Thursday, February 24, 2011

Great Security Tool for Active Directory Admins Today Free!

I get ask all the time for tools or tricks that a administrator can use here a great one. AD Unlocker Pro.

You and administrator of a Active Directory Domain you don your due diligence and set a group policy that say after x tries lock user account , Now how do you audit and see what accounts are locked?

Here a very small utility that you can run that will show you what accounts are locked and Unlocking them with only one click.

This application also  can use alternate login (useful if your Active Directory Administrator account is not your default user account).



See the accounts


Choose what account to unlock


and you can ever have application running to show when account is locked


For those of you who read my blog daily here a great deal

TODAY 2/24/2011 you can download and get a free copy

by clicking Here (follow the directions)

Monday, February 21, 2011

Security Guide for Protecting Malware Incidents

Microsoft today announced a free planning guide to help with Malware.The Infrastructure Planning and Design Guide for Malware Response empowers readers to take action quickly in the event of a malware incident by matching the technology solution to the business need and aligning business and IT from the beginning. This guide discusses three primary recovery methods: cleaning the system, recovering system state, and rebuilding the system. Each method presents different risks and benefits to the organization. The guide also describes approaches to investigating outbreaks and cleaning infected systems. Read this guide to make an informed decision about how to return the systems to operation while limiting the likelihood of the malware infecting additional systems.

The guide empowers readers in the following ways:

  • Shortens the time required to recover from a malware outbreak by describing the decisions to be made.
  • Provides a cost-effective and straightforward solution by matching the most suitable technologies to the business needs.
  • Prompts decisions to be made in choosing one of three courses of action: clean, restore, or rebuild a system.

To learn more about Infrastructure Planning and Design Guide for Malware Response click  here. To download the guidance, click here.


Tuesday, February 8, 2011

Two Live Cyber Security Webinars

The first webinar, "Protecting Your Network with Authentication and Cryptography," is scheduled for 12 pm EST Wednesday, February 9, and will focus on password protocols, user verification, symmetric and asymmetric encryption, and using cryptography to protect data.

In the second cyber security webinar, " Securing Communications," scheduled for 12 pm EST Wednesday, February 23, attendees will learn how to put into practice the cyber security concepts covered in the first webinar. They will learn about using cryptography to secure services and wireless networks and about using rights management for protecting data.

"In this cyber security webinar series, we'll discuss using cryptography, authentication, and encryption from theory to practice," said Ferron. "Grasping these concepts will help you understand the basics of keeping your data secure."

Webinar: Protecting Your Network with Authentication and Cryptography
Live Presentation: Wednesday, February 9, 2011, 12:00-1:00 pm EST

Webinar: Securing Communications
Live Presentation: Wednesday, February 23, 2011, 12:00-1:00 pm EST

Register for "Protecting Your Network with Authentication and Cryptography" and " Securing Communications" on the Global Knowledge web site. Recorded versions of these cyber security webinars will be available approximately one week after the live sessions.