Roger's Security Blog

As Chief Security Advisor of Microsoft EMEA - lets share interesting security information

Browse by Tags

Related Posts
  • Blog Post: Securing My Infrastructure: Introduction

    As you probably know, some time ago, I asked for feedback and themes you are interested in. Some of you replied to me privately, some with comments and I would like to thank you for the constructive feedback. One of the inputs I got several times is that you would like to get more information how to...
  • Blog Post: Securing My Infrastructure: Firewall

    Well, this is a follow-up of my last posts about how I secure my environment. If you want to read the earlier posts of the series, see at the end of this post. So, we did the Risk Assessment, now, let's look a little bit closer into my perimeter. Technically I have a "normal" ADSL connection with...
  • Blog Post: Deploying PKI

    Recently I decided to spend some time to implement some new technologies in my environment at home. The environment itself is a mixture between test and production. If you are reading this post on www.halbheer.info/security , you are already accessing this environment. So, I host my web server, mail...
  • Blog Post: Securing My Infrastructure: Introduction (part 2)

    Looking at Jacks comment to my initial post this morning ( Securing My Infrastructure: Introduction ) it seems that I have to give you some additional information: So let me start with the goal of this network: Basically I started to build it on one server to play around with our technology. Soon...
  • Blog Post: Patch Management, a key step towards compliance!

    As you might have read, I recently blogged about my infrastructure and the future of a platform towards a better management of compliance – honestly, I actually played with our latest technology . I wrote about Deploying PKI Time Sync on Virtual DCs Now, a necessary and very important next step towards...
  • Blog Post: Securing My Infrastructure: Risk Management

    This is a follow-up of my last post about how I secure my environment. If you want to read the start of the series, see at the end of this post but please do not expect me to keep this rhythm J . Let me start with an introduction first: After my first post, I got quite some reactions – which was very...