TechNet Magazine Blog

The official blog of TechNet Magazine

Browse by Tags

Related Posts
  • Blog Post: Run Forefront Commands while Working with Exchange Management Shell

    Here’s an easy solution for running Forefront commands with Exchange Management Shell and working with Forefront Security in your scripts . Follow our daily tips on: Twitter | Facebook | blog | Web | RSS
  • Blog Post: TechNet Magazine February 2009 Is Now Available Online

    The February 2009 issue of TechNet Magazine is now available online. Discover how you can use Excel and SharePoint to provide Business Intelligence in your organization, learn about logging and recovery in SQL Server and learn how to maintain a better database, see how you can automate the deployment...
  • Blog Post: Exchange Queue & A: Outlook Anywhere and IPv6, the Remote Connectivity Analyzer, and More

    Here’s just a sample of the questions answered in this month’s column: Q Our organization, which uses Exchange Server 2007, is in the planning stages of deploying standby continuous replication (SCR). We want to have a second set of data for each of the mailbox databases created on our non-clustered...
  • Blog Post: SQL Server 2008: Security

    SQL Server 2008 may be a mature product, but security continues to be an area of deliberate improvement. The new release includes numerous enhancements and new features that can help you improve the overall security of your database environment. You get new encryption and authentication capabilities...
  • Blog Post: Security Watch: Windows Domain Password Policies

    Administrators know that there are many constraints when it comes to password policies for domain user accounts.  Windows Server 2008 , however, makes at least one of those issues a thing of the past .  In the December installment of Security Watch , Derek Melber explains how Windows Server...
  • Blog Post: Security Watch: Securing a mobile workforce

    Many organizations have staff that operate from far-flung offices, telecommute, or frequently travel to visit customers. Empowering these users to easily access applications and data, regardless of location, makes them more productive. However, until recently, enabling secure remote access often meant...
  • Blog Post: Inside Windows Vista User Account Control

    You may recall that the final part of Mark Russinovich's three-part series, Inside the Windows Vista Kernel , Mark discussed kernel changes in Windows Vista related to reliability, recovery, and security. However, one notable security feature - User Account Control - was tabled for future discussion...
  • Blog Post: The Microsoft Security Intelligence Report

    What does Microsoft do with the massive amounts of data it collects from millions of Internet-connected systems and some of the world’s busiest online services? For one, twice a year it publishes the Microsoft Security Intelligence Report , which covers trends in software vulnerability disclosures...
  • Blog Post: Manage the New Download Manager in Internet Explorer 9

    Learn about the new download manager in Internet Explorer 9 , see how it works, and discover how you can manage it with Group Policy. Follow our daily tips: • facebook.com/TechNetTips • twitter.com/TechNetTips • blogs.technet.com/tnmag
  • Blog Post: Security Watch: Revisiting the 10 Immutable Laws of Security, Part 1

    It's been about 8 years since Scott Culp published " The 10 Immutable Laws of Security ." It is one of the best and most important essays on computer security ever published. And it's a must-read article that is fundamental to all work in the field of information security. If you haven't read...
  • Blog Post: Understand and Configure Geolocation in Internet Explorer 9

    The geolocation feature in Internet Explorer 9 allows Web sites to provide information that is tailored to your geographic location. Here's a look at geolocation in Internet Explorer 9 and how you can disable it on your system and systems throughout your organization. Follow our daily tips: •...
  • Blog Post: Understand and Manage Internet Explorer 9 Tracking Protection

    Internet Explorer 9 includes a new security feature called Tracking Protection . Here’s a quick look at how Tracking Protection works and how you can manage this feature . Follow our daily tips: • facebook.com/TechNetTips • twitter.com/TechNetTips • blogs.technet.com/tnmag
  • Blog Post: IEEE 802.1X Wired Authentication

    With the rise in popularity of I EEE 802.1X authentication for IEEE 802.11 wireless networks, network administrators want to use this standard for their wired network connections as well. Just as a wireless client must submit a set of credentials to be validated prior to allowing wireless frames to be...
  • Blog Post: Security Watch: Malware Inspection at the Perimeter

    Discover how the Malware Inspection feature of the Microsoft Forefront Threat Management Gateway can give you a centralized view of any suspicious traffic that might cross your firewall and allow you to take actions based on the results of the inspection—without impairing the user experience while browsing...
  • Blog Post: Four Free Tools that every Administrator should Know About

    Some of the best tools for managing Windows are available for free. Check out these 4 downloads every administrator should know about . Follow our daily tips on: Twitter | Facebook | blog | Web | RSS
  • Blog Post: Utility Spotlight: The Microsoft Security Assessment Tool

    Tracking down network security problems can be tricky and time-consuming, but we have a tool that can help. In the December issue, Lance Whitney presents the Microsoft Security Assessment Too l, a free utility that asks you describe your security environment, then provides an analysis along with recommendations...
  • Blog Post: TechNet Magazine January 2009 Issue Available Online

    The January 2009 issue of TechNet Magazine is now available online. Learn about Identity Lifecycle Manager 2, delve into Group Policy Preferences, get an overview of advanced SQL Server troubleshooting with Extended Events, discover a handy free utility for managing USB flash drives, and more. FEATURE...
  • Blog Post: August 2008 issue of TechNet Magazine available online

    The August 2008 issue of TechNet Magazine is now available online. FEATURE ARTICLES Far too often, people who are not trained database administrators end up responsible for managing one or more databases. In the latest issue of TechNet Magazine , Paul Randal offers a crash course for all those involuntary...
  • Blog Post: Active Directory Backup and Restore in Windows Server 2008

    Active Directory is one of the most critical components of your infrastructure.  If it goes down, your network is rendered useless. Therefore, to ensure business continuity and compliance, you need to have a solid backup and recovery plan in place for Active Directory. Now, you may already have...
  • Blog Post: Security: New Elevation PowerToys for Windows Vista

    You may be familiar with the Elevation PowerToys created by Michael Murgolo, which he discussed in the June 2007 issue of TechNet Magazine.  In the June 2008 issue, he's back with an update to his Elevation PowerToys for Windows Vista. You'll find enhanced Run as Administrator functionality that...
  • Blog Post: Windows 7: Recover a Local User Account Password

    Windows 7 offers limited ways to recover forgotten passwords. Here’s what you should know to be prepared before a password is lost . Follow our daily tips on: Twitter | Facebook | blog | Web | RSS
  • Blog Post: Control How Group Policy Is Applied At Logon

    The Fast Logon Optimization feature causes policy to be applied asynchronously so the user can start working more quickly. But you can configure systems to apply the latest policy updates before allowing the user to start working so you can ensure the most recent policies are applied . Here's how . ...
  • Blog Post: THE CABLE GUY: Network Policy Server

    Nothing’s more critical to the health of your enterprise than a secure network, and Network Policy Server (NPS), new in Windows Server 2008, is an important tool for manag ing access. It lets you implement organization-wide policies, providing centralized authentication, authorization, and accounting...
  • Blog Post: Protect Office 2010 Documents before Distributing Them

    Get an overview of built-in tools to help prevent unauthorized changes to your documents and to help assure recipients your documents are really from you. Follow our daily tips: • facebook.com/TechNetTips • twitter.com/TechNetTips • blogs.technet.com/tnmag
  • Blog Post: Utility Spotlight: Script Elevation PowerToys for Windows Vista

    We have a very exciting Utility Spotlight this month! One of our very talented contributing editors, Michael Murgolo, has created a powerful (and free!) set of Script Elevation PowerToys for Windows Vista. These tools allow for command line and UI-based UAC elevation of VBScript and Windows PowerShell...