Endpoint security management tools

Email Alerts

Register now to receive SearchEnterpriseDesktop.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Spending too much time trying to fix everything.

    When it comes to performing security assessments on your Windows system, avoid these five mistakes in order to help cut back on weaknesses in your network. 

  • Relying on audit checklists and automated tools

    When it comes to performing security assessments on your Windows system, avoid these five mistakes in order to help cut back on weaknesses in your network. 

  • Not looking at the whole picture

    When it comes to performing security assessments on your Windows system, avoid these five mistakes in order to help cut back on weaknesses in your network. 

  • Not considering the side effects of your tests

    When it comes to performing security assessments on your Windows system, avoid these five mistakes in order to help cut back on weaknesses in your network. 

  • Assuming testing once is enough

    When it comes to performing security assessments on your Windows system, avoid these five mistakes in order to help cut back on weaknesses in your network. 

  • Top Windows security tips for admins

    Check out our hottest tech tips on subjects such as networking security, spyware, patch management, enterprise security best practices and more. 

  • Windows Vista: Encrypting File System redesigned

    While Encrypting File System, a part of Windows XP, isn't a new idea, it has been greatly improved for Vista users. Microsoft MVP Brien Posey gives a rundown of its new features, as well as a comparative to another encryption feature -- BitLocker. 

  • Restricted Web sites

    Spyware infections can possibly restrict your favorite Web sites. Find out how to avoid this with this advice from Windows security threats expert Kevin Beaver. 

  • Managing Microsoft's Windows Firewall

    Microsoft's Windows Firewall can give network admins a headache. Check out the advice of our Windows security experts to find out when to use Windows Firewall, how to configure it for remote users and what can cause Windows Firewall to automatically ... 

  • BOOT.INI is gone, BCD is here

    There's a little surprise waiting for you in Windows Vista: The boot options are different from those in previous versions of Windows. Learn more about the new boot tool called BCD.