WindowSecurity.com - Improving security through least-privilege practices
Hi Security World,
---------------------------------------------------------
---------------------------------------------------------
Just Published
-----------------------------------------------------------------
Improving security through least-privilege practices (on 11 June 2014 by Ricky M. & Monique L. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/improving-security-through-least-privilege-practices.html
In this article we will consider the successful implementation and management of the least-privilege principle and contemplate the challenges and benefits faced by organisations when addressing security through least-privilege.
Recent Articles & Tutorials
-----------------------------------------------------------------
Securing Your Lync Server (Part 3) (on 4 June 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/securing-your-lync-server-part3.html
This article looks at some security tips specific to using Lync across the Internet and with users outside the organization.
GFI EndPointSecurity - Voted WindowSecurity.com Readers' Choice Award Winner - Endpoint Security (on 29 May 2014 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Endpoint-Security-GFI-EndPointSecurity-Apr14.html
GFI EndPointSecurity was selected the winner in the Endpoint Security category of the WindowSecurity.com Readers' Choice Awards. Comodo Endpoint Security Manager and AGAT ActiveSync Shield were runner-up and second runner-up respectively.
Video: Auditing vs Advanced Auditing Configurations - Part 2 (on 28 May 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/windows_os_security/video-auditing-vs-advanced-auditing-configurations-part-2.html
Microsoft has added new auditing options to Windows Server 2008 R2/Windows 7 computers and above. The new auditing controls more granular areas of your computer, reducing the overall security log entries so you can audit more of what you want and less of what you don’t need. In this second part video.
Securing Your Lync Server (Part 2) (on 21 May 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/securing-your-lync-server-part2.html
In this article we'll go over the common threats to Lync servers, provide some tips and tricks for hardening your Lync server and the Lync database, and discuss how to plan and configure two-factor authentication for Lync.
WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)
Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- WServerNews.com (http://www.wservernews.com/)
--
To unsubscribe: http://www.techgenix.com/newsletter/members.aspx?Task=OOS&SI=78504&E=security.world%40gmail.com&S=1&NL=10
To change your subscription settings: http://www.techgenix.com/newsletter/members.aspx?Task=US&SI=78504&E=security.world%40gmail.com&S=1
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2014. All rights reserved.
No comments:
Post a Comment