Resources For IT Professionals
United States (English)
Get this Tag RSS feed
Translate this page
BizTalk Server 2010
Curated in Curah
Ed's Stub Pages
Exchange Server 2010
Exchange Server 2013
Fernando Lugao Veltem
FIM Troubleshooting Article
has Back to Top link
has Other Languages
has See Also
Italian Wiki Articles
Lync Server 2010
Multi Language Wiki Articles
SQL Server 2012
System Center 2012
TechNet Guru Medal Winner
TechNet Wiki Featured Article
Translated into French
Translated into German
Windows Phone Migration Content
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
Browse by Tags
Tagged Content List
Bring Your Own Device (BYOD) Survival Guide for Microsoft Technologies
As technology evolves and users demand to work from anywhere and any device, it is important that companies have a strategy to embrace this new model. In this new model IT doesn’t have full control of the device, however is necessary to have some level of security in place to enable users to be productive...
31 Jan 2015
FIM 2010: Planning security setup for accounts, groups and services
Peter Geelen - MSFT
//**article in progress**// This article provides an overview of the required security accounts, service accounts and groups of the related FIM components and infrastructure. Table of Contents Short URL Acronyms & Abbreviations used Check list General Least privilege Segregation of duties...
31 Jan 2015
An Azure Application Architecture for Security, Scalability, Performance, Redundancy and Reliability
This article is an attempt to document my experience of leveraging Azure to build a global system with security, scalability, performance, redundancy and reliability as some of the design goals. Note that this is not an attempt to capture every architectural aspect, but rather an attempt to use certain...
26 Jan 2015
Exchange Best Practices for Untrusted Mailbox Users
There are many scenarios where a mailbox and its access can become "untrusted". Preventative solutions abound, but this article will focus on the following worst case scenarios for the quickest way to shut down access with the least amount of impact and administrative effort. A mobile...
10 Jan 2015
Password Based Encryption using AES - PBKDF2
Password based Key Derivation Function 2 or PBKDF2 in short, is an encryption mechanism, which basically uses a password and manipulates it to generate a strong key which could be used for encryption and subsequently decryption. This article basically focusses on the .Net classes available to enable...
6 Jan 2015
Security User Groups
This page contains resources for and a listing of offline Microsoft user groups focused on Security Table of Contents Security User Group Listing Security Resources on the TechNet Wiki Contribute to the TechNet Wiki Getting Help and Engaging the TechNet Wiki Community See Also Others Languages...
31 Dec 2014
What is the Difference Between Traditional IT Security and Private Cloud Security?
Thomas W Shinder - MSFT
That's a good question. Private cloud is just a delivery model for cloud computing. Remember, a cloud is a cloud is a cloud. Doesn't matter where that cloud computing infrastructure is located, if it's a cloud computing infrastructure, it's fulfills the same five essential characteristics...
19 Dec 2014
Understanding Access to Microsoft Certificate Revocation List
kaizoku miss azure
High-Level Overview We encourage you to enhance this guide by identifying missing areas (scenarios, features, lifecycle...), provide links to and write descriptions of existing content, and providing new content where there are gaps. Join the community ! Introduction...
30 Nov 2014
Microsoft Private Cloud Dojo (PCD)
Thomas W Shinder - MSFT
The Microsoft Private Cloud Dojo (PCD) is a place where you can go to find articles about Private Cloud Computing and Microsoft's initiatives in Private Cloud. This is a community authored resource where anyone who has interesting and useful information about Microsoft Private Cloud Computing can...
25 Nov 2014
Wiki: IT Security Portal
Yuri Diogenes [MSFT]
Information security is the process of keeping computers and networks protected from theft, corruption, unwanted publication, tampering, or natural disaster, while keeping the information and property accessible and productive to its intended users. This article contains links only to TechNet Wiki...
19 Nov 2014
SharePoint 2013 / Office 365 Security Gurupları (tr-TR)
Erdem SELÇUK - TAT
Bu yazımızda SharePoint / Office 365 üzerinde kullanıcı grup yetkilendirmeleri ve güvenlik gurupları hakkında kısa bilgiler vereceğiz. Daha önceki yazımızda SharePoint 2103 üzerinde nasıl kullanıcı ve grup yetkilendirmesi yapabileceğimizi görmüştük. Bu yazılarıma aşağıdan ulaşabilirsiniz. ...
5 Nov 2014
Cloud Computing Security Architecture (IT Pro Perspective)
Welcome to the Cloud Computing Security site on the TechNet wiki . The goal of this site is to share and promote information and thought leadership on the topic of Cloud Computing security. The decision to place this content on the TechNet wiki was an explicit one, as we realize that the topic of...
31 Oct 2014
SQL Server Database Engine Permission Posters
Table of Contents Azure SQL Database See Also Posters are available that list all the granular permissions of the SQL Server Database Engine and Windows Azure SQL Database. Select the pdf images below. You can display these on your computer, expanding or shrinking them to focus on specific areas...
12 Oct 2014
Private Cloud Technical Concept and Overview
Driven by pressure to do more with less, many of your customers turn increasingly to virtualization when they need to add capacity or deliver new or scaled out services. And yet, simple consolidation of servers—what some have called virtualization 1.0—is no longer sufficient. Your customers want...
5 Oct 2014
Reference Architecture for Private Cloud
The Reference Architecture for Private Cloud wiki site on TechNet is driven by the SCD iX Solutions Group. It is a joint effort with the private cloud community at large. This document set is designed to facilitate an organization’s transformation to private cloud as a service delivery enabling set...
4 Oct 2014
Hyper-V Security Survival Guide
Hyper-V security is in context with Windows Server security. Start with the Windows Security Survival Guide: http://social.technet.microsoft.com/wiki/contents/articles/windows-security-survival-guide.aspx . TechNet Hyper-V Security Guide: http://technet.microsoft.com/en-us/library/dd569113.aspx...
2 Oct 2014
Extraction des droits SQL
Nombreuses sont les fois où le besoin de pouvoir extraire l’ensemble des droits d’une instance est nécessaire pour répondre à différents besoins, comme par exemple : Migration et donc déplacement des comptes, Sauvegarde des droits (autrement que par backup de master et des autres bases), ...
1 Oct 2014
Microsoft User Groups Portal
Welcome to the Microsoft User Groups Portal on the TechNet Wiki. The purpose of this portal is to engage and connect offline Microsoft User Group communities with the online TechNet Wiki community, by encouraging article creation/collaboration and raising awareness of the TechNet Wiki within user...
27 Sep 2014
How to Provide Temporary and Secure Administrative Access to Critical Systems and Applications
Table of Contents Introduction Scenario Solution Implementation Required operations to maintain the implementation User experience Tracking and Escalation Conclusion Introduction Active Directory provides an easy way to centrally manage accounts within an organization. It also provides an efficient...
19 Sep 2014
Microsoft Anti-Virus Exclusion List
One place on the web where you can find an updated list of ALL the AV exclusions you might want to configure for Windows Server. Feel free to add to the list, it is the wiki way! HINT : Subscribe to the RSS feed for this wiki page to get auto-notification when it is updated! Enterprise Configuration...
12 Sep 2014
SCCM 2012 R2 Antimalware Policy Hazırlanması ve İstemcilere Dağıtılması (tr-TR)
Merhabalar, Bu makalemde sizlere System Center Endpoint Protection üzerinde istemcilerimiz üzerine uygulayacağımız Anti-malware Policy ye değineceğiz. SCEP üzerinde istemcilerimize yapılacak olan aksiyonları içeren kuralımız antimalware policy dir. Bizde burada istemcilerimiz üzerinde bulunan...
5 Sep 2014
Internet security tips for Businesses
Internet has become a lifeline for today’s businesses. Whether you are running an e-Commerce portal or a traditional business, you need Internet to run day-to-day operations. You may need to check the bank account information online or want to book air tickets without thinking twice that information...
27 Aug 2014
Windows Azure SQL Database Connection Security
Summary This article provides information on the security fundamentals and best practices when working with Windows Azure SQL Database. This article is primarily concerned with writing secure connection strings for SQL Database. Author: Selcin Turkarslan Reviewers: Evan Basalik, Larry Franks...
6 Aug 2014
VB.NET Change File Level Permissions: Better to Ask for Forgiveness than Permission
Ed Price - MSFT
Table of Contents Introduction Requirements Loading Users for a specific file Example 1: Users loaded into lstUsers list box. Viewing Permissions for a specific user Example 2: Selection of a specific user Adding/Removing permissions Notes Introduction Some people are thinking better to...
24 Jul 2014
Blueprint for A Solution for Private Cloud Security
Welcome to this first paper in the Solution for Private Cloud Security series. This paper discusses private cloud security from the architectural perspective and seeks to define the problem domain, key scenarios, and create a structured approach that you will use to create a private cloud security...
21 Jun 2014
Page 1 of 7 (156 items)
Can't find it? Write it!
Post an Article
© 2014 Microsoft Corporation. All rights reserved.
See all products »
Curah! curation service
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Server and Tools Blogs
TechNet Flash Newsletter
Cloud and Datacenter
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Microsoft Download Center
TechNet Evaluation Center
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Second shot for certification
Born To Learn blog
Find technical communities in your area
For small and midsize businesses
For IT professionals
For technical support
For home users
Microsoft Premier Online
Microsoft Fix It Center
Security Bulletins & Advisories
International support solutions
Log a support ticket
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums