Windows OS Security

Last Updated on 8 June 2016, Total: 133 Articles and Tutorials

  1. ADM Template Repository

    Control over registry using an administrative template repository solution... Read More

  2. Accessing Security Logs Remotely and Efficiently

    In this article the author discusses the various tools, techniques and options available to administrators to gather logs from one or many Windows computers remotely... Read More

  3. Analysis of Buffer Overflow Attacks

    What causes the buffer overflow condition? Broadly speaking, buffer overflow occurs anytime the program writes more information into the buffer than the space it has allocated in the memory. This allows an attacker to overwrite data that controls the program execution path and hijack the control of the program to execute the attacker’s code instead the process code. For those... Read More

  4. Analyzing DLL Hijacking Attacks

    Taking a look at the architectural flaws that make DLL hijacking a possibility, how to determine if applications you use are vulnerable, and steps you can take to ensure you aren’t target of this attack... Read More

  5. Applocker: Scenarios for Use and Deployment

    This article covers Windows 7 integrated security feature AppLocker... Read More

  6. Auditing Users and Groups with the Windows Security Log

    Active Directory is one of the most important areas of Windows that should be monitored for intrusion prevention and the auditing required by legislation like HIPAA and Sarbanes-Oxley. I say that because Active Directory is home to objects most associated with user access: user accounts, groups, organizational units and group policy objects. This article deals with monitoring users and groups... Read More

  7. Auditing for Increased Security (Part 1)

    You will need to Audit your systems for enhanced and increased security. When Microsoft laid out this objective, they were most likely thinking about building your security strategy up with Defense in Depth. This strategy is outlined as a way to avoid depending on one single protective measure deployed on your network. In other words, to eliminate the feeling of... Read More

  8. Best practice security guide to built-in device control in Windows (Part 1)

    How to protect your Windows XP, Windows Server 2003 or Vista based computer from unwanted or built-in devices... Read More

  9. Best practice security guide to built-in device control in Windows (Part 2)

    A quick overview of the device control options in Windows Vista... Read More

  10. Better Security through Sandboxing

    Taking a look at popular sandboxing methods and discussing just what sandboxing does and does not accomplish, security-wise... Read More