New & Notable
Microsoft endpoint security management News
March 10, 2010
Early adopters share why their moves to Microsoft Forefront Security will offer value once the kinks have been worked out.
December 03, 2009
Microsoft introduces the successor to the ISA Server, the Forefront Threat Management Gateway. TMG introduce Web security to the ISA line, which was long used as a proxy server.
April 14, 2009
Microsoft continues to meld security and identity management, with the Beta 2 release this week of Stirling, the next generation of its Forefront Security Suite.
Microsoft endpoint security management Get Started
Bring yourself up to speed with our introductory content
Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted. Continue Reading
Evaluate Microsoft endpoint security management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Your organization may primarily be a Windows shop, but Macbooks are becoming popular among executives and Macintosh computer security must be understood. Continue Reading
Windows Firewall with Advanced Security extends security to Windows 7 and Windows Server 2008 end users. Continue Reading
Full disk encryption is becoming a priority for laptop security in midmarket companies because of regulatory compliance and fear of data breaches. Consider central management, ease of deployment, user transparency, reporting, platform support and ... Continue Reading
Manage Microsoft endpoint security management
Learn to apply best practices and optimize your operations.
Booting a system from a virtual hard drive is one of the perks of Windows 7. After reviewing the security benefits, Tony Bradley offers a step-by-step plan for creating a VHD. Continue Reading
Tony Bradley explains why the security features in IE 8 may convince midmarket organizations to make the browser upgrade. Continue Reading
802.1X, a port-based access control, is primarily used on WLANs to control which machines can connect to the network. However, 802.1X is gaining popularity as an access control method for wired networks. This tip outlines some stipulations for ... Continue Reading
Problem Solve Microsoft endpoint security management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform. Continue Reading
Although Windows 7 is more secure than its predecessors, it remains vulnerable to security threats. In this tip, Brien Posey details five steps for securing Windows 7 desktops. Continue Reading
Many patch management systems fail to address endpoint application security. Tom Chmielarski suggests three areas to examine to ensure that your endpoint applications are secure. Continue Reading