Browse by Tags

Tagged Content List
  • Wiki Page: Microsoft Security Compliance Manager (SCM) - Baseline Download Help

    The content of this page is removed. Please send your feedback to secwish@microsoft.com if you have any questions about accessing this page.
  • Wiki Page: Microsoft Security Compliance Manager (SCM)

    Table of Contents Overview What does SCM do? Key Features and Benefits Setup Requirements More Information Overview Security Compliance Manager 3.0 (SCM 3.0) is a free tool from the Microsoft Solution Accelerator team that enables you to quickly configure and manage your desktops, traditional datacenter...
  • Wiki Page: Microsoft Security Compliance Manager (SCM) - Getting Started

    Table of Contents Installation Steps The SCM Console Feedback Installation Steps This section provides instructions on how to install the Microsoft Security Compliance Manager (SCM) tool. While installing the tool, you can configure it to download all of the latest security baselines from Microsoft...
  • Wiki Page: SQL Server Database Engine Permission Posters

    Posters are available that list all the granular permissions of the SQL Server Database Engine and Windows Azure SQL Database. Select the pdf images below. You can display these on your computer, expanding or shrinking them to focus on specific areas. Use Control+F to search for a specific permission...
  • Wiki Page: Windows Server 2008 R2 Security Guidance

    What's New in Security in Windows Server 2008 R2 Windows Server 2008 R2 introduces some changes from the security perspective of the operating system. The core changes are related to: authorization and access control , identity and authentication , information protection , security policies and...
  • Wiki Page: Hyper-V Security Survival Guide

    Hyper-V security is in context with Windows Server security. Start with the Windows Security Survival Guide: http://social.technet.microsoft.com/wiki/contents/articles/windows-security-survival-guide.aspx . TechNet Hyper-V Security Guide: http://technet.microsoft.com/en-us/library/dd569113.aspx...
  • Wiki Page: Database Engine Permission Basics

    In SQL Server 2008 R2, Database Engine permissions are managed at the server level through logins and fixed server roles, and at the database level through database users, fixed database roles, and user-defined database roles. Download the Permissions Poster PDF file . Table of Contents Logins...
  • Wiki Page: Private Cloud Security Challenges - Rapid Elasticity

    Table of Contents Security Functionality Infrastructure Security Software Security Management Security Legal Issues As a designer of a private cloud solution, I am concerned that a rogue application, client, or DoS attack might destabilize the data center by requesting a large amount of resources...
  • Wiki Page: Virtualization Security Survival Guide

    We encourage you to enhance this guide by identifying missing areas (scenarios, features, lifecycle...), provide links to and write descriptions of existing content, and providing new content where there are gaps. Join the community ! Table of Contents Introduction Planning Virtualization Security...
  • Wiki Page: Video: What is ACS?

    <<Back to ACS Academy Sign up for free trial at http://www.microsoft.com/windowsazure/free-trial/ Learn more at http://go.microsoft.com/fwlink/?LinkID=212360 Download Slides More Videos Video: What is ACS? Video: What ACS Can Do For Me? Video...
  • Wiki Page: Perimeter Network/DMZ Survival Guide

    At customer events a few years ago, we started handing out one-page "Survival Guides" (printed both sides and laminated) with links to important resources. The wiki versions of the Survival Guides are meant to do the same things without killing trees or using laminating machines. Configuring...
  • Wiki Page: Active Directory: How to Enforce Security Compliance with Group Policy

    I have had the privilege of contributing to several projects where the clients were required to meet very strict compliance guidelines, and my role was to develop solutions using Active Directory and Group Policy. After recently witnessing a colleague struggle with the same task I felt compelled to share...
  • Wiki Page: Private Cloud Security Design Principles

    Table of Contents Apply Generic Security Best Practices Isolation is Key Consider Security as a Wrapper Assume Attackers are Authenticated and Authorized Assume All Data Locations are Accessible Do Not Trust Client Information Use Established Strong Cryptographic Techniques Automate Security Operations...
  • Wiki Page: Forefront Protection 2010 for Exchange Server (FPE 2010): FAQ

    Get answers to your questions about Forefront Protection 2010 for Exchange Server. Q. What is Forefront Protection 2010 for Exchange Server? A. Forefront Protection 2010 for Exchange Server provides fast and effective detection of viruses, worms, and spyware by integrating multiple scanning engines...
  • Wiki Page: Database Engine Security Checklist: Database Engine Security Configuration

    This checklist reviews key security configuration options for the SQL Server Database Engine. Use this checklist to periodically audit your Database Engine environment. These recommended settings should be adjusted based on your security and business needs. Table of Contents Physical Security Operating...
  • Wiki Page: Security Implications of Cloud Service Models

    It is now time to look in greater detail at the three main cloud service models. These are: Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS ) We will discuss each of these models and consider the security threats and mitigations that may apply in...
  • Wiki Page: Private Cloud Security Model - Infrastructure Security

    Table of Contents Physical Security Energy Supply Security Facility Security Network Security Hardware Security Compute Security Storage Security Operating System Security Virtualization Security Update Security Now that you have examined the factors within the security wrapper, this paper presents...
  • Wiki Page: Cloud Security Challenges

    To highlight the changes in security between traditional IT systems and cloud-based environments, this paper takes four of the five the NIST cloud computing definitions and analyses these statements to create a problem statement and a range of possible attack vectors. This paper considers each of these...
  • Wiki Page: Private Cloud Security Model - Wrapper Functionality

    As discussed earlier in this paper, the private cloud must implement security as a wrapper. Every transaction then must pass through this security wrapper on any data transition within the cloud, for example: Client to the service delivery layer Service delivery layer to the software...
  • Wiki Page: Defining the Private Cloud Security Problem Domain

    As previous sections in this document outline, security is a universal component of cloud service provisioning. To help consider this requirement logically, this series considers the key security differences in private cloud environments, which result from the unique features of a cloud-based service...
  • Wiki Page: Windows Server 2003 Security Configuration Wizard (SCW) Kurulumu (tr-TR)

    Yeni bir makale ile herkese merhaba. Bu makalemizde, Windows Server 2003 işletim sistemi üzerinde bulunan Security Configuration Wizard ( SCW ) kurulumu hakkında bilgi vermeye çalışacağım. Kurulum adımlarına geçmeden önce SCW hakkında kısaca bilgi sahibi olalım. Güvenlik...
  • Wiki Page: Patch Issues for Administrators

    Resources and Guidance for Patch Issues for Administrators To better remember where the log files end up for various patches, this wiki page is an attempt to recap them in one place for the Patching Administrator. If the failure is in installation, - what is the error message? Here's a page...
  • Wiki Page: Operations Guide for A Solution for Private Cloud Security

    Welcome to this third paper in the Solution for Private Cloud Security series. This paper discusses private cloud security from the operations perspective and offers guidance for operating security within a private cloud environment. In some areas, specific products are discussed in relation to the security...
  • Wiki Page: Elevation of Privilege - The Game

    Elevation of Privilege (abbreviated "EoP") is a card game developed by Adam Shostack with assistance from many patient Microsoft developers, and is designed to provide a fun and educational introduction to the concepts and practice of Threat Modeling. Table of Contents Resources The...
  • Wiki Page: Measured Services Related Private Cloud Security Operations Challenges

    As an operator of a private cloud solution, what can I do to ensure that only legitimate users are using the private cloud resources? Security Functionality Part of the answer to the question above is addressed in the On-demand Self-Service section earlier in this paper. That section discussed...
Page 4 of 6 (136 items) «23456
Can't find it? Write it!