Microsoft released a patch on November 11 to address a vulnerability in SChannel that could allow remote code..
In October 2013, I wrote about How to Connect to a Windows 8.1 or Server 2012 R2 Remote..
Just about every company has a security policy that contains a statement that goes like this, "Every computer..
In part one of this three-part series, I showed you how to import security .inf files to a..
Windows Server 2012 is quite secure out-of-the-box, balancing usability and compatibility against security. For organizations that need to..
Applying and Rolling Back Policies and Advanced Features The first article in this two-part series, "Using the Windows..
As recent headlines attest, security is a hot topic on the minds of many IT managers these days...
The Security Configuration Wizard (SCW) first appeared in Windows Server 2003 Service Pack 1. It helps organizations reduce..
Enabled by default, Windows Firewall blocks unsolicited incoming sessions. In this Ask the Admin, we examine how to..
The Petri IT Knowledgebase is hiring! We're looking to add two more contract writers to our content team:..
Security has always been an overwhelming field for IT administrators. It’s something that can never really be defined..
I’ve always liked to write a summary of what I thought the big takeaways were from every RSA..
I’ve been attending the RSA security conference for years, and I always look forward to meeting security vendors..
Names like "Cisco" and "Checkpoint" dominate edge network security in large enterprises and clouds. Dell SonicWALL has become..
At the recent RSA Conference 2014 in San Francisco I had the opportunity for an in-person interview with..