Q: What's the easiest way to create a global audit policy that will automatically log events for all administrator changes to the system registry on all the domain controllers (DCs) in a Windows domain?
More... | ADVERTISEMENT Follow us Twitter! Don't miss real-time updates on articles, virtual events, white papers, Essential Guides, webcasts, and more. Meet your peers and tell us what you think. Also look for us on Facebook and LinkedIn.
| In "Attention, IT Pros: You Can Help Evolve a Secure Cloud, Too," I emphasized how important it is for businesses to support open Internet identity standards and to require their vendors to support them. I'm long overdue to bring a couple of relatively new, very important identity frameworks to your attention. Why should you care? These new frameworks—OAuth 2.0 and OpenID Connect—are the "Kerberos of the cloud." As with Kerberos, even if you don't explicitly develop code using them, you must at least know how they work in order to support your users: Those users are utilizing mobile and cloud apps with increasing frequency.
More... | The look-and-feel for Microsoft's Malware Encyclopedia has been updated along with the Malware Protection Center web site. And, while it's great to have a searchable encyclopedia online, there's actually better value provided on the revamped site than just the searchable database. Also, on the page, Microsoft provides the top 10 for Recently Published threats, Top Detected threats, Top malware and potentially unwanted software, Top MSRT threats, Top families of threats, and then they highlight a specific family of threats if you want to learn more about malware.
More... | Additional Resources | | Resources | Aug. 15 | Deep Dive Data Protection for Hyper-V Join us for this deep dive presentation on data protection strategies for Hyper-V. Learn the skills to take your data protection to the next level with Hyper-V.
Why VMWare and Hyper-V Disk Backup is Broken Protection for virtual environments is a critical aspect of a strong and efficient virtual machine. Environments like VMWare and hypervisors require specialized backup, but the majority are vulnerable, being protected by generic systems. |
|
No comments:
Post a Comment