BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Filter:

Posts Tagged ‘windows’

session-viewer-pbw

Tech Tip: PowerBroker for Windows 6.0 Sneak Peek

Posted May 16, 2013    Peter Beauregard

Have you ever wanted to see what activities someone has performed inside one of your line-of-business apps for troubleshooting purposes? Maybe you just want to monitor what activities a network administrator performed on your Exchange Server to track down a configuration change. Well, we’ve got an exciting new feature in the upcoming release of PowerBroker…

Tags:
, , , , ,
retinacs-img9

Creating a Gold Image SCAP Template for Windows

Posted March 21, 2013    Bill Tillson

One of the challenges of Benchmark Configuration management is creating or modifying SCAP OVAL content to match your business policies and requirements. The following procedure is recommended to create custom Windows benchmarks for the Retina Network Security Scanner and Retina CS via local system policy, Local GPO, and Microsoft Security and Compliance Manager. For starters,…

Tags:
, , , ,
bt-bb-acq

Media Coverage Roundup | BeyondTrust Acquires Blackbird Group

Posted December 12, 2012    Sarah Lieber

Today we announced the acquisition of Blackbird Group, a leader in Windows system management. With this addition, BeyondTrust furthers our vision to simplify IT security operations management, while providing customers much-needed context to improve decision-making to protect against both internal and external security threats. We’re happy to welcome the Blackbird Group! Read the official announcement now….

Tags:
, , , , , , , ,
bestknownsecret-2

PowerBroker for Windows, Best Known Secrets – Collections

Posted October 1, 2012    Morey Haber

One of the best-known secrets about PowerBroker for Windows is the ability to logically group rules into Collections. This Best Practice allows you to organize rules based on almost any criteria and treat multiple rules as a single entity. This feature is most useful when: Rules require the same item-level targeting Organizing rules into physical…

Tags:
, , , , ,
IE-0day

Mmm, Smells Like 0day

Posted September 17, 2012    BeyondTrust Research Team

Just when you thought we were out of the woods, Internet Explorer 0day shows up, in the wild. Here’s what you need to know about the vulnerability: Internet Explorer 6, 7, 8, and 9 are vulnerable (UPDATE: Out-of-band patch available now!) Use-after-free when the CMshtmlEd object is deleted and then the same area in memory…

Tags:
, , , , , ,