Browse by Tags

Tagged Content List
  • Wiki Page: VB.NET Change File Level Permissions: Better to Ask for Forgiveness than Permission

    Table of Contents Introduction Requirements Loading Users for a specific file Example 1: Users loaded into lstUsers list box. Viewing Permissions for a specific user Example 2: Selection of a specific user Adding/Removing permissions Notes Introduction Some people are thinking better to...
  • Wiki Page: Blueprint for A Solution for Private Cloud Security

    Welcome to this first paper in the Solution for Private Cloud Security series. This paper discusses private cloud security from the architectural perspective and seeks to define the problem domain, key scenarios, and create a structured approach that you will use to create a private cloud security...
  • Wiki Page: Microsoft Security Compliance Manager (SCM) - Frequently Asked Questions (FAQ)

    Table of Contents Q: How do I join the latest Security Compliance Manager Beta Review Program? Q: How do I obtain the Security Compliance Manager solution accelerator? Q: Can I read about Security Compliance Manager before I download it? Q: Can I read or access the security guides without downloading...
  • Wiki Page: Microsoft Security Compliance Manager (SCM)

    Table of Contents Overview What does SCM do? Key Features and Benefits Setup Requirements More Information Overview Security Compliance Manager 3.0 (SCM 3.0) is a free tool from the Microsoft Solution Accelerator team that enables you to quickly configure and manage your desktops, traditional datacenter...
  • Wiki Page: 5nine Cloud Security with Kaspersky engine

    5nine Software is making major efforts to gear global best practices of information security in virtual environments to the market demands and has finished embedding "Kaspersky Lab" antivirus engine in its product. 5nind Cloud Security helps companies and government institutions...
  • Wiki Page: Microsoft Security Compliance Manager (SCM) - Baseline Download Help

    Table of Contents Background Baseline Download Links Copyright Information See also Background When the Microsoft Security Compliance Manager (SCM) tool was initially designed, the intention was that all content (i.e. baselines) published by Microsoft would flow to users from within the SCM...
  • Wiki Page: Azure Virtual Machines – Common Questions and Issues

    This page addresses some of the common issues encountered when using the Azure Virtual Machines feature (IaaS). VM removed unexpectedly from management portal When you reach the usage limit on your Windows Azure subscription, for example when using a 90-day trial subscription or the Azure...
  • Wiki Page: Secure Silverlight Applications with Claims-Based Authentication in Azure – Lessons Learned – Part 2

    In this second article of the series ( see first article here ), I’ll continue sharing security and Silverlight lessons learned while moving an application to Azure. Specifically let’s extend what we discussed in part one to include: · More details about securing the on-premise service...
  • Wiki Page: Secure Silverlight Applications with Claims-Based Authentication in Azure – Lessons Learned – Part 1

    Part of Microsoft’s Azure strategy is offering organizations the choice to port and run portions of their existing applications in the cloud while continuing to utilize on-premise software. This is a compelling strategy with many variations which are easy to implement using Windows Azure and related...
  • Wiki Page: Overview of Security in Windows Azure SQL Database

    Windows Azure SQL Database has two types of access control: SQL Authentication and a server-side firewall that restricts access by IP address. Along with access control SQL Database always maintains a secure connection to your database via SQL Server’s protocol encryption. Transparent Data Encryption...
  • Wiki Page: Test your server for Heartbleed via Powershell

    Download latest OpenSSL for Windows and install your computer. Open your text editor and write one domain name or IP address on each line and save it. Then change $sites and $oSSL variables. $sites = Get-Content -Path " C:\domains.txt " $oSSL = " C:\OpenSSL-Win64...
  • Wiki Page: IE Security Threat Work-around: Disable Flash in Internet Explorer

    Due to a security threat, Homeland Security and numerous other Government Security organizations have recommended their citizens immediately stop using Internet Explorer. However, this is not entirely necessary. You can continue to use Internet Explorer so long as you disable the Shockwave Flash plugin...
  • Wiki Page: Patch Issues for Administrators

    Resources and Guidance for Patch Issues for Administrators To better remember where the log files end up for various patches, this wiki page is an attempt to recap them in one place for the Patching Administrator. If the failure is in installation, - what is the error message? Here's a page...
  • Wiki Page: SCVMM V2V Failed with Error - Protocol Error with Too Many Authentication Failures for Root

    When you perform a V2V using SCVMM from a VMware ESX 3.5 host and we may get the following error: Error (12709) The operation on did not complete successfully because of the error: Server sent disconnect message: type 2 (protocol error : too many authentication failures for root) First, confirm...
  • Wiki Page: Configure Malware Policy in Exchange 2013

    Microsoft Exchange 2013 has the basic antimalware settings which can be enabled during the installation. By default we have a default malware policy which can be modified according to our needs. But it cannot be deleted. We can create our malware policy according to the company needs. Below...
  • Wiki Page: SharePoint: Limited Access permission

    Source reference Anonymous Users, Forms Pages, and the Lockdown Feature ( http://blogs.msdn.com/b/ecm/archive/2007/05/12/anonymous-users-forms-pages-and-the-lockdown-feature.aspx ) Scenario We have a list which doesn't inherit permissions from the site. Also, at the root of the list, there...
  • Wiki Page: Microsoft Enhanced Mitigation Experience Toolkit (EMET) 4.1 Technical Review - Part 1

    Microsoft Enhanced Mitigation Experience Toolkit (EMET) is a must tool from my point of view for any security professional as well as normal users to help protect them from unknown vulnerabilities or what so called Zero-Day attacks. EMET will try to stop and prevent the malicious code from running...
  • Wiki Page: Script to Check HD Encrypted Using BitLocker

    This sample script, originally on this blog post , shows how you can script a check on hard drives to report if they have been encrypted with BitLocker and/or BiltLocker To Go. Do you have an alternative script or way to check if BL is enabled on a hard drive? Please share in this article - it is...
  • Wiki Page: Office 365 Service Descriptions: Privacy, Security and Transparency, Service Continuity, and Compliance

    The Office 365 Service Descriptions TechNet page provide detailed descriptions of the services and features that are available with Office 365. Each Office 365 service is designed to provide a high degree of security, privacy, continuity, and compliance. For more information, see the following...
  • Wiki Page: Office 365 Service-Beschreibungen: Datenschutz, Sicherheit und Transparenz, Service-Verfügbarkeit und Compliance (de-DE)

    Dieser Artikel ist die Übersetzung des englischen Artikels Office 365 Service Descriptions: Privacy, Security and Transparency, Service Continuity, and Compliance von Ed Price . Die TechNet-Seite Office 365 Service Descriptions beschreibt die von Office 365 angeboten Services und Features detailliert...
  • Wiki Page: Forefront Protection 2010 for Exchange Server (FPE 2010): FAQ

    Get answers to your questions about Forefront Protection 2010 for Exchange Server. Q. What is Forefront Protection 2010 for Exchange Server? A. Forefront Protection 2010 for Exchange Server provides fast and effective detection of viruses, worms, and spyware by integrating multiple scanning...
  • Wiki Page: Forefront Online Protection for Exchange (FOPE): FAQ

    Get answers to your general questions about the Forefront Online Protection for Exchange (FOPE) service right here. You can find more FOPE documentation at the following locations: FOPE Technical Support FAQs - Details many troubleshooting tips for FOPE. FOPE User Guide - In-depth documentation...
  • Wiki Page: Forefront Protection 2010 for SharePoint (FPSP 2010): FAQ

    Get answers to your questions about Forefront Protection 2010 for SharePoint. Q. What is Forefront Protection 2010 for SharePoint? A. Microsoft Forefront Protection 2010 for SharePoint helps prevents users from uploading or downloading documents containing malware, out-of-policy content...
  • Wiki Page: A Solution for Private Cloud Security

    Welcome to the "A Solution for Private Cloud Security" series of three papers on private cloud security. With increasing numbers of organizations looking to create cloud-based environments or to implement cloud technologies within their existing data centers, business and technology decision...
  • Wiki Page: SharePoint 2010: Choisir entre des groupes AD et des groupes SharePoint (fr-FR)

    Quelle route devriez-vous emprunter en vous dirigeant vers une infrastructure de sécurité pour SharePoint : utiliser Active Directory (AD) ou des groupes SharePoint ? Table of Contents Pour: les groupes AD Pour: les groupes SharePoint Best practices Sujets connexes Vue d'ensemble des best...
Page 2 of 7 (157 items) 12345»
Can't find it? Write it!