• Main Menu
  • Microsoft Security

    • Implementing Public Key Infrastructure

      Implementing Public Key Infrastructure

      An Overview on the Public Key Infrastructure (PKI) A set of components, standards, and protocols make up the Public Key Infrastructure (PKI), which protects data as it is transmitted over the network. The PKI is an integral aspect of security within a network. Digital certificates form the basis of the PKI because these certificates use

    • Understanding Security Templates

      Understanding Security Templates

      With Windows NT 4.0, came the launch of the System Policy Editor feature which enabled administrators to manage the security settings of the system through a single user interface. The System Policy Editor feature allowed administrators to easily manage configurations of multiple computers because configuration settings could be copied between systems. With the introduction of

    • How to Recover a Lost Windows Password

      How to Recover a Lost Windows Password

      There are several ways to recover a lost windows password. Hidden administrator account method, Windows installation disk, and third party software are some of the methods you can try. Hidden Administrator Account Method If using a custom user account, Windows automatically creates an “Administrator” account that is hidden from the user selection log in screen.

    • Authentication Types

      Authentication Types

      What is Authentication Authentication is the process whereby the system identifies legitimate users from unauthorized users. It is the process in which a user identifies his/her self to the system. How effective an authentication process is, is determined by the authentication protocols and mechanisms being used. Windows Server 2003 provides a few different authentication types

    • Shared Folder Permissions

      Shared Folder Permissions

      Shared folder permissions are used to restrict access to a folder or file that is shared over a network. Folder sharing is normally used to grant remote users access to files and folders over a network. Web sharing grants remote users access to files from the Web if Internet Information Services (IIS) is installed. Members

    • Auditing Security Events

      Auditing Security Events

      An Overview of Auditing Auditing enables you to determine which activities are occurring on your system. Through auditing, you can track access to objects, files and folders; as well as any modifications made to the objects, files and folders. Auditing therefore enables you to collect information associated with resource access and usage on your system

    • Securing Domain Controllers

      Securing Domain Controllers

      Domain Controllers Security Issues When it comes to Windows Server Active Directory networks, one of the most important server roles which can be configured is probably the domain controllers role. Domain controllers perform a number of important functions and control activities within a domain, including the following: Contain a replica of the Active Directory directory

    • Understanding and Implementing Smart Card Authentication

      Understanding and Implementing Smart Card Authentication

      An Overview on Authentication and Smart Cards Administrators have to secure the network from attacks launched by hackers, spies, terrorists, thieves and criminals. Security encompasses numerous technologies, protocols, standards, policies, passwords, and secret keys. All these mechanisms typically focus on the following: Authentication Access Control Data Protection Auditing/Accountability Authentication is the process by which an

    • Securing File and Print Servers

      Securing File and Print Servers

      The file server role stores data for network users, and provides access to users for files stored on the file server. File servers enable users to store files in a centralized location and share files with another user. The print server role provides network printing capabilities for the network. Through the print server role, you

    • Implementing IAS

      Implementing IAS

      Internet Authentication Service (IAS) Overview In most organizations that have multiple network access servers, the centralization of authentication and accounting of connections being established at a centralized server is the better approach than each network access server performing authentication and accounting services. The Remote Authentication Dial-In User Service (RADIUS) protocol is the recognized protocol for

    microsoft-security
    182 queries in 0.568 seconds.