Liens Sécurité AD / Security AD links

Links URLs
10lois immuables de l’Administration de la sécurité10 Immutable Laws of Security Administration https://technet.microsoft.com/library/cc722488.aspxhttps://technet.microsoft.com/library/cc722488.aspx
MicrosoftSecurity Compliance ManagerMicrosoft Security Compliance Manager https://technet.microsoft.com/library/cc677002.aspxhttps://technet.microsoft.com/library/cc677002.aspx
Gartner Symposium ITXPOGartner Symposium ITXPO http://www.gartner.com/technology/symposium/orlando/http://www.gartner.com/technology/symposium/orlando/
La divulgation 2012enquêtes rapport (DBIR)2012 Data Breach Investigations Report (DBIR) http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdfhttp://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf
Dix immuables de sécurité (Version2.0)Ten Immutable Laws of Security (Version 2.0) https://technet.microsoft.com/security/hh278941.aspxhttps://technet.microsoft.com/security/hh278941.aspx
À l’aide de l’analyse heuristiqueUsing Heuristic Scanning https://technet.microsoft.com/library/bb418939.aspxhttps://technet.microsoft.com/library/bb418939.aspx
Lecteur de téléchargementDrive-by download https://www.microsoft.com/security/sir/glossary/drive-by-download-sites.aspxhttps://www.microsoft.com/security/sir/glossary/drive-by-download-sites.aspx
Article du Support Microsoft2526083Microsoft Support article 2526083 https://support.microsoft.com/kb/2526083https://support.microsoft.com/kb/2526083
Article du Support Microsoft814777Microsoft Support article 814777 https://support.microsoft.com/kb/814777https://support.microsoft.com/kb/814777
Ouvrez le projet de sécurité des applications Web (OWASP avoir)Open Web Application Security Project (OWASP) https://www.owasp.org/index.php/Main_Pagehttps://www.owasp.org/index.php/Main_Page
MicrosoftSecurity Development LifecycleMicrosoft Security Development Lifecycle https://www.microsoft.com/security/sdl/default.aspxhttps://www.microsoft.com/security/sdl/default.aspx
Atténuation des attaques Pass-the-Hash (PtH) et autres Techniques de vol d’informations d’identificationMitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques Attaques https://download.microsoft.com/download/7/7/A/77ABC5BD-8320-41AF-863C-6ECFB10CB4B9/Mitigating Pass-the-Hash (PtH) et autres vols d’informations d’identification Techniques_English.pdfhttps://download.microsoft.com/download/7/7/A/77ABC5BD-8320-41AF-863C-6ECFB10CB4B9/Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques_English.pdf
Adversaires identifiés et les attaques cibléesDetermined Adversaries and Targeted Attacks https://www.microsoft.com/download/details.aspx?id=34793https://www.microsoft.com/download/details.aspx?id=34793
Solution de gestion de mot de passe du compte administrateur intégré via un GPOSolution for management of built-in Administrator account’s password via GPO https://code.msdn.microsoft.com/windowsdesktop/Solution-for-management-of-ae44e789https://code.msdn.microsoft.com/windowsdesktop/Solution-for-management-of-ae44e789
Article du Support Microsoft817433Microsoft Support article 817433 https://support.microsoft.com/?id=817433https://support.microsoft.com/?id=817433
Article du Support Microsoft973840Microsoft Support article 973840 https://support.microsoft.com/kb/973840https://support.microsoft.com/kb/973840
Compte administrateur est désactivé par défautAdministrator account is disabled by default https://technet.microsoft.com/library/cc753450.aspxhttps://technet.microsoft.com/library/cc753450.aspx
Guide de planification de la sécurité des comptes administrateurThe Administrator Accounts Security Planning Guide https://technet.microsoft.com/library/cc162797.aspxhttps://technet.microsoft.com/library/cc162797.aspx
Kit de ressources de sécurité MicrosoftWindowsMicrosoft Windows Security Resource Kit https://www.microsoft.com/learning/en/us/book.aspx?ID=6815&locale=en-ushttps://www.microsoft.com/learning/en/us/book.aspx?ID=6815&locale=en-us
L’Assurance du mécanisme d’authentification pour ADDS dans Windows Server2008R2 Step-by-Step GuideAuthentication Mechanism Assurance for AD DS in Windows Server 2008 R2 Step-by-Step Guide https://technet.microsoft.com/en-us/library/dd378897(WS.10).aspxhttps://technet.microsoft.com/en-us/library/dd378897(WS.10).aspx
WindowsServerUpdateServicesWindows Server Update Services https://technet.microsoft.com/windowsserver/bb332157https://technet.microsoft.com/windowsserver/bb332157
Bureaux virtuels personnelsPersonal Virtual Desktops https://technet.microsoft.com/library/dd759174.aspxhttps://technet.microsoft.com/library/dd759174.aspx
Read-Only Guide de déploiement et de planification de contrôleur de domaineRead-Only Domain Controller Planning and Deployment Guide https://technet.microsoft.com/library/cc771744(WS.10).aspxhttps://technet.microsoft.com/library/cc771744(WS.10).aspx
Exécution de contrôleurs de domaine dans Hyper-VRunning Domain Controllers in Hyper-V https://technet.microsoft.com/library/dd363553(v=ws.10).aspxhttps://technet.microsoft.com/library/dd363553(v=ws.10).aspx
Guide de sécurité Hyper-VHyper-V Security Guide https://www.microsoft.com/download/details.aspx?id=16650https://www.microsoft.com/download/details.aspx?id=16650
Demander à l’équipe de Services d’annuaireAsk the Directory Services Team http://blogs.technet.com/b/askds/archive/2011/09/12/managing-rid-pool-depletion.aspxhttp://blogs.technet.com/b/askds/archive/2011/09/12/managing-rid-pool-depletion.aspx
Comment configurer un pare-feu pour les domaines et approbationsHow to configure a firewall for domains and trusts https://support.microsoft.com/kb/179442https://support.microsoft.com/kb/179442
Rapport de violation de données de Verizon20092009 Verizon Data Breach Report http://www.verizonbusiness.com/resources/security/reports/2009_databreach_rp.pdfhttp://www.verizonbusiness.com/resources/security/reports/2009_databreach_rp.pdf
Rapport de divulgation de données Verizon20122012 Verizon Data Breach report http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdfhttp://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf
Présentation des modifications d’audit dans Windows2008Introducing Auditing Changes in Windows 2008 http://blogs.technet.com/b/askds/archive/2007/10/19/introducing-auditing-changes-in-windows-2008.aspxhttp://blogs.technet.com/b/askds/archive/2007/10/19/introducing-auditing-changes-in-windows-2008.aspx
Refroidir l’audit des astuces dans Vista et 2008Cool Auditing Tricks in Vista and 2008 http://blogs.technet.com/b/askds/archive/2007/11/16/cool-auditing-tricks-in-vista-and-2008.aspxhttp://blogs.technet.com/b/askds/archive/2007/11/16/cool-auditing-tricks-in-vista-and-2008.aspx
Audit d’accès objet global est magiqueGlobal Object Access Auditing is Magic http://blogs.technet.com/b/askds/archive/2011/03/10/global-object-access-auditing-is-magic.aspxhttp://blogs.technet.com/b/askds/archive/2011/03/10/global-object-access-auditing-is-magic.aspx
Emplacement centralisé pour l’audit dans Windows Server2008 et WindowsVistaOne-Stop Shop for Auditing in Windows Server 2008 and Windows Vista http://blogs.technet.com/b/askds/archive/2008/03/27/one-stop-shop-for-auditing-in-windows-server-2008-and-windows-vista.aspxhttp://blogs.technet.com/b/askds/archive/2008/03/27/one-stop-shop-for-auditing-in-windows-server-2008-and-windows-vista.aspx
ADDS audit Step-by-Step GuideAD DS Auditing Step-by-Step Guide https://technet.microsoft.com/library/a9c25483-89e2-4202-881c-ea8e02b4b2a5.aspxhttps://technet.microsoft.com/library/a9c25483-89e2-4202-881c-ea8e02b4b2a5.aspx
Mise en route de la stratégie d’Audit en vigueur dans Windows7 et 2008R2Getting the Effective Audit Policy in Windows 7 and 2008 R2 http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdfhttp://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf
Exemple de scriptSample script http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdfhttp://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf
Type d’Option d’auditAudit Option Type http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdfhttp://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf
Fonctions avancées de sécurité d’audit dans Windows7 et Windows Server2008R2Advanced Security Auditing in Windows 7 and Windows Server 2008 R2 https://social.technet.microsoft.com/wiki/contents/articles/advanced-security-auditing-in-windows-7-and-windows-server-2008-r2.aspxhttps://social.technet.microsoft.com/wiki/contents/articles/advanced-security-auditing-in-windows-7-and-windows-server-2008-r2.aspx
L’audit et conformité dans Windows Server2008Auditing and Compliance in Windows Server 2008 https://technet.microsoft.com/magazine/2008.03.auditing.aspxhttps://technet.microsoft.com/magazine/2008.03.auditing.aspx
Comment utiliser la stratégie de groupe pour configurer les paramètres pour les ordinateurs basés sur Windows Server2008 et WindowsVista dans un domaine Windows Server2008, dans un domaine Windows Server2003 ou dans un domaine Windows2000 Server d’audit de sécurité détaillésHow to use Group Policy to configure detailed security auditing settings for Windows Vista-based and Windows Server 2008-based computers in a Windows Server 2008 domain, in a Windows Server 2003 domain, or in a Windows 2000 Server domain https://support.microsoft.com/kb/921469https://support.microsoft.com/kb/921469
Stratégie d’Audit de sécurité avancée Step-by-Step GuideAdvanced Security Audit Policy Step-by-Step Guide https://technet.microsoft.com/library/dd408940(WS.10).aspxhttps://technet.microsoft.com/library/dd408940(WS.10).aspx
Guide des menaces et contre-mesuresThreats and Countermeasures Guide https://technet.microsoft.com/library/hh125921(v=ws.10).aspxhttps://technet.microsoft.com/library/hh125921(v=ws.10).aspx
MaxTokenSize et l’encombrement du jeton KerberosMaxTokenSize and Kerberos Token Bloat http://blogs.technet.com/b/shanecothran/archive/2010/07/16/maxtokensize-and-kerberos-token-bloat.aspxhttp://blogs.technet.com/b/shanecothran/archive/2010/07/16/maxtokensize-and-kerberos-token-bloat.aspx
Assurance du mécanisme d’authentificationAuthentication Mechanism Assurance https://technet.microsoft.com/library/dd391847(v=WS.10).aspxhttps://technet.microsoft.com/library/dd391847(v=WS.10).aspx
MicrosoftData Classification ToolkitMicrosoft Data Classification Toolkit https://technet.microsoft.com/library/hh204743.aspxhttps://technet.microsoft.com/library/hh204743.aspx
Contrôle d’accès dynamiqueDynamic Access Control http://blogs.technet.com/b/windowsserver/archive/2012/05/22/introduction-to-windows-server-2012-dynamic-access-control.aspxhttp://blogs.technet.com/b/windowsserver/archive/2012/05/22/introduction-to-windows-server-2012-dynamic-access-control.aspx
Logiciel absoluAbsolute Software http://www.absolute.com/en/landing/Google/absolute-software-google/computrace-and-absolute-manage?gclid=CPPh5P6v3rMCFQtxQgodFEQAnAhttp://www.absolute.com/en/landing/Google/absolute-software-google/computrace-and-absolute-manage?gclid=CPPh5P6v3rMCFQtxQgodFEQAnA
Gérer les absolueAbsolute Manage http://www.absolute.com/landing/Google/absolute-manage-google/it-asset-management-softwarehttp://www.absolute.com/landing/Google/absolute-manage-google/it-asset-management-software
Gérer les absolue MDMAbsolute Manage MDM http://www.absolute.com/landing/Google/MDM-google/mobile-device-managementhttp://www.absolute.com/landing/Google/MDM-google/mobile-device-management
SolarWindsSolarWinds http://www.solarwinds.com/eminentware-products.aspxhttp://www.solarwinds.com/eminentware-products.aspx
Pack d’Extension EminentWare WSUSEminentWare WSUS Extension Pack http://solarwinds-marketing.s3.amazonaws.com/solarwinds/Datasheets/EminentWare-WSUS-Extension-Pack-005-Datasheet2.pdfhttp://solarwinds-marketing.s3.amazonaws.com/solarwinds/Datasheets/EminentWare-WSUS-Extension-Pack-005-Datasheet2.pdf
Pack d’Extension EminentWare SystemCenter ConfigurationManagerEminentWare System Center Configuration Manager Extension Pack http://solarwinds-marketing.s3.amazonaws.com/solarwinds/Datasheets/EminentWare-Extension-Pack-for-CM-Datasheet-006-Revised.pdfhttp://solarwinds-marketing.s3.amazonaws.com/solarwinds/Datasheets/EminentWare-Extension-Pack-for-CM-Datasheet-006-Revised.pdf
Logiciel GFIGFI Software http://www.gfi.com/?adv=952&loc=58&gclid=CLq9y5603rMCFal7QgodMFkAyAhttp://www.gfi.com/?adv=952&loc=58&gclid=CLq9y5603rMCFal7QgodMFkAyA
GFI LanGuardGFI LanGuard http://www.gfi.com/network-security-vulnerability-scanner/?adv=952&loc=60&gclid=CP2t-7i03rMCFQuCQgodNkAA7ghttp://www.gfi.com/network-security-vulnerability-scanner/?adv=952&loc=60&gclid=CP2t-7i03rMCFQuCQgodNkAA7g
SecuniaSecunia http://secunia.com/http://secunia.com/
Outil inspecteur de logiciels d’entreprise Secunia (CSI)Secunia Corporate Software Inspector (CSI) http://secunia.com/products/corporate/csi/http://secunia.com/products/corporate/csi/
Une vulnérabilité Intelligence ManagerVulnerability Intelligence Manager http://secunia.com/vulnerability_intelligence/http://secunia.com/vulnerability_intelligence/
eEye Digital SecurityeEye Digital Security http://www.wideeyesecurity.com/?gclid=CK6b0sm13rMCFad_QgodhScAiwhttp://www.wideeyesecurity.com/?gclid=CK6b0sm13rMCFad_QgodhScAiw
Gestion de la rétine CSRetina CS Management http://www.wideeyesecurity.com/products.asphttp://www.wideeyesecurity.com/products.asp
LumensionLumension http://www.lumension.com/?rpLeadSourceId=5009&gclid=CKuai_e13rMCFal7QgodMFkAyAhttp://www.lumension.com/?rpLeadSourceId=5009&gclid=CKuai_e13rMCFal7QgodMFkAyA
Gestion des vulnérabilités LumensionLumension Vulnerability Management http://www.lumension.com/Solutions/Vulnerability-Management.aspxhttp://www.lumension.com/Solutions/Vulnerability-Management.aspx
Guide des menaces et contre-mesures: droits d’utilisateurThreats and Countermeasures Guide: User Rights https://technet.microsoft.com/library/hh125917(v=ws.10).aspxhttps://technet.microsoft.com/library/hh125917(v=ws.10).aspx
Menaces et vulnérabilitésThreats and Vulnerabilities Mitigation https://technet.microsoft.com/library/cc755181(v=ws.10).aspxhttps://technet.microsoft.com/library/cc755181(v=ws.10).aspx
Droits d’utilisateurUser Rights https://technet.microsoft.com/library/dd349804(v=WS.10).aspxhttps://technet.microsoft.com/library/dd349804(v=WS.10).aspx
Gestionnaire d’accès aux informations d’identification en tant qu’appelant approuvéAccess Credential Manager as a trusted caller https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_2https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_2
Accéder à cet ordinateur à partir du réseauAccess this computer from the network https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_1https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_1
Agir en tant que partie du système d’exploitationAct as part of the operating system https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_3https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_3
Ajouter des stations de travail au domaineAdd workstations to domain https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_4https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_4
Ajuster les quotas de mémoire pour un processusAdjust memory quotas for a process https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_5https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_5
AutoriserAllow log on locally https://technet.microsoft.com/en-us/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_6https://technet.microsoft.com/en-us/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_6
Permettre le par le biais des Services Terminal ServerAllow log on through Terminal Services https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_7https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_7
Sauvegarder des fichiers et répertoiresBack up files and directories https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_8https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_8
Contourner la vérification de parcoursBypass traverse checking https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_9https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_9
Modifier l’heure systèmeChange the system time https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_10https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_10
Modifier le fuseau horaireChange the time zone https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_11https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_11
Créer un fichier d’échangeCreate a pagefile https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_12https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_12
Créer un objet-jetonCreate a token object https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_13https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_13
Créer des objets globauxCreate global objects https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_14https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_14
Créer des objets partagés permanentsCreate permanent shared objects https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_15https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_15
Créer des liens symboliquesCreate symbolic links https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_16https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_16
Déboguer les programmesDebug programs https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_17https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_17
Refuser l’accès à cet ordinateur à partir du réseauDeny access to this computer from the network https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_18https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_18
Refuse la connexion en tant que tâcheDeny log on as a batch job https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_18ahttps://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_18a
Refuse la connexion en tant que serviceDeny log on as a service https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_19https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_19
Refuse la connexion localeDeny log on locally https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_20https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_20
Refuse la connexion par le biais des Services Terminal ServerDeny log on through Terminal Services https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_21https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_21
Permettre aux comptes d’utilisateur et d’ordinateur à être approuvé pour délégationEnable computer and user accounts to be trusted for delegation https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_22https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_22
Forcer l’arrêt à partir d’un système distantForce shutdown from a remote system https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_23https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_23
Générer des audits de sécuritéGenerate security audits https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_24https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_24
Emprunter l’identité d’un client après l’authentificationImpersonate a client after authentication https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_25https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_25
Augmenter une plage de travail de processusIncrease a process working set https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_26https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_26
Augmenter la priorité de planificationIncrease scheduling priority https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_27https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_27
Charger et décharger des pilotes de périphériqueLoad and unload device drivers https://technet.microsoft.com/en-us/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_28https://technet.microsoft.com/en-us/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_28
Verrouillage des pages en mémoireLock pages in memory https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_29https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_29
Ouvrez une session en tant que tâcheLog on as a batch job https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_30https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_30
Ouvrez une session en tant que serviceLog on as a service https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_31https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_31
Gérer le journal d’audit et de sécuritéManage auditing and security log https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_32https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_32
Modifier un nom d’objetModify an object label https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_33https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_33
Modifier les valeurs d’environnement du microprogrammeModify firmware environment values https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_34https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_34
Effectuer les tâches de maintenance de volumePerform volume maintenance tasks https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_35https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_35
Processus unique du profilProfile single process https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_36https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_36
Optimiser les performances systèmeProfile system performance https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_37https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_37
Supprimer un ordinateur à partir de la station d’accueilRemove computer from docking station https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_38https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_38
Remplacer un jeton de niveau processusReplace a process level token https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_39https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_39
Restaurer des fichiers et répertoiresRestore files and directories https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_40https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_40
Arrêter le systèmeShut down the system https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_41https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_41
Synchroniser les données de service d’annuaireSynchronize directory service data https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_42https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_42
Prendre possession de fichiers ou d’autres objetsTake ownership of files or other objects https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_43https://technet.microsoft.com/library/db585464-a2be-41b1-b781-e9845182f4b6(v=ws.10)#BKMK_43
Contrôle d’accèsAccess Control https://msdn.microsoft.com/library/aa374860(v=VS.85).aspxhttps://msdn.microsoft.com/library/aa374860(v=VS.85).aspx
Article du Support Microsoft251343Microsoft Support article 251343 https://support.microsoft.com/kb/251343https://support.microsoft.com/kb/251343
Opérations de modification rootDSErootDSE Modify Operations https://msdn.microsoft.com/library/cc223297.aspxhttps://msdn.microsoft.com/library/cc223297.aspx
Sauvegarde et récupération Step-by-Step GuideAD DS Backup and Recovery Step-by-Step Guide https://technet.microsoft.com/library/cc771290(v=ws.10).aspxhttps://technet.microsoft.com/library/cc771290(v=ws.10).aspx
Configurations de Windows pour Kerberos prises en charge le Type de chiffrementWindows Configurations for Kerberos Supported Encryption Type http://blogs.msdn.com/b/openspecification/archive/2011/05/31/windows-configurations-for-kerberos-supported-encryption-type.aspxhttp://blogs.msdn.com/b/openspecification/archive/2011/05/31/windows-configurations-for-kerberos-supported-encryption-type.aspx
Processus et Interactions UACUAC Processes and Interactions https://technet.microsoft.com/library/dd835561(v=WS.10).aspx#1https://technet.microsoft.com/library/dd835561(v=WS.10).aspx#1
EmpowerIDEmpowerID http://www.empowerid.com/products/authorizationserviceshttp://www.empowerid.com/products/authorizationservices
Contrôle d’accès basé sur un rôle (RBAC)Role-based access control (RBAC) http://pic.dhe.ibm.com/infocenter/aix/v7r1/index.jsp?topic=%2Fcom.ibm.aix.security%2Fdoc%2Fsecurity%2Fdomain_rbac.htmhttp://pic.dhe.ibm.com/infocenter/aix/v7r1/index.jsp?topic=%2Fcom.ibm.aix.security%2Fdoc%2Fsecurity%2Fdomain_rbac.htm
Le modèle de RBACThe RBAC model http://docs.oracle.com/cd/E19082-01/819-3321/6n5i4b7ap/index.htmlhttp://docs.oracle.com/cd/E19082-01/819-3321/6n5i4b7ap/index.html
Contrôle d’accès centrée sur ActiveDirectoryActive Directory-centric access control http://www.centrify.com/solutions/it-security-access-control.asphttp://www.centrify.com/solutions/it-security-access-control.asp
Cyber-Ark de Privileged Identity Management (PIM) SuiteCyber-Ark’s Privileged Identity Management (PIM) Suite http://www.cyber-ark.com/digital-vault-products/pim-suite/index.asphttp://www.cyber-ark.com/digital-vault-products/pim-suite/index.asp
QuêteQuest One http://www.quest.com/landing/?id=7370&gclid=CJnNgNyr3rMCFYp_QgodXFwA3whttp://www.quest.com/landing/?id=7370&gclid=CJnNgNyr3rMCFYp_QgodXFwA3w
Enterprise Manager mot de passe aléatoire (ERPM)Enterprise Random Password Manager (ERPM) http://www.liebsoft.com/Random_Password_Manager/http://www.liebsoft.com/Random_Password_Manager/
Gestionnaire des utilisateurs privilégiés NetIQNetIQ Privileged User Manager https://www.netiq.com/products/privileged-user-manager/https://www.netiq.com/products/privileged-user-manager/
Autorité de certification IdentityMinder?CA IdentityMinder? http://awards.scmagazine.com/ca-technologies-ca-identity-managerhttp://awards.scmagazine.com/ca-technologies-ca-identity-manager
Description des événements de sécurité dans WindowsVista et Windows Server2008Description of security events in Windows Vista and in Windows Server 2008 https://support.microsoft.com/kb/947226https://support.microsoft.com/kb/947226
Description des événements de sécurité dans Windows7 et Windows Server2008R2Description of security events in Windows 7 and in Windows Server 2008 R2 https://support.microsoft.com/kb/977519https://support.microsoft.com/kb/977519
Événements d’Audit de sécurité pour Windows7Security Audit Events for Windows 7 https://www.microsoft.com/download/details.aspx?id=21561https://www.microsoft.com/download/details.aspx?id=21561
Windows Server2008R2 et Windows8 et les détails des événements de sécurité Windows Server2012Windows Server 2008 R2 and Windows 8 and Windows Server 2012 Security Event Details https://www.microsoft.com/download/details.aspx?id=35753https://www.microsoft.com/download/details.aspx?id=35753
Émergents cybermenaces Géorgie Tech rapport 2013Georgia Tech’s Emerging Cyber Threats for 2013 report http://www.gtsecuritysummit.com/report.htmlhttp://www.gtsecuritysummit.com/report.html
MicrosoftSecurity Intelligence ReportMicrosoft Security Intelligence Report https://www.microsoft.com/security/sir/default.aspxhttps://www.microsoft.com/security/sir/default.aspx
Gouvernement australien défense signale les stratégies d’atténuation 35 supérieur ActiveAustralian Government Defense Signals Directory Top 35 Mitigation Strategies http://www.dsd.gov.au/infosec/top35mitigationstrategies.htmhttp://www.dsd.gov.au/infosec/top35mitigationstrategies.htm
Avantages de sécurité de l’informatique en nuageCloud Computing Security Benefits https://www.microsoft.com/news/Press/2012/May12/05-14SMBSecuritySurveyPR.aspxhttps://www.microsoft.com/news/Press/2012/May12/05-14SMBSecuritySurveyPR.aspx
Appliquer le principe des moindres privilèges aux comptes d’utilisateurs sur WindowsApplying the Principle of Least Privilege to User Accounts on Windows https://www.microsoft.com/download/details.aspx?id=4868https://www.microsoft.com/download/details.aspx?id=4868
Guide de planification de la sécurité des comptes administrateurThe Administrator Accounts Security Planning Guide https://www.microsoft.com/download/details.aspx?id=19406https://www.microsoft.com/download/details.aspx?id=19406
Best Practice Guide pour la sécurisation des Installations d’ActiveDirectory pour Windows Server2003Best Practice Guide for Securing Active Directory Installations for Windows Server 2003 https://www.microsoft.com/download/details.aspx?id=16755https://www.microsoft.com/download/details.aspx?id=16755
Meilleures pratiques pour la délégation de l’Administration d’ActiveDirectory pour Windows Server2003Best Practices for Delegating Active Directory Administration for Windows Server 2003 https://www.microsoft.com/en-us/download/details.aspx?id=21678https://www.microsoft.com/en-us/download/details.aspx?id=21678
Politique de Support MicrosoftMicrosoft Support Lifecycle https://support.microsoft.com/common/international.aspx?RDPATH=%2flifecycle%2fdefault.aspxhttps://support.microsoft.com/common/international.aspx?RDPATH=%2flifecycle%2fdefault.aspx
Spécifications techniques ActiveDirectoryActive Directory Technical Specification https://msdn.microsoft.com/library/cc223122(v=prot.20).aspxhttps://msdn.microsoft.com/library/cc223122(v=prot.20).aspx
Message d’erreur lorsque les utilisateurs non-administrateurs qui ont été délégué contrôle essaient de joindre des ordinateurs à un Windows Server2003 ou un contrôleur de domaine Windows Server2008: «Accès refusé»Error message when nonadministrator users who have been delegated control try to join computers to a Windows Server 2003-based or a Windows Server 2008-based domain controller: « Access is denied » https://support.microsoft.com/kb/932455https://support.microsoft.com/kb/932455
L’Assurance du mécanisme d’authentification pour ADDS dans Windows Server2008R2 Step-by-Step GuideAuthentication Mechanism Assurance for AD DS in Windows Server 2008 R2 Step-by-Step Guide https://technet.microsoft.com/library/dd378897(WS.10).aspxhttps://technet.microsoft.com/library/dd378897(WS.10).aspx
Validation KDC stricteStrict KDC Validation https://www.microsoft.com/download/details.aspx?id=6382https://www.microsoft.com/download/details.aspx?id=6382

One thought on “Liens Sécurité AD / Security AD links”

Laisser un commentaire