Endpoint security management tools

Email Alerts

Register now to receive SearchEnterpriseDesktop.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • system tray

    The system tray (or "systray") is a section of the taskbars in the Microsoft Windows desktop user interface that is used to display the clock and the icons of certain programs so that a user is continually reminded that they are there and can easily ... 

  • Windows security toolbox: Network security

    Ping and tracert are great, but sometimes you need a more powerful utility when troubleshooting your network -- especially where security is concerned. Check out these 12 free network security tools -- from scanners to network mappers -- that we've c... 

  • General security configuration: Step 1

    Trying to find out what's so special about IE7? Read up on the new security features present in IE7, and learn which of these features are user configurable. 

  • Tools for virus removal and detection

    Learn about antivirus tools and best practices for removing viruses from your system in this section of our malware learning guide. 

  • Free security testing toolkit review: BackTrack 3

    The latest update to the BackTrack toolkit not only features several tools that can help lighten the load of security assessment in your organization, but it's also free. In this review, learn why BackTrack 3 has security expert Kevin Beaver so fired... 

  • Microsoft releases April trove of patches

    Windows, Office and IE all have patches deemed 'critical' by Microsoft this month. 

  • Windows Integrity Control (WIC) in Vista

    BitLocker and User Account Control have gotten lots of hype, as new security features in Vista. But what about Windows Integrity Control? Learn about WIC in this excerpt from Hacking Windows Exposed: Microsoft Windows Security Secrets and Solution... 

  • How do I properly configure WSUS?

    An improperly configured WSUS can lead to some quirky security issues. In this question in our ITKnowledge Exchange, a user is seeing multiple instances of the same computer on his WSUS lists. See how other readers have responded to this user's probl... 

  • Troubleshooting IEEE 1394 bus devices for Windows machines

    FireWire (or 1394) devices work well most of the time, but when things go wrong, troubleshooting techniques can vary depending on what's causing the problem. 

  • Metasploit 3.1 updates improve Windows penetration testing

    Metasploit has long been a popular tool to use to conduct Windows penetration testing. Well, just this January, the latest version, Metasploit 3.1, was released. Learn about the new features and updates of this cool tool, which include a true GUI int...