Endpoint security management tools

Email Alerts

Register now to receive SearchEnterpriseDesktop.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Setting up IPsec bypass

    Mark Minasi explains how to set up IPsec bypass, a technology that requires both your clients and their machines to be authenticated prior to accessing your network. This chapter is an excerpt from Minasi's book, "Mastering Windows Server 2003 Upgrad... 

  • Locking up the ports: Windows Firewall

    This upgrade to best-selling author Mark Minasi's Mastering Windows Server 2003 covers all the undocumented updates and new features in SP1 and R2. With clear and easy instruction, this book update tells you all about the SP1 and R2, including... 

  • Windows Live OneCare 1.5: How does it compare?

    Security expert Serdar Yegulalp takes an inside look at Windows Live OneCare 1.5's features and outlines the differences between it and its competitors. 

  • Alternative encryption methods?

    Learn alternative encryption methods to prevent hackers from breaking into your notebook computer with this advice from Kevin Beaver. 

  • Automatic exceptions: IPsec bypass

    In this excerpt from Mark Minasi's book, Mastering Windows Server 2003 Upgrade Edition for SP1 and R2, Mark shares his thoughts on IPsec bypass, a technology in Windows Firewall that requires both your client and their machine to be authentica... 

  • Essential elements of a good security assessment report

    Security guru Kevin Beaver outlines the six steps you can take to put together a solid assessment report. 

  • Harden your file servers with Windows wizard tool

    Jonathan Hassell explains how to secure your file servers that are running Windows Server 2003 using the Security Configuration Wizard; both in an automated fashion and through manual tweaks to the configuration. 

  • Anti-spyware, anti-virus proetction for Windows e-mail needed

    Windows security threats expert Kevin Beaver suggests anti-spyware and antivirus protection when the your messaging application of choice comes down with a self-distributing virus. 

  • Risks of 3rd-party downloading

    Downloading from a third-party source can be tricky. How do you know if you can trust the source? Are you safer downloading from a company like Microsoft? Kevin Beaver talks about downloading from this type of source. 

  • Permitting Ping: ICMP Exceptions

    According to Mark Minasi, "Ping's the most basic troubleshooting tool in many a networker's arsenal, and it's a pain to try to do network troubleshooting in a network that's blocked all pings." In this excerpt from his latest book, Mastering Windo...