Browse by Tags

Tagged Content List
  • Wiki Page: References for Project Server security

    Hi Folks! Project Server is a complete and complex solution which has been strongly documented over the years and versions. It cannot count how many time in a week I use my favourite search engine to look for some references. And the week after, I'll be surely looking for the same reference...
  • Wiki Page: An Azure Application Architecture for Security, Scalability, Performance, Redundancy and Reliability

    This article is an attempt to document my experience of leveraging Azure to build a global system with security, scalability, performance, redundancy and reliability as some of the design goals. Note that this is not an attempt to capture every architectural aspect, but rather an attempt to use certain...
  • Wiki Page: Acessando o SQL SERVER quando não há credencial

    Como acessar o SQL SERVER quando não conseguimos acessar uma instância que administramos - mas que não tinha acesso ainda. Pode ser um sistema legado. Ninguém tem ideia de qual era a senha do famoso ‘SA’. E ninguém do lado do cliente tem acesso administrativo na instância em questão. As aplicações...
  • Wiki Page: Exchange Best Practices for Untrusted Mailbox Users

    There are many scenarios where a mailbox and its access can become "untrusted". Preventative solutions abound, but this article will focus on the following worst case scenarios for the quickest way to shut down access with the least amount of impact and administrative effort. A mobile...
  • Wiki Page: Password Based Encryption using AES - PBKDF2

    Password based Key Derivation Function 2 or PBKDF2 in short, is an encryption mechanism, which basically uses a password and manipulates it to generate a strong key which could be used for encryption and subsequently decryption. This article basically focusses on the .Net classes available to enable...
  • Wiki Page: Security User Groups

    This page contains resources for and a listing of offline Microsoft user groups focused on Security Table of Contents Security User Group Listing Security Resources on the TechNet Wiki Contribute to the TechNet Wiki Getting Help and Engaging the TechNet Wiki Community See Also Others Languages...
  • Wiki Page: Understanding Access to Microsoft Certificate Revocation List

    High-Level Overview We encourage you to enhance this guide by identifying missing areas (scenarios, features, lifecycle...), provide links to and write descriptions of existing content, and providing new content where there are gaps. Join the community ! Introduction...
  • Wiki Page: SharePoint 2013 / Office 365 Security Gurupları (tr-TR)

    Bu yazımızda SharePoint / Office 365 üzerinde kullanıcı grup yetkilendirmeleri ve güvenlik gurupları hakkında kısa bilgiler vereceğiz. Daha önceki yazımızda SharePoint 2103 üzerinde nasıl kullanıcı ve grup yetkilendirmesi yapabileceğimizi görmüştük. Bu yazılarıma aşağıdan ulaşabilirsiniz. ...
  • Wiki Page: Cloud Computing Security Architecture (IT Pro Perspective)

    Welcome to the Cloud Computing Security site on the TechNet wiki . The goal of this site is to share and promote information and thought leadership on the topic of Cloud Computing security. The decision to place this content on the TechNet wiki was an explicit one, as we realize that the topic of...
  • Wiki Page: Reference Architecture for Private Cloud

    The Reference Architecture for Private Cloud wiki site on TechNet is driven by the SCD iX Solutions Group. It is a joint effort with the private cloud community at large. This document set is designed to facilitate an organization’s transformation to private cloud as a service delivery enabling set...
  • Wiki Page: Extraction des droits SQL

    Nombreuses sont les fois où le besoin de pouvoir extraire l’ensemble des droits d’une instance est nécessaire pour répondre à différents besoins, comme par exemple : Migration et donc déplacement des comptes, Sauvegarde des droits (autrement que par backup de master et des autres bases), ...
  • Wiki Page: How to Provide Temporary and Secure Administrative Access to Critical Systems and Applications

    Table of Contents Introduction Scenario Solution Implementation Required operations to maintain the implementation User experience Tracking and Escalation Conclusion Introduction Active Directory provides an easy way to centrally manage accounts within an organization. It also provides an efficient...
  • Wiki Page: SCCM 2012 R2 Antimalware Policy Hazırlanması ve İstemcilere Dağıtılması (tr-TR)

    Merhabalar, Bu makalemde sizlere System Center Endpoint Protection üzerinde istemcilerimiz üzerine uygulayacağımız Anti-malware Policy ye değineceğiz. SCEP üzerinde istemcilerimize yapılacak olan aksiyonları içeren kuralımız antimalware policy dir. Bizde burada istemcilerimiz üzerinde bulunan...
  • Wiki Page: Internet security tips for Businesses

    Internet has become a lifeline for today’s businesses. Whether you are running an e-Commerce portal or a traditional business, you need Internet to run day-to-day operations. You may need to check the bank account information online or want to book air tickets without thinking twice that information...
  • Wiki Page: Windows Azure SQL Database Connection Security

    Summary This article provides information on the security fundamentals and best practices when working with Windows Azure SQL Database. This article is primarily concerned with writing secure connection strings for SQL Database. Author: Selcin Turkarslan Reviewers: Evan Basalik, Larry Franks...
  • Wiki Page: VB.NET Change File Level Permissions: Better to Ask for Forgiveness than Permission

    Table of Contents Introduction Requirements Loading Users for a specific file Example 1: Users loaded into lstUsers list box. Viewing Permissions for a specific user Example 2: Selection of a specific user Adding/Removing permissions Notes Introduction Some people are thinking better to...
  • Wiki Page: Blueprint for A Solution for Private Cloud Security

    Welcome to this first paper in the Solution for Private Cloud Security series. This paper discusses private cloud security from the architectural perspective and seeks to define the problem domain, key scenarios, and create a structured approach that you will use to create a private cloud security...
  • Wiki Page: Microsoft Security Compliance Manager (SCM) - Frequently Asked Questions (FAQ)

    Table of Contents Q: How do I join the latest Security Compliance Manager Beta Review Program? Q: How do I obtain the Security Compliance Manager solution accelerator? Q: Can I read about Security Compliance Manager before I download it? Q: Can I read or access the security guides without downloading...
  • Wiki Page: Microsoft Security Compliance Manager (SCM) - Baseline Download Help

    Table of Contents Background Baseline Download Links Copyright Information See also Background When the Microsoft Security Compliance Manager (SCM) tool was initially designed, the intention was that all content (i.e. baselines) published by Microsoft would flow to users from within the SCM...
  • Wiki Page: Azure Virtual Machines – Common Questions and Issues

    This page addresses some of the common issues encountered when using the Azure Virtual Machines feature (IaaS). VM removed unexpectedly from management portal When you reach the usage limit on your Windows Azure subscription, for example when using a 90-day trial subscription or the Azure...
  • Wiki Page: Secure Silverlight Applications with Claims-Based Authentication in Azure – Lessons Learned – Part 2

    In this second article of the series ( see first article here ), I’ll continue sharing security and Silverlight lessons learned while moving an application to Azure. Specifically let’s extend what we discussed in part one to include: · More details about securing the on-premise service...
  • Wiki Page: Secure Silverlight Applications with Claims-Based Authentication in Azure – Lessons Learned – Part 1

    Part of Microsoft’s Azure strategy is offering organizations the choice to port and run portions of their existing applications in the cloud while continuing to utilize on-premise software. This is a compelling strategy with many variations which are easy to implement using Windows Azure and related...
  • Wiki Page: Overview of Security in Windows Azure SQL Database

    Windows Azure SQL Database has two types of access control: SQL Authentication and a server-side firewall that restricts access by IP address. Along with access control SQL Database always maintains a secure connection to your database via SQL Server’s protocol encryption. Transparent Data Encryption...
  • Wiki Page: Test your server for Heartbleed via Powershell

    Download latest OpenSSL for Windows and install your computer. Open your text editor and write one domain name or IP address on each line and save it. Then change $sites and $oSSL variables. $sites = Get-Content -Path " C:\domains.txt " $oSSL = " C:\OpenSSL-Win64...
  • Wiki Page: IE Security Threat Work-around: Disable Flash in Internet Explorer

    Due to a security threat, Homeland Security and numerous other Government Security organizations have recommended their citizens immediately stop using Internet Explorer. However, this is not entirely necessary. You can continue to use Internet Explorer so long as you disable the Shockwave Flash plugin...
Page 2 of 7 (161 items) 12345»
Can't find it? Write it!