Share via


New column - debunking security myths

There is a lot at stake in security configuration guidance. First, it is easy to understand why people are clamoring for it. Everyone can see the benefit in turning on some setting and blocking an attack. In some environments, doing so is not even an option. A system must be configured in accordance with some security configuration or hardening guide to be compliant with security policy. In other environments security configuration guidance is strongly encouraged. Before you start making security tweaks, however, we feel that it is very important that you understand some of the fundamental problems with them. These are what we call the myths.

Part 1: https://www.microsoft.com/technet/community/columns/secmgmt/sm0305_2.mspx

Part 2: https://www.microsoft.com/technet/community/columns/secmgmt/sm0405.mspx