TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Microsoft Edge
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Skype for Business
See all products »
Resources
Channel 9 Video
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Windows Update
Trials
Windows Server 2016
System Center 2016
Windows 10 Enterprise
SQL Server 2016
See all trials »
Related Sites
Microsoft Download Center
Microsoft Evaluation Center
Drivers
Windows Sysinternals
TechNet Gallery
Training
Expert-led, virtual classes
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
Microsoft Official Courses On-Demand
Certifications
Certification overview
Special offers
MCSE Cloud Platform and Infrastructure
MCSE: Mobility
MCSE: Data Management and Analytics
MCSE Productivity
Other resources
Microsoft Events
Exam Replay
Born To Learn blog
Find technical communities in your area
Azure training
Official Practice Tests
Support options
For business
For developers
For IT professionals
For technical support
Support offerings
More support
Microsoft Premier Online
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Home
Library
Wiki
Learn
Gallery
Downloads
Support
Forums
Blogs
Resources For IT Professionals
United States (English)
Россия (Pусский)
中国(简体中文)
Brasil (Português)
Skip to locale bar
Get this Tag RSS feed
Translate this page
Powered by
Microsoft® Translator
Popular Tags
Active Directory
AD
AD DS
adfs
ASP.NET
azure
BizTalk
BizTalk Server
BizTalk Server 2010
C#
Candidate for deletion
certification
cloud
core docs
de-DE
EAA
Ed Price
Ed's Stub Pages
en-US
ESA
es-ES
Excel
Exchange
Exchange 2010
fa-IR
Fernando Lugao Veltem
FIM
FIM 2010
FIM Resources
FIM-HELP
forefront
forums
fr-FR
Gokan Ozcifci
has code
has comment
has comments
has image
has Images
has Other Languages
has See Also
Has Table
Has TOC
Horizon_Net
How To
Hyper-V
id-ID
IIS
Italian Wiki Articles
it-IT
ja-JP
Jordano Mazzoni
Link Collection
Luciano Lima
Luigi Bruno
Lync Server 2010
MIISILMFIM MACAULAY
Multi Language Wiki Articles
needs work
operations manager
Pirated Content
Portal
Português Brasil
PowerShell
pt-BR
security
SharePoint
SharePoint 2010
SharePoint 2013
SharePoint Pirate
Small Basic
solucionando problemas
SQL Server
SQL Server 2012
stub
System Center
System Center 2012
TechNet Guru
TechNet Wiki
TechNet Wiki Featured Article
tonyso
Translated into Japanese
troubleshooting
tr-TR
vídeo
Video
Virtualization
VMM
Wiki
Windows
Windows 7
Windows 8
Windows Azure
Windows Server
Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
yottun8
اکتیو دایرکتوری
Browse by Tags
>
TechNet Articles
>
All Tags
>
security
Tagged Content List
Wiki Page:
Effective Database Engine Permissions
Rick Byham, Microsoft
This topic describes how to determine who has permissions to various objects in the SQL Server Database Engine. SQL Server implements two permission systems for the Database Engine. An older system of fixed roles has preconfigured permissions. Beginning with SQL Server 2005 a more flexible and precise...
on
9 May 2013
Wiki Page:
A Solution for Private Cloud Security Table of Contents
Fernando Lugão Veltem
Complete Table of Contents for “A Solution for Private Cloud Security” A Solution for Private Cloud Security Blueprint for a A Solution for Private Cloud Security Defining the Private Cloud Security Domain Cloud Security Challenges Private Cloud Reference Model...
on
4 May 2013
Wiki Page:
Wiki: IT Security Portal
Charbel.Y
Information security is the process of keeping computers and networks protected from theft, corruption, unwanted publication, tampering, or natural disaster, while keeping the information and property accessible and productive to its intended users. This article contains links only to TechNet Wiki...
on
28 Apr 2013
Wiki Page:
The Security Development LifeCycle
Richard Mueller
Table of Contents Introduction Phase 1: Core Security Training Phase 2: Requirements Phase 3: Design Phase 4: Implementation Phase 5: Verification Phase 6: Release Phase 7: Response Community Resources MSDN Pages Blogs Forums Papers Technical Articles See Also Books Social Media Introduction...
on
26 Apr 2013
Wiki Page:
Forefront Online Protection for Exchange (FOPE): FAQ
Richard Mueller
Get answers to your general questions about the Forefront Online Protection for Exchange (FOPE) service right here. You can find more FOPE documentation at the following locations: FOPE Technical Support FAQs - Details many troubleshooting tips for FOPE. FOPE User Guide - In-depth documentation...
on
3 Apr 2013
Wiki Page:
Advanced Security Auditing in Windows 7 and Windows Server 2008 R2
Richard Mueller
This article is a work-in-progress. Please help update and extend it. If you add new security auditing topics, please add a link to the new topic at the bottom of this page. It is the Wiki way! Security auditing allows you to track the effectiveness of your network defenses and identify attempts to...
on
2 Apr 2013
Wiki Page:
Private Cloud Security Model - Client Side Security
Yagmoth555
With private cloud environments, you have three options for client security: Secure trusted client. A secure trusted client one that exists on the internal network and has a security trust relationship with the cloud domain. You would provide appropriate levels of protection to these client...
on
28 Feb 2013
Wiki Page:
ACS and ADFS
Yagmoth555
<<Back to ACS Academy Sign up for free trial at http://www.microsoft.com/windowsazure/free-trial/ Learn more at http://go.microsoft.com/fwlink/?LinkID=212360 Download slides More Videos Video: What is ACS? Video: What ACS Can Do For Me? Video: ACS Functionality...
on
24 Feb 2013
Wiki Page:
Video: ACS Architecture
Yagmoth555
<<Back to ACS Academy Sign up for free trial at http://www.microsoft.com/windowsazure/free-trial/ Learn more at http://go.microsoft.com/fwlink/?LinkID=212360 Download slides More Videos Video: What is ACS? Video: What ACS Can Do For Me? Video: ACS Functionality...
on
24 Feb 2013
Wiki Page:
Video: ACS Functionality
Yagmoth555
<<Back to ACS Academy Sign up for free trial at http://www.microsoft.com/windowsazure/free-trial/ Learn more at http://go.microsoft.com/fwlink/?LinkID=212360 Download slides More Videos Video: What is ACS? Video: What ACS Can Do For Me? Video: ACS Functionality...
on
24 Feb 2013
Wiki Page:
Forefront Security for Office Communications Server (FSOCS): FAQ
Yagmoth555
Get answers to your questions about Forefront Security for Office Communications Server. Q. What is Forefront Security for Office Communications Server? A. Microsoft Forefront Security for Office Communications Server provides fast and effective protection against IM-based malware by including...
on
23 Feb 2013
Wiki Page:
Video: ACS and the Cloud
Yagmoth555
<<Back to ACS Academy Sign up for free trial at http://www.microsoft.com/windowsazure/free-trial/ Learn more at http://go.microsoft.com/fwlink/?LinkID=212360 Download slides More Videos Video: What is ACS? Video: What ACS Can Do For Me? Video: ACS Functionality...
on
23 Feb 2013
Wiki Page:
Windows Azure AppFabric Access Control Service (ACS) Academy Videos
Yagmoth555
This is collection of very short (around 2 min) videos about ACS including the slides available for download. The purpose of ACS Academy is to give you quick orientation of what ACS is and how it can be helpful for your scenario.
on
19 Feb 2013
Wiki Page:
Script to Check HD Encrypted Using BitLocker
Ed Price - MSFT
This sample script, originally on this blog post , shows how you can script a check on hard drives to report if they have been encrypted with BitLocker and/or BiltLocker To Go. Do you have an alternative script or way to check if BL is enabled on a hard drive? Please share in this article - it is...
on
16 Feb 2013
Wiki Page:
Exchange Best Practices for untrusted mailbox users
Austin McCollum
There are many scenarios where a mailbox and its access can become "untrusted". Preventative solutions abound, but this article will focus on the following worst case scenarios for the quickest way to shut down access with the least amount of impact and administrative effort. A mobile...
on
16 Feb 2013
Wiki Page:
Microsoft Security Compliance Manager (SCM) - Release Notes
Ed Price - MSFT
The Microsoft Security Compliance Manager (SCM) engineering team is constantly improving the tool and maintains this article to share the latest release information and known issues. Table of Contents Version History Update Existing Installation Known Issues Version History SCM v3.0.60.0...
on
15 Feb 2013
Wiki Page:
Windows Azure SQL Database SQL Authentication
Richard Mueller
Windows Azure SQL Database supports only SQL Server authentication. Windows authentication (integrated security) is not supported. You must provide credentials every time when you connect to SQL Database. The SQL Database provisioning process gives you a SQL Database server, a master database...
on
14 Feb 2013
Wiki Page:
Windows Azure SQL Database Connection Encryption
Richard Mueller
Regardless of the client library chosen, data is transferred using tabular data stream (TDS) over a secure sockets layer (SSL). Windows Azure SQL Database doesn’t support unencrypted connections. This will ensure data transmission is secure and can help prevent man-in-the-middle attacks. The handshake...
on
14 Feb 2013
Wiki Page:
What to Do If Your Hotmail Account Is Hacked or Hijacked
Yagmoth555
The computer-speak term for this situation is "account compromise," use this term when communicating with the Live support folks. Your Hotmail account is now owned by the folks at Windows Live, which is why you will find the Windows Live help topic for this under Account Compromise - Unauthorized...
on
7 Feb 2013
Wiki Page:
Domain Security Changes: Dealing With Legacy Applications
Yagmoth555
[Note: this article was originally posted at http://blogs.technet.com/b/yuridiogenes/archive/2008/03/10/when-security-in-mind-doesn-t-match-with-the-application-s-security.aspx ] 1. Introduction Scenario: Security policies are applied without taking into consideration how applications will be...
on
7 Feb 2013
Wiki Page:
ACS and WIF
Yagmoth555
<<Back to ACS Academy Sign up for free trial at http://www.microsoft.com/windowsazure/free-trial/ Learn more at http://go.microsoft.com/fwlink/?LinkID=212360 Download slides More Videos Video: What is ACS? Video: What ACS Can Do For Me? Video: ACS Functionality...
on
7 Feb 2013
Wiki Page:
Microsoft Security Compliance Manager (SCM) - Frequently Asked Questions (FAQ)
Yagmoth555
Table of Contents Q: How do I join the latest Security Compliance Manager Beta Review Program? Q: How do I obtain the Security Compliance Manager solution accelerator? Q: Can I read about Security Compliance Manager before I download it? Q: Can I read or access the security guides without downloading...
on
6 Feb 2013
Wiki Page:
Overview of Security in Windows Azure SQL Database
Yagmoth555
Windows Azure SQL Database has two types of access control: SQL Authentication and a server-side firewall that restricts access by IP address. Along with access control SQL Database always maintains a secure connection to your database via SQL Server’s protocol encryption. Transparent Data Encryption...
on
5 Feb 2013
Wiki Page:
Windows Azure SQL Database Connection Security
Yagmoth555
Summary This article provides information on the security fundamentals and best practices when working with Windows Azure SQL Database. This article is primarily concerned with writing secure connection strings for SQL Database. Author: Selcin Turkarslan Reviewers: Evan Basalik, Larry Franks...
on
5 Feb 2013
Wiki Page:
DirectAccess and Firewalls and NAT
Richard Mueller
Table of Contents When the Forefront UAG DirectAccess server is on the IPv4 Internet When the Forefront UAG DirectAccess server is on the IPv6 Internet If you look at our documentation for Packet Filtering for the Internet Firewall ( http://technet.microsoft.com/en-us/library/ee809062.aspx ) you...
on
1 Feb 2013
Page 3 of 6 (136 items)
1
2
3
4
5
»
Can't find it? Write it!
Post an Article