Looking for Windows security tools, but don't have time to do the research? Learn about a few that come highly-recommended...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
by one of our top security experts, Kevin Beaver. This guide weighs the pros and cons of Microsoft's Baseline Security Analyzer, examines why Windows shops should use Mark Russinovich's Sysinternals toolkit and introduces four Internet Explorer 8 group policy security settings.
Why should Windows shops use Microsoft Baseline Security Analyzer?
Microsoft Baseline Security Analyzer, now in version 2.1 is actually pretty decent. It not only tests for missing patches, but also uncovers other weaknesses in your Windows-based systems. Find out its' capabilities here.
Sysinternals tools: A must-have for every Windows security toolbox
Get a review of the free Sysinternals tools that make managing and troubleshooting Windows-based PCs almost effortless for administrators. Kevin also provides valuable links where downloading these tools is quick and easy.
Using Sysinternals tools in security management scenarios
Uncover three valuable Sysinternals tools and discover how these security tools can work for you. To further demonstrate the power and benefits of these tools, Kevin explores security management scenarios you're likely to come across when administering Windows systems.
Four Internet Explorer 8 group policy security settings
Internet Explorer 8 doesn't have nearly as many new security mechanisms as its predecessor; however, there are four group policy security settings for IE8 worth mentioning.
|ABOUT THE AUTHOR:|
| Kevin Beaver
Kevin Beaver is an information security consultant, keynote speaker, and expert witness with Atlanta-based Principle Logic, LLC. Kevin specializes in performing independent security assessments. Kevin has authored/co-authored seven books on information security including Hacking For Dummies and Hacking Wireless Networks For Dummies (Wiley). He's also the creator of the Security On Wheels information security audio books and blog providing security learning for IT professionals on the go. Kevin can be reached at kbeaver /at/ principlelogic.com.
Dig Deeper on Endpoint security management tools