Browse by Tags

Tagged Content List
  • Wiki Page: Enterprise Mode no Internet Explorer 11

    Olá pessoal, No que diz respeito a compatibilidade de sites, a Microsoft possui uma ferramenta não ativada por padrão no Internet Explorer 11, mas auxilia para sites e sistemas desenvolvido com códigos mais antigos ou a utilização de ActiveX legados. Caso muito comum em sites de bancos pois é...
  • Wiki Page: Security Survival Guide

    Add any security articles, pages, or videos to this list. The sections are divided by technology. The list includes links to survival guides for the individual technologies as well. You can also see a list of Wiki-only articles in the portal here . Table of Contents General...
  • Wiki Page: Security auditing features in Windows Server 2008 R2

    Organizations will go to any extend to keep their IT infrastructure safe and secure. That is why security audit has become an important job of their IT departments. The security auditing capabilities of IT administrators increased many folds after the arrival of Windows Server 2008 R2. Audit features...
  • Wiki Page: Password Based Encryption using AES - PBKDF2

    Password based Key Derivation Function 2 or PBKDF2 in short, is an encryption mechanism, which basically uses a password and manipulates it to generate a strong key which could be used for encryption and subsequently decryption. This article basically focusses on the .Net classes available to enable...
  • Wiki Page: Forefront Threat Management Gateway (TMG) 2010 Survival Guide

    We encourage you to enhance this guide by identifying missing areas (scenarios, features, lifecycle...), provide links to and write descriptions of existing content, and providing new content where there are gaps. Join the community ! Table of Contents Introduction Planning High Availability...
  • Wiki Page: Bring Your Own Device (BYOD) Survival Guide for Microsoft Technologies

    As technology evolves and users demand to work from anywhere and any device, it is important that companies have a strategy to embrace this new model. In this new model IT doesn’t have full control of the device, however is necessary to have some level of security in place to enable users to be productive...
  • Wiki Page: SQL Server Database Engine Permission Posters

    Table of Contents Azure SQL Database See Also Posters are available that list all the granular permissions of the SQL Server Database Engine and Windows Azure SQL Database. Select the pdf images below. You can display these on your computer, expanding or shrinking them to focus on specific areas...
  • Wiki Page: Windows Security Survival Guide

    We encourage you to enhance this guide by identifying missing areas (scenarios, features, lifecycle...), provide links to and write descriptions of existing content, and providing new content where there are gaps. Join the community ! Introduction Many companies invest a good amount...
  • Wiki Page: Perimeter Network/DMZ Survival Guide

    At customer events a few years ago, we started handing out one-page "Survival Guides" (printed both sides and laminated) with links to important resources. The wiki versions of the Survival Guides are meant to do the same things without killing trees or using laminating machines. Configuring...
  • Wiki Page: Windows PowerShell Security Survival Guide

    Lots of people new to PowerShell have question about security. This article is meant to be the place to collect links on PowerShell security, especially remoting security. Feel free to add information and links to this article--it is the Wiki way! PowerShell’s Security Guiding Principles TechNet...
  • Wiki Page: Forefront Threat Management Gateway (TMG) 2010 Troubleshooting Survival Guide

    We encourage you to enhance this guide by identifying missing areas (scenarios, features, lifecycle...), provide links to and write descriptions of existing content, and providing new content where there are gaps. Join the community ! Introduction Troubleshooting Tools Troubleshooting...
  • Wiki Page: Microsoft Private Cloud Dojo (PCD)

    The Microsoft Private Cloud Dojo (PCD) is a place where you can go to find articles about Private Cloud Computing and Microsoft's initiatives in Private Cloud. This is a community authored resource where anyone who has interesting and useful information about Microsoft Private Cloud Computing can...
  • Wiki Page: SharePoint: SQL account Security

    Credits Source: https://social.technet.microsoft.com/Forums/fr-FR/fc0d8d29-cd2b-4bf7-a411-87cc803df3f0/sql-admin-account-for-sharepoint-2013?forum=sharepointgeneral Original poster: Zakir Chougle Configuration SQL Admin Account SQL Admin account would be use to install SQL Server for...
  • Wiki Page: Database Engine Permission Basics

    In Database Engine permissions are managed at the server level through logins and fixed server roles, and at the database level through database users, fixed database roles, and user-defined database roles. Download the Permissions Poster PDF file . Table of Contents Logins...
  • Wiki Page: Atravessando Pastas mesmo sem Permissão (pt-BR)

    Um dos itens mais utilizados por administradores/analistas de redes Microsoft, é configurar as permissões de usuários e grupos em servidores de arquivos. Dependendo do tamanho da empresa e sua complexidade, a configuração pode demorar semanas e até meses para ser concluída. Isso sem contar a manutenção...
  • Wiki Page: Sql Server Instance Name Security

    Merhaba, Bu teknik yazıda size Sql Server’a ait Instance adının network ortamında gizlenmesini anlatacağım. İşlemlere başlamadan önce neden böyle bir çalışmaya ihtiyacımız var bu konuyu biraz açmam gerekiyor. Network ortamını dinleyen kötü niyetli ( hacker ) kişilerin Sql Server’ımızı bazı ataklara...
  • Wiki Page: What is the Difference Between Traditional IT Security and Private Cloud Security?

    That's a good question. Private cloud is just a delivery model for cloud computing. Remember, a cloud is a cloud is a cloud. Doesn't matter where that cloud computing infrastructure is located, if it's a cloud computing infrastructure, it's fulfills the same five essential characteristics...
  • Wiki Page: Sql Server Instance Name Gizlemek

    Merhaba, Bu teknik yazıda size Sql Server’a ait Instance adının network ortamında gizlenmesini anlatacağım. İşlemlere başlamadan önce neden böyle bir çalışmaya ihtiyacımız var bu konuyu biraz açmam gerekiyor. Network ortamını dinleyen kötü niyetli ( hacker ) kişilerin Sql Server’ımızı bazı ataklara...
  • Wiki Page: Private Cloud Technical Concept and Overview

    Driven by pressure to do more with less, many of your customers turn increasingly to virtualization when they need to add capacity or deliver new or scaled out services. And yet, simple consolidation of servers—what some have called virtualization 1.0—is no longer sufficient. Your customers want...
  • Wiki Page: Microsoft Security Compliance Manager (SCM)

    Table of Contents Overview What does SCM do? Key Features and Benefits Setup Requirements More Information Overview Security Compliance Manager 3.0 (SCM 3.0) is a free tool from the Microsoft Solution Accelerator team that enables you to quickly configure and manage your desktops, traditional datacenter...
  • Wiki Page: Office 365 Service-Beschreibungen: Datenschutz, Sicherheit und Transparenz, Service-Verfügbarkeit und Compliance (de-DE)

    Dieser Artikel ist die Übersetzung des englischen Artikels Office 365 Service Descriptions: Privacy, Security and Transparency, Service Continuity, and Compliance von Ed Price . Die TechNet-Seite Office 365 Service Descriptions beschreibt die von Office 365 angeboten Services und Features detailliert...
  • Wiki Page: References for Project Server security

    Hi Folks! Project Server is a complete and complex solution which has been strongly documented over the years and versions. It cannot count how many time in a week I use my favourite search engine to look for some references. And the week after, I'll be surely looking for the same reference...
  • Wiki Page: An Azure Application Architecture for Security, Scalability, Performance, Redundancy and Reliability

    This article is an attempt to document my experience of leveraging Azure to build a global system with security, scalability, performance, redundancy and reliability as some of the design goals. Note that this is not an attempt to capture every architectural aspect, but rather an attempt to use certain...
  • Wiki Page: Acessando o SQL SERVER quando não há credencial

    Como acessar o SQL SERVER quando não conseguimos acessar uma instância que administramos - mas que não tinha acesso ainda. Pode ser um sistema legado. Ninguém tem ideia de qual era a senha do famoso ‘SA’. E ninguém do lado do cliente tem acesso administrativo na instância em questão. As aplicações...
  • Wiki Page: Exchange Best Practices for Untrusted Mailbox Users

    There are many scenarios where a mailbox and its access can become "untrusted". Preventative solutions abound, but this article will focus on the following worst case scenarios for the quickest way to shut down access with the least amount of impact and administrative effort. A mobile...
Page 2 of 8 (179 items) 12345»
Can't find it? Write it!