• Main Menu
  • Microsoft Security

    • How to Enable the Windows Vista Administrator Account

      How to Enable the Windows Vista Administrator Account

      In Windows Vista, there is a difference between accounts with “computer administrator” privileges and the Administrator account. In the Administrator account, the User Account Control is disabled. Also, the Administrator account is present, but hidden and disabled by default. Please be aware that Vista Beta 2 has a bug that may cause big problems, if

    • Implementing Public Key Infrastructure

      Implementing Public Key Infrastructure

      An Overview on the Public Key Infrastructure (PKI) A set of components, standards, and protocols make up the Public Key Infrastructure (PKI), which protects data as it is transmitted over the network. The PKI is an integral aspect of security within a network. Digital certificates form the basis of the PKI because these certificates use

    • Defining a Baseline Security Template

      Defining a Baseline Security Template

      Security Templates Review A security template is collection of security configuration settings that can be applied to a domain controller, member server or a workstation. The settings within a security template control the security configuration of a computer through both local policies and group policies. A security template can be applied to a local computer,

    • Auditing Security Events

      Auditing Security Events

      An Overview of Auditing Auditing enables you to determine which activities are occurring on your system. Through auditing, you can track access to objects, files and folders; as well as any modifications made to the objects, files and folders. Auditing therefore enables you to collect information associated with resource access and usage on your system

    • Resultant Set of Policies

      Resultant Set of Policies

      Group Policy Objects (GPOs) containing Group Policy settings can be linked to sites, domains, and organizational units (OUs), so that they are applied to user objects or computer objects located in the particular site, domain, or OU in Active Directory. Because of numerous Group Policy settings that exist, and the flexibility of group policies, Group

    • Understanding and Designing a Public Key Infrastructure

      Understanding and Designing a Public Key Infrastructure

      An Introduction to the Public Key Infrastructure (PKI) It has grown more important to ensure the confidentiality and integrity for data communication where an organization's network contains intranets, extranets, and Internet Web sites. Because of the connectivity of networks today, an organization's network is exposed to unauthorized users who could possibly attempt to access and

    • Securing Domain Controllers

      Securing Domain Controllers

      Domain Controllers Security Issues When it comes to Windows Server Active Directory networks, one of the most important server roles which can be configured is probably the domain controllers role. Domain controllers perform a number of important functions and control activities within a domain, including the following: Contain a replica of the Active Directory directory

    • How to Limit Internet Access in Windows XP User Accounts

      How to Limit Internet Access in Windows XP User Accounts

      User accounts allow Microsoft Windows to differentiate between computer usersĀ  in order to determine the rights they should have. Each user account is assigned its own location on the hard disk for file storage. There is a collection of settings pertaining to each account that is stored in the computer’s Registry. Methods for Limiting a

    • How Internet Authentication Service (IAS) works

      How Internet Authentication Service (IAS) works

      Internet Authentication Service (IAS) is Microsoft's implementation of a RADIUS (Remote Authentication Dial-in User Service) server and proxy. As a RADIUS server, IAS performs centralized connection authentication, authorization, and accounting for many types of network access, including wireless and VPN (Virtual Private Network) connections. As a RADIUS proxy, IAS forwards authentication and accounting messages to

    • Understanding and Implementing Smart Card Authentication

      Understanding and Implementing Smart Card Authentication

      An Overview on Authentication and Smart Cards Administrators have to secure the network from attacks launched by hackers, spies, terrorists, thieves and criminals. Security encompasses numerous technologies, protocols, standards, policies, passwords, and secret keys. All these mechanisms typically focus on the following: Authentication Access Control Data Protection Auditing/Accountability Authentication is the process by which an

    179 queries in 0.563 seconds.