Windows 10 security and management

  • Step 3: Drive your point home

    The multitude of processes and services on your servers are ripe for exploitation. This step-by-step guide from vulnerability testing expert Kevin Beaver provides specific steps for testing the security of your servers' configurations.  Continue Reading

  • Step 4: The "block the application" approach

    In the wrong hands IM and P2P file sharing can be too much of a risk for your organization. There are many ways to block this traffic, but some are more elegant -- with less adverse effects -- than others. Contributor Serdar Yegulalp details this ...  Continue Reading

  • Step-by-Step Guide: Patch management must-do list

    Contributor Brien Posey warns not to rely solely on your patch management software in keeping Windows patched. Even the best tools will miss some security holes. In this step-by-step guide, he offers a must-do list to help you maintain ...  Continue Reading