Windows OS Security

Last Updated on 5 Nov. 2014, Total: 132 Articles and Tutorials

  1. Is Microsoft Windows Security Essentials Enough for Enterprise Security?

    Is Windows Security Essentials enough to achieve satisfactory enterprise security or should enterprises be considering additional security strategies? Let's take a look... Read More

  2. Verifying Active Directory Delegation is Accurate

    This article looks at how to verify that any actice directory delegations which have been set up are correct... Read More

  3. Termination of Windows XP support – How does this affect your security?

    This article reflects how the termination of Windows XP support is likely to affect companies or individuals still using the operating system in the interim and any considerations that should be made short term to secure your systems while planning a move to a current and supported version... Read More

  4. Video: Auditing vs Advanced Auditing Configurations - Part 2

    Microsoft has added new auditing options to Windows Server 2008 R2/Windows 7 computers and above. The new auditing controls more granular areas of your computer, reducing the overall security log entries so you can audit more of what you want and less of what you don’t need. In this second part video... Read More

  5. Effectively securing Windows 8.x, ten things you need to know

    This article will focus on the security enhancements that Windows 8.x offers, over what is found in the previous versions of Windows. We will also look at enhancements that have been made to the operating system that will help both the individual and the enterprise and effectively will impact data stored in the cloud... Read More

  6. Video: Auditing vs Advanced Auditing Configurations - Part 1

    Microsoft has added new auditing options to Windows Server 2008 R2/Windows 7 computers and above. The new auditing controls more granular areas of your computer, reducing the overall security log entries so you can audit more of what you want and less of what you don’t need. In this first part video we will look at the configurations of each... Read More

  7. Least Privilege Eases Whitelisting Requirements

    The author explains how least privilege can ease whitelisting requirements... Read More

  8. IT Admins and Security Auditors

    In this article, the author discusses the pitfalls of security audits when administrators and auditors do not work well together... Read More

  9. Video: Importing Custom Settings Into Group Policy Production using Security Compliance Manager (SCM)

    This video explains the process of importing custom settings into Group Policy Production using Security Compliance Manager... Read More

  10. Video: Importing GPOs into Security Compliance Manager (SCM)

    This video explains the process of importing GPOs into Security Compliance Manager 2.5... Read More

Featured Links