Browse by Tags

Tagged Content List
  • Wiki Page: Database Engine Security Checklist: Database Engine Security Configuration

    This checklist reviews key security configuration options for the SQL Server Database Engine. Use this checklist to periodically audit your Database Engine environment. These recommended settings should be adjusted based on your security and business needs. Table of Contents Physical Security Operating...
  • Wiki Page: Database Engine Security Checklist: Enhance the Security of Database Engine Connections

    This checklist reviews key options to use when connecting to the SQL Server Database Engine. Use this checklist to review your environment to make sure that connections are made to the Database Engine as securely as necessary for your business needs. Database Engine Configuration ....
  • Wiki Page: Database Engine Fixed Server and Fixed Database Roles

    Fixed server roles and fixed database roles are assigned specific permissions by SQL Server. The permissions of the fixed roles cannot be changed. Fixed server and fixed database roles are provided for convenience and backward compatibility. Beginning with SQL Server 2005, a more granular permission...
  • Wiki Page: Operations Guide for A Solution for Private Cloud Security

    Welcome to this third paper in the Solution for Private Cloud Security series. This paper discusses private cloud security from the operations perspective and offers guidance for operating security within a private cloud environment. In some areas, specific products are discussed in relation to the...
  • Wiki Page: Design Guide for A Solution for Private Cloud Security

    The Service Design paper discusses private cloud security from the design perspective, offers guidance for creating a security design for a private cloud, and discusses some of the design decisions you will have to make. In some areas, this paper discusses specific products in relation to the security...
  • Wiki Page: Blueprint for A Solution for Private Cloud Security

    Welcome to this first paper in the Solution for Private Cloud Security series. This paper discusses private cloud security from the architectural perspective and seeks to define the problem domain, key scenarios, and create a structured approach that you will use to create a private cloud security...
  • Wiki Page: Cloud Security Challenges

    To highlight the changes in security between traditional IT systems and cloud-based environments, this paper takes four of the five the NIST cloud computing definitions and analyses these statements to create a problem statement and a range of possible attack vectors. This paper considers each of these...
  • Wiki Page: Defining the Private Cloud Security Problem Domain

    As previous sections in this document outline, security is a universal component of cloud service provisioning. To help consider this requirement logically, this series considers the key security differences in private cloud environments, which result from the unique features of a cloud-based service...
  • Wiki Page: Security Entwickler Ressourcen (de-DE)

    Andere Ressourcen Security Developer Center Kryptographie-Themen auf MSDN Folge uns auf Twitter Table of Contents MSDN Forums Blogs MSDN Magazin Artikel Bücher Webseiten Siehe auch Andere Sprachen MSDN Forums Die technische Community ermöglicht es mit Microsoft...
  • Wiki Page: What to Do If Your Hotmail (live.com/Outlook.com) Account Is Hacked or Hijacked

    The computer-speak term for this situation is "account compromise," use this term when communicating with the Live support folks. Your Hotmail account is now owned by the folks at Windows Live, which is why you will find the Windows Live help topic for this under Account Compromise ...
  • Wiki Page: Security Hardening Tips and Recommendations

    This article will focus on real security hardening, for instance when most basics if not all, are already in place (see previous article: http://social.technet.microsoft.com/wiki/contents/articles/12432.general-security-advice-and-best-practices.aspx ). Obviously, the changes to be made on the...
  • Wiki Page: SharePoint 2010: Choosing Between AD Groups or SharePoint Groups

    Table of Contents Introduction Pro AD groups Pro SharePoint groups Best practices See Also Best Practices Overview Other Languages Introduction Which way should you go when coming up with a security infrastructure for SharePoint: use Active Directory (AD) or SharePoint groups? Pro AD groups...
  • Wiki Page: SharePoint 2007: Search Federation Security

    This article explains the security best practices for the federation feature of Microsoft Office SharePoint Server 2007 with the Infrastructure Update for Microsoft Office Servers installed. It should be read by information technology professionals as well as system architects and search services administrators...
  • Wiki Page: Managed Service Accounts

    This article needs work. Please help update and extend it. If you add new managed service account topics, please add a link to the new topic at the bottom of this page. Managed service accounts in Windows Server 2008 R2 and Windows 7 are managed domain accounts that provide the following...
  • Wiki Page: Windows Server 2008 R2 Security Guidance

    What's New in Security in Windows Server 2008 R2 Windows Server 2008 R2 introduces some changes from the security perspective of the operating system. The core changes are related to: authorization and access control , identity and authentication , information protection , security policies and...
  • Wiki Page: Security User Groups

    This page contains resources for and a listing of offline Microsoft user groups focused on Security Table of Contents Security User Group Listing Security Resources on the TechNet Wiki Contribute to the TechNet Wiki Getting Help and Engaging the TechNet Wiki Community See Also Others Languages...
  • Wiki Page: Microsoft User Groups Portal

    Welcome to the Microsoft User Groups Portal on the TechNet Wiki. The purpose of this portal is to engage and connect offline Microsoft User Group communities with the online TechNet Wiki community, by encouraging article creation/collaboration and raising awareness of the TechNet Wiki within user...
  • Wiki Page: SQL Server Kurulu Sunucularda Antivirus Kurmak (tr-TR)

    Veritabanı sunucunuza bir virüsün musallat olup sisteminizi işleyemez hale getirmesi, sizin için en kötü senaryolardan birisi olsa gerek. Veritabanı sisteminiz çalışmadığı zaman kurumda hayat durur. Çünkü kurumdaki tüm uygulamaların can damarı veritabanıdır. Can damarından vurulmuş bir kurumun iş sürekliliği...
  • Wiki Page: Windows Azure Virtual Machines – Common Questions and Issues

    This page addresses some of the common issues encountered when using the Windows Azure Virtual Machines feature (IaaS). VM removed unexpectedly from management portal When you reach the usage limit on your Windows Azure subscription, for example when using a 90-day trial subscription or the...
  • Wiki Page: Private Cloud Security Design Principles

    Table of Contents Apply Generic Security Best Practices Isolation is Key Consider Security as a Wrapper Assume Attackers are Authenticated and Authorized Assume All Data Locations are Accessible Do Not Trust Client Information Use Established Strong Cryptographic Techniques Automate Security Operations...
  • Wiki Page: Windows PowerShell Security Survival Guide

    Lots of people new to PowerShell have question about security. This article is meant to be the place to collect links on PowerShell security, especially remoting security. Feel free to add information and links to this article--it is the Wiki way! PowerShell’s Security Guiding Principles TechNet...
  • Wiki Page: Private Cloud Security Model - Wrapper Functionality

    As discussed earlier in this paper, the private cloud must implement security as a wrapper. Every transaction then must pass through this security wrapper on any data transition within the cloud, for example: Client to the service delivery layer Service delivery layer to the software...
  • Wiki Page: Private Cloud Security Model - Infrastructure Security

    Table of Contents Physical Security Energy Supply Security Facility Security Network Security Hardware Security Compute Security Storage Security Operating System Security Virtualization Security Update Security Now that you have examined the factors within the security wrapper, this paper presents...
  • Wiki Page: Security Implications of Cloud Service Models

    It is now time to look in greater detail at the three main cloud service models. These are: Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS ) We will discuss each of these models and consider the security threats and mitigations that may apply in...
  • Wiki Page: Resumen y concepto técnico de nube privada (es-ES)

    Impulsado por la presión de hacer más con menos, muchos de sus clientes recurren cada vez más virtualización cuando necesitan agregar capacidad o entregar nueva o escala servicios. Y sin embargo, la simple consolidación de servidores — lo que algunos han llamado virtualización 1.0 — ya no es...
Page 2 of 6 (147 items) 12345»
Can't find it? Write it!