Mark Burnett


Mark Burnett ( is an independent consultant specializing in Windows security. He is a Security MVP and the author of several books, including Perfect Passwords and Hacking the Code (Syngress). Visit Mark’s blog at

Use Guest Accounts to Fight Malware - 21 Nov 2005 13
Make Guest accounts a part of your least-privilege strategy, to reduce exposure to malware attacks through vulnerable applications such as Web browsers and email.
Update Management for SMBs - 20 Sep 2005
Despite access to WSUS and third-party patch management solutions, many small and midsized businesses haven't implemented an update management plan. Here's a ready-made plan that you can easily adopt.
Tips for Tightening User Account Security 2
User authentication is the foundation of the Windows security mechanism. Take these simple steps to tighten your user accounts.
Setting Up Network Access Quarantine Control 2
Find out how to use Windows 2003's Network Access Quarantine Control to prevent noncompliant systems from connecting to your network.
Tips for Securing IIS
Use these best practices to make your IIS servers more resistant to attack.
Packet Filtering and Windows
Learn the pros and cons of the various Windows packet-filtering options and how to decide which is best for your situation.
Advanced Patch Management
Arm yourself with the advanced techniques and resources needed to keep your crucial servers up-to-date.
Scripting IPSec Policies 1
Security improvements in Windows 2003 make IPSec an excellent firewall solution for standalone IIS servers.
Setting Up the Test Network
Here's a description of the test network I used to test the features and functionality of seven patch-management products.
Enterprise Patch Management for Windows 27
Compare solutions that help you find and deploy the correct security patches for your enterprise.
BlackHat Briefings Reflect Industry Changes
Guest columnist Mark Burnett discusses how offerings at the Las Vegas BlackHat Briefings in July reflect the changing security arena. New emphases include policy, law, and society, and IT security trends--including handling security vulnerabilities.
10 Steps to Secure FrontPage Server Extensions 2
A history of security vulnerabilities has plagued FrontPage Server Extensions, but with a little planning and effort, you can secure server extensions. Here's how.
NTFS Permissions for IIS Web Servers 1
Protect your Web server from attack by setting the proper NTFS permissions.
Slipstreaming Service Packs and Hotfixes
Need a way to install Win2K in an already-secured state so that you can safely connect it to a hostile network such as the Internet? The process of slipstreaming service packs and hotfixes can be tedious, but the payoffs are worth the effort.
Testing the Distribution
Need to test your new hotfix-enhanced Win2K distribution? Follow these steps.
Microsoft Stack Master Class

Master-Level Microsoft Stack Class with John Savill
Online Class: Thursdays Oct. 12th-Dec. 21st
30 Hours of Training for $995!

Understand the complete Microsoft solution stack, how the products work together, and how to implement and maintain for a total datacenter and desktop solution. This course covers the latest technology updates including Windows Server 2016 and Windows 10 and will enable the new capabilities to be leveraged in your organization.


Join the Conversation

Sponsored Introduction Continue on to (or wait seconds) ×