Susan Bradley

Contributing Writer

Susan Bradley has been patching since before the Code Red/Nimda days and remembers exactly where she was when SQL slammer hit (trying to buy something on eBay and wondering why the Internet was so slow). She writes the Patch Watch column for Windows Secrets, is a moderator on the PatchManagement.org listserve and SBS2k, and was one of the authors of Windows Server 2008 Security Resource Kit. . In real life she’s the IT wrangler at her firm, Tamiyasu, Smith, Horn and Braun, where she manages a fleet of Windows servers, an Exchange Server, desktops, a few Macs, several iPads, a few Surface devices, several iPhones and tries to keep patches up to date on all of them. In addition, she provides forensic computer investigations for the litigation consulting arm of the firm. She blogs at www.sbsdiva.com and is on twitter at @sbsdiva. She lurks on Twitter and Facebook, so if you are on Facebook with her, she really did read what you posted. She has a SANS/GSEC certification in security and prefers Heavy Duty Reynolds wrap for her tinfoil hat.

How to disable legacy authentication in Microsoft Exchange to enable MFA

How to disable legacy authentication in Microsoft Exchange to enable MFA

Microsoft recommends enabling multi-factor authentication for Office 365. To do so, you must also disable basic or legacy authentication on Microsoft Exchange Server.

7 steps to ensure your Azure backup works when you need it

7 steps to ensure your Azure backup works when you need it

Worried about ransomware attacks? The best thing you can do now is make sure your backup system is ready.

How to avoid using RDP on Windows

How to avoid using RDP on Windows

Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it where possible. Here’s how.

How to check Privileged Identity management settings for Office 365

How to check Privileged Identity management settings for Office 365

Microsoft Azure Privileged Identity Management (PIM) allows you to set administrative rights for roles on an as-needed basis, reducing risk.

Know your Edge Chromium security options

Know your Edge Chromium security options

Microsoft's upcoming Chromium-based Edge browser will give Edge- and Chrome-like web security features to older versions of Microsoft Windows. Here's what you need to know.

How attackers identify your organization's weakest links

How attackers identify your organization's weakest links

Understanding the techniques and tools attackers use in targeted phishing attacks.

How to set up Microsoft Azure AD Identity Protection to spot risky users

How to set up Microsoft Azure AD Identity Protection to spot risky users

Whichever license of Azure Active Directory you own, you have options to set up alerts and automate actions to risky user behavior.

How to manage Microsoft's BitLocker encryption feature

How to manage Microsoft's BitLocker encryption feature

Enterprises with many Windows devices might struggle to know which have BitLocker enabled or where to find BitLocker recovery keys. These techniques can help.

How to set up Microsoft Cloud App Security

How to set up Microsoft Cloud App Security

Microsoft's Cloud App Security add-on will alert you to suspicious sign-in activity in Office 365, Azure and other cloud apps using standard templates or custom policies.

How to tell which Microsoft Office patching process to use

How to tell which Microsoft Office patching process to use

How you download and deploy Microsoft Office patches depends on the version and license type you have. Here's how to determine which process to use.

How to use the new Microsoft 365 Business Conditional Access feature

How to use the new Microsoft 365 Business Conditional Access feature

Microsoft 365 Conditional Access lets you automate conditional access controls for cloud applications. If you haven't enabled it yet, you should.

8 steps to make sure Microsoft Windows 10 1903 is ready for deployment

8 steps to make sure Microsoft Windows 10 1903 is ready for deployment

Follow these steps to identify problems that might crop up when you update to the Windows 10 1903 release.

How to disable basic authentication in Microsoft Office 365

How to disable basic authentication in Microsoft Office 365

If you've implemented multi-factor authentication, you should disable the default basic authentication to make sure attackers can't exploit it.

How to set up password policies in Azure AD Password Protection

How to set up password policies in Azure AD Password Protection

When was the last time you reviewed your password policy? It's probably time to update, and Microsoft Azure has a good tool to set up and manage that policy.

How to update your Spectre, Meltdown mitigations for the Retpoline mitigation

How to update your Spectre, Meltdown mitigations for the Retpoline mitigation

Intel recently released a new mitigation for Spectre and Meltdown and some of their variants. Called Retpoline, it might not be enabled with the Windows 10 1809 update. Here's how to find out and implement.

How to isolate a Windows 7 machine from your network

How to isolate a Windows 7 machine from your network

If you have a business reason to keep a Windows 7 system active past its 2020 end-of-life date, here's how to keep it from being a security liability on your network.

5 tips for better backups with Azure Backup Agent

5 tips for better backups with Azure Backup Agent

Both on-premises and cloud networks need backup solutions that allow you to recover from ransomware attacks quickly. One option is to use the Azure Backup Agent.

How to outwit attackers using two Windows registry settings

How to outwit attackers using two Windows registry settings

These Microsoft Windows registry settings will prevent attackers from scheduling tasks that will hide their activities or gain unauthorized access.

How to enable the Windows Potentially Unwanted Application (PUA) feature

How to enable the Windows Potentially Unwanted Application (PUA) feature

Turning on the PUA setting helps avoid users falling prey to malicious drive-by downloads.

How to prep legacy Windows systems for the switch to SHA-2

How to prep legacy Windows systems for the switch to SHA-2

Install these patches on Windows 7 and other legacy platforms now so you can continue to receive security updates.

Load More