Help Desk Geek – How to Find Open and Blocked TCP/UDP Ports 3.4 3.4.7 Configuration Management
This link provides the definition of a network port and shows the reader how to find open and closed ports.
This link provides the definition of a network port and shows the reader how to find open and closed ports.
This blog reviews the ITIL change management process and covers various models and workflows that are part of this process.
This article summarizes the fundamental security components of a Windows Configuration Manager environment.
This article from Microsoft, describes how administrators can configure Windows 10 to prevent users from installing software.
This set of tools allows enterprise security administrators to download, analyze, test, edit and store Microsoft-recommended security configuration baselines for Windows and other Microsoft products, while comparing them against other security configurations.
The National Checklist Program (NCP), defined by the NIST SP 800-70, is the U.S. government repository of publicly available security checklists (or benchmarks) that provide detailed low level guidance on setting the security configuration of operating systems and applications.
This article helps identify key controls that should be considered when establishing a secure configuration.
This article from netwrix outlines the most vulnerable ports and critical security strategies for protecting against them.
This article discusses reasons for configuration drift and how to avoid it through proper configuration management and change control.
This NIST Special Publication covers general guidelines for ensuring that security considerations are integrated into the configuration management process.