Browse by Tags

Tagged Content List
  • Wiki Page: Effective Database Engine Permissions

    This topic describes how to determine who has permissions to various objects in the SQL Server Database Engine. SQL Server implements two permission systems for the Database Engine. An older system of fixed roles has preconfigured permissions. Beginning with SQL Server 2005 a more flexible and precise...
  • Wiki Page: A Solution for Private Cloud Security Table of Contents

    Complete Table of Contents for “A Solution for Private Cloud Security” A Solution for Private Cloud Security Blueprint for a A Solution for Private Cloud Security Defining the Private Cloud Security Domain Cloud Security Challenges Private Cloud Reference Model...
  • Wiki Page: Wiki: IT Security Portal

    Information security is the process of keeping computers and networks protected from theft, corruption, unwanted publication, tampering, or natural disaster, while keeping the information and property accessible and productive to its intended users. This article contains links only to TechNet Wiki...
  • Wiki Page: The Security Development LifeCycle

    Table of Contents Introduction Phase 1: Core Security Training Phase 2: Requirements Phase 3: Design Phase 4: Implementation Phase 5: Verification Phase 6: Release Phase 7: Response Community Resources MSDN Pages Blogs Forums Papers Technical Articles See Also Books Social Media Introduction...
  • Wiki Page: Forefront Online Protection for Exchange (FOPE): FAQ

    Get answers to your general questions about the Forefront Online Protection for Exchange (FOPE) service right here. You can find more FOPE documentation at the following locations: FOPE Technical Support FAQs - Details many troubleshooting tips for FOPE. FOPE User Guide - In-depth documentation...
  • Wiki Page: Advanced Security Auditing in Windows 7 and Windows Server 2008 R2

    This article is a work-in-progress. Please help update and extend it. If you add new security auditing topics, please add a link to the new topic at the bottom of this page. It is the Wiki way! Security auditing allows you to track the effectiveness of your network defenses and identify attempts to...
  • Wiki Page: Private Cloud Security Model - Client Side Security

    With private cloud environments, you have three options for client security: Secure trusted client. A secure trusted client one that exists on the internal network and has a security trust relationship with the cloud domain. You would provide appropriate levels of protection to these client...
  • Wiki Page: ACS and ADFS

    <<Back to ACS Academy Sign up for free trial at http://www.microsoft.com/windowsazure/free-trial/ Learn more at http://go.microsoft.com/fwlink/?LinkID=212360 Download slides More Videos Video: What is ACS? Video: What ACS Can Do For Me? Video: ACS Functionality...
  • Wiki Page: Video: ACS Architecture

    <<Back to ACS Academy Sign up for free trial at http://www.microsoft.com/windowsazure/free-trial/ Learn more at http://go.microsoft.com/fwlink/?LinkID=212360 Download slides More Videos Video: What is ACS? Video: What ACS Can Do For Me? Video: ACS Functionality...
  • Wiki Page: Video: ACS Functionality

    <<Back to ACS Academy Sign up for free trial at http://www.microsoft.com/windowsazure/free-trial/ Learn more at http://go.microsoft.com/fwlink/?LinkID=212360 Download slides More Videos Video: What is ACS? Video: What ACS Can Do For Me? Video: ACS Functionality...
  • Wiki Page: Forefront Security for Office Communications Server (FSOCS): FAQ

    Get answers to your questions about Forefront Security for Office Communications Server. Q. What is Forefront Security for Office Communications Server? A. Microsoft Forefront Security for Office Communications Server provides fast and effective protection against IM-based malware by including...
  • Wiki Page: Video: ACS and the Cloud

    <<Back to ACS Academy Sign up for free trial at http://www.microsoft.com/windowsazure/free-trial/ Learn more at http://go.microsoft.com/fwlink/?LinkID=212360 Download slides More Videos Video: What is ACS? Video: What ACS Can Do For Me? Video: ACS Functionality...
  • Wiki Page: Windows Azure AppFabric Access Control Service (ACS) Academy Videos

    This is collection of very short (around 2 min) videos about ACS including the slides available for download. The purpose of ACS Academy is to give you quick orientation of what ACS is and how it can be helpful for your scenario.
  • Wiki Page: Script to Check HD Encrypted Using BitLocker

    This sample script, originally on this blog post , shows how you can script a check on hard drives to report if they have been encrypted with BitLocker and/or BiltLocker To Go. Do you have an alternative script or way to check if BL is enabled on a hard drive? Please share in this article - it is...
  • Wiki Page: Exchange Best Practices for untrusted mailbox users

    There are many scenarios where a mailbox and its access can become "untrusted". Preventative solutions abound, but this article will focus on the following worst case scenarios for the quickest way to shut down access with the least amount of impact and administrative effort. A mobile...
  • Wiki Page: Microsoft Security Compliance Manager (SCM) - Release Notes

    The Microsoft Security Compliance Manager (SCM) engineering team is constantly improving the tool and maintains this article to share the latest release information and known issues. Table of Contents Version History Update Existing Installation Known Issues Version History SCM v3.0.60.0...
  • Wiki Page: Windows Azure SQL Database SQL Authentication

    Windows Azure SQL Database supports only SQL Server authentication. Windows authentication (integrated security) is not supported. You must provide credentials every time when you connect to SQL Database. The SQL Database provisioning process gives you a SQL Database server, a master database...
  • Wiki Page: Windows Azure SQL Database Connection Encryption

    Regardless of the client library chosen, data is transferred using tabular data stream (TDS) over a secure sockets layer (SSL). Windows Azure SQL Database doesn’t support unencrypted connections. This will ensure data transmission is secure and can help prevent man-in-the-middle attacks. The handshake...
  • Wiki Page: What to Do If Your Hotmail Account Is Hacked or Hijacked

    The computer-speak term for this situation is "account compromise," use this term when communicating with the Live support folks. Your Hotmail account is now owned by the folks at Windows Live, which is why you will find the Windows Live help topic for this under Account Compromise - Unauthorized...
  • Wiki Page: Domain Security Changes: Dealing With Legacy Applications

    [Note: this article was originally posted at http://blogs.technet.com/b/yuridiogenes/archive/2008/03/10/when-security-in-mind-doesn-t-match-with-the-application-s-security.aspx ] 1. Introduction Scenario: Security policies are applied without taking into consideration how applications will be...
  • Wiki Page: ACS and WIF

    <<Back to ACS Academy Sign up for free trial at http://www.microsoft.com/windowsazure/free-trial/ Learn more at http://go.microsoft.com/fwlink/?LinkID=212360 Download slides More Videos Video: What is ACS? Video: What ACS Can Do For Me? Video: ACS Functionality...
  • Wiki Page: Microsoft Security Compliance Manager (SCM) - Frequently Asked Questions (FAQ)

    Table of Contents Q: How do I join the latest Security Compliance Manager Beta Review Program? Q: How do I obtain the Security Compliance Manager solution accelerator? Q: Can I read about Security Compliance Manager before I download it? Q: Can I read or access the security guides without downloading...
  • Wiki Page: Overview of Security in Windows Azure SQL Database

    Windows Azure SQL Database has two types of access control: SQL Authentication and a server-side firewall that restricts access by IP address. Along with access control SQL Database always maintains a secure connection to your database via SQL Server’s protocol encryption. Transparent Data Encryption...
  • Wiki Page: Windows Azure SQL Database Connection Security

    Summary This article provides information on the security fundamentals and best practices when working with Windows Azure SQL Database. This article is primarily concerned with writing secure connection strings for SQL Database. Author: Selcin Turkarslan Reviewers: Evan Basalik, Larry Franks...
  • Wiki Page: DirectAccess and Firewalls and NAT

    Table of Contents When the Forefront UAG DirectAccess server is on the IPv4 Internet When the Forefront UAG DirectAccess server is on the IPv6 Internet If you look at our documentation for Packet Filtering for the Internet Firewall ( http://technet.microsoft.com/en-us/library/ee809062.aspx ) you...
Page 3 of 6 (136 items) 12345»
Can't find it? Write it!