See all products »
Curah! curation service
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Server and Tools Blogs
TechNet Flash Newsletter
Cloud and Datacenter
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Microsoft Download Center
TechNet Evaluation Center
Compatability & Converters
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Second shot for certification
Born To Learn blog
Find technical communities in your area
For small and midsize businesses
For IT professionals
For technical support
For home users
Microsoft Premier Online
Microsoft Fix It Center
Security Bulletins & Advisories
International support solutions
Log a support ticket
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Insufficient data from Andrew Fryer
The place where I page to when my brain is full up of stuff about the Microsoft platform
Application Lifecycle Management
Data Protection Manager
Essential Business Server
Full Text Search
Microsoft Security Essentials
Performance Point Server
Read Only Domain Controller
Remote Desktop Services
Slowly Changing Dimensions
Software + Services
SQL Server 2008
SQL Server 2008 R2
SQL Server 2012
SQL Server 2014
SQL Server Express
TechNet Road Show
Windows Phone 7
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
Windows Server 2012R2
Browse by Tags
Insufficient data from Andrew Fryer
Lab Ops 5 - Access Rights in PowerShell
In my last post I had a section in my script to create access right to a share I had just created and as promised I wanted to dissect that a bit more. To recap what I wanted to do was to create a share with sufficient privileges to use that share for storing VMs as part of my VDI demo. In order to understand...
10 Oct 2013
SQL Server Spruce up
Landrovers, will take a lot of pounding and neglect, but when my wife drove hers to Australia she made very sure it was properly set up for 2 years on the road Similarly SQL Server is also often out in the wild far from DBA’s and inspection from maintenance tools, like System Center . However now...
9 Aug 2013
Evaluate This–File Classification
In my last post & screen cast I showed how Dynamic Access Control (DAC) worked; the business of matching a users claims to the properties of a file (Resource Property in DAC), however the problem then becomes how do I correctly tag my files so that DAC works. You shouldn’t necessarily be doing...
19 Mar 2013
Evaluate This – Dynamic Access Control
Managing users access to the right files is a pain on any OS, the best that’s going ot happen is that no one will complain about not having access to a file while none of your sensitive company data gets into the wrong hands. In a traditional hierarchical business life was pretty easy you had a...
14 Mar 2013
Contain your Enthusiasm
You may be aware that I am still keen on SQL Server and despite the changing nature of my role at Microsoft I still try and keep my hand in with the latest version. One thing I overlooked until I did SQL Relay was contained database security which is easy to use and can make your life a lot easier...
29 May 2012
Microsoft Virtual Academy
I don’t think data centre management or the private cloud is particularly difficult to learn, but it could be easier to find out where to start. Of course if your focus is virtualisation or you only make tools in this space then your site should make this journey pretty straight forward. ...
24 Mar 2011
Why I use IE9
The obvious answer to this question is I am an evangelist who works fro Microsoft and while that is true just bear with me for a paragraph or two. You’ll probably like the speed and clean looks of this incarnation of IE, you might like the side by side comparison option by tearing off tabs, or the fact...
25 Oct 2010
Microsoft Support Calls
3 basic life skills: You don’t give your car keys or house keys to strangers. You only trust certain friends and family to look after your young children while you go out for dinner. You only let people fiddle with your computer you trust. I mention the last one because there are increasing...
19 Oct 2010
Internet Safety for adults
I did an internet safety presentation to the association for retired police officers on Friday, and it still amazes me how little my generation know about social media and the internet in general. There are basically three camps when it comes to awareness of the dangers the internet poses...
6 Oct 2010
Windows 7 for friends and family
It’s not always Microsoft’s fault… For the last month or so, my mum’s Asus Revo mini desktop PC thing kept starting windows repair intermittently on boot and her local tech support man (I couldn’t get down to her) thought Windows updates were the problem. Also when it did power up it was taking...
6 Sep 2010
What is ADFS, and why you should care?
Active Directory Federated Services (ADFS) doesn’t sound like the most exciting topic for a post, but I am going to post on it anyway precisely because it is boring. First let me log in to windows with a Live ID.. You’ll notice I have used my Microsoft alias to sign in, and I haven’t entered my password...
9 Jun 2010
A last word on Policy based Management
If I search my blog for Policy Based Management in SQL Server, I notice there are a fair few posts on the matter. I am not going to apologise for this as it’s a vital tool in any DBA’s armoury in the world of ever increasing databases compliance and risk management. My blog is also like paging...
25 May 2010
Data Governance with SQL Server
I thought it would be good to write up my talk at the IT Manager TechDays last week, as I get a fair number of questions and the information is not always easy to find. First let me explain what I mean by Governance: It is the policies, best practices, enforcement and training needed to address the compliance...
26 Apr 2010
Safer Internet Day 9th Feb
If I was writing a bill of rights for the internet my main focus would be to make the web a safe and fun place for everyone, but that’s not going to happen so instead I spend some of my spare time trying to help children be safe on line (a sort of digital green cross man). Because this entails...
28 Jan 2010
An Interesting VDI case, Holmes.
Last June I didi a series of interviews with Alun Rodgers of Risual about the cool stuff in Windows Server 2008. In one of these.. Alun is telling me about how Terminal Services (now known as Remote Desktop Services, RDS, in Windows Server 2008 R2) could be used to provide a secure desktop for police...
6 Nov 2009
Think U Know
Reading today’s Sun , you might well be worried if your kids are on FaceBook, but taking their laptop away is probably not going to be the correct response, as they’ll simply find another way to get online which is less under your control than what they are doing now e.g. using their phone, a mates laptop...
28 Oct 2009
Lying about your age
Lying is generally not a good thing, but as I was ordering something for my neice’s birthday I was asked to enter my date of birth and deliberately put in the wrong date. I can only imagine that the store concerned saw this as added security but I’m not convinced. The other classic question in...
29 May 2009
Microsoft Security Intelligence Report vol 6
Every 6 months Microsoft publishes a freely available Security Intelligence Report (SIR) , looking at what’s happening to threaten the security of our personal and corporate computing. Mostly it‘s written in English and if you can’t find the time to read it all I would at least recommend the summary...
9 Apr 2009
Update Tuesday – good for your health
1st of April could well see the resurgence of the infamous Conflicker or downadup worm which some experts reckoned had infected over 3.5 million computers by January. This is because Conflicker will use a new algorithm to work out which domains to attack. Many of the problems that have been...
30 Mar 2009
Internet Explorer 8 on Vista and Windows 7
Viral has just pinged me a write up of a hacking contest from the Washington Post (he is American after all) . The "Pwn2Own" contest at the CanSecWest security conference in Vancouver won by a 25 year German student called “Nils”. He won $15,000 for exposing a vulnerability in IE8 beta...
30 Mar 2009
Security Update MS08-067
There’s no easy way to say this but whatever version of windows you are running, the first thing you want to do today is install update MS08-067 . To quote from the article… This security update (MS08-067) resolves a vulnerability in the Server service that affects all currently supported versions...
27 Oct 2008
Career Limiting Move, SQL Server 2008 Transparent Data Encryption
Transparent data encryption (TDE) in SQL Server 2008 enterprise edition is a great tool for protecting your data ‘at rest’ , but you need to be careful when you use it. TDE only really comes into play when you move the database to another location (hence the transparent in the name). When you encrypt...
26 Aug 2008
Fuel injection is generally considered to be a good thing for cars, while IT professionals consider SQL injection to be a bad thing. The technique does not exploit weaknesses in the the database , but how it and the relevant web server are configured. In the Microsoft world a lot of work...
1 Jul 2008
SQL Server 2008 Encryption Keys
Encryption, Keys and certificates etc. are complicated and confusing judging by the number of support calls coming in from DBA's. As I said in my last post , Transparent Data Encryption is there to stop someone walling off with your data. A database can be encrypted using a key which is stored...
24 Dec 2007
SQL Server 2008 for Developers
There seems to be this divide between developers and DBAs. Developers need to create databases and objects within them and of course DBAs want everything nice and tidy. SQL Server 2008 has quite a few new features fir developers including: ADO.NET entity framework to provide a semantic layer between...
17 Dec 2007
© 2014 Microsoft Corporation.
Privacy & Cookies