Share via


Technet Spotlight On Demand Video - Rafal Lukawiecki – Active Security Common Practices Part 1

Starting with the concept of Defense-in-Depth we will look at all of the main aspects of the operational environment that require being secured using active technologies. We will look at the techniques and guidance available for securing applications, hosts and the network itself. Specifically, we will debate some of the challenges posed by in-house enterprise applications, as well as those provided by vendors such as Microsoft. While discussing the available security technologies, we will attempt to provide a fairly complete list of those that you should consider employing, including: Windows XP SP2, Patch Management and WU/SUS/SMS, ISA, Server Hardening Guides, IPSec, MOM, 802.1x/WPA, and Identity Integration. We will close this session with a brief discussion of the checklists of the 'Top 10' suggestions for securing the primary Microsoft server systems.

https://www.microsoft.com/emea/spotlight/sessionh.aspx?videoid=19