Sign in
Browse by Tags
TechNet Blogs
»
Ask the Performance Team
»
All Tags
»
security
Server & Tools Blogs
>
Server & Management Blogs
>
Ask the Performance Team Blog
All About Windows Server
Windows Server
Windows Server Essentials Blog
Partner & Customer Solutions
Ask The
Performance Team
Ask Premier Field Engineering
Ask the Core Team
Cloud OS Blogs
Brad Anderson - In the Cloud
Building Clouds
Server & Cloud
Datacenter Management
The System Center Team Blog
System Center Virtual Machine Manager
System Center Service Manager
System Center Operations Manager
System Center Data Protection Manager
System Center Orchestrator
Partner & Customer Solutions
Client Management
System Center Configuration Manager
System Center Service Manager
MDOP
Malware Protection Center
Windows Intune
SUS
Partner and Customer Solutions
Virtualization, VDI & Remote Desktop
Virtualization Team Blog
Ben Armstrong’s Virtualization Blog
Jose Barreto Blog on Hyper-V
Partner & Customer Solutions
Remote Desktop Services
Windows Multipoint Server
Ask the Core Team on Hyper-V
File & Storage & High Availability
File & Storage
Jose Barreto
Partner & Customer Solutions
Ask the Core Team on Failover Cluster
Clustering & High Availability
Windows Server Management
PowerShell
Hey Scripting Guy (PowerShell)
Server Manager
Group Policy
Networking
Identity & Access
Ask Directory Services
Active Directory Team Blog
Ask the Performance Team Blog
Thoughts from the EPS Windows Server Performance Team
Live Now on Server & Tools Blogs
Subscribe
Comments
Facebook
Menu
Home
Atom
Translate this page
Powered by
Microsoft® Translator
Live Map
Useful Microsoft Blogs
IE Blog
Terminal Server Blog
PowerShell Blog
NT Debugging Blog
MSRC (Security) Blog
Exchange Team Blog
IIS Site
LATAM (Portugese / Spanish)
OEM Team Blog
MS HotFix and Hot Issues Blog
Platforms Blogs
CORE (Setup / Cluster)
Directory Services
LATAM (Latin America)
Manageability (Configuration Mgr)
Manageability (Mobile Device Mgr)
Manageability (Operations Mgr)
Manageability (SoftGrid)
Manageability (SUS)
Networking
Small Business Server
Windows Essential Business Server
Manageability (SCVMM)
Recent Posts
The [The selected task “{0}” no longer exists…] issue
Posted
1 month ago
by
Blake Morrison - MSFT
Blake Morrison - MSFT
1
Comment
Heads up: Perfmon algorithm issue found/fixed
Posted
1 month ago
by
Blake Morrison - MSFT
Blake Morrison - MSFT
1
Comment
Windows 8.1 / Windows Server 2012 R2 – Wrap up
Posted
1 month ago
by
Blake Morrison - MSFT
Blake Morrison - MSFT
Windows 8.1 / Windows Server 2012 R2 – Assigned Access
Posted
1 month ago
by
Blake Morrison - MSFT
Blake Morrison - MSFT
2
Comments
Tags
Application Compatibility
Applications and Services
Architecture
General
GPO
Internet Explorer
Memory Management
Networking
Pages
Performance
Printing
Support Center
Terminal Server
Troubleshooting
Two Minute Drill
Windows 7
Windows Server 2008
Windows Vista
Archives
Archives
November 2013
(2)
October 2013
(11)
September 2013
(4)
August 2013
(2)
July 2013
(1)
June 2013
(1)
May 2013
(3)
April 2013
(3)
March 2013
(1)
February 2013
(1)
January 2013
(2)
December 2012
(1)
November 2012
(7)
October 2012
(10)
September 2012
(3)
August 2012
(3)
July 2012
(3)
June 2012
(4)
May 2012
(1)
April 2012
(3)
March 2012
(7)
February 2012
(7)
January 2012
(4)
December 2011
(1)
November 2011
(1)
October 2011
(2)
September 2011
(4)
August 2011
(2)
July 2011
(1)
June 2011
(3)
May 2011
(4)
April 2011
(2)
March 2011
(4)
February 2011
(4)
January 2011
(1)
December 2010
(3)
November 2010
(3)
October 2010
(2)
September 2010
(5)
August 2010
(4)
July 2010
(7)
June 2010
(4)
May 2010
(4)
April 2010
(5)
March 2010
(5)
February 2010
(3)
January 2010
(8)
December 2009
(2)
November 2009
(7)
October 2009
(23)
September 2009
(5)
August 2009
(8)
July 2009
(7)
June 2009
(9)
May 2009
(19)
April 2009
(87)
March 2009
(9)
February 2009
(8)
January 2009
(7)
December 2008
(7)
November 2008
(6)
October 2008
(10)
September 2008
(9)
August 2008
(10)
July 2008
(9)
June 2008
(8)
May 2008
(9)
April 2008
(9)
March 2008
(10)
February 2008
(27)
January 2008
(9)
December 2007
(6)
November 2007
(6)
October 2007
(10)
September 2007
(7)
August 2007
(8)
July 2007
(10)
June 2007
(9)
May 2007
(15)
April 2007
(8)
March 2007
(7)
February 2007
(2)
January 2007
(5)
December 2006
(1)
More
▼
Less
▲
Tagged Content List
Blog Post:
Windows 7 – Parental Controls
CC Hameed
Good Morning AskPerf! Today’s post is a bit of a departure from what we normally discuss, but since this past Sunday was Father’s Day, I thought this might be an interesting topic to share. Actually, this conversation came up while I was having lunch with my parents. My daughters are...
on
23 Jun 2009
Blog Post:
APP: Application Compatibility - User Account Control (Windows Vista +)
CC Hameed
APPLICATION COMPATIBILITY - USER ACCOUNT CONTROL (UAC) Description: User Account Control (UAC) is the functionality within Windows Vista that allows a user to run under a safer, less privileged context, but switch to an Administrator context when needed. Under normal circumstances, every user...
on
10 Apr 2009
Blog Post:
MS08-067: Worms, Worms, Worms
CC Hameed
Over the last couple of weeks, there has been an uptick in the number of different malware programs aimed at exploiting the vulnerability patched in MS08-067 . If you’ve been monitoring the various security websites and blogs, then you’ve probably already seen information on malware such as Worm...
on
9 Dec 2008
Blog Post:
“Unknown Publisher”??? Part Two
CC Hameed
Hello AskPerf readers, it’s Don Geddes again and I’m back with that post that I promised you about that pesky dialog box that we all know so well. In this post, I’m going to walk through some common client/server scenarios and explain the technical details of what generates the “Unknown Publisher” dialog...
on
31 Oct 2008
Blog Post:
Two Minute Drill: Five Things to think about regarding Anti-Virus software
CC Hameed
Hello AskPerf readers! My name is Leena Nair, and I am a Support Engineer on the Performance team. Over the last couple of months, I’ve had some very interesting discussions with customers regarding anti-virus software selection, and I thought it might be interesting to share some pieces...
on
28 Oct 2008
Blog Post:
NAP 101 – The Components of NAP
CC Hameed
Welcome back AskPerf Readers. In my last post we covered the basics of Network Access Protection (NAP) – what it is, and what it can (and can’t!) do for you. Today we’re going to go over the various components of NAP. The diagram below from the NAP Architecture Whitepaper (the link to the Whitepaper...
on
30 Sep 2008
Blog Post:
Network Access Protection for the non-Network Admin
CC Hameed
We've talked about security in previous posts. We've also talked about SMB, Large File Copies and a number of other networking-related issues. Today we're going to talk about Network Access Protection (NAP) and its role in the enterprise. Now, I know you're probably asking yourself...
on
26 Sep 2008
Blog Post:
IE8 and Privacy
CC Hameed
Privacy. Personally Identifiable Information. Choice. Disclosure. These are all key concepts in the digital age. We expose more of our personal data electronically than at any time in our history. IE8 gives users more choice about controlling what information is shared...
on
5 Sep 2008
Blog Post:
Terminal Servers and the “Man in the Middle”
CC Hameed
We often get questions on configuring Terminal Server Authentication. The questions have less to do with configuring a simple logon scenario than they do with preventing attacks, in particular “Man in the Middle” attacks – especially when the Terminal Servers may be publicly accessible. For...
on
29 Jul 2008
Blog Post:
Key Principles of Security
CC Hameed
OK, so today's isn't really something "Performance" related, but nevertheless, I think we can all safely agree that this is something that all administrators should be aware of. During our Windows Vista and Windows Server 2008 posts we've been talking about "reducing the attack surface"...
on
7 Mar 2008
Blog Post:
WS2008: Frontside Authentication and SSO
CC Hameed
Welcome to Day Twenty-One. We're three weeks into our series and there are only six days left. Today's topics for discussion are Frontside Authentication and Single Sign-On (SSO) in the Terminal Services space. So, let's get started ... Frontside Authentication is a new connection process...
on
21 Feb 2008
Blog Post:
WS2008: Network Level Authentication and Encryption
CC Hameed
Welcome to Day Sixteen. We're continuing on with our series on Windows Server 2008 in preparation for the launch. Today, we're going to look at Terminal Server security in Windows Server 2008 - specifically Network Level Authentication and Encryption. Terminal Server security may be enhanced...
on
16 Feb 2008
Blog Post:
WS2008: Dynamic Link Library Loader and Address Space Load Randomization
CC Hameed
There's only three weeks to go till Launch Day. Today, we're going to talk about the Dynamic Link Library (DLL) Loader and Address Space Load Randomization. In Windows Vista and Windows Server 2008, when talking about process and thread creation, it is important to understand the role of...
on
6 Feb 2008
Blog Post:
WS2008: Windows Service Hardening
CC Hameed
Day Three of our series of posts in preparation for the Windows Server 2008 Launch and the countdown continues. If it's a weekend for you, I hope you are enjoying yourself. Only twenty-four more days to go till Launch Day. Today's post - Windows Service Hardening. Windows Service Hardening...
on
3 Feb 2008
Blog Post:
BHO's, Security and Shell Extensions
CC Hameed
Today we're going to wrap up our overview of Browser Helper Objects with a look at BHO's and Security as well as similarities between BHO's and Shell Extensions. If you recall from our first post on BHO's , a BHO is an extension to Internet Explorer that adds customization and functionality. ...
on
11 Dec 2007
Blog Post:
The Basics of Browser Helper Objects
CC Hameed
In our last few posts on Internet Explorer, we've looked at ActiveX Controls. Today we're going to take a look at the Basics of Browser Helper Objects (BHO's). We're not going to cover BHO's and Security in this post, that will be covered in our next post on BHO's. First off, what is a BHO...
on
7 Dec 2007
Blog Post:
Introduction to ActiveX - Part Three: Security and Security Zones
CC Hameed
One of the most common calls that we get relates to the warning dialogs, the "gold bar" message or even the infamous "Red X" image being displayed where the ActiveX control should be loaded. In some instances, the problem is caused by a failure of the control itself. However...
on
4 Dec 2007
Blog Post:
Windows Vista - Point & Print
CC Hameed
Here on the Perf team, we deal with quite a few printing issues. An issue we've had a few calls on since the release of Windows Vista concerns the changes made to the Point & Print functionality. Point & Print is a Windows feature that enables users to connect to a shared printer without the...
on
4 May 2007
Blog Post:
Application Compatibility - Session 0 Isolation
CC Hameed
In Windows XP, Windows Server 2003, and earlier versions of the Windows operating system, all services run in the same session as the first user who logs on to the console. This session is called Session 0. Running services and user applications together in Session 0 poses a security risk because services...
on
27 Apr 2007
Blog Post:
IE7 - Introducing the Phishing Filter
CC Hameed
Before looking at the new Phishing Filter for IE7 and what it does, it is important to understand what Phishing is, and some common Phishing techniques. Phishing is a criminal activity. Using social engineering techniques, phishers attempt to fraudulently acquire sensitive information - such as usernames...
on
16 Mar 2007