Microsoft patch management policy
In the Microsoft Patch Management tutorial, learn about Windows patch management policy, patch maintenance and post-patch security as well as what tools you can use for patch management in Windows networks. Learn about setting patch management policy, prioritizing your patching process, managing a testing budget and the pros and cons of using third-party patch management tools.
Managing Windows network access security tutorial
This guide is designed to help network admins control network access. There are many areas you need to be cognizant of when securing a Windows network, like VPNs, remote access and telecommuters, securing network endpoints and network firewalls. If you overlook any of these access points, you run the risk of losing critical data to any degree of hacker, from the relatively benign hacker to the most advanced cyber criminals. This tutorial on controlling Windows network access will provide several tips and tools to teach you how to manage network access and keep your network as secure as possible.
Internet Explorer security settings and controls
This learning guide details the vulnerabilities associated with today's most commonly used Web browser, Microsoft Internet Explorer, and the ways in which you can defend your network from Web-related security hacks. Any time a user on your network has access to the Web, which these days is almost always, a clever hacker can exploit inherent Windows internet security flaws and gain access to your network. As a Windows security administrator, you need to not only be aware of Internet Explorer security flaws but also how to recover from resulting breaches when a hacker decides to strike. The Internet Explorer security learning guide offers advice on securing IE7, surviving with IE6, discusses Web browser security settings and controls and outlines how proper Web browsing can lead to a safer network.
Rootkit and malware detection and removal guide
This guide helps network admins keep malware off of their Windows systems. Malware has become more and more sophisticated in recent years, evolving from annoyance attacks or proof-of-concept attacks to rootkits and keyloggers designed to steal your business critical data. Thus, the Windows administrator of today must be ever cognizant of evolving malware threats and the methods to combat them. The Windows malware prevention and detection learning guide will provide several tips and tools on rootkit prevention, spyware and adware removal, antivirus tools, malware removal best practices and more.
This was first published in September 2008