Browse by Tags

Related Posts
  • Blog Post: HIPAA or PCI or FISMA Baseline? (FAQ)

    A teammate of mine posted a FAQ this week about the GRC space and how it intersects with Microsoft Baselines. Check it out! http://social.technet.microsoft.com/wiki/contents/articles/grc-baselines-made-easy.aspx -jeff PS - for those of you wanting the SCM v2 Beta, I've got great news. Just...
  • Blog Post: Now available: System Center Configuration Manager Extensions for SCAP Beta

    If your organization is affected by the Federal Desktop Core Configuration (FDCC) mandate, and the Security Content Automation Protocol (SCAP), then this new Beta program will be of interest to you. The FDCC mandate from the Office of Management and Budget (OMB) requires federal agencies and organizations...
  • Blog Post: Partner adopts Security Compliance Management toolkit

    I wanted to thank Securevantange in making the Security Compliance Management toolkit a success in their world. Our customers and partners are all very pleased with the new baselines provided in the Security Compliance Management toolkit for DCM along with the ease of customization supported...
  • Blog Post: Integrate AccessChk.exe with DCM Scripts

    The DCM feature supports a powerful way for data discovery by using scripting. By invoking AccessChk.exe from DCM scripts, the output of user rights assignment data from AccessChk.exe can be collected by the DCM scripting data discovery provider. The following procedure enables you to use Microsoft Visual...
  • Blog Post: Configuration Drift

    In my last blog I introduced a new Solution Accelerator called the Security Compliance Management toolkit. Today I'd like to help you learn more about this new Accelerator, but in a somewhat indirect way—by discussing a problem space known as configuration drift. Probably the simplest way to understand...
  • Blog Post: How to Use AccessChk.exe for Security Compliance Management

    In this article we invite Michael Tan, one of our senior program mangers, to introduce a new feature in the recently updated Sysinternals tool called AccessChk. His two part article looks at how the new AccessChk feature works and the benefits of using this Sysinternals tool. The second part takes a...