Randy Franklin Smith

Randy Franklin

Randy Franklin Smith is a contributing editor for Windows IT Pro and the creator of LOGbinder SP for SharePoint. He publishes UltimateWindowsSecurity.com, which focuses on securing Active Directory, SharePoint, and SQL Server. He’s CEO of Monterey Technology Group, a SSCP, a CISA, and a Security MVP.

Access Denied - 24 Jan 2008
Answers to your Windows security questions.
Using AccessChk to View Which Files and Folders a User Has Access To
Do you need to know which folders and files a user can access? Find out how to use AccessChk to generate a report that shows what data a given user can view.
Determining How Windows Handles Attachments and Downloaded Files
Is Windows blocking you from opening certain files downloaded from the Internet? Find out where you can configure the policies that let you open attachments and Internet files.
Preventing IE from Prompting for a Client Certificate
Is IE prompting your users to choose a client certificate, even if they have only one certificate to choose from? Here's how to stop IE from doing so.
Access Denied - 27 Dec 2007
Answers to your Windows security questions.
Four Workstation Security Risks You Should Address
Learn four easy ways to secure your workstations.
How UAC Secures Workstations 1
Although UAC does secure workstation OSs, it doesn't necessarily make the information stored on workstations more secure. Find out just how UAC protects workstations.
Identifying Which Child Objects Have Non-Inherited Permissions
A tool called AccessEnum can help you identify which child objects have permissions that might override the parent permissions.
Using MOICE to Avoid Office File Format Vulnerabilities
Find out how MOICE lets you more securely open Word, Excel, and PowerPoint files.
Access Denied - 21 Nov 2007
Answers to your Windows security questions.
The Event ID Showing the Audit Log Was Cleared in Vista
Are you unsure what the event ID for "The audit log was cleared" is in Vista? Find out the event ID and how to use it to discover how and when audit logs were cleared.
Evaluating How Secure Guest VMs Are on a Host System
Learn what factors play into how secure a guest VM is on a host system.
Determining if an SID Is a Deleted User or Group
If an SID is found in place of a user or group name in an ACL, the user or group might have been deleted.
The Essential Guide to Creating an Environment for Sustaining Compliance
Before the onslaught of today's security-related mandates most companies were already struggling to deal with their own internal mandates for security and control of their IT infrastructure. Faced with the multiple mandates and looming deadlines it's easy to take a reactive, point-in-time oriented approach.
Locking Down an Area of a Web Site
Secure part of your Web site by configuring IIS to require authentication for the folder that contains that area of the site.
John Savill's Microsoft Stack Master Class

Join John Savill for the ALL NEW Microsoft Stack Master Class!

Get 30 hours of detailed instruction covering the complete Microsoft solution stack. Invest a few hours each week and become THE Microsoft expert in your organization.

Thursdays, October 8th to December 17th

John will cover topics including:

* Key Features of Active Directory for every version of Server OS, including Windows Server 2012 R2 and Windows Server 2016
* Key elements of Microsoft System Center 2012 and System Center 2012 R2 PLUS major changes in the 2016 wave
* Deploying, Migrating to, and Managing Hyper-V in Your Organization
* Implementing a Private Cloud
* Using PowerShell to Automate Common tasks
* Key Windows 10 changes including the new Start menu, Cortana, Microsoft Edge, and more
* And much more!


Enroll by October 1st and SAVE $245!



Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×