WindowSecurity.com - Use Windows Command Line Tools and PowerShell Cmdlets to Manage Security in Windows Server 2012 (Part 1)
Hi Security World,
---------------------------------------------------------
---------------------------------------------------------
Just Published
-----------------------------------------------------------------
Use Windows Command Line Tools and PowerShell Cmdlets to Manage Security in Windows Server 2012 (Part 1) (on 16 Oct. 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Windows_Server_2012_Security/use-windows-command-line-tools-and-powershell-cmdlets-manage-security-windows-server-2012-part1.html
In this article we'll provide an overview of how to use Certutil.exe and PowerShell cmdlets to install and manage the Certificate Services role.
Recent Articles & Tutorials
-----------------------------------------------------------------
Change Management for Active Directory (on 9 Oct. 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/change-management-active-directory.html
In this article we will cover what is in Active Directory by default, as well as what you might want to keep an eye for in other products that can make your change management of Active Directory a complete solution.
Complacency: the 8th Deadly Sin of IT Security (Part 3) (on 2 Oct. 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/complacency-8th-deadly-sin-it-security-part3.html
In Part 3, we’ll discuss some tips for maintaining vigilance without going overboard.
Panda Cloud Office Protection - Voted WindowSecurity.com Readers' Choice Award Winner - Firewall (on 26 Sept. 2013 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Firewall-Panda-Cloud-Office-Protection-Aug13.html
Panda Cloud Office Protection was selected the winner in the Firewall category of the WindowSecurity.com Readers' Choice Awards. Check Point VPN-1 UTM and Sophos UTM software appliance were runner-up and second runner-up respectively.
Video: Change management for Active Directory - Part 2 (on 25 Sept. 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/video-change-management-active-directory-part-2.html
This video is the second part of two part video series demonstrating change management for Active Directory.
WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)
Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- MSPanswers.com (http://www.mspanswers.com/)
- WServerNews.com (http://www.wservernews.com/)
--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2013. All rights reserved.
No comments:
Post a Comment