Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Windows security tools for the busy desktop administrator

Looking for Windows security tools, but don't have time to do the research? Learn about a few that come highly-recommended by one of our top security experts.

Looking for Windows security tools, but don't have time to do the research? Learn about a few that come highly-recommended by one of our top security experts, Kevin Beaver. This guide weighs the pros and cons of Microsoft's Baseline Security Analyzer, examines why Windows shops should use Mark Russinovich's Sysinternals toolkit and introduces four Internet Explorer 8 group policy security settings.

Why should Windows shops use Microsoft Baseline Security Analyzer?
Microsoft Baseline Security Analyzer, now in version 2.1 is actually pretty decent. It not only tests for missing patches, but also uncovers other weaknesses in your Windows-based systems. Find out its' capabilities here.

Sysinternals tools: A must-have for every Windows security toolbox
Get a review of the free Sysinternals tools that make managing and troubleshooting Windows-based PCs almost effortless for administrators. Kevin also provides valuable links where downloading these tools is quick and easy.

Using Sysinternals tools in security management scenarios
Uncover three valuable Sysinternals tools and discover how these security tools can work for you. To further demonstrate the power and benefits of these tools, Kevin explores security management scenarios you're likely to come across when administering Windows systems.

Four Internet Explorer 8 group policy security settings
Internet Explorer 8 doesn't have nearly as many new security mechanisms as its predecessor; however, there are four group policy security settings for IE8 worth mentioning.

Kevin Beaver
Kevin Beaver is an information security consultant, keynote speaker, and expert witness with Atlanta-based Principle Logic, LLC. Kevin specializes in performing independent security assessments. Kevin has authored/co-authored seven books on information security including Hacking For Dummies and Hacking Wireless Networks For Dummies (Wiley). He's also the creator of the Security On Wheels information security audio books and blog providing security learning for IT professionals on the go. Kevin can be reached at kbeaver /at/ principlelogic.com.
This was last published in May 2009

Dig Deeper on Endpoint security management tools

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.