Browse by Tags

Tagged Content List
  • Wiki Page: Configure Malware Policy in Exchange 2013

    Microsoft Exchange 2013 has the basic antimalware settings which can be enabled during the installation. By default we have a default malware policy which can be modified according to our needs. But it cannot be deleted. We can create our malware policy according to the company needs. Below...
  • Wiki Page: Microsoft Security Compliance Manager (SCM) - Baseline Download Help

    Table of Contents Background Baseline Download Links Copyright Information Background When the Microsoft Security Compliance Manager (SCM) tool was initially designed, the intention was that all content (i.e. baselines) published by Microsoft would flow to users from within the SCM tool itself...
  • Wiki Page: Wiki: IT Security Portal

    Information security is the process of keeping computers and networks protected from theft, corruption, unwanted publication, tampering, or natural disaster, while keeping the information and property accessible and productive to its intended users. This article contains links only to TechNet Wiki...
  • Wiki Page: SQL Server Database Engine Permission Posters

    Posters are available that list all the granular permissions of the SQL Server Database Engine and Windows Azure SQL Database. Select the pdf images below. You can display these on your computer, expanding or shrinking them to focus on specific areas. Use Control+F to search for a specific permission...
  • Wiki Page: SharePoint: Limited Access permission

    Source reference Anonymous Users, Forms Pages, and the Lockdown Feature ( http://blogs.msdn.com/b/ecm/archive/2007/05/12/anonymous-users-forms-pages-and-the-lockdown-feature.aspx ) Scenario We have a list which doesn't inherit permissions from the site. Also, at the root of the list, there...
  • Wiki Page: Bring Your Own Device (BYOD) Survival Guide for Microsoft Technologies

    As technology evolves and users demand to work from anywhere and any device, it is important that companies have a strategy to embrace this new model. In this new model IT doesn’t have full control of the device, however is necessary to have some level of security in place to enable users to be productive...
  • Wiki Page: Microsoft Enhanced Mitigation Experience Toolkit (EMET) 4.1 Technical Review - Part 1

    Microsoft Enhanced Mitigation Experience Toolkit (EMET) is a must tool from my point of view for any security professional as well as normal users to help protect them from unknown vulnerabilities or what so called Zero-Day attacks. EMET will try to stop and prevent the malicious code from running...
  • Wiki Page: SCCM 2012 R2 Antimalware Policy Hazırlanması ve İstemcilere Dağıtılması (tr-TR)

    Merhabalar, Bu makalemde sizlere System Center Endpoint Protection üzerinde istemcilerimiz üzerine uygulayacağımız Anti-malware Policy ye değineceğiz. SCEP üzerinde istemcilerimize yapılacak olan aksiyonları içeren kuralımız antimalware policy dir. Bizde burada istemcilerimiz üzerinde bulunan...
  • Wiki Page: Script to Check HD Encrypted Using BitLocker

    This sample script, originally on this blog post , shows how you can script a check on hard drives to report if they have been encrypted with BitLocker and/or BiltLocker To Go. Do you have an alternative script or way to check if BL is enabled on a hard drive? Please share in this article - it is...
  • Wiki Page: Microsoft Security Compliance Manager (SCM)

    Table of Contents Overview What does SCM do? Key Features and Benefits Setup Requirements More Information Overview Security Compliance Manager 3.0 (SCM 3.0) is a free tool from the Microsoft Solution Accelerator team that enables you to quickly configure and manage your desktops, traditional datacenter...
  • Wiki Page: Office 365 Service Descriptions: Privacy, Security and Transparency, Service Continuity, and Compliance

    The Office 365 Service Descriptions TechNet page provide detailed descriptions of the services and features that are available with Office 365. Each Office 365 service is designed to provide a high degree of security, privacy, continuity, and compliance. For more information, see the following...
  • Wiki Page: Office 365 Service-Beschreibungen: Datenschutz, Sicherheit und Transparenz, Service-Verfügbarkeit und Compliance (de-DE)

    Dieser Artikel ist die Übersetzung des englischen Artikels Office 365 Service Descriptions: Privacy, Security and Transparency, Service Continuity, and Compliance von Ed Price . Die TechNet-Seite Office 365 Service Descriptions beschreibt die von Office 365 angeboten Services und Features detailliert...
  • Wiki Page: Forefront Protection 2010 for Exchange Server (FPE 2010): FAQ

    Get answers to your questions about Forefront Protection 2010 for Exchange Server. Q. What is Forefront Protection 2010 for Exchange Server? A. Forefront Protection 2010 for Exchange Server provides fast and effective detection of viruses, worms, and spyware by integrating multiple scanning...
  • Wiki Page: Microsoft Anti-Virus Exclusion List

    One place on the web where you can find an updated list of ALL the AV exclusions you might want to configure for Windows Server. Feel free to add to the list, it is the wiki way! HINT : Subscribe to the RSS feed for this wiki page to get auto-notification when it is updated! Enterprise Configuration...
  • Wiki Page: Forefront Online Protection for Exchange (FOPE): FAQ

    Get answers to your general questions about the Forefront Online Protection for Exchange (FOPE) service right here. You can find more FOPE documentation at the following locations: FOPE Technical Support FAQs - Details many troubleshooting tips for FOPE. FOPE User Guide - In-depth documentation...
  • Wiki Page: Forefront Protection 2010 for SharePoint (FPSP 2010): FAQ

    Get answers to your questions about Forefront Protection 2010 for SharePoint. Q. What is Forefront Protection 2010 for SharePoint? A. Microsoft Forefront Protection 2010 for SharePoint helps prevents users from uploading or downloading documents containing malware, out-of-policy content...
  • Wiki Page: A Solution for Private Cloud Security

    Welcome to the "A Solution for Private Cloud Security" series of three papers on private cloud security. With increasing numbers of organizations looking to create cloud-based environments or to implement cloud technologies within their existing data centers, business and technology decision...
  • Wiki Page: SharePoint 2010: Choisir entre des groupes AD et des groupes SharePoint (fr-FR)

    Quelle route devriez-vous emprunter en vous dirigeant vers une infrastructure de sécurité pour SharePoint : utiliser Active Directory (AD) ou des groupes SharePoint ? Table of Contents Pour: les groupes AD Pour: les groupes SharePoint Best practices Sujets connexes Vue d'ensemble des best...
  • Wiki Page: FIM 2010: Planning security setup for accounts, groups and services

    //**article in progress**// This article provides an overview of the required security accounts, service accounts and groups of the related FIM components and infrastructure. Table of Contents General Least privilege Segregation of duties / Account Isolation Admin rights Installation Required...
  • Wiki Page: Private Cloud Technical Concept and Overview

    Driven by pressure to do more with less, many of your customers turn increasingly to virtualization when they need to add capacity or deliver new or scaled out services. And yet, simple consolidation of servers—what some have called virtualization 1.0—is no longer sufficient. Your customers want...
  • Wiki Page: Password Management (es-ES)

    Crear Passwords Fuertes y fáciles de recordar: Use una frase, recordando un momento memorable y que solo usted puede recordar El Password debería ser no menor de ocho caracteres. Incluya al menos uno de los siguientes caracteres: Mayúsculas, minúsculas, caracteres especiales...
  • Wiki Page: Effective Database Engine Permissions

    This topic describes how to determine who has permissions to various objects in the SQL Server Database Engine. SQL Server implements two permission systems for the Database Engine. An older system of fixed roles has preconfigured permissions. Beginning with SQL Server 2005 a more flexible and precise...
  • Wiki Page: Database Engine Permission Basics

    In SQL Server 2008 R2, Database Engine permissions are managed at the server level through logins and fixed server roles, and at the database level through database users, fixed database roles, and user-defined database roles. Download the Permissions Poster PDF file . Table of Contents Logins...
  • Wiki Page: Database Engine Security Checklist: Encrypt Sensitive Data

    This checklist helps you confirm that encryption is used appropriately in your environment. Use this checklist to periodically audit your use of encryption with the SQL Server Database Engine. Database Level ... Description Have you evaluated encrypting...
  • Wiki Page: Database Engine Security Checklist: Limit Access to Data

    This checklist helps you review how you limit access to data in your organization. Use this checklist to periodically audit how users access information stored in the SQL Server Database Engine. Table of Contents Access to the Instance of SQL Server Managing User Identity Object Access Auditing...
Page 1 of 6 (147 items) 12345»
Can't find it? Write it!