John Baker's BritBlog
bytes by Technet
Group Policy Preferences
hyper-v server 2008 R2
internet explorer 9
IT Pro Resources
microsoft assessment and planning toolkit
microsoft deployment toolkit
Microsoft Virtual Academy
Network Access protection
Network Policy Server
Small Business Server 2008
software plus services
System Center 2012
System Center Configuration Manager
System Center Configuration Manager 2012
System Center Essentials
System Center Operations Manager
System center virtual machine manager
System center virtual machine manager 2012
Window Server 2008 R2
windows deployment services
windows deployment tools
Windows Home Server
windows phone 7
Windows Server 2003
Windows Server 2003 R2
Windows Server 2008
Windows Server 2008 R2
windows vista sp1
Browse by Tags
John Baker's BritBlog
Tagged Content List
TechNet Radio: Preserving Data Privacy and Confidentiality in the Cloud
Join me and Javier Salido, Senior Program Manager with the Trustworthy Computing Group at Microsoft, as we discuss some challenges and solutions organizations may face when trying to maintain the privacy and security of their confidential data, if they decide to migrate their infrastructure to the cloud...
14 Oct 2010
TechNet Radio: Microsoft Security Essentials
Join me and Theresa Burch, Director of Product Management at Microsoft , as we discuss Microsoft Security Essentials --- a new offering that extends Microsoft’s security platform to consumers and small businesses. Come see why people are calling Microsoft Security Essentials the easy-to-use, “install...
7 Oct 2010
Just Announced!!! Latest Beta Release of the Security Baselines for Windows Server 2008 R2 Solution Accelerator
The Solution Accelerators team is pleased to announce its latest Beta release—the Security Baselines for Windows Server 2008 R2. We’re interested in hearing your thoughts and feedback. Join the Security Baselines Beta. The best-practice guidance and security settings provided by the new Security Baselines...
30 Jul 2010
Security Compliance Manager Beta program now open!!!!
Hardening operating systems and applications, implementing security settings, and enforcing compliance standards can be resource intensive—but it doesn’t have to be. Take advantage of a free new tool from the Microsoft security experts on the Solution Accelerators team. The Security Compliance...
11 Feb 2010
IT Pro Tiki Hut Tour - Spring 2009 Registration Opens
Aloha! Get ready for Spring and join our local TechNet Events team to discuss the Windows Client OS Roadmap - why Windows Vista is an important foundation for Windows 7. We’ll discuss security and application compatibility, as well as look at the new features of the Windows 7 Beta, presentations and...
23 Feb 2009
Connecting to WMI Remotely
One of the comments on yesterdays PowerShell webcast asked how remote clients should be configured in order to allow PowerShell to make WMI calls to the remote computer. You can find a detailed explanation by going to the links below: Connecting to WMI on a Remote Computer WMI can be used...
10 Dec 2008
Just Released: The Latest Microsoft Security Intelligence Report Vol. 5
The latest version of the Microsoft Security Intelligence Report is now publicly available, with some important information if you're interested in an in-depth perspective on the changing threat landscape including software vulnerability disclosures and exploits, malicious software (malware), and potentially...
11 Nov 2008
Phishing Scams: What Can You Do?
There are a lot of phishing scams out there at the moment. The reason I decided to post this is because I almost fell for one of the social networking scams. I was in Facebook the other day and what appeared to be an instant message from a friend popped up. It said something like " You won't believe...
23 Oct 2008
Yet Another Article On Data Loss
Our TechNet Events team in the US have been talking about using BitLocker to encrypt and protect your data for the past year. During our sessions I always try to give examples of real-life scenarios of data loss or theft of laptops and drives and have talked about some of the most recent examples here...
6 Oct 2008
InformationWeek: Microsoft, Washington State Launch Legal Assault On Scareware -- Spyware
I found this interesting article in InformationWeek. You've probably had those Registry Cleaner XP pop-up ads appear on your screen. They look like a "real" Windows system message - they pop-up and tell you a critical system error has occurred and you need their software to fix it. Because it looks like...
30 Sep 2008
Windows Server 2008 Security Guide
For those of you attending TechEd 2008, I will be presenting the session MGT56-TLC - Hardening Windows Server 2008 Deployments with the Windows Server 2008 Security Guide It will cover the Windows Server 2008 Security Guide as well as the GPOAccelerator v3 . If you can’t make it don’t worry, I’ll be...
9 Jun 2008
Yet another phishing scam...this time using the IRS
It always amazes me how many people fall for these phishing emails. This one describes how they're using the IRS to get your info. The comment at the end of the article which says ".....because of this experience, he’s become a little more skeptical about all his e-mail. "I will not open anything that...
28 Aug 2007
Page 1 of 1 (12 items)
© 2013 Microsoft Corporation.
Privacy & Cookies