Ramblings from another nerd on the grid
This document provides a practitioner’s perspective and contains a set of practical techniques to help IT executives protect an enterprise Active Directory® environment. Active Directory plays a critical role in the IT infrastructure, and ensures the harmony and security of different network resources in a global, interconnected environment. The methods discussed are based largely on the Microsoft® Information Security and Risk Management (ISRM) organization’s experience, which is accountable for protecting the assets of Microsoft IT and other Microsoft Business Divisions, in addition to advising a selected number of Microsoft Global 500 customers.
Go get it @ http://www.microsoft.com/en-us/download/details.aspx?id=38785
This poster illustrates and explains the new world of identity and authentication in Office 2013 and Office 365. Two scenarios illustrate how identities are provisioned and how those identities are authenticated completely in the Microsoft cloud or in a hybrid (on-premises and Microsoft cloud) topology.
Go get the poster @ http://www.microsoft.com/en-us/download/details.aspx?id=38193
Since many other operating system vendors are also adopting this MIT-developed authentication protocol, Kerberos Version 5 will increasingly become a centerpiece of enterprise-level interoperability. Kerberos provides secure user authentication with an industry standard that permits interoperability. The Active Directory domain controller maintains user account and log-in information to support the Kerberos service.
Want to learn more? Be sure to bookmark the Kerberos Survival Guide on the TechNet WIKI at http://social.technet.microsoft.com/wiki/contents/articles/4209.kerberos-survival-guide.aspx.
Test Lab Guides (TLGs) allow you to get valuable hands-on experience with new products and technologies using a pre-defined and tested methodology that results in a working configuration. When you use a TLG to create a test lab, instructions define what servers to create, how to configure the operating systems and system services, and how to install and configure any additional products or technologies. A TLG experience enables you to see all of the components and the configuration steps on both the front-end and back-end that are required for a product or technology or for a multi-product or technology solution.
Sound interesting? Check them out at http://social.technet.microsoft.com/wiki/contents/articles/1262.test-lab-guides.aspx.
Now this is a simulator and it is for sale at Costco, if you can afford it.
This guide is the third edition of the first volume in a series about Windows Azure. It demonstrates how you can adapt an existing on-premises ASP.NET application to one that operates in the cloud by introducing a fictitious company named Adatum that modifies its expense tracking and reimbursement system, aExpense, so that it can be deployed to Windows Azure. To illustrate the wide range of options and features in Windows Azure, this guide and the code examples available for it show a step-by-step migration process that includes using Windows Azure Web Sites, Virtual Machines, Cloud Services, and SQL Database. Together with useful information on developing, deploying, managing, and costing cloud-hosted applications, this guide provides you with a comprehensive resource for moving your applications to Window Azure.
Go get it @ http://www.microsoft.com/en-us/download/details.aspx?id=29252
Microsoft is looking for great student research on the future of cybersecurity policy. If you have conducted or plan to conduct such research, read on for information on how you can win a $5,000 cash prize for your research in our Cybersecurity 2020 essay contest.
Get the full details at http://blogs.technet.com/b/security/archive/2013/03/21/cybersecurity-2020-student-essay-contest.aspx.
See the official rules and information at http://www.microsoft.com/security/gssd/contest.aspx.
I want to thank the folks at Bing for the smile today. Very Cute. Because he can see the nude beach. LOL