Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Other security for Windows, Mac, Linux
Endpoint Security Compliance
Message
<blockquote data-quote="ForgottenSeer 95367" data-source="post: 998191"><p>What a great question. The topic of compliance is almost never discussed, let alone getting into the "How-Tos."</p><p></p><p>In an enterprise setting, compliance is crafted and verified with various software such as Microsoft Endpoint Manager or a combination of applications created to ensure compliance such as Microsoft Security Compliance Manager\Toolkit. There are compliance methods and procedures for Active Directory, Azure, Microsoft 365 (enterprise). Then there are non-Microsoft equivalents to such compliance methods and software. They are under the category of Compliance Information Management Systems.</p><p></p><p>In the home consumer market, compliance can be as simple as verifying that Microsoft Defender is running via the Microsoft Account portal for all devices using that Microsoft Account.</p><p></p><p>The standards of compliance come from various sources such as Microsoft itself, NIST, ISO, DoD, NSA, MITRE, CIS, custom internal compliance standards, and so on. Each will have its own controls and benchmarks.</p><p></p><p>It is a vast subject that that is fundamentally more important than what security solution that you use. Much more effort should be provided into how-to comply and protect than "OK, use this softwares because it is popular. You are protected."</p></blockquote><p></p>
[QUOTE="ForgottenSeer 95367, post: 998191"] What a great question. The topic of compliance is almost never discussed, let alone getting into the "How-Tos." In an enterprise setting, compliance is crafted and verified with various software such as Microsoft Endpoint Manager or a combination of applications created to ensure compliance such as Microsoft Security Compliance Manager\Toolkit. There are compliance methods and procedures for Active Directory, Azure, Microsoft 365 (enterprise). Then there are non-Microsoft equivalents to such compliance methods and software. They are under the category of Compliance Information Management Systems. In the home consumer market, compliance can be as simple as verifying that Microsoft Defender is running via the Microsoft Account portal for all devices using that Microsoft Account. The standards of compliance come from various sources such as Microsoft itself, NIST, ISO, DoD, NSA, MITRE, CIS, custom internal compliance standards, and so on. Each will have its own controls and benchmarks. It is a vast subject that that is fundamentally more important than what security solution that you use. Much more effort should be provided into how-to comply and protect than "OK, use this softwares because it is popular. You are protected." [/QUOTE]
Insert quotes…
Verification
Post reply
Top