A+ R A-

Windows Security

Introduction

The security log for Windows is full of great information, but unless you know how to control, manage, and analyze the information, it is going to take you much longer to get the information that you want out of it. This article will describe some of the tips and tricks that can be used to better dig the information that you need out of the security log, making your job easier, you more efficient, and the overall security of your network better.

Setting Up What is Logged

First...

Winner in the Patch Management Category of Readers’ Choice Awards: GFI LANguard

August 25, 2010 - GFI LANguard was selected the winner in the Patch Management category of the WindowSecurity.com Readers’ Choice Awards. Ecora Patch Manager and WinINSTALL were runner-up and second runner-up respectively.


  GFI LANguard

“Our Readers’ Choice Awards give visitors to our site the opportunity to vote for the products they view as the very best in their respect...

In 2008, I published an article on this site about the threats that mobile phones can pose to business networks and steps you could take to secure Windows Mobile 6.1 phones. The smartphone market has boomed since then and companies are faced with a plethora of employee-owned handheld devices may have access to your company’s resources. Along with new iterations of Windows Mobile and the iPhone, we have Android based phones - along with those that run Symbian, Palm and Nokia’s new Maemo operating systems. With these new and improved models come new security issues.

The good news is that, as we enter a new and probably even more mobile decade, the industry seems to finally be getting smart about smartphone security. A recent survey from Goode Intelligence indicated that more than half of respondent organizations planned to deploy mobile anti-virus products in 2010. But anti-virus is not enough; if you have smartphones on your network, you need a comprehensive

Winner in the Event Log Monitoring Category of Readers’ Choice Awards: AdventNet EventLog Analyzer

March 25, 2010 - AdventNet EventLog Analyzer was selected the winner in the Event Log Monitoring category of the WindowSecurity.com Readers’ Choice Awards. EventSentry and WebSpy Vantage were runner-up and second runner-up respectively.

“Our Readers’ Choice Awards give visitors to our site the opportunity to vote for the products they view as the very best in their respective category,” said Sean Buttigieg, WindowSecurity.com manager. “WindowSecurity.com users are specialists in their field who encounter various network security solutions at the workplace.  The award serves as a

Winner in the Anti Virus Category of Readers’ Choice Awards: avast! Server edition

April 29, 2010 - avast! Server edition was selected the winner in the Event Anti Virus category of the WindowSecurity.com Readers’ Choice Awards. Kaspersky Enterprise Space Security and McAfee VirusScan Enterprise were runner-up and second runner-up respectively.

“Our Readers’ Choice Awards give visitors to our site the opportunity to vote for the products they view as the very best in their respective category,” said Sean Buttigieg, WindowSecurity.com manager. “WindowSecurity.com users are specialists in

Product: NetWrix Change Reporter Suite

Product Homepage: click here

Change management has become an essential part of managing IT system security. Changes to system configuration - even when the changes are authorized – can result in unintended consequences such as exposure of the systems and network to malicious code or attack. Being able to track changes is also essential to troubleshooting problems that may have been caused by those changes. And of course, it is vital that you be made aware, as quickly as possible, of any unauthorized changes that might indicate

If you would like read the next part in this article series please go to Understanding Man-In-The-Middle Attacks – Part2: DNS Spoofing.

One of the most prevalent network attacks used against individuals and large organizations alike are man-in-the-middle (MITM) attacks. Considered an active eavesdropping attack, MITM works by establishing connections to victim machines and relaying messages between them. In cases like these, one victim believes it is communicating directly with another victim, when in reality the communication flows through the host performing the attack. The end result is that the attacking host can not only intercept sensitive data, but can also inject and manipulate a data stream to gain further control of its victims.

In this series of articles we will examine some of the most widely used forms of MITM attacks including ARP cache poisoning, DNS

If you would like to be notified of when Robert Shimonski releases the next part in this article series please sign up to our WindowSecurity.com Real Time article update newsletter.

Windows 7 is Microsoft’s latest desktop-based client operating system which builds on the strengths and weaknesses of its predecessors, Windows XP and Windows Vista. Every aspect of the base operating system as well as the services it runs and how it manages the applications loaded within it has been reviewed and made more secure if possible. All services have been enhanced and new security options making it more reliable. Aside from basic system enhancements and new services, Windows 7 delivers more security functionality, enhanced auditing and monitoring capabilities and the ability to encrypt remote connections and your data, Windows 7 also has newly developed internal protection enhancements to secure system

Page 1 of 8

Get email updates