Browse by Tags

  

Tagged Content List
  • Blog Post: Why you should avoid manual ‘server hardening’

    Sachin Kumar , a Premier Field Engineer from the India team, discusses a very important topic in this post. Many support incidents are actually triggered by non-standard (and sometimes unsupported) settings which are picked from outdated hardening guides. Read on for more details and for information...
  • Blog Post: Security, Security, Security, Security!

    Lots of security-related news to catch up on. (Ed note: I’m one of the developers/maintainers of the Security Health Check 4.5 offering, so I try to keep abreast of developments at home and elsewhere in the industry.) Alexandre Marins introduces the new Attack Surface Analyzer . Attack Surface Analyzer...
  • Blog Post: 3 Simple Rules to Kerberos Authentication/Delegation SPNs

    aka: " Kerbie Goes Bananas " Note: I keep this content (more) up to date at my Kerberos Troubleshooting Wiki * did until the provider nuked it. Oh well. Before starting, go get the updated SetSPN if you're using Windows 2000 or 2003. Kerb authentication ...read more
  • Blog Post: Security Updates (and Why You Should Love Them)

    Mark Dudok, a PFE colleague of mine in sunny Canberra , writes about security patches, and why it’s important to keep them front of mind and not get complacent: Now let's get into your responsibilities as an administrator. If you were a mechanic, you probably wouldn’t be reading this blog. You would...
  • Blog Post: The Windows XP journey ends soon. Are you ready for April 8, 2014?

    It’s only 4 months until Windows XP becomes an ex parrot . PFE superstar Milad Aslaner walks us through some of the implications. April 8 th 2014 will be a very important day for most enterprises. After that day Microsoft is ending the support for Windows XP Service Pack 3, the last supported version...
  • Blog Post: Auditing File Access on File Servers

    This article was contributed by Liju Varghese , a Senior Premier Field Engineer from Canada, based on a recent engagement. Recently, I helped a customer achieve two objectives: Audit access to sensitive content on the file servers and ensure the information is captured Generate reports on a regular basis...
  • Blog Post: How To Use the Microsoft Authenticator App for Windows Phone to Enable Two-Factor Authentication on Facebook

    Our old favourite PFE Gregg O’Brien runs through using the Microsoft Authenticator app for Windows Phone to make his social networking experience more secure. If you are like me, social media is a heavily-used feature of technology in your daily life. I use social media to keep in touch with friends...