Security


Springboard Upends the Microsoft Roadmap

Security delays with Windows XP SP2 are causing cascading delays all through Microsoft’s delivery schedule.

Microsoft Delivers on Centralized Security

Audit Collection Services provides a scalable means of consolidating security event logs across your enterprise.

Stopping Computer Crime, Part 2

Catch the culprits through logging, analysis and reporting.

Resources for Security

Check out these links for additional information on security.

The Importance of Keeping Time

Unreliable and inaccurate time sources can lead to security vulnearabilities.

Protection Through Isolation

By creating internal network segments, you limit the reach of unauthorized users.

Same Access Tokens, Same Privileges

The magic behind simple access tokens.

Windows XP SP2 Strategies

To install or not to install SP2 is all up to you.

Linux: Avenue for Windows Sneak Attack?

Any hole, irrespective of OS, is the weakest link.

RPC Over HTTP Reloaded

Readers ask for a good resource on configuring this useful but confusing feature of Exchange 2003.

Insecurity, in Black and White

Proper preventive measures can mitigate attacks on data storage.

Two are Better Than One

It's time to make the move to two-factor authentication.

Securing Your Handhelds

Deploying handhelds requires understanding the sensitivity of your data, the strengths & weaknesses of your infrastructure, & the needs of your IT team. There are no easy answers.

Put Your Finger on Proper Security

A roundup of five biometric products that go the extra security mile—for when passwords alone aren't enough.

On the Offensive

It's time to become proactive about stopping computer crime.

You Ask, Ballmer Answers

MCP Magazine readers get a crack at the Microsoft CEO.

Protection Through Isolation

This admin got a shock when he discovered that usernames and passwords for his new employer's sensitive documents were being sent in cleartext. Fortunately, he was able to see the forest for the trees.

A Trustworthy Response?

Everyone--Microsoft and its customers--needs to get more serious about the virus threat.

Lock Down Remote Registry Access

Block anonymous users from accessing confidential information.

XML and Web Services: Are We Secure Yet?

From confidentiality, integrity, and availability to authentication, authorization, and audit, find out how you can employ best practices to make Web services secure.

Subscribe on YouTube

Upcoming Training Events

0 AM
Live! 360 Orlando
November 17-22, 2024
TechMentor @ Microsoft HQ
August 11-15, 2025