1. Managing Event Logs on Multiple Servers

    Tools for managing Event logs on multiple Windows servers... Read More

  2. Port 445 and trust creation

    How port 445 is used in trust creation... Read More

  3. Pre-staging computer accounts

    How to ensure client computers are not left in an unmanaged state after joining a domain... Read More

  4. Preventing Group Policy Workarounds

    A smart user who has local Administrator or Power Users privileges on their desktop computer may be able to circumvent Group Policy... Read More

  5. Preventing Users From Circumventing Group Policy

    Given enough privileges, a user can often circumvent Group Policy restrictions. Here's what you can do about it... Read More

  6. Preventing users from Modifying Group Policy Settings

    How to prevent users from modifying Group Policy... Read More

  7. Pros and Cons of Disabling NTLMv1

    Is it a good idea to disable LM and NTLMv1 authentication on Windows networks and allow only NTLMv2 authentication?... Read More

  8. Protect Wireless Access Using MAC Address Filters

    Wireless networks add a significant level of convenience for many users. The ability to roam at will and access the network without adding wires is quite useful. But, you need to do so securely. There are a number of basic steps you should take to protect your wireless network and filtering MAC addresses is one more way to secure it... Read More

  9. Protect Your Security Logs

    Tip on how to protect your Security logs... Read More

  10. Renaming the Administrator Account

    When dealing with your administrator account, sometimes it is best to just rename it all together... Read More