Wednesday, May 28, 2014

WindowSecurity.com - Video: Auditing vs Advanced Auditing Configurations - Part 2

WindowSecurity.com - Video: Auditing vs Advanced Auditing Configurations - Part 2

Hi Security World,


---------------------------------------------------------
---------------------------------------------------------


Just Published
-----------------------------------------------------------------
Video: Auditing vs Advanced Auditing Configurations - Part 2 (on 28 May 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/windows_os_security/video-auditing-vs-advanced-auditing-configurations-part-2.html
Microsoft has added new auditing options to Windows Server 2008 R2/Windows 7 computers and above. The new auditing controls more granular areas of your computer, reducing the overall security log entries so you can audit more of what you want and less of what you don’t need. In this second part video.



Recent Articles & Tutorials
-----------------------------------------------------------------
Securing Your Lync Server (Part 2) (on 21 May 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/securing-your-lync-server-part2.html
In this article we'll go over the common threats to Lync servers, provide some tips and tricks for hardening your Lync server and the Lync database, and discuss how to plan and configure two-factor authentication for Lync.

Effectively securing Windows 8.x, ten things you need to know (on 14 May 2014 by Ricky M. & Monique L. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/windows_os_security/effectively-securing-windows-8x-ten-things-you-need-know.html
This article will focus on the security enhancements that Windows 8.x offers, over what is found in the previous versions of Windows. We will also look at enhancements that have been made to the operating system that will help both the individual and the enterprise and effectively will impact data stored in the cloud.

Securing Your Lync Server (Part 1) (on 7 May 2014 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/securing-your-lync-server-part1.html
In this, Part 1 of this series on securing your Lync server, we'll take a look at what Microsoft Lync is, how it works, and the security mechanisms and management tools that are built in.

Securing and Auditing Windows Active Directory (Part 1) (on 30 April 2014 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/securing-and-auditing-windows-active-directory-part1.html
This article series discusses securing and auditing your Windows environment.





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- WServerNews.com (http://www.wservernews.com/)


--
To unsubscribe: http://www.techgenix.com/newsletter/members.aspx?Task=OOS&SI=78504&E=security.world%40gmail.com&S=1&NL=10
To change your subscription settings: http://www.techgenix.com/newsletter/members.aspx?Task=US&SI=78504&E=security.world%40gmail.com&S=1
WindowSecurity.com
is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2014. All rights reserved.

No comments:

Post a Comment