• Main Menu
  • Microsoft Security

    • How to Turn off User Account Control

      How to Turn off User Account Control

      Microsoft designed the Windows User Account Control and deployed it on the Windows Operating System (OS) in order to prevent unauthorized modifications to critical settings or programs on a computer running the Windows OS. Microsoft deployed User Account Control since Windows XP, and has continued to update the application in newer versions of Windows (such

    • Understanding and Implementing Access Control

      Understanding and Implementing Access Control

      An Overview of Access Control Allowing users and computers unlimited access to system resources and network resources can ultimately compromise the security and stability of an organization. Even though users and computers need to access network and system resources to perform certain tasks, the access that they require should be limited to those necessary to

    • Implementing Account and Security Policies

      Implementing Account and Security Policies

      Understanding Security Policy Types With Windows Server 2003, you can implement and manage security settings at the following levels: Local computer (local security policies) Active Directory site, domain, or organizational unit (domain security policies) Local security policies are managed through Local Computer Group Policy Objects (GPOs), and domain security policies are managed through Group Policy

    • Wireless Connection Security

      Wireless Connection Security

      Wireless Network Security Threats Wireless networks do not have the inbuilt physical security of wired networks, and are unfortunately more prone to attacks from intruders. Once unauthorized access is gained to the wireless network, the intruder would be able to easily access the resources of the corporate, internal network. To complicate matters, there are numerous

    • Implementing Public Key Infrastructure

      Implementing Public Key Infrastructure

      An Overview on the Public Key Infrastructure (PKI) A set of components, standards, and protocols make up the Public Key Infrastructure (PKI), which protects data as it is transmitted over the network. The PKI is an integral aspect of security within a network. Digital certificates form the basis of the PKI because these certificates use

    • Understanding and Implementing Smart Card Authentication

      Understanding and Implementing Smart Card Authentication

      An Overview on Authentication and Smart Cards Administrators have to secure the network from attacks launched by hackers, spies, terrorists, thieves and criminals. Security encompasses numerous technologies, protocols, standards, policies, passwords, and secret keys. All these mechanisms typically focus on the following: Authentication Access Control Data Protection Auditing/Accountability Authentication is the process by which an

    • How to Recover a Lost Windows Password

      How to Recover a Lost Windows Password

      There are several ways to recover a lost windows password. Hidden administrator account method, Windows installation disk, and third party software are some of the methods you can try. Hidden Administrator Account Method If using a custom user account, Windows automatically creates an “Administrator” account that is hidden from the user selection log in screen.

    • Resultant Set of Policies

      Resultant Set of Policies

      Group Policy Objects (GPOs) containing Group Policy settings can be linked to sites, domains, and organizational units (OUs), so that they are applied to user objects or computer objects located in the particular site, domain, or OU in Active Directory. Because of numerous Group Policy settings that exist, and the flexibility of group policies, Group

    • Implementing IAS

      Implementing IAS

      Internet Authentication Service (IAS) Overview In most organizations that have multiple network access servers, the centralization of authentication and accounting of connections being established at a centralized server is the better approach than each network access server performing authentication and accounting services. The Remote Authentication Dial-In User Service (RADIUS) protocol is the recognized protocol for

    • How to Enable the Windows Vista Administrator Account

      How to Enable the Windows Vista Administrator Account

      In Windows Vista, there is a difference between accounts with “computer administrator” privileges and the Administrator account. In the Administrator account, the User Account Control is disabled. Also, the Administrator account is present, but hidden and disabled by default. Please be aware that Vista Beta 2 has a bug that may cause big problems, if

    microsoft-security
    173 queries in 0.532 seconds.