Randy Franklin Smith

Randy Franklin

Randy Franklin Smith is a contributing editor for Windows IT Pro and the creator of LOGbinder SP for SharePoint. He publishes UltimateWindowsSecurity.com, which focuses on securing Active Directory, SharePoint, and SQL Server. He’s CEO of Monterey Technology Group, a SSCP, a CISA, and a Security MVP.

Access Denied - 24 Jan 2008
Answers to your Windows security questions.
Using AccessChk to View Which Files and Folders a User Has Access To
Do you need to know which folders and files a user can access? Find out how to use AccessChk to generate a report that shows what data a given user can view.
Determining How Windows Handles Attachments and Downloaded Files
Is Windows blocking you from opening certain files downloaded from the Internet? Find out where you can configure the policies that let you open attachments and Internet files.
Preventing IE from Prompting for a Client Certificate
Is IE prompting your users to choose a client certificate, even if they have only one certificate to choose from? Here's how to stop IE from doing so.
Access Denied - 27 Dec 2007
Answers to your Windows security questions.
Four Workstation Security Risks You Should Address
Learn four easy ways to secure your workstations.
How UAC Secures Workstations 1
Although UAC does secure workstation OSs, it doesn't necessarily make the information stored on workstations more secure. Find out just how UAC protects workstations.
Identifying Which Child Objects Have Non-Inherited Permissions
A tool called AccessEnum can help you identify which child objects have permissions that might override the parent permissions.
Using MOICE to Avoid Office File Format Vulnerabilities
Find out how MOICE lets you more securely open Word, Excel, and PowerPoint files.
Access Denied - 21 Nov 2007
Answers to your Windows security questions.
The Event ID Showing the Audit Log Was Cleared in Vista
Are you unsure what the event ID for "The audit log was cleared" is in Vista? Find out the event ID and how to use it to discover how and when audit logs were cleared.
Evaluating How Secure Guest VMs Are on a Host System
Learn what factors play into how secure a guest VM is on a host system.
Determining if an SID Is a Deleted User or Group
If an SID is found in place of a user or group name in an ACL, the user or group might have been deleted.
The Essential Guide to Creating an Environment for Sustaining Compliance
Before the onslaught of today's security-related mandates most companies were already struggling to deal with their own internal mandates for security and control of their IT infrastructure. Faced with the multiple mandates and looming deadlines it's easy to take a reactive, point-in-time oriented approach.
Locking Down an Area of a Web Site
Secure part of your Web site by configuring IIS to require authentication for the folder that contains that area of the site.
Microsoft Stack Master Class

Master-Level Microsoft Stack Class with John Savill
Online Class: Thursdays Oct. 12th-Dec. 21st
30 Hours of Training for $995!

Understand the complete Microsoft solution stack, how the products work together, and how to implement and maintain for a total datacenter and desktop solution. This course covers the latest technology updates including Windows Server 2016 and Windows 10 and will enable the new capabilities to be leveraged in your organization.


Join the Conversation

Sponsored Introduction Continue on to (or wait seconds) ×