Randy Franklin Smith

Randy Franklin Smith is a contributing editor for Windows IT Pro and the creator of LOGbinder SP for SharePoint. He publishes UltimateWindowsSecurity.com, which focuses on securing Active Directory, SharePoint, and SQL Server. He’s CEO of Monterey Technology Group, a SSCP, a CISA, and a Security MVP.

Articles by Randy Franklin Smith
Access Denied - 24 Jan 2008
Answers to your Windows security questions.
Using AccessChk to View Which Files and Folders a User Has Access To
Do you need to know which folders and files a user can access? Find out how to use AccessChk to generate a report that shows what data a given user can view.
Determining How Windows Handles Attachments and Downloaded Files
Is Windows blocking you from opening certain files downloaded from the Internet? Find out where you can configure the policies that let you open attachments and Internet files.
Preventing IE from Prompting for a Client Certificate
Is IE prompting your users to choose a client certificate, even if they have only one certificate to choose from? Here's how to stop IE from doing so.
Access Denied - 27 Dec 2007
Answers to your Windows security questions.
Four Workstation Security Risks You Should Address
Learn four easy ways to secure your workstations.
How UAC Secures Workstations 1
Although UAC does secure workstation OSs, it doesn't necessarily make the information stored on workstations more secure. Find out just how UAC protects workstations.
Identifying Which Child Objects Have Non-Inherited Permissions
A tool called AccessEnum can help you identify which child objects have permissions that might override the parent permissions.
Using MOICE to Avoid Office File Format Vulnerabilities
Find out how MOICE lets you more securely open Word, Excel, and PowerPoint files.
Access Denied - 21 Nov 2007
Answers to your Windows security questions.
The Event ID Showing the Audit Log Was Cleared in Vista
Are you unsure what the event ID for "The audit log was cleared" is in Vista? Find out the event ID and how to use it to discover how and when audit logs were cleared.
Evaluating How Secure Guest VMs Are on a Host System
Learn what factors play into how secure a guest VM is on a host system.
Determining if an SID Is a Deleted User or Group
If an SID is found in place of a user or group name in an ACL, the user or group might have been deleted.
The Essential Guide to Creating an Environment for Sustaining Compliance
Before the onslaught of today's security-related mandates most companies were already struggling to deal with their own internal mandates for security and control of their IT infrastructure. Faced with the multiple mandates and looming deadlines it's easy to take a reactive, point-in-time oriented approach.
Locking Down an Area of a Web Site
Secure part of your Web site by configuring IIS to require authentication for the folder that contains that area of the site.
NEW: Microsoft Hyper-V Master Class with John Savill

A new Master Class with John Savill! Get 12 hours of detailed instruction covering all the key aspects of a Hyper-V based virtualization environment.

During this training attendees will learn how to:

-- Architect a Hyper-V based virtualization solution.
-- Migrate from physical and other virtualization environments.
-- Implement a private cloud solution.

Thursdays, April 17th through May 8th
 

Upcoming Training

Deploying Windows 7 and Windows 8.1 with System Center Configuration Manager 2012 R2

Tuesday, May 6th @ 11am, 1pm, 3pm ET

In a single day you will learn to deploy Windows 7 and Windows 8.1 using System Center Configuration Manager 2012 R2 and MDT 2013. Johan Arwidmark guides you through the entire build process. You will learn about reference images, deployment of images, drivers injection, adding updates and applications and a great deal of real-world tips and tricks.

Enroll by April 29th and SAVE 15%
View All Online Training

IT/Dev Connections

Register now to get the best rates available!

Current Issue

April 2014 - The architectural components related to Hyper-V networking in System Center Virtual Machine Manager 2012 R2 can be confusing. Walk through all the VMM networking architectural components and how to use them.

CURRENT ISSUE / ARCHIVE / SUBSCRIBE

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×