TechNet
Products
IT Resources
Downloads
Training
Support
Products
Windows
Windows Server
System Center
Microsoft Edge
Office
Office 365
Exchange Server
SQL Server
SharePoint Products
Skype for Business
See all products »
Resources
Channel 9 Video
Evaluation Center
Learning Resources
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Script Center
Server and Tools Blogs
TechNet Blogs
TechNet Flash Newsletter
TechNet Gallery
TechNet Library
TechNet Magazine
TechNet Wiki
Windows Sysinternals
Virtual Labs
Solutions
Networking
Cloud and Datacenter
Security
Virtualization
Updates
Service Packs
Security Bulletins
Windows Update
Trials
Windows Server 2016
System Center 2016
Windows 10 Enterprise
SQL Server 2016
See all trials »
Related Sites
Microsoft Download Center
Microsoft Evaluation Center
Drivers
Windows Sysinternals
TechNet Gallery
Training
Expert-led, virtual classes
Training Catalog
Class Locator
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
Microsoft Official Courses On-Demand
Certifications
Certification overview
Special offers
MCSE Cloud Platform and Infrastructure
MCSE: Mobility
MCSE: Data Management and Analytics
MCSE Productivity
Other resources
Microsoft Events
Exam Replay
Born To Learn blog
Find technical communities in your area
Azure training
Official Practice Tests
Support options
For business
For developers
For IT professionals
For technical support
Support offerings
More support
Microsoft Premier Online
TechNet Forums
MSDN Forums
Security Bulletins & Advisories
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Sign in
Home
Library
Wiki
Learn
Gallery
Downloads
Support
Forums
Blogs
Resources For IT Professionals
United States (English)
Россия (Pусский)
中国(简体中文)
Brasil (Português)
Skip to locale bar
Get this Tag RSS feed
Translate this page
Powered by
Microsoft® Translator
Popular Tags
Active Directory
AD
AD DS
adfs
ASP.NET
azure
BizTalk
BizTalk Server
BizTalk Server 2010
C#
Candidate for deletion
certification
cloud
core docs
de-DE
EAA
Ed Price
Ed's Stub Pages
en-US
ESA
es-ES
Excel
Exchange
Exchange 2010
fa-IR
Fernando Lugao Veltem
FIM
FIM 2010
FIM Resources
FIM-HELP
forefront
forums
fr-FR
Gokan Ozcifci
has code
has comment
has comments
has image
has Images
has Other Languages
has See Also
Has Table
Has TOC
Horizon_Net
How To
Hyper-V
id-ID
IIS
Italian Wiki Articles
it-IT
ja-JP
Jordano Mazzoni
Link Collection
Luciano Lima
Luigi Bruno
Lync Server 2010
MIISILMFIM MACAULAY
Multi Language Wiki Articles
needs work
operations manager
Pirated Content
Portal
Português Brasil
PowerShell
pt-BR
security
SharePoint
SharePoint 2010
SharePoint 2013
SharePoint Pirate
Small Basic
solucionando problemas
SQL Server
SQL Server 2012
stub
System Center
System Center 2012
TechNet Guru
TechNet Wiki
TechNet Wiki Featured Article
tonyso
Translated into Japanese
troubleshooting
tr-TR
vídeo
Video
Virtualization
VMM
Wiki
Windows
Windows 7
Windows 8
Windows Azure
Windows Server
Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
yottun8
اکتیو دایرکتوری
Browse by Tags
>
TechNet Articles
>
All Tags
>
security
Tagged Content List
Wiki Page:
Rapid Elasticity Related Private Cloud Security Operations Challenges
Thomas W Shinder - MSFT
As an operator of a private cloud solution: How do I detect and respond to requests for resources that might negatively impact other tenant applications or the whole cloud? What impact does the private cloud have on my plans to maintain the availability and capacity of resources? ...
on
17 Jan 2012
Wiki Page:
On Demand Self Service Related Private Cloud Security Operations Challenges
Thomas W Shinder - MSFT
As an operator of a private cloud solution: How do I monitor and audit the use of the services hosted in the cloud? If I don't know what I've got, how do I make sure that it's secure? What happens if the wrong people request or de-provision resources? How does the private cloud...
on
17 Jan 2012
Wiki Page:
Broad Network Access Related Private Cloud Security Operations Challenges
Thomas W Shinder - MSFT
As an operator of a private cloud solution, I want to be sure that an appropriate level of security applies regardless of where the client is connecting from and regardless of the device form factor. This requirement applies to both cloud management and application security. Security Functionality...
on
17 Jan 2012
Wiki Page:
Resource Pooling Related Private Cloud Security Operations Challenges
Thomas W Shinder - MSFT
As an operator of a private cloud solution: How can I detect any breaches in isolation between tenants' resources and how do I respond to the situation? How do I design my disaster recovery procedures to ensure isolation? What impact does the private cloud have on my plans for maintaining...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Operations Principles
Thomas W Shinder - MSFT
This section introduces the key operational security principles for private clouds. These principles apply to all the detailed security design recommendations that are discussed in subsequent sections. Note: In the following discussions, we use the term "tenant" to refer to a client or...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Challenges - Measured Services
Thomas W Shinder - MSFT
As a designer of a private cloud, I want to want to ensure that all applications and services running in the cloud are measured and accounted for. Security Functionality Figure 1 lists a number of security capabilities that the security wrapper should include in the private cloud such as...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Challenges - Broad Network Access
Thomas W Shinder - MSFT
As a designer of a private cloud solution, I want my solution to provide appropriate authentication and authorization services for the broad range of users accessing the cloud. Different services have different security requirements, such as different levels of security, access from multiple locations...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Challenges - Resource Pooling
Thomas W Shinder - MSFT
As a designer of a private cloud solution that uses a pool of resources that can be allocated to many different tenants, how can I ensure the proper isolation of resources (network, compute, memory, storage) between tenants? Security Functionality Figure 1 lists a number of security capabilities...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Challenges
Thomas W Shinder - MSFT
The previous section outlined the cloud security design principles that should apply at all levels of the private cloud design. This section examines the key attributes that characterize cloud architectures: resource pooling, broad network access, on-demand self-service, rapid elasticity, and measured...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Model - Management Security
Thomas W Shinder - MSFT
The management stack contains a range of linked capabilities that provide the ability to manage the service delivery layers. Typically, these are capabilities to which the provider connects rather than the consumer. However, some of the reporting output from the management stack can appear in the service...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Model - Platform Security
Thomas W Shinder - MSFT
Having applied effective security to your infrastructure, you can start to examine security at the platform level. Good platform security is essential for high levels of application security in the software layer. Unless you have addressed potential attack points at the platform level, you are potentially...
on
17 Jan 2012
Wiki Page:
Private Cloud Security Model
Thomas W Shinder - MSFT
The private cloud security model uses the same design as the private cloud reference model but replaces the capabilities with mechanisms for implementing security. Figure 1 shows how these mechanisms tie in to the different layers of the private cloud reference model. Figure 1. The...
on
17 Jan 2012
Wiki Page:
Private Cloud Reference Model Security Perspective
Thomas W Shinder - MSFT
When envisioning your route to the private cloud, a reference model can help you visualize your complete environment. Note that a private cloud reference model does not identify specific technologies but instead shows the capabilities that your design must include. There is currently no universally...
on
17 Jan 2012
Wiki Page:
test article 12345
attacker one
on
20 Dec 2011
Wiki Page:
Dedicated Administrator Connection (DAC) (tr-TR)
Ed Price - MSFT
Dedicated Administrator Connection (DAC) SQL Server 2005 ile birlikte gelen güzel, kullanışlı ve çoğu zaman hayat kurtarıcı bir özelliktir(Bir DBA için DAC, zorda kaldığında kullanabileceği bir arka kapıdır.). SQL Server veritabanı sisteminiz bir şekilde kaynak yetersizliğinden...
on
20 Dec 2011
Wiki Page:
SQL Server Kurulu Sunucularda Antivirus Kurmak (tr-TR)
Ed Price - MSFT
Veritabanı sunucunuza bir virüsün musallat olup sisteminizi işleyemez hale getirmesi, sizin için en kötü senaryolardan birisi olsa gerek. Veritabanı sisteminiz çalışmadığı zaman kurumda hayat durur. Çünkü kurumdaki tüm uygulamaların can damarı veritabanıdır...
on
20 Dec 2011
Wiki Page:
URL Encryption in ASP.NET
Sudhakar Kottapalli
Security is one of the key concerns in web applications. To maintain state we use many mechanisms and Query String is also one. If Query string holds any sensitive data it may lead to SQL Injection or accessing some other user’s data by just updating the Query String. Let’s consider...
on
28 Oct 2011
Wiki Page:
將 ASP.NET 網站部署在 UNC 路徑上最重要的步驟 (zh-TW)
Ed Price - MSFT
如果要將 ASP.NET 網站安裝在遠端的 UNC 路徑上,在設定 IIS 時除了一般檔案的存取權限外,最重要的就是 ASP.NET 的執行權限是否有正確設定,由於所有置於 UNC 路徑上的 .NET 應用程式都會預設套用 LocalIntranet 群組,所以你無法將 ASP.NET 佈署在 UNC 路徑上,除非自行新增 .NET 安全性原則。 在沒設定 .NET 安全性群組之前,不管你怎麼設定都會出現以下 安全性例外狀況 的錯誤訊息: 解決此問題的步驟如下: 1. [開始] / [執行] / 輸入 cmd 並按下 Enter 2. 進入 .Net Framework...
on
3 Oct 2011
Wiki Page:
Access Control For Containers and Blobs - Shared Access Signature and Containers Policy
Ed Price - MSFT
NOTE : This is a stub article. Add content as you can. http://msdn.microsoft.com/en-us/library/ee395415.aspx
on
30 Sep 2011
Wiki Page:
Atravessando Pastas mesmo sem Permissão (pt-BR)
Adriano Gregório
Um dos itens mais utilizados por administradores/analistas de redes Microsoft, é configurar as permissões de usuários e grupos em servidores de arquivos. Dependendo do tamanho da empresa e sua complexidade, a configuração pode demorar semanas e até meses para...
on
18 Sep 2011
Wiki Page:
Security Issues in the Hybrid Cloud
Thomas W Shinder - MSFT
The hybrid cloud model combines public and private cloud services. The term hybrid cloud is used for a number of different models; we are using a definition of hybrid cloud that includes both Private and Public Cloud services with a likelihood that non-cloud enterprise systems may be used as well. When...
on
16 Sep 2011
Wiki Page:
Unable to Update Forefront TMG 2010 NIS Signature When Using WSUS
Ed Price - MSFT
Symptom Consider a scenario where Forefront TMG 2010 is using an internal WSUS Server in order to obtain updates. The Server where TMG is installed is able to obtain all Windows related updates but it is not able to obtain NIS signature. If the TMG Administrator changes Windows Update option to point...
on
15 Sep 2011
Wiki Page:
Security Issues in the Private Cloud
Thomas W Shinder - MSFT
The Private Cloud model requires you to have total control over all layers of the stack, which includes any traditional network perimeter security you might want to have in place. In a private cloud model, the cloud services are not typically exposed general Internet users (although they can be) and...
on
15 Sep 2011
Wiki Page:
Security Issues in Cloud Deployment Models
Thomas W Shinder - MSFT
We will discuss three models of cloud-based computing: public, private, and hybrid. The public cloud refers to software, infrastructure, or platforms offered as a service by 3 rd parties over the Internet, referred to as Cloud Service Providers or CSPs. Private cloud refers to cloud technologies where...
on
15 Sep 2011
Wiki Page:
Network Access Protection using DHCP in Windows Server 2008 R2
Server Baba
Description: In today’s IT, data integrity and information security is the major concern among the system administrators - thanks to the increasing number of highly sophisticated and coordinated attacks that are ripping away the company's reputation and customer trust within hours...
on
27 Aug 2011
Page 5 of 6 (136 items)
«
2
3
4
5
6
Can't find it? Write it!
Post an Article