• About Auditing Windows Experts

    About Us

    518dd90cd62cbf77f5a060964406ee6373807_640Hello and welcome to AuditingWindowsExpert.com. This site is specifically for the Windows auditor, security professional, network admin, or anyone else who wants to learn about how to correctly secure and audit a Windows Server or Windows Active Directory domain. The site contains articles, videos, blogs and information from over 10 years of auditing and securing Windows experience.

    The site is owned and run by Derek Melber, MVP. Derek provides consulting to all sizes of companies in the area of Windows Security. Derek can help any audit department with their upcoming or annual Windows Security Audit. Derek specializes in uncovering details.


    Group Policy

    518ddd67eaf3c9609b40c865a6616_640

    In non sagittis risus. Aenean ultrices, lorem sit amet cursus tincidunt, lectus erat pharetra libero, nec ullamcorper nisi elit vitae ipsum. Nulla ante ante, rutrum hendrerit pretium a, placerat vitae enim. Ut at orci convallis nibh auctor blandit quis at ante. Vivamus vehicula, nulla in vehicula ullamcorper, mauris quam tempus felis, vitae consequat ipsum dui sit amet magna.

    Service #1 Button

    Compliance Reporting

    518ddd9b6a6cdd03ec590263d4736de0fb21a_640

    Vestibulum placerat lobortis lacus, eget malesuada nisl placerat nec. Vivamus aliquet facilisis blandit. Pellentesque fermentum dictum eros ac ultricies. Vestibulum ultrices urna et nisl ultrices eu bibendum augue dictum. Aliquam erat volutpat. Donec hendrerit rutrum purus non gravida. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae.

    Service #2 Button

    User Management

    518ddecb0615e7e9c3b2464fa7f272359fe51_640

    Donec arcu mi, laoreet sed scelerisque nec, auctor sit amet nulla. Proin malesuada felis non neque sodales luctus. Fusce condimentum, leo et eleifend porttitor, leo arcu placerat felis, sed iaculis est libero eu ligula. Morbi et felis non urna facilisis volutpat. Suspendisse varius sagittis lectus, nec ullamcorper libero malesuada atleo arcu placerat felis, leo et eleifend porttitor, sed iaculis est libero eu ligula.

    Service #3 Button


    Mauris viverra purus ut dolor pharetra vulputate. In vestibulum nunc vel arcu bibendum et fermentum massa suscipit. Nullam id orci sapien, vel sollicitudin enim. Curabitur tempus libero luctus turpis malesuada cursus. Ut sodales accumsan suscipit. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Proin a dolor ac urna accumsan iaculis eget ac leo. Vestibulum tempor justo quis leo facilisis pulvinar. Praesent turpis enim, luctus in consequat a, sollicitudin vel justo. Nulla placerat lacinia tincidunt. Nam pharetra lacus quis magna rutrum consectetur. Cras in viverra mi.

  • Services We Provide

    Services

    Windows Active Directory Audits

    boardroomLorem ipsum dolor sit amet, consectetur adipiscing elit. Pellentesque massa lorem, facilisis sit amet faucibus at, pulvinar feugiat purus. Nam risus felis, auctor non tempus eu, rutrum aliquam ante. Praesent urna elit, molestie id ornare ut, dictum in orci. Nullam accumsan ullamcorper ipsum ac dapibus. Curabitur dapibus fringilla orci, posuere pellentesque purus porttitor ut. Ut nunc lacus, molestie eget porttitor ut, bibendum nec est. Nunc condimentum leo non odio faucibus accumsan. Maecenas semper nibh eget massa porta mattis vulputate turpis gravida.

    Want to learn more about my Windows Active Directory Auditing Services? Contact Me For More Information

    Aenean blandit, metus at sollicitudin malesuada, sem orci fringilla lorem, vitae accumsan nisi ante vel metus. Quisque nibh massa, fringilla sed venenatis at, fermentum in dolor. Vivamus vestibulum commodo neque eu volutpat. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Morbi in lacus lorem. Vivamus in mauris nibh. Pellentesque nec arcu id justo aliquet fermentum vitae a lectus. Morbi hendrerit mauris nec ligula aliquet et tincidunt odio placerat. Aliquam non volutpat diam. Pellentesque hendrerit aliquet massa, nec cursus elit laoreet eget. Nam consectetur volutpat ligula, in tristique enim interdum et. In tristique velit et nisl tempus sed consectetur purus fringilla. Nunc venenatis velit a nisl ultrices vitae luctus mi fermentum.

    Windows Active Directory Audit Program

    Aenean eleifend suscipit odio, in pellentesque metus fringilla lacinia. Morbi vitae dui et nisi adipiscing bibendum non ut diam. Mauris laoreet hendrerit viverra. Curabitur eu metus at lacus fermentum eleifend. Nullam tincidunt, ipsum id tincidunt porta, neque quam vestibulum velit, sed tempus velit libero in est. Proin pharetra, enim ut dapibus dictum, libero sapien tempor ligula, vel malesuada nisl risus id quam. Morbi tortor metus, semper eget porta eu, pharetra et magna. Curabitur a diam sed magna facilisis lobortis. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Nunc consequat erat elit. Morbi auctor iaculis urna eget semper. Maecenas semper porttitor fringilla. Quisque ipsum erat, condimentum ac blandit ac, pellentesque et orci.

    Want to learn more about my Windows Active Directory Audit Program? Contact Me For More Information

    Suspendisse velit erat, placerat a pretium ac, mollis nec nunc. Nulla facilisi. Ut nibh nisl, euismod eget convallis ac, facilisis a nunc. In quam odio, adipiscing quis blandit nec, aliquet eget nulla. Maecenas viverra est a est tristique euismod. Aliquam mollis, nulla sed varius luctus, ante enim mollis sem, eget imperdiet ligula nisi sit amet leo. Sed est mauris, dignissim non rutrum eget, rhoncus et diam. Cras molestie, elit sed hendrerit venenatis, tortor arcu adipiscing sapien, vitae mattis dui felis quis metus. Praesent augue lectus, hendrerit at convallis eu, condimentum ac urna. Phasellus sed lorem urna. Ut augue diam, consequat id bibendum non, vulputate sed nisl.

    Security and Audit Consulting

    Curabitur ac quam orci. Pellentesque et est nunc. Pellentesque tincidunt iaculis risus quis egestas. Etiam ultricies mollis nisi, vel faucibus risus egestas at. Sed fermentum posuere turpis sed porta. Ut aliquam blandit rutrum. Duis iaculis tincidunt neque, fermentum facilisis urna aliquet sed. Nunc porttitor semper urna, at pharetra risus convallis semper. Ut ornare euismod justo eget bibendum. Etiam imperdiet turpis porta metus commodo convallis aliquet nunc vehicula. Sed id leo elit, non dapibus orci. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Ut ac augue et risus euismod gravida. Curabitur vestibulum pulvinar ante. In pulvinar facilisis arcu, a rhoncus elit elementum id. Cras gravida ornare nisl, et tristique lectus lobortis non.

    Want to learn more about my Security and Audit Consultation services? Contact Me For More Information

    Vestibulum et mauris massa. Aliquam at ante sit amet nisl condimentum iaculis at id est. Phasellus quis nisi neque. Nullam pretium cursus arcu, eu faucibus elit mollis id. Nam sit amet neque mi. Praesent fringilla, odio sit amet euismod sagittis, nisi arcu sollicitudin risus, a placerat ligula neque sed sapien. Curabitur quis faucibus sem. Fusce dignissim volutpat nibh, et rutrum lorem ornare nec. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos.

    Security and Audit Training

    Curabitur ac quam orci. Pellentesque et est nunc. Pellentesque tincidunt iaculis risus quis egestas. Etiam ultricies mollis nisi, vel faucibus risus egestas at. Sed fermentum posuere turpis sed porta. Ut aliquam blandit rutrum. Duis iaculis tincidunt neque, fermentum facilisis urna aliquet sed. Nunc porttitor semper urna, at pharetra risus convallis semper. Ut ornare euismod justo eget bibendum. Etiam imperdiet turpis porta metus commodo convallis aliquet nunc vehicula. Sed id leo elit, non dapibus orci. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Ut ac augue et risus euismod gravida. Curabitur vestibulum pulvinar ante. In pulvinar facilisis arcu, a rhoncus elit elementum id. Cras gravida ornare nisl, et tristique lectus lobortis non.

    Want to learn more about my Security and Audit Training service? Contact Me For More Information

    Vestibulum et mauris massa. Aliquam at ante sit amet nisl condimentum iaculis at id est. Phasellus quis nisi neque. Nullam pretium cursus arcu, eu faucibus elit mollis id. Nam sit amet neque mi. Praesent fringilla, odio sit amet euismod sagittis, nisi arcu sollicitudin risus, a placerat ligula neque sed sapien. Curabitur quis faucibus sem. Fusce dignissim volutpat nibh, et rutrum lorem ornare nec. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos.

    Speaking and Presentations

    Curabitur ac quam orci. Pellentesque et est nunc. Pellentesque tincidunt iaculis risus quis egestas. Etiam ultricies mollis nisi, vel faucibus risus egestas at. Sed fermentum posuere turpis sed porta. Ut aliquam blandit rutrum. Duis iaculis tincidunt neque, fermentum facilisis urna aliquet sed. Nunc porttitor semper urna, at pharetra risus convallis semper. Ut ornare euismod justo eget bibendum. Etiam imperdiet turpis porta metus commodo convallis aliquet nunc vehicula. Sed id leo elit, non dapibus orci. Vestibulum ante ipsum primis in faucibus orci luctus et ultrices posuere cubilia Curae; Ut ac augue et risus euismod gravida. Curabitur vestibulum pulvinar ante. In pulvinar facilisis arcu, a rhoncus elit elementum id. Cras gravida ornare nisl, et tristique lectus lobortis non.

    Want to learn more about my Speaking and Presentation Services? Contact Me For More Information

    Vestibulum et mauris massa. Aliquam at ante sit amet nisl condimentum iaculis at id est. Phasellus quis nisi neque. Nullam pretium cursus arcu, eu faucibus elit mollis id. Nam sit amet neque mi. Praesent fringilla, odio sit amet euismod sagittis, nisi arcu sollicitudin risus, a placerat ligula neque sed sapien. Curabitur quis faucibus sem. Fusce dignissim volutpat nibh, et rutrum lorem ornare nec. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos.

  • Published Articles

    Articles


    Showing the 50 most recent articles.
    Windows Passwords: Making them Secure (Part 1)

    Windows Passwords: Making them Secure (Part 1)

    Articles

    04-15-2009

    Like any network operating system, at the heart of the security is a username and password. There are default users created (Administrator and Guest are a few), whi...

    Click Here To Read This Article

    View
    Windows Passwords: Making them secure (Part 2)

    Windows Passwords: Making them secure (Part 2)

    Articles

    05-06-2009

    In the last article, I went into detail on how the default Windows password is established. As a reminder, the default Windows password is established using the Def...

    Click Here To Read This Article

    View
    Windows Passwords: Making them Secure (Part 3)

    Windows Passwords: Making them Secure (Part 3)

    Articles

    06-03-2009

    In the first two articles in this series, I exposed the reality of Windows’ password policy and how it is controlled in an Active Directory environment. I went ov...

    Click Here To Read This Article

    View
    Centralized Auditing is here and it’s FREE!

    Centralized Auditing is here and it’s FREE!

    Articles

    06-25-2009

    As I have been speaking, evangelizing, educating, and writing about Windows operating systems for the past 15 years, I have heard one common request during that tim...

    Click Here To Read This Article

    View
    Event IDs for Windows Server 2008 and Vista Revealed!

    Event IDs for Windows Server 2008 and Vista Revealed!

    Articles

    07-01-2009

    Have you ever wanted to track something happening on a computer, but did not have all of the information available to track the event? Well, this article is going t...

    Click Here To Read This Article

    View
    Top 10 Windows Security Configurations: Where and How! (Part 1)

    Top 10 Windows Security Configurations: Where and How! (Part 1)

    Articles

    08-12-2009

    There are always top 10 lists that grab your attention; and this one should be no different. Windows provides many settings, options, and areas of configuration. In...

    Click Here To Read This Article

    View
    Restricting Specific Web Sites in Internet Explorer Using Group Policy

    Restricting Specific Web Sites in Internet Explorer Using Group Policy

    Articles

    08-26-2009

    Are you aware there are Web sites that you should not allow your employees to visit? Of course you are! Now, are you aware that you can configure Internet Explorer ...

    Click Here To Read This Article

    View
    Top 10 Windows Security Configurations: Where and How! (Part 2)

    Top 10 Windows Security Configurations: Where and How! (Part 2)

    Articles

    10-07-2009

    Now, on with the countdown! In my last installment, I covered 5 of the most important security settings that you need to set for your Windows environment. Those wer...

    Click Here To Read This Article

    View
    Top 10 Windows Security Configurations: Where and How! (Part 3)

    Top 10 Windows Security Configurations: Where and How! (Part 3)

    Articles

    11-04-2009

    For my last installment in this series of articles, I am going to cover three additional settings that many of you might not know about. If you do know about them, ...

    Click Here To Read This Article

    View
    Configuring Advanced IE Settings Using Group Policy

    Configuring Advanced IE Settings Using Group Policy

    Articles

    01-27-2010

    There is no question, especially after the last month of IE scares, that every computer running Internet Explorer needs to be locked down and secured. With many adv...

    Click Here To Read This Article

    View
    Quick Guide to Troubleshooting Group Policy Security Settings

    Quick Guide to Troubleshooting Group Policy Security Settings

    Articles

    03-04-2010

    As Active Directory, Group Policy, security, and desktop administrators, we all know that the best way to secure a Windows environment is to use Group Policy. There are h...

    Click Here To Read This Article

    View
    Security Compliance Manager Goes Beta

    Security Compliance Manager Goes Beta

    Articles

    03-24-2010

    Microsoft has been working on a new solution that would link together many different aspects of Windows security and they are done! Yes, it is true, Microsoft has p...

    Click Here To Read This Article

    View
    Desktops: Local Rights and Privileges

    Desktops: Local Rights and Privileges

    Articles

    05-19-2010

    I seem to get more and more questions about end user desktops these days. Don’t get me wrong, I love them! I just wish that the whole concept of the end user desktop, u...

    Click Here To Read This Article

    View
    Group Policy Resource Guide

    Group Policy Resource Guide

    Articles

    06-16-2010

    I sometimes get stuck in my ways and can’t see the wood for the trees. I also find that many administrators find themselves in this situation, especially when it comes ...

    Click Here To Read This Article

    View
    Attaching Tasks to Event Viewer Logs and Events

    Attaching Tasks to Event Viewer Logs and Events

    Articles

    07-14-2010

    As a Windows network administrator, you have limited time on your hands. If you can automate a task it means that you have saved yourself some money! Well, the Event View...

    Click Here To Read This Article

    View
    Reasons to Look at Event Viewer in Windows 2008 and Windows 7

    Reasons to Look at Event Viewer in Windows 2008 and Windows 7

    Articles

    08-04-2010

    I have been working with Windows-related solutions for over 15 years. During that time period, the Event Viewer has always been a hard topic to discuss as it has fa...

    Click Here To Read This Article

    View
    Security Log Management Tips

    Security Log Management Tips

    Articles

    08-26-2010

    The security log for Windows is full of great information, but unless you know how to control, manage, and analyze the information, it is going to take you much longer to...

    Click Here To Read This Article

    View
    Securing Your Migrated Windows 7 Desktop

    Securing Your Migrated Windows 7 Desktop

    Articles

    09-22-2010

    When you decide to move to Windows 7, you will have a perfect opportunity to secure your desktops so you can reduce TOC, reduce helpdesk calls, increase productivit...

    Click Here To Read This Article

    View
    Desktop anti-virus… what is it good for

    Desktop anti-virus… what is it good for

    Articles

    11-17-2010

    We have all been living in a world where we are sold security applications at every turn. We are told that our desktops need security protective applications to protect u...

    Click Here To Read This Article

    View
    Using PowerShell to Continuously Audit Security of Active Directory

    Using PowerShell to Continuously Audit Security of Active Directory

    Articles

    12-15-2010

    The phrase I most often hear in the auditing world today is "continuous auditing." The term itself brings something totally different to mind, compared to what it actuall...

    Click Here To Read This Article

    View
    Using ADUC Saved Queries to Continuously Audit Windows Active Directory

    Using ADUC Saved Queries to Continuously Audit Windows Active Directory

    Articles

    01-26-2011

    As the world of security and auditing moves from an annual or bi-annual audit schedule to a continuous audit scenario, there will be the need to create more efficient pro...

    Click Here To Read This Article

    View
    Continuous Auditing of Active Directory with Scheduled Tasks

    Continuous Auditing of Active Directory with Scheduled Tasks

    Articles

    03-09-2011

    In my last two installments of “continuous auditing of Windows Active Directory”, we have covered some powerful ways for you, the auditor or security professional, to...

    Click Here To Read This Article

    View
    Why Applications Don’t work for standard users

    Why Applications Don’t work for standard users

    Articles

    05-04-2011

    We have all seen it. You know what I mean! You have a computer where you have configured the user to be a standard user, instead of a local Administrator. Then, you insta...

    Click Here To Read This Article

    View
    Microsoft Forefront Endpoint Protection 2010 – Is Microsoft Anti-virus Good Enough

    Microsoft Forefront Endpoint Protection 2010 – Is Microsoft Anti-virus Good Enough

    Articles

    05-18-2011

    Microsoft released Forefront Endpoint Protection (FEP) 2010 in December 2010. This is Microsoft’s sophomore offering in the anti-virus space, but the first to be seriou...

    Click Here To Read This Article

    View
    The Advanced Persistent Threat – What Is It and How Does It Affect Me?

    The Advanced Persistent Threat – What Is It and How Does It Affect Me?

    Articles

    06-08-2011

    Over the past several years, a term has steadily crept into the minds of IT Security analysts and into the presentations of vendors everywhere: Advanced Persistent Threat...

    Click Here To Read This Article

    View
    Well-Known SIDs for Windows Server 2008 R2 Active Directory

    Well-Known SIDs for Windows Server 2008 R2 Active Directory

    Articles

    06-22-2011

    It has come to my attention that many admins are not aware that Active Directory, as well as Windows servers and desktop operating systems, produce users and groups that ...

    Click Here To Read This Article

    View
    Applocker: Scenarios for Use and Deployment

    Applocker: Scenarios for Use and Deployment

    Articles

    07-13-2011

    As many enterprises evaluate their plans for the ‘next generation’ endpoint device in their organization, large challenges loom and large opportunities abound. Is now...

    Click Here To Read This Article

    View
    Disk Encryption – The Next Generation (Bitlocker Administration and Monitoring)

    Disk Encryption – The Next Generation (Bitlocker Administration and Monitoring)

    Articles

    07-27-2011

    Throughout the years, certain elements of IT have evolved from a ‘nice to have’ to ‘an absolute requirement’. If one thinks back 10 years ago, the IT landscape lo...

    Click Here To Read This Article

    View
    Windows Security Tools

    Windows Security Tools

    Articles

    09-07-2011

    Microsoft has been putting more effort into security, which Windows Server 2008 R2 and Windows 7 proves. They have been hardening the “out of the box” experience for ...

    Click Here To Read This Article

    View
    Troubleshooting Event Log Entries

    Troubleshooting Event Log Entries

    Articles

    09-28-2011

    I know the feeling of reviewing logs on servers and domain controllers, even the most impressive network administrator beg for a job being a greeter at the nearest conven...

    Click Here To Read This Article

    View
    Using the Microsoft Diagnostics and Recovery Toolset (DaRT) for Incident Response

    Using the Microsoft Diagnostics and Recovery Toolset (DaRT) for Incident Response

    Articles

    10-12-2011

    While building a security program, one of the most important elements to include is what to do when things go wrong. Being able to plan for and implement preventati...

    Click Here To Read This Article

    View
    Managing Active Directory with Forefront Identity Manager (FIM) 2010

    Managing Active Directory with Forefront Identity Manager (FIM) 2010

    Articles

    10-26-2011

    It’s hard to find a Windows environment that doesn’t rely heavily on Active Directory these days. Indeed, since the inception of AD in the late 90s and early 2000s it...

    Click Here To Read This Article

    View
    Windows Firewall: Domain Networks, Private Networks, and Public Networks

    Windows Firewall: Domain Networks, Private Networks, and Public Networks

    Articles

    11-16-2011

    Ever since Microsoft has released the latest versions of their Windows Firewall, there has been confusion as to “which network” should I configure and when? To ...

    Click Here To Read This Article

    View
    Windows Firewall Documentation

    Windows Firewall Documentation

    Articles

    11-30-2011

    There is a lot of confusion around the Windows Firewall and its settings in Windows Server 2008 R2 and Windows 7. This may be due to the history of Windows Firewall which...

    Click Here To Read This Article

    View
    Accessing Security Logs Remotely and Efficiently

    Accessing Security Logs Remotely and Efficiently

    Articles

    12-14-2011

    There is an ongoing need and desire to utilize the security logs that are generated on Windows servers and desktops. The security logs can be used to help troublesh...

    Click Here To Read This Article

    View
    Enhancing Endpoint Security for Windows Desktops

    Enhancing Endpoint Security for Windows Desktops

    Articles

    01-11-2012

    When I say the phrase “Windows desktop endpoint security”, what vision snaps into your mind? I am sure that for most the vision is rather similar. However, for some, ...

    Click Here To Read This Article

    View
    Enhancing Endpoint Security for Windows Desktops

    Enhancing Endpoint Security for Windows Desktops

    Articles

    01-25-2012

    This is the second of two article series describing the methods and options available to enhance your endpoint security for your Windows devices. In our first article we ...

    Click Here To Read This Article

    View
    Saving Credentials on Windows Computers

    Saving Credentials on Windows Computers

    Articles

    02-08-2012

    For years users have wanted to save time and effort when accessing servers on the network, Web sites requiring credentials, etc. So, there have been options in the operat...

    Click Here To Read This Article

    View
    Myths of Securing Windows Desktops (Part 1)

    Myths of Securing Windows Desktops (Part 1)

    Articles

    03-14-2012

    I have spent the better part of the past 6 years focusing on securing Windows desktops (in addition to the entire Windows enterprise). I have been trying to educate, evan...

    Click Here To Read This Article

    View
    Myths of Securing Windows Desktops (Part 2)

    Myths of Securing Windows Desktops (Part 2)

    Articles

    03-28-2012

    In part one of this article, we reviewed the most basic elements of security for your desktop, which is anti-virus. We also tackled the myths regarding least privilege ma...

    Click Here To Read This Article

    View
    What You Don’t Know Can Hurt You: LAN Manager Might Be Supported

    What You Don’t Know Can Hurt You: LAN Manager Might Be Supported

    Articles

    05-11-2012

    I have been preaching and teaching about the finer points of authentication protocols, anonymous, group membership, etc. for years. I have been talking about how these si...

    Click Here To Read This Article

    View
    To Whitelist or To Not Whitelist

    To Whitelist or To Not Whitelist

    Articles

    05-09-2012

    There are some key concerns about using whitelisting in your organization to control which applications users can use. In my opinion, whitelisting can be a very powerful ...

    Click Here To Read This Article

    View
    Bring Your Own Device To Work: Security Nightmare?

    Bring Your Own Device To Work: Security Nightmare?

    Articles

    05-23-2012

    Has your company been forced into a debate whether or not employees can use their own personal devices for business related activities? If not, the day is coming that you...

    Click Here To Read This Article

    View
    Who Am I? Understanding Credentials

    Who Am I? Understanding Credentials

    Articles

    07-18-2012

    As a consultant, I often get strange emails asking for my input on a situation. Often, the situations that I get occur on many networks without a root cause or final sol...

    Click Here To Read This Article

    View
    User Accounts, Group Accounts, and Access Control Lists

    User Accounts, Group Accounts, and Access Control Lists

    Articles

    08-15-2012

    A wise man once taught me how to properly configure access control lists (ACLs), which I still preach today. However, I find that after so many years of network administr...

    Click Here To Read This Article

    View
    Accessing Active Directory Information with LDP

    Accessing Active Directory Information with LDP

    Articles

    09-19-2012

    Active Directory is the most popular network directory used by corporations throughout the world. This does not mean that there are no other popular network directories, ...

    Click Here To Read This Article

    View
    Endpoint Security: Isn’t It Obvious!?

    Endpoint Security: Isn’t It Obvious!?

    Articles

    10-24-2012

    I know we all deal with computers on a daily basis. With so much computer use, why is security so complex? Well, I have an answer, which might not ring a perfect tone in ...

    Click Here To Read This Article

    View
    Firewall is Enabled and Configured on Windows Server 2008/R2 Domain Controllers

    Firewall is Enabled and Configured on Windows Server 2008/R2 Domain Controllers

    Articles

    11-21-2012

    Microsoft has provided a Firewall for nearly a decade now. The firewall is designed to help protect the local computer against attacks, plus to limit the inbound and outb...

    Click Here To Read This Article

    View
    Auditing Windows Active Directory Trust Relationships

    Auditing Windows Active Directory Trust Relationships

    Articles

    01-02-2013

    The concept of Windows trust relationships have been around for a long time. They started back in the Windows NT era and have continued to be an important aspect of any W...

    Click Here To Read This Article

    View
    IT Admins and Security Auditors

    IT Admins and Security Auditors

    Articles

    01-23-2013

    Recently, I was working with a company to perform their annual Windows server and Active Directory audit. This company is not unique to the companies I do work with, rath...

    Click Here To Read This Article

    View
    Click Here To View All Articles
  • Articles Archive


  • Welcome To Our Blog

    Blog

  • Contacting The Auditing Windows Expert

    Contact Us

    Contact Auditing Windows Experts

    Auditing Windows Expert Contact Form

    We would love to hear from you. Please fill out this form and we will get in touch with you shortly.

     
    logo-w600

    emailEmail

    derek@derekmelber.com

    Telephone IconPhone

    (707) 555-1234

  • Windows Passwords: Making them Secure (Part 1)

    Windows Passwords: Making them Secure (Part 1)

    Articles

    04-15-2009

    Like any network operating system, at the heart of the security is a username and password. There are default users created (Administrator and Guest are a few), whi...

    Click Here To Read This Article

    View
    Windows Passwords: Making them secure (Part 2)

    Windows Passwords: Making them secure (Part 2)

    Articles

    05-06-2009

    In the last article, I went into detail on how the default Windows password is established. As a reminder, the default Windows password is established using the Def...

    Click Here To Read This Article

    View
    Windows Passwords: Making them Secure (Part 3)

    Windows Passwords: Making them Secure (Part 3)

    Articles

    06-03-2009

    In the first two articles in this series, I exposed the reality of Windows’ password policy and how it is controlled in an Active Directory environment. I went ov...

    Click Here To Read This Article

    View
    Centralized Auditing is here and it’s FREE!

    Centralized Auditing is here and it’s FREE!

    Articles

    06-25-2009

    As I have been speaking, evangelizing, educating, and writing about Windows operating systems for the past 15 years, I have heard one common request during that tim...

    Click Here To Read This Article

    View
    Event IDs for Windows Server 2008 and Vista Revealed!

    Event IDs for Windows Server 2008 and Vista Revealed!

    Articles

    07-01-2009

    Have you ever wanted to track something happening on a computer, but did not have all of the information available to track the event? Well, this article is going t...

    Click Here To Read This Article

    View
    Top 10 Windows Security Configurations: Where and How! (Part 1)

    Top 10 Windows Security Configurations: Where and How! (Part 1)

    Articles

    08-12-2009

    There are always top 10 lists that grab your attention; and this one should be no different. Windows provides many settings, options, and areas of configuration. In...

    Click Here To Read This Article

    View
    Restricting Specific Web Sites in Internet Explorer Using Group Policy

    Restricting Specific Web Sites in Internet Explorer Using Group Policy

    Articles

    08-26-2009

    Are you aware there are Web sites that you should not allow your employees to visit? Of course you are! Now, are you aware that you can configure Internet Explorer ...

    Click Here To Read This Article

    View
    Top 10 Windows Security Configurations: Where and How! (Part 2)

    Top 10 Windows Security Configurations: Where and How! (Part 2)

    Articles

    10-07-2009

    Now, on with the countdown! In my last installment, I covered 5 of the most important security settings that you need to set for your Windows environment. Those wer...

    Click Here To Read This Article

    View
    Top 10 Windows Security Configurations: Where and How! (Part 3)

    Top 10 Windows Security Configurations: Where and How! (Part 3)

    Articles

    11-04-2009

    For my last installment in this series of articles, I am going to cover three additional settings that many of you might not know about. If you do know about them, ...

    Click Here To Read This Article

    View

    Summary of Services

    About Auditing Windows Experts

    Fusce pulvinar mauris id metus venenatis, eget sollicitudin nibh faucibus. Quisque adipiscing augue sit amet posuere tempus. Nam a lacus arcu. Donec vel pellentesque risus. Sed tincidunt accumsan imperdiet. Etiam imperdiet semper lectus, vel vestibulum lacus molestie non. Duis ante eros, faucibus a cursus vitae, tincidunt quis nunc. Duis id varius lacus, feugiat vulputate ante. Nam accumsan turpis vel sagittis egestas. Donec at purus erat. Vestibulum et massa id sem condimentum interdum id nec erat. Proin id mi non tellus faucibus tincidunt lacinia vel elit. Donec fringilla condimentum volutpat. Aliquam porta nulla a nisi placerat ultricies. Aenean viverra libero et odio ultricies sagittis. Donec convallis libero ut leo euismod, ut pulvinar lorem auctor.
    Read More About Us

    Windows Active Directory Audits

    Content Placeholder: Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nullam mattis tortor id orci tristique, sit amet auctor velit dictum. Proin ac iaculis velit, quis dignissim magna. Nulla facilisi. Morbi dignissim nulla sem, eget vestibulum massa bibendum sed. Aliquam semper dui et porta ullamcorper. Ut congue tortor et commodo laoreet. Nunc a metus vel tortor condimentum convallis. Curabitur in diam vitae velit porta pretium.

    Windows Active Directory Audit Program

    Content Placeholder: Ut vel dolor sit amet libero dignissim dapibus ac vitae enim. Integer iaculis egestas nibh, id mollis mi egestas a. Pellentesque ipsum dolor, iaculis vel metus non, tincidunt pretium ante. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Suspendisse a euismod est, ut vehicula massa.

    Security and Audit Consulting

    Content Placeholder: Aliquam eros tellus, bibendum a luctus eu, tincidunt non dolor. Vestibulum porttitor lacinia metus. Donec egestas massa et mauris consequat, a malesuada leo bibendum.

    Security and Audit Training

    Content Placeholder: Nullam eu leo ultrices, aliquet felis quis, suscipit mi. Fusce congue ullamcorper interdum. Nulla lorem erat, scelerisque vel porta quis, blandit ut enim. Praesent ut suscipit nulla, nec auctor quam. Nam luctus nibh non rutrum vehicula. Quisque sit amet convallis arcu.

    Speaking and Presentations

    Content Placeholder: Nullam eu leo ultrices, aliquet felis quis, suscipit mi. Fusce congue ullamcorper interdum. Nulla lorem erat, scelerisque vel porta quis, blandit ut enim. Praesent ut suscipit nulla, nec auctor quam. Nam luctus nibh non rutrum vehicula. Quisque sit amet convallis arcu.

    Who is Derek Melber?

    DSC_0221_small Phasellus tempor dolor ut nibh interdum ultrices. Nulla molestie faucibus auctor. Etiam eros erat, eleifend tempus elementum a, auctor elementum tortor. Pellentesque pharetra neque ut sapien mattis et adipiscing lectus gravida. Aliquam sem magna, dignissim eu luctus ut, gravida quis ante. Mauris eu orci lorem. Sed vulputate, ante a hendrerit commodo, lectus enim vehicula nulla, a commodo magna nulla eu dolor. Vivamus laoreet tempor orci, a lobortis tortor consequat sed. Proin sodales viverra ante, sit amet tincidunt urna laoreet ut. Suspendisse volutpat, neque in laoreet sagittis, erat odio feugiat nulla, non porta nisi nisi eget neque. Nam eu lacus nulla.
    Visit Derek Melber's Website