In this Ask the Admin, Russell Smith explains how Controlled Folder Access can help protect users against ransomware.
Russell Smith explains how attackers target businesses indiscriminately and outlines some steps for securing your devices.
Take a look at the steps which, when taken together, should minimize your risks of being successfully attacked by ransomware such as WannaCrypt, CryptoLocker, and a plethora of other variants that are ravaging businesses of all sizes around the world.
Aidan Finn shows you how to deploy Microsoft Anti-Malware to Azure virtual machines at scale with scanning exceptions and schedules using PowerShell.
Looking into unified threat management? Check our review of WatchGuard XTM, which provides security and connects on-premise and (hybrid) cloud services.
It’s time to update those legacy apps! Learn about EMET 4.1 and how it can be used to secure legacy applications running on WS2012 R2 and Windows 8.1.
Is installing antivirus on your Hyper-V hosts necessary? Answer: That depends. Learn more, including how to configure antivirus scanning exceptions.
Learn more about putting antivirus on servers – which just might help prevent or limit the damage caused by virus outbreaks on your network.
Microsoft’s free Security Essentials product isn’t as comprehensive as paid products. Find out whether it’s worth switching to a paid security solution!