WindowSecurity.com - Video: Change management for Active Directory - Part 1
Hi Security World,
---------------------------------------------------------
---------------------------------------------------------
Just Published
-----------------------------------------------------------------
Video: Change management for Active Directory - Part 1 (on 14 Aug. 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/video-change-management-active-directory-part-1.html
This video is the first part of two videos demonstrating change management for Active Directory.
Recent Articles & Tutorials
-----------------------------------------------------------------
Big Data: The Security Perspective (Part 1) (on 7 Aug. 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/big-data-security-perspective-part1.html
One of the hottest buzzwords of the past year was "big data," but what does it really mean? And what does it mean in terms of security? In this article, we’ll talk about the big data trend from a security perspective.
Pass-The-Hash: Protect Your Windows Computers! (Part 1) (on 31 July 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/viruses_trojans_malware/pass-hash-protect-your-windows-computers-part1.html
This article takes a look at the hottest exploit on Windows, Pass-The-Hash (PTH).
Netwrix Auditor - Voted WindowSecurity.com Readers' Choice Award Winner - Group Policy Management (on 25 July 2013 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Group-Policy-Management-Netwrix-Auditor-Jun13.html
Netwrix Auditor was selected the winner in the Group Policy Management category of the WindowSecurity.com Readers' Choice Awards. NetIQ Group Policy Administrator and Quest GPOADmin were runner-up and second runner-up respectively.
Security Awareness Training: Your First Line of Defense (Part 4) (on 24 July 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/security-awareness-training-your-first-line-defense-part4.html
In this final installment of the series, we’ll talk about evaluating the training effectiveness both in the short term and long term.
WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)
Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- MSPanswers.com (http://www.mspanswers.com/)
- WServerNews.com (http://www.wservernews.com/)
--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2013. All rights reserved.
No comments:
Post a Comment