Security


Powerful Firewall Gets Personal

Driven by a simple, application-based security rule-set, ZoneAlarm keeps computer invaders at bay.

Active Directory Data: Guarding the Family Jewels

Now that you know what Active Directory is — and how vital it is — what are you doing to keep it safe?

Secure Your System

Build comprehensive firewall protection with CyberwallPLUS 6.0.

The Gift of Group Policy

Santa Gates has a special toy from the land of Windows 2000. Question is, how does it work?

Vanquishing Viruses: A Primer for the Hunter

Consider yourself under the threat of constant attack—viruses aren’t going away. Here, we examine five network anti-virus solutions that can aid you in your fight.

Fab 5

An intrepid systems engineer divulges his most-loved Windows utilities. (A guy could get sentimental about this stuff.) Should these programs be in your toolbox?

Handling Security the Right Way

Make security administration a breeze with this trio of Small Wonders Software tools.

Change in Time

Mandatory password expirations should apply to everyone, even the network administrator.

The Network Protector

Microsoft’s Internet Security and Acceleration Server performs proxy and firewall services. This briefing educates you on its firewall capabilities.

Smart Card Logon Integration with Kerberos

Learn the basic behind-the-scenes steps for Smart Card logon under Kerberos.

Smart Card Education, Part 2

With last month’s foundation in smart card technology under your belt, it’s time to implement the test system.

Smart Card Education

If you’re concerned about weak passwords serving as a hacker’s haven on your network, smart card logon may be the answer.

IPSec, Your Private Communications Security Cop

Implementing this emerging data communication security standard can tighten up your network. Here’s how its default policies work.

Securing Terminal Services

Running Windows 2000 Terminal Services is the next best thing to being there--but how do you do it securely?

8 Ways to Secure Exchange

Windows 2000 and Exchange 2000 offer new routes to email security, but have you done all you can with Exchange 5.5?

Systems Engineering: Home-Built Intrusion Detection

With a bit of SQL and the NT Resource Kit, you can create a log file management system to stay on top of potential intrusions.

Single Sign-On Promises

Making SSO a reality in mixed-OS enterprises involves niggling details, compromises, and add-ons or third-party solutions. Does Windows 2000 help?

Back to Work

Put aside your latest list of one-alarm fires for a few hours and spend some time planning your disaster recovery response.

My Security Favorites

When we asked Roberta to provide a list of the best Web sites for security information, she cleaned out her Favorites folder and rediscovered a few old friends.

Tickets, Please! Limit User Access with Windows 2000

Use Windows 2000's default security to make sure no one gets in without your permission. First step: Understand what ships in the product.

Subscribe on YouTube

Upcoming Training Events

0 AM
Live! 360 Orlando
November 17-22, 2024
TechMentor @ Microsoft HQ
August 11-15, 2025