Randy Franklin Smith

Randy Franklin Smith is a contributing editor for Windows IT Pro and the creator of LOGbinder SP for SharePoint. He publishes UltimateWindowsSecurity.com, which focuses on securing Active Directory, SharePoint, and SQL Server. He’s CEO of Monterey Technology Group, a SSCP, a CISA, and a Security MVP.

Articles by Randy Franklin Smith
Security in Windows Environments: 4 Stories
This four-chapter Tech Advisor includes detailed information on various security challenges, from changing your security weakness into strengths; securing your desktops with Group Policy; comparisons of some of the top endpoint solutions on the market; best practices in security policy management, and more.
Replacing a Buggy Microsoft Security Update - 26 Sep 2008
Here's what you need to know about installing a rereleased security update.
Letting a User Log on from Only a Specific Computer - 27 Aug 2008 4
Here's how to make it so that a user can log on only from a specific computer.
Learning about Virtual Machine Security
Find out how to secure VMs of different organizations or untrusted users that are being hosted on the same host system.
Securing AD Service Accounts
Learn how to prevent users from using a service account to log on to the network.
Using BitLocker, TPM, and RODCs to Prevent the Exploitation of a DC
You can use Windows Server 2008’s BitLocker Drive Encryption, Trusted Platform Module, and Read-Only Domain Controller functionality to prevent the exploitation of physically insecure DCs.
Access Denied - 27 Mar 2008
Answers to your Windows security questions.
The Advantage of Using an RODC Rather Than a DC 3
Take a look at how Windows Server 2008’s RODC features can address the risks associated with placing a DC at a remote site.
The Risks Associated with Placing DCs at Remote Sites
Find out why it’s so dangerous to place a domain controller at a remote site instead of in a data center.
Strengthening Permissions on Hard Links - 10 Mar 2008

How important is the System objects: Strengthen default permissions of internal system objects (e.g., Symbolic Links) security option? Are there any drawbacks to enabling this setting?

Access Denied - 28 Feb 2008
Answers to your Windows security questions.
Removing a User or Group’s Permissions
Use Icacls to remove a user or group’s allow or deny permissions from a file server.
Preventing Users from Changing IE's Security Settings
Learn how to set the security level of IE’s Internet zone and prevent users from changing it.
Determining Whether Administrators Are Forcing Users to Change Their Passwords
Discover which event ID will log whether an administrator selected the "User must change password at next logon" check box.
Figuring Out Why Outside Parties Aren't Receiving a Remote User's Email Messages
Find out why SPF might be preventing people outside of your organization from receiving your telecommuter's email messages.
NEW: Microsoft Hyper-V Master Class with John Savill

A new Master Class with John Savill! Get 12 hours of detailed instruction covering all the key aspects of a Hyper-V based virtualization environment.

During this training attendees will learn how to:

-- Architect a Hyper-V based virtualization solution.
-- Migrate from physical and other virtualization environments.
-- Implement a private cloud solution.

Thursdays, April 17th through May 8th
 

Upcoming Training

Deploying Windows 7 and Windows 8.1 with System Center Configuration Manager 2012 R2

Wednesday, April 23rd @ 11am, 1pm, 3pm ET

In a single day you will learn to deploy Windows 7 and Windows 8.1 using System Center Configuration Manager 2012 R2 and MDT 2013. Johan Arwidmark guides you through the entire build process. You will learn about reference images, deployment of images, drivers injection, adding updates and applications and a great deal of real-world tips and tricks.

Enroll by April 29th and SAVE 15%
View All Online Training

IT/Dev Connections

Register now to get the best rates available!

Current Issue

April 2014 - The architectural components related to Hyper-V networking in System Center Virtual Machine Manager 2012 R2 can be confusing. Walk through all the VMM networking architectural components and how to use them.

CURRENT ISSUE / ARCHIVE / SUBSCRIBE

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×