Jan De Clercq

De Clercq

Jan De Clercq is a member of HP’s Technology Consulting IT Assurance Portfolio team. He focuses on cloud security, identity and access management, architecture for Microsoft-rooted IT infrastructures, and the security of Microsoft products. He's the author of Windows Server 2003 Security Infrastructures (Digital Press) and coauthor of Microsoft Windows Security Fundamentals (Digital Press) and Cloud Computing Protected: Security Assessment Handbook (Recursive Press).

Windows Gatekeeper Q&As
Discovering the Details About a Domain's Password Policy
Using a command-line tool, authenticated domain users can learn the details about the policy that governs their passwords.
Windows Gatekeeper Q&As
Controlling the PowerShell Execution Policy Settings in a Domain
Using a Group Policy Object, you can centrally control the PowerShell execution policy settings on the Windows machines in a domain.
Windows Gatekeeper Q&As
Getting and Setting the PowerShell Execution Policy on a Local Computer
With some simple Windows PowerShell commands, you can find out the current PowerShell execution policy that's set on a local computer and change it if necessary.
Windows Gatekeeper Q&As
Use Execution Policies to Control What PowerShell Scripts Can Be Run
With PowerShell's four execution policies and five levels of scope, you can control which PowerShell scripts can be run on Windows boxes and who can run those scripts.
Capture All Certification Authority Configuration Changes in Windows Event Logs
Different tools can be used to change the Certification Authority configuration. Here's how to make sure the changes are logged, no matter which tool is being used.
An Easy Way to Determine the Authentication Methods Used by Websites
The free Kerberos Authentication Tester displays the authentication method used by a website as well as its authorization header.
Fault-Tolerance Options for Windows DHCP Servers
DHCP servers support three fault-tolerance options: installing DHCP on a Windows failover cluster, setting up a split-scope DHCP, and setting up DHCP failover.
Optimize Windows Event Forwarding
There are several ways to limit the processing and communication strain that event forwarding puts on the Windows source computers and event collectors.
Configure Windows Event Collectors with a GPO Setting
You can use a Group Policy Object (GPO) setting to configure event collectors for your Windows clients.
Internet Explorer Trust Indicators
Learn about the trust indicators that Internet Explorer uses.
Protect Windows IIS FTP Servers
Use the FTP Logon Attempt Restrictions feature to protect your Windows IIS FTP servers.
Event ID 5145 Logs Access Attempts
You can use the Detailed File Share audit subcategory to determine which file a user accessed on a file share.
Windows File Share Access
Determine which users are accessing Windows file shares.
Windows 8 Remote Attestation Service 1
Secure Windows 8 through a remote attestation service.
Microsoft Rights Management for Individuals
Learn about Microsoft's new RMS offering.
Master-Level Microsoft Stack Training with John Savill

Get 30 hours of comprehensive training covering the complete Microsoft solution stack. Invest a few hours each week and become the #1 Microsoft expert in your organization.

Past Sessions Available for Instant Access! Access to Recordings through May 20, 2015

Semester 1: October 30th to December 4th
Semester 2: January 22nd to February 19th

John Savill will cover topics including:

* Deploying, Managing, and Maintaining Windows
* Key Features of Active Directory from Windows 2000 to Windows Server 2012
* Key elements of System Center 2012 and System Center 2012 R2
* Deploying, Migrating to and Managing Hyper-V in Your Organization
* Implementing a Private Cloud
* Using PowerShell to Automate Common Tasks
* PLUS a preview of Windows 10


Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×