Microsoft Security Risk Detection

Microsoft Security Risk Detection is a unique fuzz testing service for finding security-critical bugs in software. The tool helps customers quickly adopt practices and technology battle-tested over the last 15 years at Microsoft.

[ Read More ]

Microsoft Safety Scanner

Microsoft Safety Scanner is designed to find and remove malware from Windows computers. Simply download it and run a scan to find malware and try to reverse changes made by identified threats.

[ Read More ]

Penetration Testing Guidance

Gather information on the Network/Application/Infrastructure/Domain from the Client with the help of a questionnaire or a kickoff meeting between the organization and the client.

[ Read More ]

Mobile Devices

Here is a checklist on how to access your organization’s mobile devices as well as your own personal devices (BYOD) at workspace.

[ Read More ]

Router

Here is a checklist on how to safeguard your network router by effectively managing access controls, passwords, and configurations.

[ Read More ]

User Account Policies

Here is a checklist of User Account Policies to check the requirements for requesting and maintaining an account on computer systems or networks, typically within an organization.

[ Read More ]

Switches

Here is a checklist on how to use the network switches, ports and connected devices in order to safeguard them from vulnerabilities and threats.

[ Read More ]

Workstation Security

Here is a checklist of Workstation Security which provides guidance for the security of computer workstations operated by a company in order to ensure the security of information on the workstation and information to which the workstation may have access.

[ Read More ]

Backup Policies

Here is a checklist of Backup Policies which describe the controls required for data backup regimes, to safeguard against the loss of data that may occur due to hardware or software failure, physical disaster or human error.

[ Read More ]

Remote Access Policies

Here is a checklist of Remote Access Policy which defines the standards for connecting to the organizational network and security standards for computers that are allowed to connect to the organizational network.

[ Read More ]