Browse by Tags

Tagged Content List
  • Wiki Page: Wiki: IT Security Portal

    Information security is the process of keeping computers and networks protected from theft, corruption, unwanted publication, tampering, or natural disaster, while keeping the information and property accessible and productive to its intended users. This article contains links only to TechNet Wiki...
  • Wiki Page: SharePoint 2013 / Office 365 Security Gurupları (tr-TR)

    Bu yazımızda SharePoint / Office 365 üzerinde kullanıcı grup yetkilendirmeleri ve güvenlik gurupları hakkında kısa bilgiler vereceğiz. Daha önceki yazımızda SharePoint 2103 üzerinde nasıl kullanıcı ve grup yetkilendirmesi yapabileceğimizi görmüştük. Bu yazılarıma aşağıdan ulaşabilirsiniz. ...
  • Wiki Page: Cloud Computing Security Architecture (IT Pro Perspective)

    Welcome to the Cloud Computing Security site on the TechNet wiki . The goal of this site is to share and promote information and thought leadership on the topic of Cloud Computing security. The decision to place this content on the TechNet wiki was an explicit one, as we realize that the topic of...
  • Wiki Page: Microsoft Private Cloud Dojo (PCD)

    The Microsoft Private Cloud Dojo (PCD) is a place where you can go to find articles about Private Cloud Computing and Microsoft's initiatives in Private Cloud. This is a community authored resource where anyone who has interesting and useful information about Microsoft Private Cloud Computing can...
  • Wiki Page: SQL Server Database Engine Permission Posters

    Table of Contents Azure SQL Database See Also Posters are available that list all the granular permissions of the SQL Server Database Engine and Windows Azure SQL Database. Select the pdf images below. You can display these on your computer, expanding or shrinking them to focus on specific areas...
  • Wiki Page: Private Cloud Technical Concept and Overview

    Driven by pressure to do more with less, many of your customers turn increasingly to virtualization when they need to add capacity or deliver new or scaled out services. And yet, simple consolidation of servers—what some have called virtualization 1.0—is no longer sufficient. Your customers want...
  • Wiki Page: Reference Architecture for Private Cloud

    The Reference Architecture for Private Cloud wiki site on TechNet is driven by the SCD iX Solutions Group. It is a joint effort with the private cloud community at large. This document set is designed to facilitate an organization’s transformation to private cloud as a service delivery enabling set...
  • Wiki Page: Hyper-V Security Survival Guide

    Hyper-V security is in context with Windows Server security. Start with the Windows Security Survival Guide: http://social.technet.microsoft.com/wiki/contents/articles/windows-security-survival-guide.aspx . TechNet Hyper-V Security Guide: http://technet.microsoft.com/en-us/library/dd569113.aspx...
  • Wiki Page: Extraction des droits SQL

    Nombreuses sont les fois où le besoin de pouvoir extraire l’ensemble des droits d’une instance est nécessaire pour répondre à différents besoins, comme par exemple : Migration et donc déplacement des comptes, Sauvegarde des droits (autrement que par backup de master et des autres bases), ...
  • Wiki Page: Microsoft User Groups Portal

    Welcome to the Microsoft User Groups Portal on the TechNet Wiki. The purpose of this portal is to engage and connect offline Microsoft User Group communities with the online TechNet Wiki community, by encouraging article creation/collaboration and raising awareness of the TechNet Wiki within user...
  • Wiki Page: How to Provide Temporary and Secure Administrative Access to Critical Systems and Applications

    Table of Contents Introduction Scenario Solution Implementation Required operations to maintain the implementation User experience Tracking and Escalation Conclusion Introduction Active Directory provides an easy way to centrally manage accounts within an organization. It also provides an efficient...
  • Wiki Page: Microsoft Anti-Virus Exclusion List

    One place on the web where you can find an updated list of ALL the AV exclusions you might want to configure for Windows Server. Feel free to add to the list, it is the wiki way! HINT : Subscribe to the RSS feed for this wiki page to get auto-notification when it is updated! Enterprise Configuration...
  • Wiki Page: SCCM 2012 R2 Antimalware Policy Hazırlanması ve İstemcilere Dağıtılması (tr-TR)

    Merhabalar, Bu makalemde sizlere System Center Endpoint Protection üzerinde istemcilerimiz üzerine uygulayacağımız Anti-malware Policy ye değineceğiz. SCEP üzerinde istemcilerimize yapılacak olan aksiyonları içeren kuralımız antimalware policy dir. Bizde burada istemcilerimiz üzerinde bulunan...
  • Wiki Page: FIM 2010: Planning security setup for accounts, groups and services

    //**article in progress**// This article provides an overview of the required security accounts, service accounts and groups of the related FIM components and infrastructure. Table of Contents Acronyms & Abbreviations used Check list General Least privilege Segregation of duties / Account...
  • Wiki Page: Internet security tips for Businesses

    Internet has become a lifeline for today’s businesses. Whether you are running an e-Commerce portal or a traditional business, you need Internet to run day-to-day operations. You may need to check the bank account information online or want to book air tickets without thinking twice that information...
  • Wiki Page: Exchange Best Practices for Untrusted Mailbox Users

    There are many scenarios where a mailbox and its access can become "untrusted". Preventative solutions abound, but this article will focus on the following worst case scenarios for the quickest way to shut down access with the least amount of impact and administrative effort. A mobile...
  • Wiki Page: Windows Azure SQL Database Connection Security

    Summary This article provides information on the security fundamentals and best practices when working with Windows Azure SQL Database. This article is primarily concerned with writing secure connection strings for SQL Database. Author: Selcin Turkarslan Reviewers: Evan Basalik, Larry Franks...
  • Wiki Page: VB.NET Change File Level Permissions: Better to Ask for Forgiveness than Permission

    Table of Contents Introduction Requirements Loading Users for a specific file Example 1: Users loaded into lstUsers list box. Viewing Permissions for a specific user Example 2: Selection of a specific user Adding/Removing permissions Notes Introduction Some people are thinking better to...
  • Wiki Page: Blueprint for A Solution for Private Cloud Security

    Welcome to this first paper in the Solution for Private Cloud Security series. This paper discusses private cloud security from the architectural perspective and seeks to define the problem domain, key scenarios, and create a structured approach that you will use to create a private cloud security...
  • Wiki Page: Microsoft Security Compliance Manager (SCM) - Frequently Asked Questions (FAQ)

    Table of Contents Q: How do I join the latest Security Compliance Manager Beta Review Program? Q: How do I obtain the Security Compliance Manager solution accelerator? Q: Can I read about Security Compliance Manager before I download it? Q: Can I read or access the security guides without downloading...
  • Wiki Page: Microsoft Security Compliance Manager (SCM)

    Table of Contents Overview What does SCM do? Key Features and Benefits Setup Requirements More Information Overview Security Compliance Manager 3.0 (SCM 3.0) is a free tool from the Microsoft Solution Accelerator team that enables you to quickly configure and manage your desktops, traditional datacenter...
  • Wiki Page: 5nine Cloud Security with Kaspersky engine

    5nine Software is making major efforts to gear global best practices of information security in virtual environments to the market demands and has finished embedding "Kaspersky Lab" antivirus engine in its product. 5nind Cloud Security helps companies and government institutions...
  • Wiki Page: Microsoft Security Compliance Manager (SCM) - Baseline Download Help

    Table of Contents Background Baseline Download Links Copyright Information See also Background When the Microsoft Security Compliance Manager (SCM) tool was initially designed, the intention was that all content (i.e. baselines) published by Microsoft would flow to users from within the SCM...
  • Wiki Page: Forefront Threat Management Gateway (TMG) 2010 Survival Guide

    We encourage you to enhance this guide by identifying missing areas (scenarios, features, lifecycle...), provide links to and write descriptions of existing content, and providing new content where there are gaps. Join the community ! Table of Contents Introduction Planning High Availability...
  • Wiki Page: Azure Virtual Machines – Common Questions and Issues

    This page addresses some of the common issues encountered when using the Azure Virtual Machines feature (IaaS). VM removed unexpectedly from management portal When you reach the usage limit on your Windows Azure subscription, for example when using a 90-day trial subscription or the Azure...
Page 1 of 7 (153 items) 12345»
Can't find it? Write it!