Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Microsoft identity and access management
Learn Active Directory security basics: How to configure the management tool
In this learning guide, various experts review how to use Active Directory to secure your organization. Continue Reading
Understand role-based access control in Microsoft Exchange 2010
Role-based access control in Microsoft Exchange Server 2010 enforces the principle of least privilege, and allows companies to delegate email management efficiently. Continue Reading
Understand the pros and cons of Microsoft Windows 7 DirectAccess
Discover how Microsoft's Windows 7 DirectAccess can help midsized companies obtain secure remote end-to-edge and end-to-end access, tunneled through a Windows Server 2008 R2 DirectAccess Server. Plus, examine the advantages and limitations of this ... Continue Reading
-
Microsoft SharePoint security hinges on authorization, external user management
Management of external user access controls, authentication and authorization are important Microsoft SharePoint security best practices. This is the second of a two-part series of technical tips. Continue Reading
Poor Microsoft SharePoint security permissions policies can derail deployments
A strong Microsoft SharePoint security policy starts with proper permissions and access controls to internal resources, and to control external users. This is the first of a two-part technical tip. Continue Reading
Three ways to prioritize endpoint security over perimeter defenses
Midmarket organizations should prioritize endpoint security management over perimeter defenses.Continue Reading