Search This Blog

Wednesday, October 09, 2013

WindowSecurity.com - Change Management for Active Directory

WindowSecurity.com - Change Management for Active Directory

Hi Security World,


---------------------------------------------------------
---------------------------------------------------------


Just Published
-----------------------------------------------------------------
Change Management for Active Directory (on 9 Oct. 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/change-management-active-directory.html
In this article we will cover what is in Active Directory by default, as well as what you might want to keep an eye for in other products that can make your change management of Active Directory a complete solution.



Recent Articles & Tutorials
-----------------------------------------------------------------
Complacency: the 8th Deadly Sin of IT Security (Part 3) (on 2 Oct. 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/complacency-8th-deadly-sin-it-security-part3.html
In Part 3, we’ll discuss some tips for maintaining vigilance without going overboard.

Panda Cloud Office Protection - Voted WindowSecurity.com Readers' Choice Award Winner - Firewall (on 26 Sept. 2013 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Firewall-Panda-Cloud-Office-Protection-Aug13.html
Panda Cloud Office Protection was selected the winner in the Firewall category of the WindowSecurity.com Readers' Choice Awards. Check Point VPN-1 UTM and Sophos UTM software appliance were runner-up and second runner-up respectively.

Video: Change management for Active Directory - Part 2 (on 25 Sept. 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/video-change-management-active-directory-part-2.html
This video is the second part of two part video series demonstrating change management for Active Directory.

Complacency: the 8th Deadly Sin of IT Security (Part 2) (on 18 Sept. 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/complacency-8th-deadly-sin-it-security-part2.html
In this article we’ll discuss some types of security breach attempts we commonly dismiss as “too obvious� that might merit taking a second look, particularly those of the social engineering variety that target you rather than your users.





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- MSPanswers.com (http://www.mspanswers.com/)
- WServerNews.com (http://www.wservernews.com/)


--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2013. All rights reserved.

No comments: