Browse by Tags

Related Posts
  • Blog Post: When it comes to malware - what keeps you awake at night?

    It’s a challenge to protect an organization’s valuable assets against malware. And as malware increases in magnitude and sophistication, it seems that IT security is a journey that really doesn’t have a final destination. Do you find yourself looking over your shoulder and wondering about new threat...
  • Blog Post: Which Windows Services Do We Need?

    When you look at Microsoft Windows services, it can be confusing to sort through them and understand which ones you need. In this blog entry I'm going to take a more detailed look at Windows services and see if we can identify any services that might not be needed, or determine whether any are suspicious...
  • Blog Post: New Beta Available: Microsoft Forefront Integration Kit for Network Access Protection

    I would like to announce the beta release for the Microsoft® Forefront™ Integration Kit for Network Access Protection. We are making this beta release available so that we can get your feedback. With your help, we can ensure that the Kit meets your needs. What is the Microsoft Forefront Integration...
  • Blog Post: Malware Defenses

    Following the success of the Malware Removal Starter Kit, the Solutions Accelerators - Security and Compliance (SA-SC) team has been working to provide a more in depth look at malware. The team would like your input about what you and your peers find beneficial when dealing with malware. Malware...
  • Blog Post: Malware Removal Starter Kit

    The thought that a computer infected with malware is irreparable is both undesirable and should be possible to avert. A solution to that could be used to provide a last best effort to recover from malware is possible, now. The Malware Removal Starter Kit, a Solution Accelerator from Microsoft, provides...
  • Blog Post: Security identification using Microsoft Assessment and Planning Toolkit 3.1

    Are your PC's antivirus (AV) and antispyware or anti-malware (AM) programs actually running? If anything should keep you up at night, it's the question of whether your users' desktops and laptops are protected from malware. Previously we talked about how NAP can provide a defense-in-depth...