Endpoint security management tools

Email Alerts

Register now to receive SearchEnterpriseDesktop.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to use Microsoft's Malware Removal Starter Kit

    Can Microsoft's new Malware Removal Starter Kit help your shop to further rid itself of pesky invasions? Find out with these helpful setup tips from security expert Brien Posey. 

  • How to secure your Microsoft SharePoint products

    Microsoft SharePoint products are hot right now, and you're probably planning on deploying them in the near future. But do you know how to keep them secure? This checklist provides the necessary steps to take in order to further secure WSS and MOSS. 

  • Microsoft Windows Firewall security

    Learn how to manage Windows Firewall, disable the Microsoft firewall and the basics of Windows Firewall in this section of our network access learning guide. 

  • One patch for Active Directory is a doozy

    Of the six July patches, the worst of the bunch are targeted at Active Directory and the .NET Framework. 

  • Prevent and defend against spyware infection

    Find information on spyware and adware detection, keyloggers and their destructive capabilities, bots, proper spyware removal tactics and antispyware tools. 

  • Scan IP ports without Windows Firewall restrictions

    A properly configured Windows Firewall is great for security, but can also impede your own security scans. Learn how to bypass a secure Windows Firewall and scan for a user's IP address with this advice from Jonathan Hassell. 

  • How can I recover lost files?

    If your administrator account is compromised, data recovery can be a tall task. Learn to recover lost files with this advice from Windows hardening expert Jonathan Hassell. 

  • How can I recover data after rebuilding my machine?

    If you're not careful, data recovery after rebuilding a machine may be impossible, as you can lose any necessary recovery agents for your data. Read what security expert Jonathan Hassell has to say about recovering data after you've reformatted your ... 

  • Create a corporate security baseline for Windows Vista

    Learn how to create a security baseline that can help your organization determine whether or not its Vista machines are configured to comply with your corporate security policy. 

  • Vista BitLocker Drive Encryption tips

    Learn how to use Vista's BitLocker and read up on questions about BitLocker Drive Encryption with these helpful and informational tips, written by Microsoft security industry experts.