Browse by Tags

Tagged Content List
  • Wiki Page: SharePoint: Limited Access permission

    Source reference Anonymous Users, Forms Pages, and the Lockdown Feature ( http://blogs.msdn.com/b/ecm/archive/2007/05/12/anonymous-users-forms-pages-and-the-lockdown-feature.aspx ) Scenario We have a list which doesn't inherit permissions from the site. Also, at the root of the list, there...
  • Wiki Page: Bring Your Own Device (BYOD) Survival Guide for Microsoft Technologies

    As technology evolves and users demand to work from anywhere and any device, it is important that companies have a strategy to embrace this new model. In this new model IT doesn’t have full control of the device, however is necessary to have some level of security in place to enable users to be productive...
  • Wiki Page: Microsoft Enhanced Mitigation Experience Toolkit (EMET) 4.1 Technical Review - Part 1

    Microsoft Enhanced Mitigation Experience Toolkit (EMET) is a must tool from my point of view for any security professional as well as normal users to help protect them from unknown vulnerabilities or what so called Zero-Day attacks. EMET will try to stop and prevent the malicious code from running...
  • Wiki Page: Script to Check HD Encrypted Using BitLocker

    This sample script, originally on this blog post , shows how you can script a check on hard drives to report if they have been encrypted with BitLocker and/or BiltLocker To Go. Do you have an alternative script or way to check if BL is enabled on a hard drive? Please share in this article - it is...
  • Wiki Page: Office 365 Service Descriptions: Privacy, Security and Transparency, Service Continuity, and Compliance

    The Office 365 Service Descriptions TechNet page provide detailed descriptions of the services and features that are available with Office 365. Each Office 365 service is designed to provide a high degree of security, privacy, continuity, and compliance. For more information, see the following...
  • Wiki Page: Office 365 Service-Beschreibungen: Datenschutz, Sicherheit und Transparenz, Service-Verfügbarkeit und Compliance (de-DE)

    Dieser Artikel ist die Übersetzung des englischen Artikels Office 365 Service Descriptions: Privacy, Security and Transparency, Service Continuity, and Compliance von Ed Price . Die TechNet-Seite Office 365 Service Descriptions beschreibt die von Office 365 angeboten Services und Features detailliert...
  • Wiki Page: Forefront Protection 2010 for Exchange Server (FPE 2010): FAQ

    Get answers to your questions about Forefront Protection 2010 for Exchange Server. Q. What is Forefront Protection 2010 for Exchange Server? A. Forefront Protection 2010 for Exchange Server provides fast and effective detection of viruses, worms, and spyware by integrating multiple scanning...
  • Wiki Page: Forefront Online Protection for Exchange (FOPE): FAQ

    Get answers to your general questions about the Forefront Online Protection for Exchange (FOPE) service right here. You can find more FOPE documentation at the following locations: FOPE Technical Support FAQs - Details many troubleshooting tips for FOPE. FOPE User Guide - In-depth documentation...
  • Wiki Page: Forefront Protection 2010 for SharePoint (FPSP 2010): FAQ

    Get answers to your questions about Forefront Protection 2010 for SharePoint. Q. What is Forefront Protection 2010 for SharePoint? A. Microsoft Forefront Protection 2010 for SharePoint helps prevents users from uploading or downloading documents containing malware, out-of-policy content...
  • Wiki Page: A Solution for Private Cloud Security

    Welcome to the "A Solution for Private Cloud Security" series of three papers on private cloud security. With increasing numbers of organizations looking to create cloud-based environments or to implement cloud technologies within their existing data centers, business and technology decision...
  • Wiki Page: SharePoint 2010: Choisir entre des groupes AD et des groupes SharePoint (fr-FR)

    Quelle route devriez-vous emprunter en vous dirigeant vers une infrastructure de sécurité pour SharePoint : utiliser Active Directory (AD) ou des groupes SharePoint ? Table of Contents Pour: les groupes AD Pour: les groupes SharePoint Best practices Sujets connexes Vue d'ensemble des best...
  • Wiki Page: Private Cloud Technical Concept and Overview

    Driven by pressure to do more with less, many of your customers turn increasingly to virtualization when they need to add capacity or deliver new or scaled out services. And yet, simple consolidation of servers—what some have called virtualization 1.0—is no longer sufficient. Your customers want...
  • Wiki Page: Password Management (es-ES)

    Crear Passwords Fuertes y fáciles de recordar: Use una frase, recordando un momento memorable y que solo usted puede recordar El Password debería ser no menor de ocho caracteres. Incluya al menos uno de los siguientes caracteres: Mayúsculas, minúsculas, caracteres especiales...
  • Wiki Page: Effective Database Engine Permissions

    This topic describes how to determine who has permissions to various objects in the SQL Server Database Engine. SQL Server implements two permission systems for the Database Engine. An older system of fixed roles has preconfigured permissions. Beginning with SQL Server 2005 a more flexible and precise...
  • Wiki Page: Database Engine Permission Basics

    In SQL Server 2008 R2, Database Engine permissions are managed at the server level through logins and fixed server roles, and at the database level through database users, fixed database roles, and user-defined database roles. Download the Permissions Poster PDF file . Table of Contents Logins...
  • Wiki Page: Database Engine Security Checklist: Encrypt Sensitive Data

    This checklist helps you confirm that encryption is used appropriately in your environment. Use this checklist to periodically audit your use of encryption with the SQL Server Database Engine. Database Level ... Description Have you evaluated encrypting...
  • Wiki Page: Database Engine Security Checklist: Limit Access to Data

    This checklist helps you review how you limit access to data in your organization. Use this checklist to periodically audit how users access information stored in the SQL Server Database Engine. Table of Contents Access to the Instance of SQL Server Managing User Identity Object Access Auditing...
  • Wiki Page: Database Engine Security Checklist: Database Engine Security Configuration

    This checklist reviews key security configuration options for the SQL Server Database Engine. Use this checklist to periodically audit your Database Engine environment. These recommended settings should be adjusted based on your security and business needs. Table of Contents Physical Security Operating...
  • Wiki Page: Database Engine Security Checklist: Enhance the Security of Database Engine Connections

    This checklist reviews key options to use when connecting to the SQL Server Database Engine. Use this checklist to review your environment to make sure that connections are made to the Database Engine as securely as necessary for your business needs. Database Engine Configuration ....
  • Wiki Page: Database Engine Fixed Server and Fixed Database Roles

    Fixed server roles and fixed database roles are assigned specific permissions by SQL Server. The permissions of the fixed roles cannot be changed. Fixed server and fixed database roles are provided for convenience and backward compatibility. Beginning with SQL Server 2005, a more granular permission...
  • Wiki Page: Operations Guide for A Solution for Private Cloud Security

    Welcome to this third paper in the Solution for Private Cloud Security series. This paper discusses private cloud security from the operations perspective and offers guidance for operating security within a private cloud environment. In some areas, specific products are discussed in relation to the...
  • Wiki Page: Design Guide for A Solution for Private Cloud Security

    The Service Design paper discusses private cloud security from the design perspective, offers guidance for creating a security design for a private cloud, and discusses some of the design decisions you will have to make. In some areas, this paper discusses specific products in relation to the security...
  • Wiki Page: Cloud Security Challenges

    To highlight the changes in security between traditional IT systems and cloud-based environments, this paper takes four of the five the NIST cloud computing definitions and analyses these statements to create a problem statement and a range of possible attack vectors. This paper considers each of these...
  • Wiki Page: Defining the Private Cloud Security Problem Domain

    As previous sections in this document outline, security is a universal component of cloud service provisioning. To help consider this requirement logically, this series considers the key security differences in private cloud environments, which result from the unique features of a cloud-based service...
  • Wiki Page: Security Entwickler Ressourcen (de-DE)

    Andere Ressourcen Security Developer Center Kryptographie-Themen auf MSDN Folge uns auf Twitter Table of Contents MSDN Forums Blogs MSDN Magazin Artikel Bücher Webseiten Siehe auch Andere Sprachen MSDN Forums Die technische Community ermöglicht es mit Microsoft...
Page 2 of 7 (152 items) 12345»
Can't find it? Write it!