• | Architecture and Design
Find design guidelines for more secure applications, as well as guidance on authentication and authorization, threat modeling, and more. |
• | Assessment
Read about resources that can help you assess the security of your systems, such as the Microsoft Baseline Security Analyzer (MBSA). |
• | Auditing and Monitoring
Learn how auditing and monitoring your systems can help you thwart attacks before they happen, or, if an attack does occur, contain damage and recover quickly. |
• | Compliance and Policies
Learn more about methodologies that can help you identify, analyze, and prioritize potential security and compliance issues. |
• | Desktop Security
Find information on how to better protect your company's desktops against external and internal threats. |
• | Developing Secure Applications
Get detailed information and guidance on the various strategies you can use to enhance the security of your applications. |
| | | | • | Disaster Recovery
Find general and product-specific information on how to prepare for network outages and disasters, and how to respond quickly to minimize disruption or damage. |
• | Identity and Access Management
Learn how an effective identity and access management strategy not only strengthens security, but can also help your company achieve greater productivity, drive down costs, and improve business integration while simplifying and streamlining the user experience. |
• | Network Security
Find resources on a broad spectrum of network security guidance, from designing a perimeter firewall to increasing the security of a wireless network. |
• | Patch Management
Get tools to help you manage updates and simplify the task of keeping systems current, and find guidance that will help you assess your environment and implement an effective software update management strategy. |
• | Server Security
Find information and resources that can help you increase the security of your server systems. |
• | Threats and Countermeasures
Learn about security threats that can menace your company's networks and systems, settings you can configure to help mitigate specific risks, and impacts and functionality trade-offs you should consider. |
|