Windows OS Security

Last Updated on 8 June 2016, Total: 133 Articles and Tutorials

  1. Video: Importing GPOs into Security Compliance Manager (SCM)

    This video explains the process of importing GPOs into Security Compliance Manager 2.5... Read More

  2. Video: SCM 2.5 Creating GPOs from Baselines

    This video demonstrates the process of conversion of SCM baselines into GPOs... Read More

  3. Video: Security Compliance Manager 2.5: Understanding Baselines

    This video introduces Microsoft Security Compliance Manager 2.5 and explains the concept of baselines... Read More

  4. Video: User Rights - Server vs Domain Controller

    This video explains the concept of user rights for a Windows server, compared to that of a Windows domain controller... Read More

  5. To Whitelist or To Not Whitelist

    In this article the author investigates whitelisting methods as a way to control which applications users can use, as opposed to privilege management solutions which can dramatically reduce the attack surface within an organization... Read More

  6. Myths of Securing Windows Desktops (Part 2)

    In part two of this article about Securing Windows desktops, the author discusses endpoint firewalls, data protection, and whitelisting of applications as to make sure that readers are fully aware of the capabilities and limitations of each security solution... Read More

  7. Myths of Securing Windows Desktops (Part 1)

    In this article the author discusses two of the areas that you will need to solve: Anti-virus and privilege management... Read More

  8. Accessing Security Logs Remotely and Efficiently

    In this article the author discusses the various tools, techniques and options available to administrators to gather logs from one or many Windows computers remotely... Read More

  9. Troubleshooting Event Log Entries

    In this article the author will review some of the tips, concepts, tools, and overall approaches in determining the root cause of log events... Read More

  10. Windows Security Tools

    In this article the author discusses the following Microsoft security tools - MBSA, Security templates, SCW and SCM... Read More