WindowSecurity.com - Video: Auditing vs Advanced Auditing Configurations - Part 1
Hi Security World,
---------------------------------------------------------
---------------------------------------------------------
Just Published
-----------------------------------------------------------------
Video: Auditing vs Advanced Auditing Configurations - Part 1 (on 2 April 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/windows_os_security/video-auditing-vs-advanced-auditing-configurations-part-1.html
Microsoft has added new auditing options to Windows Server 2008 R2/Windows 7 computers and above. The new auditing controls more granular areas of your computer, reducing the overall security log entries so you can audit more of what you want and less of what you don’t need. In this first part video we will look at the configurations of each audit policy to know where we can configure them.
Recent Articles & Tutorials
-----------------------------------------------------------------
Netwrix Auditor - Voted WindowSecurity.com Readers' Choice Award Winner - Event Log Monitoring (on 27 March 2014 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Event-Log-Monitoring-Netwrix-Auditor-Feb14.html
Netwrix Auditor was selected the winner in the Event Log Monitoring category of the WindowSecurity.com Readers' Choice Awards. EventSentry and Panda Cloud Systems Management were runner-up and second runner-up respectively.
Web Browser Security Revisited (Part 5) (on 26 March 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Web_Application_Security/web-browser-security-revisited-part5.html
In this article we’ll look at the special features Google provides for enterprise administrators with its Chrome for Business.
Securing Active Directory with PowerShell (on 19 March 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/securing-active-directory-powershell.html
In this article, we’re going to look at security as it relates to AD. In particular, we’ll look at how you can use PowerShell to ensure that several different security aspects of AD don’t drift. These scripts are designed for you to run them on a periodic basis to determine whether anything has changed with respect to your AD security posture.
Web Browser Security Revisited (Part 4) (on 12 March 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Web_Application_Security/web-browser-security-revisited-part4.html
In this article we'll discuss how to adjust Google Chrome’s security and privacy settings for best security practices.
WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)
Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- WServerNews.com (http://www.wservernews.com/)
--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2014. All rights reserved.
No comments:
Post a Comment