Mark Burnett


Mark Burnett ( is an independent consultant specializing in Windows security. He is a Security MVP and the author of several books, including Perfect Passwords and Hacking the Code (Syngress). Visit Mark’s blog at

Use Guest Accounts to Fight Malware - 21 Nov 2005 13
Make Guest accounts a part of your least-privilege strategy, to reduce exposure to malware attacks through vulnerable applications such as Web browsers and email.
Update Management for SMBs - 20 Sep 2005
Despite access to WSUS and third-party patch management solutions, many small and midsized businesses haven't implemented an update management plan. Here's a ready-made plan that you can easily adopt.
Tips for Tightening User Account Security 2
User authentication is the foundation of the Windows security mechanism. Take these simple steps to tighten your user accounts.
Setting Up Network Access Quarantine Control 2
Find out how to use Windows 2003's Network Access Quarantine Control to prevent noncompliant systems from connecting to your network.
Tips for Securing IIS
Use these best practices to make your IIS servers more resistant to attack.
Packet Filtering and Windows
Learn the pros and cons of the various Windows packet-filtering options and how to decide which is best for your situation.
Advanced Patch Management
Arm yourself with the advanced techniques and resources needed to keep your crucial servers up-to-date.
Scripting IPSec Policies 1
Security improvements in Windows 2003 make IPSec an excellent firewall solution for standalone IIS servers.
Setting Up the Test Network
Here's a description of the test network I used to test the features and functionality of seven patch-management products.
Enterprise Patch Management for Windows 27
Compare solutions that help you find and deploy the correct security patches for your enterprise.
BlackHat Briefings Reflect Industry Changes
Guest columnist Mark Burnett discusses how offerings at the Las Vegas BlackHat Briefings in July reflect the changing security arena. New emphases include policy, law, and society, and IT security trends--including handling security vulnerabilities.
10 Steps to Secure FrontPage Server Extensions 2
A history of security vulnerabilities has plagued FrontPage Server Extensions, but with a little planning and effort, you can secure server extensions. Here's how.
NTFS Permissions for IIS Web Servers 1
Protect your Web server from attack by setting the proper NTFS permissions.
Slipstreaming Service Packs and Hotfixes
Need a way to install Win2K in an already-secured state so that you can safely connect it to a hostile network such as the Internet? The process of slipstreaming service packs and hotfixes can be tedious, but the payoffs are worth the effort.
Testing the Distribution
Need to test your new hotfix-enhanced Win2K distribution? Follow these steps.
Azure Master Class

Azure Master Class with John Savill
Live Online Training: Thursdays August 10th to August 31st
Register by August 3rd and Save 20%!

Every organization is currently evaluating how they can utilize the public cloud, what it means, and how to actually get started. This 12 session Master Class will equip you with everything you need to understand, evaluate, deploy and maintain environments that utilize Microsoft Azure including hybrid scenarios.


Join the Conversation

Sponsored Introduction Continue on to (or wait seconds) ×