Title: Security Tip
![]() |
![]() |
![]() |
Issue Sponsored By:
> Introducing the new Windows Security Adviser newsletter
![]()
IN THIS ISSUE:
>
Windows security strategy
>
Best practices for patch management
>
Remind users to never patch from e-mail attachments
>
Ask the Expert: How do I know if security patches are complete?
![]() |
![]() |
| |
![]() |
|
![]() |
Introducing the new Windows Security Adviser newsletter
From the editor: Today's Security Tip is the last you will receive from SearchWin2000.com. Starting Tues. Aug. 17, this newsletter will become the Windows Security Adviser delivered by TechTarget's newest site, SearchWindowsSecurity.com, launching Aug. 12. The Windows Security Adviser will automatically be sent to you three days each week, Tuesday through Thursday, to arm you with critical Windows security news, tips and technical advice. Enjoy and thank you for being a loyal subscriber!
Update your preferences to include SearchWindowsSecurity.com and check out the new site next week.
|
| |
|
![]() |
![]() |
![Headlines]()
![]()
Windows security strategy
[Tom Lancaster]
Does your security strategy factor in attack vectors and how they change? Read this article to learn more about the most common attack vectors for Windows machines and how they threaten your system's security.
Best practices for patch management
[Vandana Sharma]
A good security strategy includes patch management solutions that cover both the operating system and applications. This article features seven best practices to help you plan your patch management strategy.
Remind users to never patch from e-mail attachments
[Tom Lancaster]
One of the most common attack vectors for Windows machines is e-mail worms. Read this article to learn about the dangers of e-mail attachments that claim to patch viruses or worms.
Ask the Expert: How do I know if security patches are complete?
[Roberta Bragg]
Dear Roberta, How can I report the status and check if security patches are completed on clients other than by using Add/Remove programs? I'm using SUS 1.0.
![]()
FEATURED TOPIC:
Group Policy 101
Is the vast world of Group Policies driving you crazy? You're not alone! This guide introduces you to how Group Policy works, explains best practices and pitfalls to avoid and provides troubleshooting help and advice.
BEST WEB LINKS:
Policy Management
These Best Web Links will help you create, implement and enforce an effective security policy.
WHITE PAPER:
Chapter 12: Performance tuning and monitoring
This chapter download from IIS 6 administration by Mitch Tulloch contains valuable techniques you can use to configure, maintain and manage content in IIS.
|
![]() |
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
|
![]() |
![]() |
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!
|
SearchWin2000: Active Directory Tip |
|
![]()
|
| Not a Member? We'll activate your membership with your subscription. |
|
![]() |
![]() |
![]() |
|
![]() |
|
![]() |
|