• Main Menu
  • Microsoft Security

    • Understanding and Implementing Access Control

      Understanding and Implementing Access Control

      An Overview of Access Control Allowing users and computers unlimited access to system resources and network resources can ultimately compromise the security and stability of an organization. Even though users and computers need to access network and system resources to perform certain tasks, the access that they require should be limited to those necessary to

    • How to Add a User to Windows

      How to Add a User to Windows

      The Microsoft Windows operating system (OS) is one of the most popular OSs in the world. Although the company releases a new OS every three to four years (sometimes a bit faster), there are a number of common tasks that extend across software versions; albeit, the specific steps required to accomplish the task may differ

    • Implementing IAS

      Implementing IAS

      Internet Authentication Service (IAS) Overview In most organizations that have multiple network access servers, the centralization of authentication and accounting of connections being established at a centralized server is the better approach than each network access server performing authentication and accounting services. The Remote Authentication Dial-In User Service (RADIUS) protocol is the recognized protocol for

    • How to Enable the Windows Vista Administrator Account

      How to Enable the Windows Vista Administrator Account

      In Windows Vista, there is a difference between accounts with “computer administrator” privileges and the Administrator account. In the Administrator account, the User Account Control is disabled. Also, the Administrator account is present, but hidden and disabled by default. Please be aware that Vista Beta 2 has a bug that may cause big problems, if

    • How Internet Authentication Service (IAS) works

      How Internet Authentication Service (IAS) works

      Internet Authentication Service (IAS) is Microsoft's implementation of a RADIUS (Remote Authentication Dial-in User Service) server and proxy. As a RADIUS server, IAS performs centralized connection authentication, authorization, and accounting for many types of network access, including wireless and VPN (Virtual Private Network) connections. As a RADIUS proxy, IAS forwards authentication and accounting messages to

    • Understanding and Designing a Public Key Infrastructure

      Understanding and Designing a Public Key Infrastructure

      An Introduction to the Public Key Infrastructure (PKI) It has grown more important to ensure the confidentiality and integrity for data communication where an organization's network contains intranets, extranets, and Internet Web sites. Because of the connectivity of networks today, an organization's network is exposed to unauthorized users who could possibly attempt to access and

    • Authentication Types

      Authentication Types

      What is Authentication Authentication is the process whereby the system identifies legitimate users from unauthorized users. It is the process in which a user identifies his/her self to the system. How effective an authentication process is, is determined by the authentication protocols and mechanisms being used. Windows Server 2003 provides a few different authentication types

    • How to Recover a Lost Windows Password

      How to Recover a Lost Windows Password

      There are several ways to recover a lost windows password. Hidden administrator account method, Windows installation disk, and third party software are some of the methods you can try. Hidden Administrator Account Method If using a custom user account, Windows automatically creates an “Administrator” account that is hidden from the user selection log in screen.

    • Implementing Public Key Infrastructure

      Implementing Public Key Infrastructure

      An Overview on the Public Key Infrastructure (PKI) A set of components, standards, and protocols make up the Public Key Infrastructure (PKI), which protects data as it is transmitted over the network. The PKI is an integral aspect of security within a network. Digital certificates form the basis of the PKI because these certificates use

    • Securing File and Print Servers

      Securing File and Print Servers

      The file server role stores data for network users, and provides access to users for files stored on the file server. File servers enable users to store files in a centralized location and share files with another user. The print server role provides network printing capabilities for the network. Through the print server role, you

    microsoft-security
    178 queries in 0.552 seconds.