Windows

Windows | News, how-tos, features, reviews, and videos

Windows security and protection [Windows logo/locks]
deadline clock time speed analog clock by ryan mcguire gratisography

Microsoft Windows update arrows / progress bars

How to prepare for the Microsoft Windows 10 1903 security feature update

Microsoft is changing the way it does Windows 10 feature updates, and that will affect how you schedule update deferrals. Here's what you need to know.

clock on the processor of a circuilt board

How to time-sync Windows systems

Incorrect time on a Windows device or server can prevent security updates or user authentication, and it can interfere with a forensics investigation.

tt19 013 thumbnail
video

What's new in Windows 10 version 1903? | TECH(talk)

With the next version of Windows 10 set to appear this spring, it’s a good time to take a look at what’s new and what’s changed in version 1903. (Not much, actually.) But that’s a good thing, according to Computerworld contributing...

security audit - risk assessment - network analysis

How to audit Windows Task Scheduler for cyber-attack activity

Two recently discovered Windows zero-day attacks underscore the importance of monitoring for unauthorized tasks.

cssg 015 enable auditing
video

How to audit Windows Task Scheduler to detect attacks

Learn how to prevent attackers from using Task Scheduler to hide and set up tasks to access Windows systems.

Microsoft Windows update arrows on laptop and mobile phone

Windows security updates that require new registry keys

Don't assume automated Windows security updates are complete. You might need to add registry keys manually. Here are a few to check now.

11 event logging

How to install PowerShell 5 on Windows 7

Have older Windows systems on your network? You can give them PowerShell 5's event logging capabilities even if they run Windows 7.

05 malware

How to identify, prevent and remove rootkits in Windows 10

Rootkits are among the most difficult malware to detect and remove. Now, new variations are targeting Windows 10 systems. Use this advice to protect yourself from them.

cssg 014 thumbnail
video

Updating Spectre, Meltdown and Foreshadow mitigations

Use these Windows registry key changes and fixes to protect your systems from known side channel vulnerabilities.

managed security service providers

How to prevent and recover from an APT attack through a managed service provider

Threat actors are compromising their targeted victims through managed service providers (MSPs). These are the steps to take to minimize your exposure and to recover from these attacks if necessary.

Windows security and protection [Windows logo/locks]

How to harden Windows 10 workstations and servers: Disable SMB v1

Early versions of Server Message Block are still present on many Windows networks and devices, leaving them open to attack. Here's how to detect and disable them.

cssg 013 thumbnail
video

How to harden Windows workstations and servers from attack

Use these basic settings to make it harder for attackers to Windows hardware.

spear fishing

How to defend Office 365 from spear-phishing attacks

A recent successful zero-day Flash attack began with a spear-phishing email. These Windows 10 and Office 365 settings could have prevented it.

thumb
video

How to defend Office 365 from spear-phishing attacks

Configure Office 365 to detect email-delivered malware.

Microsoft Office logo within an environment of abstract binary code with shield and lock.

Center for Internet Security releases Microsoft 365 benchmarks

Follow the guidance in this CIS document to configure Microsoft 365 security settings to the level that suits your organization.

thumb
video

How to set up security in Office 365 to CIS recommendations

Following the Center for Internet Security’s benchmarks and checklists, here’s how to configure Microsoft Office 365 for the security level you need.

security audit - risk assessment - network analysis

How to enable audit logs in Microsoft Office 365

Audit logging of Office 365 mail reads makes forensics investigations of attacks much easier. Here's how to make sure it's enabled.

thumbnail
video

How to enable and configure Office 365 logging and auditing

Make sure Microsoft Office 365 logging and auditing is set up properly so forensic data is available when needed.

Load More
You Might Also Like