Search This Blog

Wednesday, April 17, 2013

WindowSecurity.com - Securing and Auditing High Risk Files on Windows Servers

WindowSecurity.com - Securing and Auditing High Risk Files on Windows Servers

Hi Security World,


---------------------------------------------------------
---------------------------------------------------------


Just Published
-----------------------------------------------------------------
Securing and Auditing High Risk Files on Windows Servers (on 17 April 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/windows_server_2008_security/securing-auditing-high-risk-files-windows-servers.html
In this article we will discuss how to properly secure files that are high risk to the organization and track when someone accesses the file successfully and also unsuccessfully.



Recent Articles & Tutorials
-----------------------------------------------------------------
The Windows Server 2012 Simplified DirectAccess Wizard Overview (Part 1) (on 10 April 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Windows_Server_2012_Security/windows-server-2012-simplified-directaccess-wizard-overview-Part1.html
In this article, we'll discuss some of the changes in the DirectAccess wizard that have been included in Windows Server 2012.

An Inside look at avoiding cloud risks (on 3 April 2013 by Ricky M. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/Cloud_computing/inside-look-avoiding-cloud-risks.html
In this article the author will cover recent events that have exposed millions of users due to lack of planning and contingency.

GFI EventsManager - Voted WindowSecurity.com Readers' Choice Award Winner - Event Log Monitoring (on 28 March 2013 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Event-Log-Monitoring-GFI-EventsManager-Feb13.html
GFI EventsManager was selected the winner in the Event Log Monitoring category of the WindowSecurity.com Readers' Choice Awards. EventSentry and ManageEngine EventLog Analyzer were runner-up and second runner-up respectively.

Understanding and Configuring Network Policy and Access Services in Server 2012 (Part 3) (on 27 March 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Windows_Server_2012_Security/understanding-configuring-network-policy-access-services-server-2012-part3.html
In this Part 3 of our article series, we’re going to discuss the process of setting up RADIUS servers.





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- MSPanswers.com (http://www.mspanswers.com/)
- WServerNews.com (http://www.wservernews.com/)


--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2013. All rights reserved.

No comments: