Everything about Web and Network Monitoring

First steps in Computer Forensics: Securing your network

No matter how secure your infrastructure is, sooner or later you will become a victim of a computer crime. Someone may point a DDoS (Distributed Denial of Service) attack at your services, may sniff your network, or may copy/delete confidential information. You may not even realize such a thing has happened. However, in an organized… Read the full post


Microsoft’s Endpoint Protection Overview

First, let’s make it clear what an endpoint is. In Microsoft’s world this term represents any client computer, server, or laptop in an organization. Forefront Endpoint Protection is a line-of-business application developed by Microsoft to provide defense against viruses, worms, and other threats. Forefront Endpoint Protection (FEP) 2010 was closely tied to System Center Configuration… Read the full post


Nine Steps to Secure your Exchange Server

In this article we will list some steps you can take to make sure your Exchange Server is running as securely as possible. 1. Harden the OS We can’t stress enough how important it is to harden the OS that is hosting the Exchange Server. It might seem obvious to you but, in fact, many… Read the full post


Windows Azure Overview Part 4: Security

  This blog post is part of the blog post series on Windows Azure. You can read the rest of this series here (part1 ; part2 ; part3). There are very few organizations that apply as many security measures as Microsoft does for its Windows Azure service. Listed below are some of the precautions Microsoft has implemented… Read the full post


Nine steps to secure your IIS7 server

In this article we will focus on some tips you can use in your environment to secure IIS7 servers and the application they’re hosting. 1. The first step you need to take when securing your web server is to harden the OS that hosts it. If you’re using Windows Server 2008 R2, then the server… Read the full post


Working With Microsoft Security Tools

How many of us take for granted Microsoft’s family of tools that contribute to the security of your organization? The most commonly used and appreciated tools are: Forefront Family Microsoft Security Essentials Windows Intune / Windows Update / Microsoft System Center Family Windows Firewall (with Advanced Security) Let’s take a look at all of these… Read the full post