Search This Blog

Wednesday, November 19, 2014

WindowSecurity.com - De-provisioning Users in Active Directory

WindowSecurity.com - De-provisioning Users in Active Directory

Hi Security World,



Just Published
-----------------------------------------------------------------
De-provisioning Users in Active Directory (on 19 Nov. 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/de-provisioning-users-active-directory.html
This article takes a look at ways to de-provision separated employees in Active Directory.



Recent Articles & Tutorials
-----------------------------------------------------------------
Secure Sharing: Collaboration without Compromise (Part 1) (on 12 Nov. 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/secure-sharing-collaboration-without-compromise-part1.html
In this multi-part article, we’re going to discuss the problem of why secure sharing is essential to business today and how to enable users to collaborate without compromising your data and network.

Is Microsoft Windows Security Essentials Enough for Enterprise Security? (on 5 Nov. 2014 by Ricky M. & Monique L. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/windows_os_security/microsoft-windows-security-essentials-enough-enterprise-security.html
Is Windows Security Essentials enough to achieve satisfactory enterprise security or should enterprises be considering additional security strategies? Let's take a look...

Tenable Nessus - Voted WindowSecurity.com Readers' Choice Award Winner - Security Scanner Software (on 30 Oct. 2014 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Security-Scanner-Software-Tenable-Nessus-Sep14.html
Tenable Nessus was selected the winner in the Security Scanner Software category of the WindowSecurity.com Readers' Choice Awards. Acunetix Web Vulnerability Scanner and Retina Network Security Scanner were runner-up and second runner-up respectively.

Planning Considerations for BYOD and Consumerization of IT (Part 6) (on 29 Oct. 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Mobile_Device_Security/planning-considerations-byod-and-consumerization-it-part6.html
In this, Part 6, we’re going to talk about how you can use robust auditing and reporting capabilities for your BYOD environment to make your network more secure and to demonstrate compliance.



WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- WServerNews.com (http://www.wservernews.com/)


--
To unsubscribe: http://www.techgenix.com/newsletter/members.aspx?Task=OOS&SI=78504&E=security.world%40gmail.com&S=1&NL=10
To change your subscription settings: http://www.techgenix.com/newsletter/members.aspx?Task=US&SI=78504&E=security.world%40gmail.com&S=1
WindowSecurity.com
is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
TechGenix Ltd. Mriehel Bypass, Mriehel BKR 3000, Malta
Copyright WindowSecurity.com 2014. All rights reserved.

No comments: