Randy Franklin Smith

Randy Franklin

Randy Franklin Smith is a contributing editor for Windows IT Pro and the creator of LOGbinder SP for SharePoint. He publishes UltimateWindowsSecurity.com, which focuses on securing Active Directory, SharePoint, and SQL Server. He’s CEO of Monterey Technology Group, a SSCP, a CISA, and a Security MVP.

Security in Windows Environments: 4 Stories
This four-chapter Tech Advisor includes detailed information on various security challenges, from changing your security weakness into strengths; securing your desktops with Group Policy; comparisons of some of the top endpoint solutions on the market; best practices in security policy management, and more.
Replacing a Buggy Microsoft Security Update - 26 Sep 2008
Here's what you need to know about installing a rereleased security update.
Letting a User Log on from Only a Specific Computer - 27 Aug 2008 4
Here's how to make it so that a user can log on only from a specific computer.
Learning about Virtual Machine Security
Find out how to secure VMs of different organizations or untrusted users that are being hosted on the same host system.
Securing AD Service Accounts
Learn how to prevent users from using a service account to log on to the network.
Using BitLocker, TPM, and RODCs to Prevent the Exploitation of a DC
You can use Windows Server 2008’s BitLocker Drive Encryption, Trusted Platform Module, and Read-Only Domain Controller functionality to prevent the exploitation of physically insecure DCs.
Access Denied - 27 Mar 2008
Answers to your Windows security questions.
The Advantage of Using an RODC Rather Than a DC 3
Take a look at how Windows Server 2008’s RODC features can address the risks associated with placing a DC at a remote site.
The Risks Associated with Placing DCs at Remote Sites
Find out why it’s so dangerous to place a domain controller at a remote site instead of in a data center.
Strengthening Permissions on Hard Links - 10 Mar 2008

How important is the System objects: Strengthen default permissions of internal system objects (e.g., Symbolic Links) security option? Are there any drawbacks to enabling this setting?

Access Denied - 28 Feb 2008
Answers to your Windows security questions.
Removing a User or Group’s Permissions
Use Icacls to remove a user or group’s allow or deny permissions from a file server.
Preventing Users from Changing IE's Security Settings
Learn how to set the security level of IE’s Internet zone and prevent users from changing it.
Determining Whether Administrators Are Forcing Users to Change Their Passwords
Discover which event ID will log whether an administrator selected the "User must change password at next logon" check box.
Figuring Out Why Outside Parties Aren't Receiving a Remote User's Email Messages
Find out why SPF might be preventing people outside of your organization from receiving your telecommuter's email messages.
John Savill's PowerShell Master Class

Join John Savill for the ALL NEW PowerShell Master Class!

In this master-level training course, you get 9 hours of technical training that will make you a PowerShell Master!

Thursdays, February 11th through 25th

By the end of the course, you will understanding how to create custom modules to achieve amazing results in your environment, in non-Microsoft environments and in Azure.

Topics covered will include:

* PowerShell Fundamentals
* Remote Management
* Connecting Commands and Mastering Objects
* Scripting and Custom Modules
* State Configuration
* PowerShell Workflows, Orchestrator SMA, and Azure Automation
* And much more!


Join the Conversation

Get answers to questions, share tips, and engage with the IT professional community at myITforum. Are you a data center professional? Join AFCOM for the best data center insights.

Sponsored Introduction Continue on to (or wait seconds) ×