Windows Security

Windows Security | News, how-tos, features, reviews, and videos

A vault door security mechanism with abstract circuits. / increase security / harden against attacks

Windows 11 PC devices

Windows 11 hardware requirements will drive security update decisions

Windows 11 is Microsoft's most security-oriented OS ever, but will your network-connected computers support it? Here's how to tell.

Windows 11 PC devices

Windows 11's best security features

Windows 11 uses some of the best security features of Windows 10. The big difference is that many are now required.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

PrintNightmare vulnerability explained: Exploits, patches, and workarounds

Public exploits are available for a remote code execution vulnerability in the Windows Print Spooler that could allow attackers to take full control of systems. The vulnerability affects all editions of Windows and organizations are...

Windows security and protection [Windows logo/locks]

How to check for Active Directory Certificate Services misconfigurations

Recently discovered Microsoft Windows AD CS configuration errors could give attackers account and domain control. Here's how to audit AD CS for vulnerable configurations.

access control / authentication / privileges / security / key

How to test the impact of new Windows DCOM Server authentication

Microsoft has hardened authentication for its DCOM Server in response to a vulnerability. Check for the impact on your network now before the change becomes permanent.

login credential - user name, password - administrative controls - access control - single sign-on

4 tips to prevent easy attacker access to Windows networks

The Colonial Pipeline attackers likely got in using old, compromised VPN credentials. This advice will force attackers to work much harder.

youtube thumbnails template 021020
video

Eliminate compromised and weak passwords

A single compromised password allowed attackers access to Colonial Pipeline’s network. Chaos ensued. This advice will help you avoid that fate.

Cybersecurity awareness  >  A man with a binary blindfold finds his way through question marks.

Report: Active Directory Certificate Services a big security blindspot on enterprise networks

Microsoft's Active Directory PKI component commonly have configuration mistakes that allow attackers to gain account and domain-level privileges.

A hook is cast at laptop email with fishing lures amid abstract data.
Tip

4 steps to prevent spear phishing

Your users are in the crosshairs of the best attackers out there. Follow these steps to better protect them.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

6 minimum security practices to implement before working on best practices

Every Windows network admin can improve their security posture by focusing on these six basic areas.

cubes - blocks - squares - containers - storage - repository

Siloscape malware escapes Windows containers to backdoor Kubernetes clusters

This newly discovered malware is the first to take advantage of an obscure Windows container escape technique to seek out and infect Kubernetes clusters.

youtube thumbnails template 021020
video

Minimum vs. best Windows network security practices

Before you worry about implementing the “best” security practices, make sure you’re doing these minimum practices.

secure system / network security policy management

How to prepare for the demise of Windows NT LAN Manager

NTLM is a less secure protocol for authenticating Windows network access. Follow these steps to begin migration off it or to limit its use.

youtube thumbnails template 021020
video

How securing the cloud differs from security on-premises servers

Keep these key points regarding cloud vs. on-premises security as you move to the cloud.

youtube thumbnails template 021020
video

How to investigate a Windows network breach

These are the most important actions to take once your Windows network is breached.

Ransomware  >  A masked criminal ransoms data for payment.

How malicious Office files and abused Windows privileges enable ransomware

Ransomware groups most often gain entry to Windows networks through malicious Office documents and then move laterally by abusing Windows privileges. Here's how to defend against both.

A firmware message appears on a circuit board.

3 ways to prevent firmware attacks without replacing systems

Use these Microsoft Windows and Office features to mitigate the risk from firmware attacks. They are faster and cheaper than replacing computers.

vulnerable breach cyberattack hacker

Most common cyberattack techniques on Windows networks for 2020

Recent research breaks down the preferred techniques attackers use to gain access to Windows networks. Use this information to monitor your logs for these methods.

Load More