Browse by Tags

Related Posts
  • Blog Post: ForeFront TMG 2010 overview

    * ForeFront TMG 2010 overview silde download (4M) * Đảm bảo an toàn truy nhập Internet với Microsoft ForeFront TMG (3M) * ForeFront TMG 2010 overview demo video download (22M) * Microsoft ForeFront TMG home page +++++++++++++++++++++ EXTERNAL LINKS +++++++++++++++++++++++++++++...
  • Blog Post: ForeFront Client Security - Single server deployment guide

    What is ForeFront Client Security (FCS) then? This is a client/server solution that helps scan and remove malware (virus, spyware, rootkit, Trojan...) in client and server operating systems. This is a new product from Microsoft. It uses WSUS 3.0 or Configuration Manager 2007 for distributing agent+definition...
  • Blog Post: ForeFront Client Security: standalone (agent only) 120 day evaluation guide

    What is ForeFront Client Security (FCS) then? This is a client/server solution that helps scan and remove malware (virus, spyware, rootkit, Trojan...) in client and server operating systems. This is a new product from Microsoft. For quick evaluation, only FCS agent is needed (no FCS server is necessary...
  • Blog Post: FCI–File Classification Infrastructure

    Automatically uploading files from File Server to SharePoint using the File Classification Infrastructure (FCI) Classification made easy with File Classification Infrastructure in Windows Server 2008 R2 Using File Classification Infrastructure (FCI) and AD RMS to automatically protect sensitive information...
  • Blog Post: Microsoft Software Restriction Policies

    Software restriction policies are free features found in Windows XP and Windows Server 2003 and above. They can be used to control which software is allowed to run on your computer. * Software Restriction Policies demo video download (5.5M) * Using Software Restriction Policies to Protect Against...
  • Blog Post: A quick look at IPSec (IPSecurity)

    * IPSec demo scenario * IPSec high level demo video (0.5M)
  • Blog Post: Code signing with digital signatures

    * Signing EXE files demo (3M) * Signing CAB files demo (3M)
  • Blog Post: Forefront Endpoint Protection demo

    The key thing to save the endpoint management and protection cost and increase agility is to combine them into one. Forefront Endpoint Protection can now be managed directly from the SCCM (and SCOM) console. There will be no separate Forefront Endpoint Protection console. Demo PPT deck download...
  • Blog Post: AD RMS overview

    AD RMS is a Windows Server feature that can help prevent confidential information (Outlook emails, Word, Excel, PowerPoint, XPS documents) from being distributed illegally to the outside world. We can have the users manually turn on protection before sharing these information internally, or we can have...
  • Blog Post: PKI - Smart Card overview presentation

    * PKI - Smart Card overview slide download (1.9M) * Deploying PKI inside Microsoft (1.4M) * Smart Card deployment at Microsoft (1.1M) * Smart Card MS ILM 2007 demo video (1.2M) ============= External links * MS Support: Configuring Certificate Based Authentication OWA * TechNet...
  • Blog Post: Conficker Worm alert

    Conficker worm is widespread throughout the world. Below is some information that will help to identify , fix and resolve the problem. Note that detection & cleaning of the worm is taken into account with the latest Microsoft Forefront Client signature. Security Bulletin : http://www.microsoft...
  • Blog Post: Microsoft Ranks First in AV-Comparatives May Edition for Proactive Detection Testing!

    We are #1 this time! And it is our first time scoring Advanced+ in AV-comparatives testing. We scored very well on both ends: second best in detection rate and we had the fewest false positives. AV-Comparatives.org published the May edition of the proactive/retrospective testing of the May Edition. This...
  • Blog Post: Deploying Active Directory Rights Management Services at Microsoft

    At Microsoft, sensitive business information in e-mail and business documents was at risk of exposure to unauthorized users. Microsoft IT implemented AD DS so that authors could use Microsoft Office and SharePoint Server to restrict access to confidential data. Click here for the Technical White Paper...