• Main Menu
  • Microsoft Security

    • Understanding and Implementing Smart Card Authentication

      Understanding and Implementing Smart Card Authentication

      An Overview on Authentication and Smart Cards Administrators have to secure the network from attacks launched by hackers, spies, terrorists, thieves and criminals. Security encompasses numerous technologies, protocols, standards, policies, passwords, and secret keys. All these mechanisms typically focus on the following: Authentication Access Control Data Protection Auditing/Accountability Authentication is the process by which an

    • Defining a Baseline Security Template

      Defining a Baseline Security Template

      Security Templates Review A security template is collection of security configuration settings that can be applied to a domain controller, member server or a workstation. The settings within a security template control the security configuration of a computer through both local policies and group policies. A security template can be applied to a local computer,

    • Resultant Set of Policies

      Resultant Set of Policies

      Group Policy Objects (GPOs) containing Group Policy settings can be linked to sites, domains, and organizational units (OUs), so that they are applied to user objects or computer objects located in the particular site, domain, or OU in Active Directory. Because of numerous Group Policy settings that exist, and the flexibility of group policies, Group

    • Securing Domain Controllers

      Securing Domain Controllers

      Domain Controllers Security Issues When it comes to Windows Server Active Directory networks, one of the most important server roles which can be configured is probably the domain controllers role. Domain controllers perform a number of important functions and control activities within a domain, including the following: Contain a replica of the Active Directory directory

    • Authentication Types

      Authentication Types

      What is Authentication Authentication is the process whereby the system identifies legitimate users from unauthorized users. It is the process in which a user identifies his/her self to the system. How effective an authentication process is, is determined by the authentication protocols and mechanisms being used. Windows Server 2003 provides a few different authentication types

    • Implementing Account and Security Policies

      Implementing Account and Security Policies

      Understanding Security Policy Types With Windows Server 2003, you can implement and manage security settings at the following levels: Local computer (local security policies) Active Directory site, domain, or organizational unit (domain security policies) Local security policies are managed through Local Computer Group Policy Objects (GPOs), and domain security policies are managed through Group Policy

    • Shared Folder Permissions

      Shared Folder Permissions

      Shared folder permissions are used to restrict access to a folder or file that is shared over a network. Folder sharing is normally used to grant remote users access to files and folders over a network. Web sharing grants remote users access to files from the Web if Internet Information Services (IIS) is installed. Members

    • How to Enable the Windows Vista Administrator Account

      How to Enable the Windows Vista Administrator Account

      In Windows Vista, there is a difference between accounts with “computer administrator” privileges and the Administrator account. In the Administrator account, the User Account Control is disabled. Also, the Administrator account is present, but hidden and disabled by default. Please be aware that Vista Beta 2 has a bug that may cause big problems, if

    • How to Add a User to Windows

      How to Add a User to Windows

      The Microsoft Windows operating system (OS) is one of the most popular OSs in the world. Although the company releases a new OS every three to four years (sometimes a bit faster), there are a number of common tasks that extend across software versions; albeit, the specific steps required to accomplish the task may differ

    • How to Turn off User Account Control

      How to Turn off User Account Control

      Microsoft designed the Windows User Account Control and deployed it on the Windows Operating System (OS) in order to prevent unauthorized modifications to critical settings or programs on a computer running the Windows OS. Microsoft deployed User Account Control since Windows XP, and has continued to update the application in newer versions of Windows (such

    microsoft-security
    176 queries in 0.635 seconds.