Search This Blog

Wednesday, September 03, 2014

WindowSecurity.com - Video: Microsoft Baseline Security Analyzer 2.3: A detailed look

WindowSecurity.com - Video: Microsoft Baseline Security Analyzer 2.3: A detailed look

Hi Security World,


---------------------------------------------------------
---------------------------------------------------------


Just Published
-----------------------------------------------------------------
Video: Microsoft Baseline Security Analyzer 2.3: A detailed look (on 3 Sept. 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/video-microsoft-baseline-security-analyzer-23-detailed-look.html
This video demonstrates the process of using Microsoft Baseline Security Analyzer 2.3



Recent Articles & Tutorials
-----------------------------------------------------------------
Microsoft Windows Server Update Services - Voted WindowSecurity.com Readers' Choice Award Winner - Patch Management (on 28 Aug. 2014 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Patch-Management-Microsoft-Windows-Server-Update-Services-Jul14.html
Microsoft Windows Server Update Services was selected the winner in the Patch Management category of the WindowSecurity.com Readers' Choice Awards. ManageEngine Security Manager Plus and GFI LANguard were runner-up and second runner-up respectively.

Planning Considerations for BYOD and Consumerization of IT (Part 2) (on 27 Aug. 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Mobile_Device_Security/planning-considerations-byod-and-consumerization-it-part2.html
In this article, we’ll being our planning process by discussing a collection of solution requirements that cuts across all secure BYOD deployments.

Pass-The-Hash: Protect Your Windows Computers! (Part 3) (on 20 Aug. 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/viruses_trojans_malware/pass-hash-protect-your-windows-computers-part3.html
In this article we'll discuss how to remove LANManager.

Planning Considerations for BYOD and Consumerization of IT (Part 1) (on 13 Aug. 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Mobile_Device_Security/planning-considerations-byod-and-consumerization-it-part1.html
In the first part of this series on planning considerations for security BYOD and consumerization of IT, we'll look at the BYOD problem domain and discuss key aspects of planning and design.





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- WServerNews.com (http://www.wservernews.com/)


--
To unsubscribe: http://www.techgenix.com/newsletter/members.aspx?Task=OOS&SI=78504&E=security.world%40gmail.com&S=1&NL=10
To change your subscription settings: http://www.techgenix.com/newsletter/members.aspx?Task=US&SI=78504&E=security.world%40gmail.com&S=1
WindowSecurity.com
is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
TechGenix Ltd. Mriehel Bypass, Mriehel BKR 3000, Malta
Copyright WindowSecurity.com 2014. All rights reserved.

No comments: