Browse by Tags

Tagged Content List
  • Wiki Page: Secure Silverlight Applications with Claims-Based Authentication in Azure – Lessons Learned – Part 1

    Part of Microsoft’s Azure strategy is offering organizations the choice to port and run portions of their existing applications in the cloud while continuing to utilize on-premise software. This is a compelling strategy with many variations which are easy to implement using Windows Azure and related...
  • Wiki Page: Overview of Security in Windows Azure SQL Database

    Windows Azure SQL Database has two types of access control: SQL Authentication and a server-side firewall that restricts access by IP address. Along with access control SQL Database always maintains a secure connection to your database via SQL Server’s protocol encryption. Transparent Data Encryption...
  • Wiki Page: Test your server for Heartbleed via Powershell

    Download latest OpenSSL for Windows and install your computer. Open your text editor and write one domain name or IP address on each line and save it. Then change $sites and $oSSL variables. $sites = Get-Content -Path " C:\domains.txt " $oSSL = " C:\OpenSSL-Win64...
  • Wiki Page: IE Security Threat Work-around: Disable Flash in Internet Explorer

    Due to a security threat, Homeland Security and numerous other Government Security organizations have recommended their citizens immediately stop using Internet Explorer. However, this is not entirely necessary. You can continue to use Internet Explorer so long as you disable the Shockwave Flash plugin...
  • Wiki Page: Patch Issues for Administrators

    Resources and Guidance for Patch Issues for Administrators To better remember where the log files end up for various patches, this wiki page is an attempt to recap them in one place for the Patching Administrator. If the failure is in installation, - what is the error message? Here's a page...
  • Wiki Page: SCVMM V2V Failed with Error - Protocol Error with Too Many Authentication Failures for Root

    When you perform a V2V using SCVMM from a VMware ESX 3.5 host and we may get the following error: Error (12709) The operation on did not complete successfully because of the error: Server sent disconnect message: type 2 (protocol error : too many authentication failures for root) First, confirm...
  • Wiki Page: Configure Malware Policy in Exchange 2013

    Microsoft Exchange 2013 has the basic antimalware settings which can be enabled during the installation. By default we have a default malware policy which can be modified according to our needs. But it cannot be deleted. We can create our malware policy according to the company needs. Below...
  • Wiki Page: SharePoint: Limited Access permission

    Source reference Anonymous Users, Forms Pages, and the Lockdown Feature ( http://blogs.msdn.com/b/ecm/archive/2007/05/12/anonymous-users-forms-pages-and-the-lockdown-feature.aspx ) Scenario We have a list which doesn't inherit permissions from the site. Also, at the root of the list, there...
  • Wiki Page: Bring Your Own Device (BYOD) Survival Guide for Microsoft Technologies

    As technology evolves and users demand to work from anywhere and any device, it is important that companies have a strategy to embrace this new model. In this new model IT doesn’t have full control of the device, however is necessary to have some level of security in place to enable users to be productive...
  • Wiki Page: Microsoft Enhanced Mitigation Experience Toolkit (EMET) 4.1 Technical Review - Part 1

    Microsoft Enhanced Mitigation Experience Toolkit (EMET) is a must tool from my point of view for any security professional as well as normal users to help protect them from unknown vulnerabilities or what so called Zero-Day attacks. EMET will try to stop and prevent the malicious code from running...
  • Wiki Page: Script to Check HD Encrypted Using BitLocker

    This sample script, originally on this blog post , shows how you can script a check on hard drives to report if they have been encrypted with BitLocker and/or BiltLocker To Go. Do you have an alternative script or way to check if BL is enabled on a hard drive? Please share in this article - it is...
  • Wiki Page: Office 365 Service Descriptions: Privacy, Security and Transparency, Service Continuity, and Compliance

    The Office 365 Service Descriptions TechNet page provide detailed descriptions of the services and features that are available with Office 365. Each Office 365 service is designed to provide a high degree of security, privacy, continuity, and compliance. For more information, see the following...
  • Wiki Page: Office 365 Service-Beschreibungen: Datenschutz, Sicherheit und Transparenz, Service-Verfügbarkeit und Compliance (de-DE)

    Dieser Artikel ist die Übersetzung des englischen Artikels Office 365 Service Descriptions: Privacy, Security and Transparency, Service Continuity, and Compliance von Ed Price . Die TechNet-Seite Office 365 Service Descriptions beschreibt die von Office 365 angeboten Services und Features detailliert...
  • Wiki Page: Forefront Protection 2010 for Exchange Server (FPE 2010): FAQ

    Get answers to your questions about Forefront Protection 2010 for Exchange Server. Q. What is Forefront Protection 2010 for Exchange Server? A. Forefront Protection 2010 for Exchange Server provides fast and effective detection of viruses, worms, and spyware by integrating multiple scanning...
  • Wiki Page: Forefront Online Protection for Exchange (FOPE): FAQ

    Get answers to your general questions about the Forefront Online Protection for Exchange (FOPE) service right here. You can find more FOPE documentation at the following locations: FOPE Technical Support FAQs - Details many troubleshooting tips for FOPE. FOPE User Guide - In-depth documentation...
  • Wiki Page: Forefront Protection 2010 for SharePoint (FPSP 2010): FAQ

    Get answers to your questions about Forefront Protection 2010 for SharePoint. Q. What is Forefront Protection 2010 for SharePoint? A. Microsoft Forefront Protection 2010 for SharePoint helps prevents users from uploading or downloading documents containing malware, out-of-policy content...
  • Wiki Page: A Solution for Private Cloud Security

    Welcome to the "A Solution for Private Cloud Security" series of three papers on private cloud security. With increasing numbers of organizations looking to create cloud-based environments or to implement cloud technologies within their existing data centers, business and technology decision...
  • Wiki Page: SharePoint 2010: Choisir entre des groupes AD et des groupes SharePoint (fr-FR)

    Quelle route devriez-vous emprunter en vous dirigeant vers une infrastructure de sécurité pour SharePoint : utiliser Active Directory (AD) ou des groupes SharePoint ? Table of Contents Pour: les groupes AD Pour: les groupes SharePoint Best practices Sujets connexes Vue d'ensemble des best...
  • Wiki Page: Password Management (es-ES)

    Crear Passwords Fuertes y fáciles de recordar: Use una frase, recordando un momento memorable y que solo usted puede recordar El Password debería ser no menor de ocho caracteres. Incluya al menos uno de los siguientes caracteres: Mayúsculas, minúsculas, caracteres especiales...
  • Wiki Page: Effective Database Engine Permissions

    This topic describes how to determine who has permissions to various objects in the SQL Server Database Engine. SQL Server implements two permission systems for the Database Engine. An older system of fixed roles has preconfigured permissions. Beginning with SQL Server 2005 a more flexible and precise...
  • Wiki Page: Database Engine Permission Basics

    In SQL Server 2008 R2, Database Engine permissions are managed at the server level through logins and fixed server roles, and at the database level through database users, fixed database roles, and user-defined database roles. Download the Permissions Poster PDF file . Table of Contents Logins...
  • Wiki Page: Database Engine Security Checklist: Encrypt Sensitive Data

    This checklist helps you confirm that encryption is used appropriately in your environment. Use this checklist to periodically audit your use of encryption with the SQL Server Database Engine. Database Level ... Description Have you evaluated encrypting...
  • Wiki Page: Database Engine Security Checklist: Limit Access to Data

    This checklist helps you review how you limit access to data in your organization. Use this checklist to periodically audit how users access information stored in the SQL Server Database Engine. Table of Contents Access to the Instance of SQL Server Managing User Identity Object Access Auditing...
  • Wiki Page: Database Engine Security Checklist: Database Engine Security Configuration

    This checklist reviews key security configuration options for the SQL Server Database Engine. Use this checklist to periodically audit your Database Engine environment. These recommended settings should be adjusted based on your security and business needs. Table of Contents Physical Security Operating...
  • Wiki Page: Database Engine Security Checklist: Enhance the Security of Database Engine Connections

    This checklist reviews key options to use when connecting to the SQL Server Database Engine. Use this checklist to review your environment to make sure that connections are made to the Database Engine as securely as necessary for your business needs. Database Engine Configuration ....
Page 2 of 7 (152 items) 12345»
Can't find it? Write it!