Problem solve
Get help with specific problems with your technologies, process and projects.
Microsoft security integration and centralized management
Buffer overflow prevention: Add apps to Microsoft EMET with command line configuration
Adding vulnerable applications to the Microsoft Enhanced Mitigation Experience Toolkit is simple once you've mastered the command line configuration tool. Continue Reading
How to use BitLocker To Go in Windows 7: A primer
In this two part series, Phil Cox first reviews the features of BitLocker To Go in Windows 7. Continue Reading
Are there options beyond a Windows XP SP2 upgrade?
If you're using 32-bit Windows, you have other options when Microsoft stops its support for machines running Windows XP SP2. Continue Reading
-
Using Windows software restriction policies to stop executable code
Software restriction policies are one way to prevent known malware and file-sharing applications from taking control of your network. Continue Reading
How to perform an Active Directory health check
Once your Active Directory is up and running, you do need to perform regular maintenance on it. Expert Joel Snyder reveals some of his best AD tricks. Continue Reading
Windows management tips: How to backup and restore Active Directory
If you lose your Active Directory, you lose everything. Expert Joel Snyder lays out a plan to help you backup and restore AD.Continue Reading
Configuring access control in a Windows Server 2008 infrastructure
Jennifer Jabbusch reviews how four Windows components will help you with various access control and authentication needs.Continue Reading
How to use Windows XP Mode in Windows 7
Your hardware or software may not be compatible with Windows 7. Contributor Tony Bradley reveals how to bridge the gap using Windows XP Mode virtualization.Continue Reading
Tradeoffs and advantages of network access control with Microsoft NAP
Microsoft NAP's endpoint security policy compliance checks and integration with third-party security products make it an attractive option over traditional network access control solutions.Continue Reading
Microsoft Windows RMS enables granular access control over sensitive data
Microsoft Windows Rights Management Services (RMS) brings affordable digital rights management to Windows Server 2003 and Windows Server 2008 users.Continue Reading
-
Assess your security state in five steps
Prioritize your security spending by identifying how data moves and users interact, and what vulnerabilities exist in infrastructure, systems and applications.Continue Reading
Next version of Microsoft ISA Server brings Web security to midmarket
Microsoft's Forefront Threat Management Gateway (TMG) adds HTTP and HTTPs antimalware inspection, application vulnerability and Web filtering. TMG will integrate tightly with other Microsoft Security products under the upcoming Forefront Security ...Continue Reading
Steps to secure Windows Server 2003: Access controls and maintenance
Maintaining the security of Windows Server 2003 requires strong access control policies and constant patch and update maintenance. This is the second of two parts.Continue Reading
Steps to secure Windows Server 2003: Volumes, policies and port control
This step-by-step guide explains how to secure Windows Server 2003. This is the first of two parts. Continue Reading
Choosing midmarket wireless authentication server infrastructure options
RADIUS servers don't have to be out of the price range of midmarket organizations; alternatives such as extending Windows infrastructure or outsourcing bring enterprise-grade infrastructure to smaller companies.Continue Reading