Browse by Tags

Tagged Content List
  • Wiki Page: Database Engine Security Checklist: Limit Access to Data

    This checklist helps you review how you limit access to data in your organization. Use this checklist to periodically audit how users access information stored in the SQL Server Database Engine. Access to the Instance of SQL Server These items relate to the entire instance of the Database Engine...
  • Wiki Page: Database Engine Security Checklist: Enhance the Security of Database Engine Connections

    This checklist reviews key options to use when connecting to the SQL Server Database Engine. Use this checklist to review your environment to make sure that connections are made to the Database Engine as securely as necessary for your business needs. Database Engine Configuration ....
  • Wiki Page: Database Engine Security Checklist: Encrypt Sensitive Data

    This checklist helps you confirm that encryption is used appropriately in your environment. Use this checklist to periodically audit your use of encryption with the SQL Server Database Engine. Database Level ... Description Have you evaluated encrypting...
  • Wiki Page: EScube on Cloud (Encrypted Searchable, Sharable data Storage on Cloud)

    Abstract Data security is the major concern in cloud. Encryption of data can securely store the data, but it will create other challenges like data searchability, sharability, key management, etc. This EScube on Cloud pattern is formulated to store, search, and share data/documents securely...
  • Wiki Page: How to Implement a Windows-Based Kiosk

    What is a kiosk? In the context of this article a kiosk is a Windows workstation having limited functionality, usually placed in an area with public access. A person can walk up to it and, without having to log on, access information in the form of a database, application, internet, etc. Table...
  • Wiki Page: How to Find Enabled Accounts on Domain Joined Computers.

    Back in February I was notified that one of the computers that we're responsible for had been compromised by Torpig . The way I understand it is the user launches a website that might be a part of a phishing scam, and the software gets dropped on their computer. Once installed it searches through...
  • Wiki Page: Video: ACS Deployment Scenarios

    <<Back to ACS Academy Sign up for free trial at http://www.microsoft.com/windowsazure/free-trial/ Learn more at http://go.microsoft.com/fwlink/?LinkID=212360 Download slides More Videos Video: What is ACS? Video: What ACS Can Do For Me? Video: ACS Functionality...
  • Wiki Page: Video: What ACS Can Do For Me?

    <<Back to ACS Academy Sign up for free trial at http://www.microsoft.com/windowsazure/free-trial/ Learn more at http://go.microsoft.com/fwlink/?LinkID=212360 Download slides More Videos Video: What is ACS? Video: What ACS Can Do For Me? Video: ACS Functionality...
  • Wiki Page: Microsoft Security Compliance Manager (SCM) - FISMA Security Compliant Baselines

    FISMA Overview The FISMA (Federal Information Security Management Act) Act provides several key security standards that are required by Congressional legislation for the United States Department of Defense (DoD) information systems. These guidelines set standards for minimum security requirements...
  • Wiki Page: Enforcing Security Compliance with Group Policy

    I have had the privilege of contributing to several projects where the customers were required to meet very strict compliance guidelines, and my role was to develop solutions using Active Directory and Group Policy. After recently witnessing an AD expert struggle with the same task I felt compelled to...
  • Wiki Page: Tom Shinder's Wiki Profile

    I'm Tom Shinder. You might know me from the dozens of books I've written on Windows and Windows networking, or you might know me from my long association with www.isaserver.org , or maybe you know me because I owe you some money :) If you don't know me, I'm a technical writer and have...
Page 6 of 6 (136 items) «23456
Can't find it? Write it!