Microsoft Build · 2025/5/20至2025/5/23 立即報名 關閉警示 Learn 發現卡 產品文件 開發語言 主題 登入 我們不會再定期更新此內容。 如需此產品、服務、技術或 API 的支援資訊,請參閱Microsoft 產品生命週期。 建議的版本 關閉警示 Windows 2000 Web and Application Services Technical Overview ...
Sorry, but nothing matched your search terms. Please try again with some different keywords. Get started with Microsoft Security Microsoft is a leader in cybersecurity, and we embrace our responsibility to make the world a safer place. Learn more What's new Surface Laptop Studio 2 Surface Lapto...
(LM) includes client computer and server software from Microsoft that allows users to link personal computers together on a single network. Network capabilities include transparent file and print sharing, user security features, and network administration tools. In Active Directory domains, the Kerbe...
Extends the value of existing investments: Because Windows Firewall is a host-based firewall that is included with the operating system, there's no extra hardware or software required. Windows Firewall is also designed to complement existing non-Microsoft network security solutions through a document...
Microsoft Fabric’s software-as-a-service (SaaS) architecture and industry-leading security tools can help you simplify and accelerate security configuration while ensuring your data is protected at every step of its journey. Fabric comes with always-on, defau...
Manage your security alertsThe Microsoft Defender for Cloud overview page shows the Security alerts tile at the top of the page, and as a link from the sidebar.The security alerts page shows the active alerts. You can sort the list by Severity, Alert title, Affected...
NoteThe use of NetBIOS for SMB transport ended in Windows Vista, Windows Server 2008, and in all later Microsoft operating systems when Microsoft introduced SMB 2.02. However, you may have software and devices other than Windows in your environment. You should disable and remove SMB1 if you ...
Identity-focused security models, software-defined infrastructure, and network-as-code are enabling Microsoft to provide next-gen connectivity to its employees. Next-generation connectivity is enabling us to transform our internal enterprise network here at Microsoft. Deploying a more agile, secure...
Welcome to this document from the Midsize Business Security Guidance collection. Microsoft hopes that the following information will help you create a more secure and productive computing environment. Executive Summary In today’s security conscious environment an in-depth approach to protecting a midsiz...
DCOM Security Enhancements What does DCOM do? The Microsoft Component Object Model (COM) is a platform-independent, distributed, object-oriented system for creating binary software components that can interact. The Distributed Component Object Model (DCOM) allows applications to be distributed across loc...