New & Notable
Microsoft Windows Security News
October 26, 2010
Security researchers from Trustwave's Spiderlabs research team demonstrated malware,--including a Windows credential stealer--that uses automated processes to avoid detection and dupe forensics investigators.
October 14, 2010
SDL RegEx Fuzzer examines regular expression patterns and whether they can be exploited causing a denial-of-service (DoS) attack.
August 02, 2010
Critical update comes a week ahead of Microsoft's regular Patch Tuesday, amid increased malware attacks.
March 23, 2010
First American Title Insurance Company cuts identity management user provisioning time from days to seconds with Microsoft Forefront Identity Manager 2010.
Microsoft Windows Security Get Started
Bring yourself up to speed with our introductory content
Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted. Continue Reading
This podcast will synthesize the high-level security challenges of ID and access management into a 10-minute discussion. Continue Reading
Find out how much you've learned about building an identity and access management architecture in Identity and Access Management Security School. Continue Reading
Evaluate Microsoft Windows Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Are you preparing for a Windows 7 upgrade? Our latest learning guide reviews the new and improved security features of the new and improved operating system. Continue Reading
In this learning guide, various experts review how to use Active Directory to secure your organization. Continue Reading
Your organization may primarily be a Windows shop, but Macbooks are becoming popular among executives and Macintosh computer security must be understood. Continue Reading
Manage Microsoft Windows Security
Learn to apply best practices and optimize your operations.
Built into business versions of the Windows OS, Microsoft BitLocker encryption is an integral enterprise encryption tool. Read on to learn how BitLocker works and how to manage it. Continue Reading
Adding vulnerable applications to the Microsoft Enhanced Mitigation Experience Toolkit is simple once you've mastered the command line configuration tool. Continue Reading
There's no one-size-fits-all approach for deciding when a patch needs testing. Tom Chmielarski shares his thoughts on an ideal patch management process. Continue Reading
Problem Solve Microsoft Windows Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform. Continue Reading
Although Windows 7 is more secure than its predecessors, it remains vulnerable to security threats. In this tip, Brien Posey details five steps for securing Windows 7 desktops. Continue Reading
Many patch management systems fail to address endpoint application security. Tom Chmielarski suggests three areas to examine to ensure that your endpoint applications are secure. Continue Reading