Security Tip of the Month: Post aVirtualiptica - Addressing Incidents in a Virtual Environment Explore some of the tools, techniques, and processes involved in obtaining information about your virtual machines and addressing an incident.
|
Virtual Domains in Forefront Online Protection for Exchange This video will show you how to create and configure virtual domains within Forefront Online Protection for Exchange to provide different filtering settings for a particular group of users, specify a different mail delivery location for a subset of users, and to rewrite recipients' email address based on the needs of your organization.
|
Planning for Security and Protection for Microsoft Application Virtualization (App-V) Security for an App-V system relies on proper setup of the software and the environment in which it operates. Get guidance on how to configure the various App-V components to enhance the security of your environment at the client, server, and sequencer level.
|
Microsoft App-V Security Guide This guide introduces you to important information about deployment decisions that can affect the security of your system. It also provides you with the necessary steps to configure App-V security settings to enhance the security of your environment. If the security settings are specific to Windows but not to App-V, the documentation includes the appropriate links to additional information.
|
Planning for Hyper-V Security You should secure your virtualization server using the same measures you would take to safeguard any server running Windows Server 2008. This article discusses those measures plus a few extra to help secure virtual machines, configuration files, and data.
|
Hyper-V Security Guide Elevate the security of virtualized Windows Server environments to address your business-critical needs. This guide provides instruction on how to harden Hyper-V, delegate virtual machine management, and protect virtual machines.
|
Secure Remote Desktop Services (RDS) Connections with SSL By default, RD Session Host sessions use native RDP encryption. However, RDP does not provide authentication to verify the identity of an RD Session Host server. Learn how you can enhance the security of RD Session Host sessions by using Secure Sockets Layer (SSL) Transport Layer Security (TLS 1.0) for server authentication and to encrypt RD Session Host communications.
|
A Guide to Data Governance for Privacy, Confidentiality and Compliance Part 5: Moving to Cloud Computing Maintaining the privacy and confidentiality of data, as well as meeting the requirements of a growing list of related compliance obligations, are top concerns for government organizations and enterprises alike. Looking ahead to the coming decade, we can see that cloud computing will likely magnify these concerns. Learn how data governance challenges change when organizations opt to use cloud-based services, and how the framework and techniques presented in Part 3 of the guide "Managing Technological Risk" can be applied in this new context. |