Wednesday, 24 July 2013

Create a Global Audit Policy

View on Mobile Phone | View as Web Page
Security Update
An Easy Way to Create a Global Audit Policy
Promo_SPK_jandeclercq_70x91
by Jan De Clercq

Q: What's the easiest way to create a global audit policy that will automatically log events for all administrator changes to the system registry on all the domain controllers (DCs) in a Windows domain?

More...

ADVERTISEMENT

BizAppSilverlight_120x60Follow us Twitter! Don't miss real-time updates on articles, virtual events, white papers, Essential Guides, webcasts, and more.  Meet your peers and tell us what you think. Also look for us on Facebook and LinkedIn.


What Are OAuth 2.0 and OpenID Connect?
PromoInt_WIN_SPK_SDeuby_76x100
by Sean Deuby
In "Attention, IT Pros: You Can Help Evolve a Secure Cloud, Too," I emphasized how important it is for businesses to support open Internet identity standards and to require their vendors to support them. I'm long overdue to bring a couple of relatively new, very important identity frameworks to your attention. Why should you care? These new frameworks—OAuth 2.0 and OpenID Connect—are the "Kerberos of the cloud." As with Kerberos, even if you don't explicitly develop code using them, you must at least know how they work in order to support your users: Those users are utilizing mobile and cloud apps with increasing frequency.

More...

Stay on Top of the Latest Malware Threats
Trent_Rod_0513_70X91.jpg
by Rod Trent
The look-and-feel for Microsoft's Malware Encyclopedia has been updated along with the Malware Protection Center web site. And, while it's great to have a searchable encyclopedia online, there's actually better value provided on the revamped site than just the searchable database. Also, on the page, Microsoft provides the top 10 for Recently Published threats, Top Detected threats, Top malware and potentially unwanted software, Top MSRT threats, Top families of threats, and then they highlight a specific family of threats if you want to learn more about malware.

More...

Additional Resources

SharePoint Virtualization and the Benefits of Modern Data Protection
Virtualizing the SharePoint environment can provide a pathway for simple, yet powerful, SharePoint backup. Download this helpful guide and find out for yourself whether virtualizing your SharePoint environment is a good option for your organization.

Mobile ITSM: Best Practices for Running Mobile E-mail and Apps
This white paper will provide, through Enterprise Mobility Management (EMM), guidelines to achieve the highest levels of mobility with lower risks. Download now and help connect with your users.

Join Our Community:
Facebook
Twitter
LinkedIn

Resources
Aug. 15 | Deep Dive Data Protection for Hyper-V
Join us for this deep dive presentation on data protection strategies for Hyper-V. Learn the skills to take your data protection to the next level with Hyper-V.

Why VMWare and Hyper-V Disk Backup is Broken
Protection for virtual environments is a critical aspect of a strong and efficient virtual machine. Environments like VMWare and hypervisors require specialized backup, but the majority are vulnerable, being protected by generic systems.
MORE RESOURCES

Events
Driving Cloud Interoperability to Reduce Costs and Speed Innovation
Click here to learn more about an open approach to cloud management and about IBM's new SmartCloud Orchestration.

Join John Savill Thursday, August 15th, for this web seminar: "Creating a Private Cloud with System Center 2012"
"Nothing showcases System Center's 2012 capabilities better than the Private Cloud." Find out why this holds true, learn about relevant programs like Virtual Machine Manager, Orchestrator, and Service Manager, and understand why and how you can create a Private Cloud with System Center 2012.
MORE EVENTS

 

Contact Us

About the commentary -- letters@windowsitpro.com
About technical questions --
forums.windowsitpro.com
About product news --
products@windowsitpro.com


Make sure your copy of Security Update doesn't get mistakenly blocked by antispam software! Be sure to add Security Update to your list of allowed senders and contacts.
 
You are subscribed as: buzzhairs.tech@blogger.com . To manage your subscription, click here.

Windows IT Pro | Penton | 1166 Avenue of the Americas/10th Fl | New York, NY 10036 | 
©Copyright 2013, Penton All Rights Reserved | Privacy Statement

No comments:

Post a Comment