How-Tos

Skull-and-crossbones, code and the 'stop' gesture: hand held forward, palm out, fingers pointing up

youtube thumbnails template 021020
video

How to use Attack Surface Reduction Rules in Windows 10

These new rules, part of Windows Defender, can help prevent damage from phishing and other attacks.

resume template job application recruit stack of paper by zhazhin sergey getty

Tech Resume Library: 21 downloadable templates for IT pros

A well-crafted resume will attract recruiters, HR pros and hiring managers, but getting it just right is a daunting task. To jump start the process, Insider Pro has assembled this collection of real resumes revamped by professional...

youtube thumbnails template 021020
video

7 dumb ways to be a ransomware victim, and how to avoid the embarrassment

Ransomware perpetrators count on Windows security admins to make these common mistakes. Here’s how to find and fix them.

whitelisting computer security security oversight admin lockout control by metamorworks getty images

How to take better control of applications running on your network

Unneeded or forgotten software on your Windows network could be a gateway for attackers into your system. Follow this advice to identify and restrict problem programs.

youtube thumbnails template 021020
video

How to limit which applications can run on your Windows network

Windows 10 S Mode allows you to whitelist approved applications and block unauthorized applications from running on your network.

youtube thumbnails template 021020
video

New Windows vulnerabilities underscore importance of network segmentation

The risk from two newly discovered Windows vulnerabilities could be mitigated if you’ve properly segmented your network. Here’s what you need to know.

cssg 079 thumb
video

Windows 10 security: Are you on the right version?

With some versions of Windows 10 off support or going off support soon, it’s time to review what security features you’re missing if you haven’t updated recently. Follow along here with the full Microsoft Ignite presentation,...

cssg 078 thumb
video

The four pillars of Windows network security

Multi-factor authentication, strong patch management, device control, and adherence to security benchmarks go a long way to protecting your Windows network.

cssg 077 thumb
video

What you need to know about Microsoft Azure Security Benchmarks 2.0

Microsoft has provided new guidance in the form of benchmarks to make sure your Azure environment is secure.

youtube thumbnails template 021020
video

How to securely prepare for Adobe Flash end of life on Windows 10

Microsoft will soon discontinue support for Adobe Flash. Here’s how to transition to secure alternatives while blocking unsafe use of Flash.

A broken link in a digital chaing / weakness / vulnerability

Microsoft's Zerologon vulnerability fix: What admins need to know

Microsoft patched its Netlogon Remote Protocol to prevent Zerologon exploits, but a second update is coming in February. Here's what you need to do now to prepare.

youtube thumbnails template 021020
video

How to patch the Zerologon vulnerability in Windows Netlogon Remote Protocol

The Zerologon flaw could give attackers domain admin privileges. Here’s how the two-step patching process to fix it works.

youtube thumbnails template 021020
video

Tips to prep Windows networks for proper incident forensics

If a security incident occurs on your Windows network, are you prepared to do a thorough investigation? These tips and tools will help.

youtube thumbnails template 021020
video

How to set up email security rules in Microsoft Office 365

Microsoft has rolled out new security settings for Office 365, but the default configuration for email might not be right for your organization.

youtube thumbnails template 021020
video

Top vulnerabilities used in attacks on Windows networks in 2020

COVID has changed tactics that attackers use to compromise Windows networks. These are the vulnerabilities they now favor.

A user reviews data and statistical models. [analytics / analysis / tracking / monitoring / logging]

How to optimize Windows event logging to better investigate attacks

The default event logging in Windows 10 won't give you enough information to properly conduct intrusion forensics. These settings and tools will help you collect the needed log data.

youtube thumbnails template 021020
video

How to tweak Windows logs to better investigate attacks

Default Windows event log settings won’t give you all the information you need to investigate security incidents. Here’s how to get the info you need.

Printer / printing  >  network / deployment / connectivity / security.

How to secure vulnerable printers on a Windows network

Attackers look for unsecured printers as a point of access. Find them before they do. Here's how.

Load More