Cybersecurity

Server 2003’s Network Access Quarantine Control: What is it and How Does it Enhance Security?

Windows Server 2003 includes many new features designed to make your servers and networks more secure. One of the least understood is the new network access quarantine control feature, even if you’ve heard of it, you might not know what it is or how it can be used to enhance your network’s security. Quarantine control is perhaps Server 2003’s least documented great new feature.

MSSQL and Security

When planning a secure MS SQL-based computer system you have to focus on several key elements: an appropriate installation with proper access rights, well-set rules for MS SQL users and a mechanism which would register all the operations performed in a database so that in case of problems the administrator could take closer and easier guesses about their real source. Moreover, do not forget that you have to design emergency procedures, such as data recovery and transferring them to another server, and test them, too.

Authorization Manager and Role-Based Administration in Windows Server 2003 (Part 2)

In Part 1 of this article, we discussed Microsoft’s new emphasis on role-based security and provided an overview of the concepts involved in using the Authorization Manager MMC snap-in. In Part 2, we’ll discuss how to configure role and task definitions, how to create role assignments within an application, and how to create and work with scopes. You’ll also learn about authorization rules.

Securing Server 2003 Domain Controllers

Because the domain controller, as its name implies, in many ways has control over your Windows domain and all of the computers that belong to it, it is essential that you take extra precautions to ensure that your DCs are and remain secure. In this article, we will look at a few of the important security measures you should take in regard to your domain controllers.

SecurityTalk with K Rudolph, CISSP

The SecurityTalks is an initiative aimed at providing the scene with the worlds' leading security experts' thoughts on various information security issues, in a way much different than the usual, small and concise interviews you are used to seeing.

Remote Administration of ISA Server 2004

If you are like me and despise switching between eight or more Terminal Services sessions, even on a dual monitor setup. Then you will probably be aware of the "lovely" ability to install remote admin tools on your XP or other desktop machines. For those of you who have never attempted it or would like to be able to do it on ISA 2004, here it is.

Should Microsoft Identity Integration Server Be Part of Your Security Plan?

Microsoft’s Identity Integration Server (MIIS) and its “lite” version, the Identity Integration Feature Pack for Windows Server 2003 (IIFP) can help organizations get a handle on all the disparate databases throughout the organization that contain information about a person’s identity. In this article, we'll take a look at what MIIS is, how it works and what the latest version has to offer.

How to Defend your Network Against Social Engineers

You can buy the most expensive firewall equipment, install the best anti-virus software, add the greatest intrusion detection system, but there is still a “weakest link” in your security plan that you may have overlooked. In this article, we discuss some common social engineering tactics and, more importantly, what you can do to protect your organization’s network against those who specialize in exploiting the weaknesses of people rather than those of the software.

Scroll to Top