New & Notable
Microsoft security integration and centralized management News
October 14, 2010
SDL RegEx Fuzzer examines regular expression patterns and whether they can be exploited causing a denial-of-service (DoS) attack.
March 10, 2010
Early adopters share why their moves to Microsoft Forefront Security will offer value once the kinks have been worked out.
April 14, 2009
Microsoft continues to meld security and identity management, with the Beta 2 release this week of Stirling, the next generation of its Forefront Security Suite.
Evaluate Microsoft security integration and centralized management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Are you preparing for a Windows 7 upgrade? Our latest learning guide reviews the new and improved security features of the new and improved operating system. Continue Reading
In this learning guide, various experts review how to use Active Directory to secure your organization. Continue Reading
Microsoft's Forefront Threat Management Gateway (TMG) adds HTTP and HTTPs antimalware inspection, application vulnerability and Web filtering. TMG will integrate tightly with other Microsoft Security products under the upcoming Forefront Security ... Continue Reading
Manage Microsoft security integration and centralized management
Learn to apply best practices and optimize your operations.
Adding vulnerable applications to the Microsoft Enhanced Mitigation Experience Toolkit is simple once you've mastered the command line configuration tool. Continue Reading
If you lose your Active Directory, you lose everything. Expert Joel Snyder lays out a plan to help you backup and restore AD. Continue Reading
Jennifer Jabbusch reviews how four Windows components will help you with various access control and authentication needs. Continue Reading
Problem Solve Microsoft security integration and centralized management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this two part series, Phil Cox first reviews the features of BitLocker To Go in Windows 7. Continue Reading
Software restriction policies are one way to prevent known malware and file-sharing applications from taking control of your network. Continue Reading
Once your Active Directory is up and running, you do need to perform regular maintenance on it. Expert Joel Snyder reveals some of his best AD tricks. Continue Reading