• Main Menu
  • Microsoft Security

    • Understanding Certificate Authorities

      Understanding Certificate Authorities

      An Overview on Certificate Authorities In the Public Key Infrastructure (PKI), digital certificates are based on public key cryptography. The PKI consists of a set of components, policies, protocols, and technologies that provide data authentication, integrity, and confidentiality through the use of certificates, and public and private keys. Data is protected by applying a hashing

    • How to Add a User to Windows

      How to Add a User to Windows

      The Microsoft Windows operating system (OS) is one of the most popular OSs in the world. Although the company releases a new OS every three to four years (sometimes a bit faster), there are a number of common tasks that extend across software versions; albeit, the specific steps required to accomplish the task may differ

    • How to Turn off User Account Control

      How to Turn off User Account Control

      Microsoft designed the Windows User Account Control and deployed it on the Windows Operating System (OS) in order to prevent unauthorized modifications to critical settings or programs on a computer running the Windows OS. Microsoft deployed User Account Control since Windows XP, and has continued to update the application in newer versions of Windows (such

    • Implementing IAS

      Implementing IAS

      Internet Authentication Service (IAS) Overview In most organizations that have multiple network access servers, the centralization of authentication and accounting of connections being established at a centralized server is the better approach than each network access server performing authentication and accounting services. The Remote Authentication Dial-In User Service (RADIUS) protocol is the recognized protocol for

    • Authentication Types

      Authentication Types

      What is Authentication Authentication is the process whereby the system identifies legitimate users from unauthorized users. It is the process in which a user identifies his/her self to the system. How effective an authentication process is, is determined by the authentication protocols and mechanisms being used. Windows Server 2003 provides a few different authentication types

    • Securing File and Print Servers

      Securing File and Print Servers

      The file server role stores data for network users, and provides access to users for files stored on the file server. File servers enable users to store files in a centralized location and share files with another user. The print server role provides network printing capabilities for the network. Through the print server role, you

    • Understanding and Implementing Access Control

      Understanding and Implementing Access Control

      An Overview of Access Control Allowing users and computers unlimited access to system resources and network resources can ultimately compromise the security and stability of an organization. Even though users and computers need to access network and system resources to perform certain tasks, the access that they require should be limited to those necessary to

    • How to Recover a Lost Windows Password

      How to Recover a Lost Windows Password

      There are several ways to recover a lost windows password. Hidden administrator account method, Windows installation disk, and third party software are some of the methods you can try. Hidden Administrator Account Method If using a custom user account, Windows automatically creates an “Administrator” account that is hidden from the user selection log in screen.

    • Understanding Security Templates

      Understanding Security Templates

      With Windows NT 4.0, came the launch of the System Policy Editor feature which enabled administrators to manage the security settings of the system through a single user interface. The System Policy Editor feature allowed administrators to easily manage configurations of multiple computers because configuration settings could be copied between systems. With the introduction of

    • Implementing Account and Security Policies

      Implementing Account and Security Policies

      Understanding Security Policy Types With Windows Server 2003, you can implement and manage security settings at the following levels: Local computer (local security policies) Active Directory site, domain, or organizational unit (domain security policies) Local security policies are managed through Local Computer Group Policy Objects (GPOs), and domain security policies are managed through Group Policy

    microsoft-security
    185 queries in 0.992 seconds.