Randy Franklin Smith

Randy Franklin
Smith

Randy Franklin Smith is a contributing editor for Windows IT Pro and the creator of LOGbinder SP for SharePoint. He publishes UltimateWindowsSecurity.com, which focuses on securing Active Directory, SharePoint, and SQL Server. He’s CEO of Monterey Technology Group, a SSCP, a CISA, and a Security MVP.

Articles
Access Denied - 24 Jan 2008
Answers to your Windows security questions.
Using AccessChk to View Which Files and Folders a User Has Access To
Do you need to know which folders and files a user can access? Find out how to use AccessChk to generate a report that shows what data a given user can view.
Determining How Windows Handles Attachments and Downloaded Files
Is Windows blocking you from opening certain files downloaded from the Internet? Find out where you can configure the policies that let you open attachments and Internet files.
Preventing IE from Prompting for a Client Certificate
Is IE prompting your users to choose a client certificate, even if they have only one certificate to choose from? Here's how to stop IE from doing so.
Access Denied - 27 Dec 2007
Answers to your Windows security questions.
Four Workstation Security Risks You Should Address
Learn four easy ways to secure your workstations.
How UAC Secures Workstations 1
Although UAC does secure workstation OSs, it doesn't necessarily make the information stored on workstations more secure. Find out just how UAC protects workstations.
Identifying Which Child Objects Have Non-Inherited Permissions
A tool called AccessEnum can help you identify which child objects have permissions that might override the parent permissions.
Using MOICE to Avoid Office File Format Vulnerabilities
Find out how MOICE lets you more securely open Word, Excel, and PowerPoint files.
Access Denied - 21 Nov 2007
Answers to your Windows security questions.
The Event ID Showing the Audit Log Was Cleared in Vista
Are you unsure what the event ID for "The audit log was cleared" is in Vista? Find out the event ID and how to use it to discover how and when audit logs were cleared.
Evaluating How Secure Guest VMs Are on a Host System
Learn what factors play into how secure a guest VM is on a host system.
Determining if an SID Is a Deleted User or Group
If an SID is found in place of a user or group name in an ACL, the user or group might have been deleted.
The Essential Guide to Creating an Environment for Sustaining Compliance
Before the onslaught of today's security-related mandates most companies were already struggling to deal with their own internal mandates for security and control of their IT infrastructure. Faced with the multiple mandates and looming deadlines it's easy to take a reactive, point-in-time oriented approach.
Locking Down an Area of a Web Site
Secure part of your Web site by configuring IIS to require authentication for the folder that contains that area of the site.
Master-Level Microsoft Stack Training with John Savill

Get 30 hours of comprehensive training covering the complete Microsoft solution stack. Invest a few hours each week and become the #1 Microsoft expert in your organization.

Past Sessions Available for Instant Access!
Semester 2: January 22nd to February 19th
Access to Recordings through May 20, 2015

John Savill will cover topics including:

* Deploying, Managing, and Maintaining Windows
* Key Features of Active Directory from Windows 2000 to Windows Server 2012
* Key elements of System Center 2012 and System Center 2012 R2
* Deploying, Migrating to and Managing Hyper-V in Your Organization
* Implementing a Private Cloud
* Using PowerShell to Automate Common Tasks
* PLUS a preview of Windows 10

 

Windows Forums

The Windows IT Pro forums are moving to myITforum.com! Get answers to questions, share tips, and engage with the IT professional community.

Sponsored Introduction Continue on to (or wait seconds) ×