New Game: Take the cyber-safe Christmas quiz and win prizes Play Quiz
3 May, 2018 | Jeff Melnick

Differences Between Share and NTFS Permissions

NTFS and share permissions are both often used in Microsoft Windows environments. While share and NTFS permissions both serve the same purpose — preventing unauthorized access — there are important differences to understand before you determine how to best perform a task like sharing a folder....
26 December, 2017 | Russell Smith

Secure Privileged Access with ESAE Model

Ensuring that systems are patched and that defense-in-depth security protections are working effectively, top the list of concerns for IT departments. But despite these efforts, security breaches are still on the rise because operational issues are commonly ignored. Best practice dictates that...
18 August, 2017 | Oleg Lalaev

Top 5 Free Tools for NTFS Permissions Reporting

Managers and compliance auditors often ask IT admins to present a report listing file share permissions granted to a group or a particular user. Here are a few free tools that will help you save time on this report generation and export all permissions granted to a user account on a file share...
26 April, 2017 | Larry Glusman

RemoteApp: Remote Access Tool to Simplify a Sysadmin Life

What is RemoteApp? Are you using your Terminal Server/RDS Server for one main application? A database or ERP program, perhaps? If so, you are a prime candidate for RemoteApp, a remote access tool introduced by Microsoft for Server 2008 R2. However, many people who are using Terminal Server/RDS...
4 August, 2016 | Russell Smith

Tips to Improve Privileged Accounts Security

In this article, I’ll take a look at how Privileged Access Management (PAM) in Windows Server 2016 enables Just-In-Time (JIT) Administration, helping to secure privileged user accounts. It seems like a problem as old as computing itself, or, depending on your point of view, just a minor matter...
Show more articles