Search This Blog

Wednesday, October 30, 2013

WindowSecurity.com - Video: Securing Service Accounts - Part 1

WindowSecurity.com - Video: Securing Service Accounts - Part 1

Hi Security World,


---------------------------------------------------------
---------------------------------------------------------


Just Published
-----------------------------------------------------------------
Video: Securing Service Accounts - Part 1 (on 30 Oct. 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/video-securing-service-accounts-part-1.html
This video is the first part of two videos explaining securing of Service Accounts



Recent Articles & Tutorials
-----------------------------------------------------------------
Are we heading for Identity Management Federation? (Part 1) (on 23 Oct. 2013 by Ricky M. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/are-we-heading-identity-management-federation-part1.html
There are now more authentication methods than ever before, hardware has progressed to a point that can facilitate complex authentication processes. Are we on the verge of a federated era in the cloud? This article will explore the authentication possibilities and the possible outcomes of what may happen over the next five years in this space.

Use Windows Command Line Tools and PowerShell Cmdlets to Manage Security in Windows Server 2012 (Part 1) (on 16 Oct. 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Windows_Server_2012_Security/use-windows-command-line-tools-and-powershell-cmdlets-manage-security-windows-server-2012-part1.html
In this article we'll provide an overview of how to use Certutil.exe and PowerShell cmdlets to install and manage the Certificate Services role.

Change Management for Active Directory (on 9 Oct. 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/change-management-active-directory.html
In this article we will cover what is in Active Directory by default, as well as what you might want to keep an eye for in other products that can make your change management of Active Directory a complete solution.

Complacency: the 8th Deadly Sin of IT Security (Part 3) (on 2 Oct. 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/complacency-8th-deadly-sin-it-security-part3.html
In Part 3, we'll discuss some tips for maintaining vigilance without going overboard.





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- MSPanswers.com (http://www.mspanswers.com/)
- WServerNews.com (http://www.wservernews.com/)


--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2013. All rights reserved.

No comments: