OS Security

21K

Solutions

55

Articles & Videos

23K

Contributors

Operating system security (OS security) is the process of ensuring OS integrity, confidentiality and availability. OS security refers to specified steps or measures used to protect the OS from threats, viruses, worms, malware or remote hacker intrusions. OS security encompasses all preventive-control techniques, which safeguard any computer assets capable of being stolen, edited or deleted if OS security is compromised, including authentication, passwords and threats to systems and programs.

Related Topics

  1. Windows Server 2003
  2. Security
  3. Active Directory
  4. Windows XP
  5. Anti-Virus Apps
  6. Vulnerabilities
  7. Windows Server 2008
  8. Microsoft Server OS
  9. Microsoft Legacy OS
  10. Windows OS
Refine results

I have a customer in the hospitality (hotel) industry that offers its guests access to 3 computers as an amenity/part of guests' stay at the hotel.  I currently have the "Guest" accounts enabled which…

425 views
Guide to Performance: Optimization & Monitoring
Guide to Performance: Optimization & Monitoring

Nowadays, monitoring is a mixture of tools, systems, and codes—making it a very complex process. And with this complexity, comes variables for failure. Get DZone’s new Guide to Performance to learn how to proactively find these variables and solve them before a disruption occurs.

Hi All,

Can anyone here please let me know what's the security best practice for the SYSVOL folder in my domain controller ?
I've got about multiple (~12) Domain Controller/GlobalCatalog which is …

1453 views

Hello Everyone, I am working with a bank that has monthly security scans, and one of the really big issues is SMB Signing.
"cifs-smb-signing-disabled
This system does not allow SMB signing. SMB …

531 views

Let's say there's malware running on the Mac in OS 10.9. This malware launches whenever the computer is booted and/or connected to the Internet. Will upgrading the operating system to 10.11 have any …

427 views

I'm trying to do the following Unix equiv in Windows :

*Probe for active domain/website (usually HTTP CODE 200 OK, something even as
  HTTP CODE 301 Redirects)
for url in $(cat list1.txt) ; do …

259 views

Hey,

we've removed the local admins from our users computers and for some reason they are still able to run exe files...
any ideas?

413 views

I have been asked to help set up a small classroom of ten computers.

The client wants most things disabled, pretty much they only want to allow internet access, notepad, and a few other programs.

944 views

People,

I’d like to know what’s your suggestion and comments regarding implementing SCCM and SCOM 2016 in the existing multi-site Data Centre environment for my environment below?

1042 views

https://www.experts-exchange.com/questions/29013908/Verifying-if-VA-scan's-vulnerabilities-are-false-positives.html

Refer to above earlier post: we can't install MBSA yet & our VA scanner still …

449 views

A user claimed his phone is compromised by showing attached screen:
is it an IOC & is there any freeware scan that can be run to determine so?

If it's not an IOC, what is this screen (the area …

535 views
Three Reasons Why Backup is Strategic
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Hi

Please provide me where I can find more information about behavior-based and anomalies detection for McAfee Endpoint Security 10.

Many thanks in advance.

227 views

Hi

Please provide me where I can find more information about behavior-based and anomalies detection for Trend Micro Office Scan 11.0.

Many thanks in advance.

232 views

Hi

Please provide me where I can find more information about behavior-based and anomalies detection for Symantec Endpoint Protection 14.0.

Many thanks in advance.

223 views

Hi
 
Please provide me where I can find more information about behavior-based and anomalies detection for Microsoft System Center Endpoint Protection 4.10.
 
Many thanks in advance.

341 views

Hello

I deployed windows 7 x64 image and while checking foe updates I am getting 80072efd. I tried deleting the keys in windows update registry and run again, It did not work.
Any suggestions?

2053 views

We are currently using Darik's boot and nuke which works on some pc's but not others. Mainly it can not find the hard drive. We would like an open source formatting program that we could boot to and …

330 views

I'm trying to clear up a mess left by a colleague not applying permissions correctly.

I need to take ownership of a folder structure in order to correct the permissions, however I am running into …

884 views

Hello Experts,

I am running into a weird situation where a service account it was compromised according to analysis. The service account is set to never expires, and starts a service in a Windows …

289 views

Any concise links/sites & books that can quick start the staff on Windows sysinternals
for forensics?  Thanks

552 views
Enterprise Mobility and BYOD For Dummies
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

We hv a top email filtering tool but some emails with ransomware (esp scripts that download
ransomwares & malwares) still get through.  Looking at 30k-125k such malicious emails being
blocked …

154 views

There has been patches that were missed & lapses in patching timely for non-Windows
platforms.   I noticed, Wintel was quite up to the mark on patching & I reckon this is
due patch management …

1178 views

I have numerous (200+) Event Errors

Event ID 4625, my filter shows 1,170
Event ID 4634, my filter shows 254,489

The listed events are steadily growing...

My server info
Windows Server …

972 views

What is the best way to protect an office (1-server ,7 computers)

from getting hit with rensome and other malware?

a device (firewall) that scans all incoming packets?

I'm looking for an …

976 views

We have a customer who is on a local ISP's email & when they clicked on a "spoofed"
email, their inbox got erased.

This customer is not using our MTA (MS Exchange) : they simply tag onto their …

357 views

Hello everyone,

We have a situation where we want to grant some user (non-admins) the ability to start\stop services on their machines. They are in workgroup setup.

If we use sdset to grant them…

948 views
Show more content
201506-LO-Top-001

OS Security

21K

Solutions

55

Articles & Videos

23K

Contributors

Operating system security (OS security) is the process of ensuring OS integrity, confidentiality and availability. OS security refers to specified steps or measures used to protect the OS from threats, viruses, worms, malware or remote hacker intrusions. OS security encompasses all preventive-control techniques, which safeguard any computer assets capable of being stolen, edited or deleted if OS security is compromised, including authentication, passwords and threats to systems and programs.

Related Topics

  1. Windows Server 2003
  2. Security
  3. Active Directory
  4. Windows XP
  5. Anti-Virus Apps
  6. Vulnerabilities