hand, one of the most valuable features...Continue Reading
The way that it automates the provisioning of accounts is valuable but there were some deployment issues.Powered by IT Central Station
Valuable Features: The way that it automated the provisioning of accounts for employees and students and the quick response time. •...Continue Reading
Manage Microsoft security integration and centralized management
Learn to apply best practices and optimize your operations.
Adding vulnerable applications to the Microsoft Enhanced Mitigation Experience Toolkit is simple once you've mastered the command line configuration tool. Continue Reading
If you lose your Active Directory, you lose everything. Expert Joel Snyder lays out a plan to help you backup and restore AD. Continue Reading
Jennifer Jabbusch reviews how four Windows components will help you with various access control and authentication needs. Continue Reading
Problem Solve Microsoft security integration and centralized management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this two part series, Phil Cox first reviews the features of BitLocker To Go in Windows 7. Continue Reading
If you're using 32-bit Windows, you have other options when Microsoft stops its support for machines running Windows XP SP2. Continue Reading
Software restriction policies are one way to prevent known malware and file-sharing applications from taking control of your network. Continue Reading