Video: User Rights – Server vs Domain Controller
This video explains the concept of user rights for a Windows server, compared to that of a Windows domain controller.
This video explains the concept of user rights for a Windows server, compared to that of a Windows domain controller.
In this article the author investigates whitelisting methods as a way to control which applications users can use, as opposed to privilege management solutions which can dramatically reduce the attack surface within an organization.
In part two of this article about Securing Windows desktops, the author discusses endpoint firewalls, data protection, and whitelisting of applications as to make sure that readers are fully aware of the capabilities and limitations of each security solution.
In this article the author discusses two of the areas that you will need to solve: Anti-virus and privilege management.
In this article the author discusses the various tools, techniques and options available to administrators to gather logs from one or many Windows computers remotely.
In this article the author will review some of the tips, concepts, tools, and overall approaches in determining the root cause of log events.
In this article the author discusses the following Microsoft security tools – MBSA, Security templates, SCW and SCM.
This article covers Windows 7 integrated security feature AppLocker.
In this article, we’ll explore the concepts behind APT and introduce you to the different pieces of the puzzle – the actors, the threats and the techniques.
This video demonstrates how Security Compliance Manager can provide many security baselines.