Thursday, March 27, 2014

WindowSecurity.com - Netwrix Auditor - Voted WindowSecurity.com Readers' Choice Award Winner - Event Log Monitoring

WindowSecurity.com - Netwrix Auditor - Voted WindowSecurity.com Readers' Choice Award Winner - Event Log Monitoring

Hi Security World,





Just Published
-----------------------------------------------------------------
Netwrix Auditor - Voted WindowSecurity.com Readers' Choice Award Winner - Event Log Monitoring (on 27 March 2014 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Event-Log-Monitoring-Netwrix-Auditor-Feb14.html
Netwrix Auditor was selected the winner in the Event Log Monitoring category of the WindowSecurity.com Readers' Choice Awards. EventSentry and Panda Cloud Systems Management were runner-up and second runner-up respectively.



Recent Articles & Tutorials
-----------------------------------------------------------------
Web Browser Security Revisited (Part 5) (on 26 March 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Web_Application_Security/web-browser-security-revisited-part5.html
In this article we’ll look at the special features Google provides for enterprise administrators with its Chrome for Business.

Securing Active Directory with PowerShell (on 19 March 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/securing-active-directory-powershell.html
In this article, we’re going to look at security as it relates to AD. In particular, we’ll look at how you can use PowerShell to ensure that several different security aspects of AD don’t drift. These scripts are designed for you to run them on a periodic basis to determine whether anything has changed with respect to your AD security posture.

Web Browser Security Revisited (Part 4) (on 12 March 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Web_Application_Security/web-browser-security-revisited-part4.html
In this article we'll discuss how to adjust Google Chrome’s security and privacy settings for best security practices.

Developing an Information Security and Risk Management Strategy (Part 2) (on 5 March 2014 by Ricky M. & Monique L. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/intrusion_detection/developing-information-security-and-risk-management-strategy-part2.html
In this article we will focus on elements that will help develop a comprehensive security strategy for your organisation.





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- WServerNews.com (http://www.wservernews.com/)


--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2014. All rights reserved.

No comments:

Post a Comment