TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Microsoft Edge
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Skype for Business
See all products »
Resources
Channel 9 Video
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Windows Update
Trials
Windows Server 2016
System Center 2016
Windows 10 Enterprise
SQL Server 2016
See all trials »
Related Sites
Microsoft Download Center
Microsoft Evaluation Center
Drivers
Windows Sysinternals
TechNet Gallery
Training
Expert-led, virtual classes
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
Microsoft Official Courses On-Demand
Certifications
Certification overview
Special offers
MCSE Cloud Platform and Infrastructure
MCSE: Mobility
MCSE: Data Management and Analytics
MCSE Productivity
Other resources
Microsoft Events
Exam Replay
Born To Learn blog
Find technical communities in your area
Azure training
Official Practice Tests
Support options
For business
For developers
For IT professionals
For technical support
Support offerings
More support
Microsoft Premier Online
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Home
Library
Wiki
Learn
Gallery
Downloads
Support
Forums
Blogs
Resources For IT Professionals
United States (English)
Россия (Pусский)
中国(简体中文)
Brasil (Português)
Skip to locale bar
Get this Tag RSS feed
Translate this page
Powered by
Microsoft® Translator
Popular Tags
Active Directory
AD
AD DS
adfs
ASP.NET
azure
BizTalk
BizTalk Server
BizTalk Server 2010
C#
Candidate for deletion
certification
cloud
core docs
de-DE
EAA
Ed Price
Ed's Stub Pages
en-US
ESA
es-ES
Excel
Exchange
Exchange 2010
fa-IR
Fernando Lugao Veltem
FIM
FIM 2010
FIM Resources
FIM-HELP
forefront
forums
fr-FR
Gokan Ozcifci
has code
has comment
has comments
has image
has Images
has Other Languages
has See Also
Has Table
Has TOC
Horizon_Net
How To
Hyper-V
id-ID
IIS
Italian Wiki Articles
it-IT
ja-JP
Jordano Mazzoni
Link Collection
Luciano Lima
Luigi Bruno
Lync Server 2010
MIISILMFIM MACAULAY
Multi Language Wiki Articles
needs work
operations manager
Pirated Content
Portal
Português Brasil
PowerShell
pt-BR
security
SharePoint
SharePoint 2010
SharePoint 2013
SharePoint Pirate
Small Basic
solucionando problemas
SQL Server
SQL Server 2012
stub
System Center
System Center 2012
TechNet Guru
TechNet Wiki
TechNet Wiki Featured Article
tonyso
Translated into Japanese
troubleshooting
tr-TR
vídeo
Video
Virtualization
VMM
Wiki
Windows
Windows 7
Windows 8
Windows Azure
Windows Server
Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
yottun8
اکتیو دایرکتوری
Browse by Tags
>
TechNet Articles
>
All Tags
>
security
Tagged Content List
Wiki Page:
Microsoft Security Compliance Manager (SCM) - Baseline Download Help
Michael X Tan
The content of this page is removed. Please send your feedback to secwish@microsoft.com if you have any questions about accessing this page.
on
31 Jan 2013
Wiki Page:
Microsoft Security Compliance Manager (SCM)
Michael X Tan
Table of Contents Overview What does SCM do? Key Features and Benefits Setup Requirements More Information Overview Security Compliance Manager 3.0 (SCM 3.0) is a free tool from the Microsoft Solution Accelerator team that enables you to quickly configure and manage your desktops, traditional datacenter...
on
31 Jan 2013
Wiki Page:
Microsoft Security Compliance Manager (SCM) - Getting Started
Michael X Tan
Table of Contents Installation Steps The SCM Console Feedback Installation Steps This section provides instructions on how to install the Microsoft Security Compliance Manager (SCM) tool. While installing the tool, you can configure it to download all of the latest security baselines from Microsoft...
on
29 Jan 2013
Wiki Page:
SQL Server Database Engine Permission Posters
Rick Byham, Microsoft
Posters are available that list all the granular permissions of the SQL Server Database Engine and Windows Azure SQL Database. Select the pdf images below. You can display these on your computer, expanding or shrinking them to focus on specific areas. Use Control+F to search for a specific permission...
on
29 Nov 2012
Wiki Page:
Windows Server 2008 R2 Security Guidance
Ed Price - MSFT
What's New in Security in Windows Server 2008 R2 Windows Server 2008 R2 introduces some changes from the security perspective of the operating system. The core changes are related to: authorization and access control , identity and authentication , information protection , security policies and...
on
14 Nov 2012
Wiki Page:
Hyper-V Security Survival Guide
Tomoaki Yoshizawa
Hyper-V security is in context with Windows Server security. Start with the Windows Security Survival Guide: http://social.technet.microsoft.com/wiki/contents/articles/windows-security-survival-guide.aspx . TechNet Hyper-V Security Guide: http://technet.microsoft.com/en-us/library/dd569113.aspx...
on
31 Oct 2012
Wiki Page:
Database Engine Permission Basics
Ed Price - MSFT
In SQL Server 2008 R2, Database Engine permissions are managed at the server level through logins and fixed server roles, and at the database level through database users, fixed database roles, and user-defined database roles. Download the Permissions Poster PDF file . Table of Contents Logins...
on
25 Sep 2012
Wiki Page:
Private Cloud Security Challenges - Rapid Elasticity
dplotnikov - mvp
Table of Contents Security Functionality Infrastructure Security Software Security Management Security Legal Issues As a designer of a private cloud solution, I am concerned that a rogue application, client, or DoS attack might destabilize the data center by requesting a large amount of resources...
on
31 Aug 2012
Wiki Page:
Virtualization Security Survival Guide
dplotnikov - mvp
We encourage you to enhance this guide by identifying missing areas (scenarios, features, lifecycle...), provide links to and write descriptions of existing content, and providing new content where there are gaps. Join the community ! Table of Contents Introduction Planning Virtualization Security...
on
30 Aug 2012
Wiki Page:
Video: What is ACS?
Fernando Lugão Veltem
<<Back to ACS Academy Sign up for free trial at http://www.microsoft.com/windowsazure/free-trial/ Learn more at http://go.microsoft.com/fwlink/?LinkID=212360 Download Slides More Videos Video: What is ACS? Video: What ACS Can Do For Me? Video...
on
27 Aug 2012
Wiki Page:
Perimeter Network/DMZ Survival Guide
Fernando Lugão Veltem
At customer events a few years ago, we started handing out one-page "Survival Guides" (printed both sides and laminated) with links to important resources. The wiki versions of the Survival Guides are meant to do the same things without killing trees or using laminating machines. Configuring...
on
24 Aug 2012
Wiki Page:
Active Directory: How to Enforce Security Compliance with Group Policy
LeoPonti
I have had the privilege of contributing to several projects where the clients were required to meet very strict compliance guidelines, and my role was to develop solutions using Active Directory and Group Policy. After recently witnessing a colleague struggle with the same task I felt compelled to share...
on
25 Jul 2012
Wiki Page:
Private Cloud Security Design Principles
Thomas W Shinder - MSFT
Table of Contents Apply Generic Security Best Practices Isolation is Key Consider Security as a Wrapper Assume Attackers are Authenticated and Authorized Assume All Data Locations are Accessible Do Not Trust Client Information Use Established Strong Cryptographic Techniques Automate Security Operations...
on
2 Jul 2012
Wiki Page:
Forefront Protection 2010 for Exchange Server (FPE 2010): FAQ
Fernando Lugão Veltem
Get answers to your questions about Forefront Protection 2010 for Exchange Server. Q. What is Forefront Protection 2010 for Exchange Server? A. Forefront Protection 2010 for Exchange Server provides fast and effective detection of viruses, worms, and spyware by integrating multiple scanning engines...
on
9 Jun 2012
Wiki Page:
Database Engine Security Checklist: Database Engine Security Configuration
Ed Price - MSFT
This checklist reviews key security configuration options for the SQL Server Database Engine. Use this checklist to periodically audit your Database Engine environment. These recommended settings should be adjusted based on your security and business needs. Table of Contents Physical Security Operating...
on
5 Jun 2012
Wiki Page:
Security Implications of Cloud Service Models
Fernando Lugão Veltem
It is now time to look in greater detail at the three main cloud service models. These are: Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS ) We will discuss each of these models and consider the security threats and mitigations that may apply in...
on
5 Jun 2012
Wiki Page:
Private Cloud Security Model - Infrastructure Security
Fernando Lugão Veltem
Table of Contents Physical Security Energy Supply Security Facility Security Network Security Hardware Security Compute Security Storage Security Operating System Security Virtualization Security Update Security Now that you have examined the factors within the security wrapper, this paper presents...
on
5 Jun 2012
Wiki Page:
Cloud Security Challenges
Fernando Lugão Veltem
To highlight the changes in security between traditional IT systems and cloud-based environments, this paper takes four of the five the NIST cloud computing definitions and analyses these statements to create a problem statement and a range of possible attack vectors. This paper considers each of these...
on
5 Jun 2012
Wiki Page:
Private Cloud Security Model - Wrapper Functionality
Fernando Lugão Veltem
As discussed earlier in this paper, the private cloud must implement security as a wrapper. Every transaction then must pass through this security wrapper on any data transition within the cloud, for example: Client to the service delivery layer Service delivery layer to the software...
on
5 Jun 2012
Wiki Page:
Defining the Private Cloud Security Problem Domain
Fernando Lugão Veltem
As previous sections in this document outline, security is a universal component of cloud service provisioning. To help consider this requirement logically, this series considers the key security differences in private cloud environments, which result from the unique features of a cloud-based service...
on
5 Jun 2012
Wiki Page:
Windows Server 2003 Security Configuration Wizard (SCW) Kurulumu (tr-TR)
dplotnikov - mvp
Yeni bir makale ile herkese merhaba. Bu makalemizde, Windows Server 2003 işletim sistemi üzerinde bulunan Security Configuration Wizard ( SCW ) kurulumu hakkında bilgi vermeye çalışacağım. Kurulum adımlarına geçmeden önce SCW hakkında kısaca bilgi sahibi olalım. Güvenlik...
on
1 Apr 2012
Wiki Page:
Patch Issues for Administrators
FZB
Resources and Guidance for Patch Issues for Administrators To better remember where the log files end up for various patches, this wiki page is an attempt to recap them in one place for the Patching Administrator. If the failure is in installation, - what is the error message? Here's a page...
on
25 Feb 2012
Wiki Page:
Operations Guide for A Solution for Private Cloud Security
Thomas W Shinder - MSFT
Welcome to this third paper in the Solution for Private Cloud Security series. This paper discusses private cloud security from the operations perspective and offers guidance for operating security within a private cloud environment. In some areas, specific products are discussed in relation to the security...
on
24 Feb 2012
Wiki Page:
Elevation of Privilege - The Game
Alun Jones
Elevation of Privilege (abbreviated "EoP") is a card game developed by Adam Shostack with assistance from many patient Microsoft developers, and is designed to provide a fun and educational introduction to the concepts and practice of Threat Modeling. Table of Contents Resources The...
on
22 Feb 2012
Wiki Page:
Measured Services Related Private Cloud Security Operations Challenges
Thomas W Shinder - MSFT
As an operator of a private cloud solution, what can I do to ensure that only legitimate users are using the private cloud resources? Security Functionality Part of the answer to the question above is addressed in the On-demand Self-Service section earlier in this paper. That section discussed...
on
17 Jan 2012
Page 4 of 6 (136 items)
«
2
3
4
5
6
Can't find it? Write it!
Post an Article