WindowSecurity.com - Video: Securing Service Accounts - Part 2
Hi Security World,
---------------------------------------------------------
---------------------------------------------------------
Just Published
-----------------------------------------------------------------
Video: Securing Service Accounts - Part 2 (on 18 Dec. 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/video-securing-service-accounts-part-2.html
This video is the second part of two video series explaining securing of Service Accounts
Recent Articles & Tutorials
-----------------------------------------------------------------
The Hardening of the Core (Part 1) - Security information and event management (on 11 Dec. 2013 by Ricky M. & Monique L. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/hardening-core-part1.html
This article will focus on the importance of SIEM and why it is needed to achieve a higher level of security posture whilst hardening the core.
The Evolution of Microsoft’s Rights Management Services (Part 1) (on 4 Dec. 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/evolution-microsofts-rights-management-services-part1.html
In this, Part 1 of our series on the evolution of Active Directory Rights Management Services, we provid an overview of what RMS is, how it works and some of the changes it has undergone from its release as an add-on for Windows Server 2003 back in 2005 to its incarnation in Windows Server 2012.
Cisco ASA 5500-X Series - Voted WindowSecurity.com Readers' Choice Award Winner - VPN Solution (on 28 Nov. 2013 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-VPN-Cisco-ASA-5500-X-Series-Oct13.html
Cisco ASA 5500-X Series was selected the winner in the VPN Soluction category of the WindowSecurity.com Readers' Choice Awards. Barracuda SSL VPN and Checkpoint VPN-1 Power were runner-up and second runner-up respectively.
Pass-The-Hash: Protect Your Windows Computers! (Part 2) (on 27 Nov. 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/viruses_trojans_malware/pass-hash-protect-your-windows-computers-part2.html
In this article we'll cover some of the GPO settings you can use to protect your computers from PTH attacks.
WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)
Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- WServerNews.com (http://www.wservernews.com/)
--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2013. All rights reserved.
No comments:
Post a Comment