Deb Shinder

Debra Littlejohn Shinder is a technology and security analyst and author specializing in identity, security and cybercrime, utilizing her past experience as a police officer and police academy/criminal justice instructor. She has written numerous books and articles for web and print publications and has been awarded the Microsoft MVP designation for fourteen years in a row.

Server 2003’s Network Access Quarantine Control: What is it and How Does it Enhance Security?

Windows Server 2003 includes many new features designed to make your servers and networks more secure. One of the least understood is the new network access quarantine control feature, even if you’ve heard of it, you might not know what it is or how it can be used to enhance your network’s security. Quarantine control is perhaps Server 2003’s least documented great new feature.

Authorization Manager and Role-Based Administration in Windows Server 2003 (Part 2)

In Part 1 of this article, we discussed Microsoft’s new emphasis on role-based security and provided an overview of the concepts involved in using the Authorization Manager MMC snap-in. In Part 2, we’ll discuss how to configure role and task definitions, how to create role assignments within an application, and how to create and work with scopes. You’ll also learn about authorization rules.

Securing Server 2003 Domain Controllers

Because the domain controller, as its name implies, in many ways has control over your Windows domain and all of the computers that belong to it, it is essential that you take extra precautions to ensure that your DCs are and remain secure. In this article, we will look at a few of the important security measures you should take in regard to your domain controllers.

Should Microsoft Identity Integration Server Be Part of Your Security Plan?

Microsoft’s Identity Integration Server (MIIS) and its “lite” version, the Identity Integration Feature Pack for Windows Server 2003 (IIFP) can help organizations get a handle on all the disparate databases throughout the organization that contain information about a person’s identity. In this article, we'll take a look at what MIIS is, how it works and what the latest version has to offer.

How to Defend your Network Against Social Engineers

You can buy the most expensive firewall equipment, install the best anti-virus software, add the greatest intrusion detection system, but there is still a “weakest link” in your security plan that you may have overlooked. In this article, we discuss some common social engineering tactics and, more importantly, what you can do to protect your organization’s network against those who specialize in exploiting the weaknesses of people rather than those of the software.

Is Open Source Really More Secure?

In this article we'll discuss the claim made by proponents of open source software that such software is more secure. Is open source really inherently more secure than closed source commercial software? If so, why? And if not, why do so many have that perception?

Comparing Firewall Features

In this article, we’ll take a look at some of the factors you should consider when buying a firewall, features available on some of the most popular offerings, and how to compare the real cost of each (hint: the initial purchase price is only a starting point).

Choosing a Firewall

In this article, we’ll take a look at some of the factors you should consider when buying a firewall, features available on some of the most popular offerings, and how to compare the real cost of each (hint: the initial purchase price is only a starting point).

Making Microsoft Software Update Services Part of your Patch Management Strategy

Windows Server 2003 includes a number of interesting and useful new features, and one that will be especially helpful to administrators who are struggling with a way to keep a large number of systems updated with the appropriate patches and fixes is the Software Update Service (SUS). SUS can also run on Windows 2000. In this article, we’ll describe how SUS works and give you some pointers on deploying SUS within your organization.

Scroll to Top