Download now Registration not required
Security of an application is in large part directly dependent on the underlying host configuration on which the application is deployed. The focus of this webcast is on a tool aimed at securing the host operating system for application deployment, developed by the Microsoft Information Security group. The tool provides automated analysis of host configuration based on a security checklist.
- Format: Webcast
- Size: 0 KB