Search This Blog

Wednesday, August 13, 2014

WindowSecurity.com - Planning Considerations for BYOD and Consumerization of IT (Part 1)

WindowSecurity.com - Planning Considerations for BYOD and Consumerization of IT (Part 1)

Hi Security World,


---------------------------------------------------------
---------------------------------------------------------


Just Published
-----------------------------------------------------------------
Planning Considerations for BYOD and Consumerization of IT (Part 1) (on 13 Aug. 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Mobile_Device_Security/planning-considerations-byod-and-consumerization-it-part1.html
In the first part of this series on planning considerations for security BYOD and consumerization of IT, we'll look at the BYOD problem domain and discuss key aspects of planning and design.



Recent Articles & Tutorials
-----------------------------------------------------------------
Video: Generating Active Directory Group Members Recursively (on 6 Aug. 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/video-generating-active-directory-group-members-recursively.html
This video explains the process of generating active directory members recursively.

Netwrix Auditor - Voted WindowSecurity.com Readers' Choice Award Winner - Group Policy Management (on 31 July 2014 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Group-Policy-Management-Netwrix-Auditor-Jun14.html
Netwrix Auditor was selected the winner in the Group Policy Management category of the WindowSecurity.com Readers' Choice Awards. Dell GPOADmin and ManageEngine ADManager Plus were runner-up and second runner-up respectively.

Managing AppLocker in Windows Server 2012 and Windows 8/8.1 (Part 4) (on 30 July 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Windows_Server_2012_Security/managing-applocker-windows-server-2012-and-windows-8-81-part4.html
In this Part 4, we’ll wrap up the series by discussing how to enable the DLL rule collection, how to create exceptions to rules, how to edit and delete rules, and how to import and export AppLocker policies between computers.

Verifying Active Directory Delegation is Accurate (on 23 July 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/windows_os_security/verifying-active-directory-delegation-accurate.html
This article looks at how to verify that any actice directory delegations which have been set up are correct.





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- WServerNews.com (http://www.wservernews.com/)


--
To unsubscribe: http://www.techgenix.com/newsletter/members.aspx?Task=OOS&SI=78504&E=security.world%40gmail.com&S=1&NL=10
To change your subscription settings: http://www.techgenix.com/newsletter/members.aspx?Task=US&SI=78504&E=security.world%40gmail.com&S=1
WindowSecurity.com
is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
TechGenix Ltd. Mriehel Bypass, Mriehel BKR 3000, Malta
Copyright WindowSecurity.com 2014. All rights reserved.

No comments: