Browse by Tags

Tagged Content List
  • Wiki Page: Why Split Tunneling is Not a Security Issue with DirectAccess

    [This article originally appeared in "The Edge Man" blog at http://blogs.technet.com/tomshinder/archive/2010/03/02/why-split-tunneling-is-not-a-security-issue-with-directaccess.aspx ] (Discuss UAG DirectAccess issues on the TechNet Forums over at http://social.technet.microsoft.com/Forums...
  • Wiki Page: SharePoint 2010: Best Practices - Choosing Between AD Groups or SharePoint Groups

    Which way should you go when coming up with a security infrastructure for SharePoint: use Active Directory (AD) or SharePoint groups? Table of Contents Pro AD groups Pro SharePoint groups Best practices Related topics Best Practices Overview Pro AD groups Company rules may dictate the...
  • Wiki Page: SCVMM V2V Failed with Error - Protocol Error with Too Many Authentication Failures for Root

    When you perform a V2V using SCVMM from a VMware ESX 3.5 host and we may get the following error: Error (12709) The operation on did not complete successfully because of the error: Server sent disconnect message: type 2 (protocol error : too many authentication failures for root) Firs, confirm...
  • Wiki Page: Hyper-V: VM Connection Keyboard Shortcuts

    Applies To: Windows Server 2008, Windows Server 2008 R2 This article sources from the Virtual PC Guy's blog post . This information is useful for troubleshooting, as well as routine operation. Hyper-V provide a "Virtual Machine Connection" for interacting with a VM. Virtual Machine...
  • Wiki Page: Microsoft Anti-Virus Exclusion List

    One place on the web where you can find an updated list of ALL the AV exclusions you might want to configure for Windows Server. Feel free to add to the list, it is the wiki way! HINT : Subscribe to the RSS feed for this wiki page to get auto-notification when it is updated! Enterprise Configuration...
  • Wiki Page: Forefront Protection 2010 for SharePoint (FPSP 2010): FAQ

    Get answers to your questions about Forefront Protection 2010 for SharePoint. Q. What is Forefront Protection 2010 for SharePoint? A. Microsoft Forefront Protection 2010 for SharePoint helps prevents users from uploading or downloading documents containing malware, out-of-policy content...
  • Wiki Page: SQL Server 2012 Audit Yenilikleri (tr-TR)

    Bu yazımda SQL Server 2012 ile birlikte Audit tarafındaki yeniliklere değineceğim. SQL Server 2008 ile birlikte gelen güzel özelliklerden birisi de Audit idi. Audit, veritabanı tarafında güvenlik ile ilgili yönetimsel işleri kolaylaştırdığı gibi özellikle denetimden...
  • Wiki Page: Windows PowerShell Security Survival Guide

    Lots of people new to PowerShell have question about security. This article is meant to be the place to collect links on PowerShell security, esepcially remoting security. Feel free to add information and links to this article--it is the Wiki way! PowerShell’s Security Guiding Principles...
  • Wiki Page: Seting Keamanan ASP.NET (IIS 7.5) pada Windows 2008 R2 (id-ID)

    Tingkat keamanan pada Windows 2008 R2 berbeda dengan versi Windows sebelumnya. Oleh karena itu untuk membuat sebuah website pada Windows 2008 R2 dengan IIS perlu menseting keamanan folder maupun IIS-nya itu sendiri. Hal utama yang perlu diperhatikan adalah hak akses baca ke sistem file (file &...
  • Wiki Page: GRC Baselines Made Easy

    Good news for those of you that have to create GRC baselines! You don’t have to build specific GRC baselines such as for the Health Insurance Portability and Accountability Act (HIPAA), as the Solution Accelerators team is now building baselines that simultaneously support HIPAA as well as over 500...
  • Wiki Page: Secure Silverlight Applications with Claims-Based Authentication in Windows Azure – Lessons Learned – Part 2

    In this second article of the series ( see first article here ), I’ll continue sharing security and Silverlight lessons learned while moving an application to Azure. Specifically let’s extend what we discussed in part one to include: · More details about securing the on-premise service...
  • Wiki Page: Secure Silverlight Applications with Claims-Based Authentication in Windows Azure – Lessons Learned – Part 1

    Part of Microsoft’s Windows Azure strategy is offering organizations the choice to port and run portions of their existing applications in the cloud while continuing to utilize on-premise software. This is a compelling strategy with many variations which are easy to implement using Windows Azure and...
  • Wiki Page: Pattern Catalog

    I am attempting to pull together a catalog of patterns from a number of sources and applicable to a number of different personas. For anyone interested in learning more about patterns see http://social.technet.microsoft.com/wiki/contents/articles/an-introduction-to-patterns.aspx Security Patterns...
  • Wiki Page: Manage SCVMM in restrictive Active Directory environment

    So you want to manage your VMM infrastructure while keeping an eye on your Hyper-V hosts security. Looks like everyone wants to do that. So have you thought before about using Restricted Groups group policy to limit membership for your local admins group? Let’s have a look at when to use a domain...
  • Wiki Page: Best Practices: Using a Separate Account for Admin Tasks

    It’s been my observation that in most organizations administrators use their normal user account for admin tasks. The account is made a member or Domain Admins, DNS Admins, Exchange Admins, or whatever admin group grants the appropriate level of permissions for their role. I would like to make the...
  • Wiki Page: Security a Recurring Theme in Cloud | dinCloud's take on GoDaddy Outage

    Security is a hot topic when you talk about cloud. People sometimes have the view that they don’t trust the cloud with their data. Then you hear about numerous outages and you wonder, how reliable is the cloud. GoDaddy Outage While we think very highly of GoDaddy, and their aptitude for branding...
  • Wiki Page: Internet security tips for Businesses

    Internet has become a lifeline for today’s businesses. Whether you are running an e-Commerce portal or a traditional business, you need Internet to run day-to-day operations. You may need to check the bank account information online or want to book air tickets without thinking twice that information...
  • Wiki Page: Database Engine Fixed Server and Fixed Database Roles

    Fixed server roles and fixed database roles are assigned specific permissions by SQL Server. The permissions of the fixed roles cannot be changed. Fixed server and fixed database roles are provided for convenience and backward compatibility. Beginning with SQL Server 2005, a more granular permission...
  • Wiki Page: [Windows 7 - Serie de How-To] Control de Aplicaciones con AppLocker (es-ES)

    En esta oportunidad hablaremos sobre como controlar las aplicaciones en Windows 7 con la funcionalidad de AppLocker!
  • Wiki Page: [Windows 7 - Serie de How-To] Configuración del Backup y Recuperación de Archivos con Shadow Copy (es-ES)

  • Wiki Page: [Windows 7 - Serie de How-To] Asegurando los USB's con Bitlocker To Go (es-ES)

  • Wiki Page: Understanding Access to Microsoft Certificate Revocation List

    High-Level Overview We encourage you to enhance this guide by identifying missing areas (scenarios, features, lifecycle...), provide links to and write descriptions of existing content, and providing new content where there are gaps. Join the community ! Introduction...
  • Wiki Page: WSUS Supportability Statement on HTTPS Inspection

    Scenario The implementation of HTTPS Inspection to inspect the traffic between Microsoft Update and a WSUS server as shown below is not supported: More information about this Scenario For more information on how HTTPS Inspection works on Forefront TMG 2010 read the article below: ...
  • Wiki Page: Windows Security Survival Guide

    We encourage you to enhance this guide by identifying missing areas (scenarios, features, lifecycle...), provide links to and write descriptions of existing content, and providing new content where there are gaps. Join the community ! Introduction Many companies invest a good amount...
  • Wiki Page: Split Tunneling Versus Force Tunneling for DirectAccess Clients

    [This article originally appeared on The Edge Man blog at http://blogs.technet.com/tomshinder/archive/2010/03/30/more-on-directaccess-split-tunneling-and-force-tunneling.aspx ] When you configure a Windows DA server or UAG DA server-based DirectAccess (DA) solution, the default setting is to enable...
Page 1 of 6 (136 items) 12345»
Can't find it? Write it!