Freshworks – ITIL Change Management Process 3.4 3.4.3 3.4.4 3.4.5 Configuration Management
This site provides various resources for the change management process based on ITIL. It also allows for a free ITSM trial.
This site provides various resources for the change management process based on ITIL. It also allows for a free ITSM trial.
This link provides a list of ports, protocols, and/or services that Georgetown University blocks in support of their least functionality guideline.
This link provides the definition of a network port and shows the reader how to find open and closed ports.
This blog reviews the ITIL change management process and covers various models and workflows that are part of this process.
This article from Microsoft, describes how administrators can configure Windows 10 to prevent users from installing software.
This blog covers the Microsoft Security Compliance toolkit as a tool to audit security baselines. This toolkit is set of tools produced by Microsoft so organizations can apply Microsoft-recommended security configurations to their environment.
The National Checklist Program (NCP), defined by the NIST SP 800-70, is the U.S. government repository of publicly available security checklists (or benchmarks) that provide detailed low level guidance on setting the security configuration of operating systems and applications.
This article helps identify key controls that should be considered when establishing a secure configuration.
This article from netwrix outlines open ports, discusses the risks of open ports, which open ports are safe, and ways to find open ports in your network. They also share tips for ensuring port security.
This NIST Special Publication covers general guidelines for ensuring that security considerations are integrated into the configuration management process.