See all products »
Curah! curation service
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Server and Tools Blogs
TechNet Flash Newsletter
Cloud and Datacenter
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Microsoft Download Center
TechNet Evaluation Center
Compatability & Converters
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Second shot for certification
Born To Learn blog
Find technical communities in your area
For small and midsize businesses
For IT professionals
For technical support
For home users
Microsoft Premier Online
Microsoft Fix It Center
Security Bulletins & Advisories
International support solutions
Log a support ticket
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
TechNet Magazine Blog
The official blog of TechNet Magazine
Exchange 2007 Sp1
High Performance Computing
Inside the Magazine
Mobile Device Manager
Network Access Protection
Office Communication Server
Software plus Services
USB Flash Drives
Windows and Macs
Windows Compute Cluster Server
Windows Deployment Services
Windows PE 2.0
Windows Server 2008
Browse by Tags
TechNet Magazine Blog
Understand and Configure Geolocation in Internet Explorer 9
The geolocation feature in Internet Explorer 9 allows Web sites to provide information that is tailored to your geographic location. Here's a look at geolocation in Internet Explorer 9 and how you can disable it on your system and systems throughout your organization. Follow our daily tips: •...
4 May 2011
Understand and Manage Internet Explorer 9 Tracking Protection
Internet Explorer 9 includes a new security feature called Tracking Protection . Here’s a quick look at how Tracking Protection works and how you can manage this feature . Follow our daily tips: • facebook.com/TechNetTips • twitter.com/TechNetTips • blogs.technet.com/tnmag
29 Apr 2011
Manage the New Download Manager in Internet Explorer 9
Learn about the new download manager in Internet Explorer 9 , see how it works, and discover how you can manage it with Group Policy. Follow our daily tips: • facebook.com/TechNetTips • twitter.com/TechNetTips • blogs.technet.com/tnmag
21 Apr 2011
Control How Group Policy Is Applied At Logon
The Fast Logon Optimization feature causes policy to be applied asynchronously so the user can start working more quickly. But you can configure systems to apply the latest policy updates before allowing the user to start working so you can ensure the most recent policies are applied . Here's how . ...
25 Nov 2010
Protect Office 2010 Documents before Distributing Them
Get an overview of built-in tools to help prevent unauthorized changes to your documents and to help assure recipients your documents are really from you. Follow our daily tips: • facebook.com/TechNetTips • twitter.com/TechNetTips • blogs.technet.com/tnmag
16 Sep 2010
Windows 7: Recover a Local User Account Password
Windows 7 offers limited ways to recover forgotten passwords. Here’s what you should know to be prepared before a password is lost . Follow our daily tips on: Twitter | Facebook | blog | Web | RSS
22 Apr 2010
Run Forefront Commands while Working with Exchange Management Shell
Here’s an easy solution for running Forefront commands with Exchange Management Shell and working with Forefront Security in your scripts . Follow our daily tips on: Twitter | Facebook | blog | Web | RSS
19 Feb 2010
Four Free Tools that every Administrator should Know About
Some of the best tools for managing Windows are available for free. Check out these 4 downloads every administrator should know about . Follow our daily tips on: Twitter | Facebook | blog | Web | RSS
8 Jan 2010
Security Watch: Malware Inspection at the Perimeter
Discover how the Malware Inspection feature of the Microsoft Forefront Threat Management Gateway can give you a centralized view of any suspicious traffic that might cross your firewall and allow you to take actions based on the results of the inspection—without impairing the user experience while browsing...
20 Jan 2009
TechNet Magazine February 2009 Is Now Available Online
The February 2009 issue of TechNet Magazine is now available online. Discover how you can use Excel and SharePoint to provide Business Intelligence in your organization, learn about logging and recovery in SQL Server and learn how to maintain a better database, see how you can automate the deployment...
13 Jan 2009
TechNet Magazine January 2009 Issue Available Online
The January 2009 issue of TechNet Magazine is now available online. Learn about Identity Lifecycle Manager 2, delve into Group Policy Preferences, get an overview of advanced SQL Server troubleshooting with Extended Events, discover a handy free utility for managing USB flash drives, and more. FEATURE...
9 Dec 2008
Exchange Queue & A: Outlook Anywhere and IPv6, the Remote Connectivity Analyzer, and More
Here’s just a sample of the questions answered in this month’s column: Q Our organization, which uses Exchange Server 2007, is in the planning stages of deploying standby continuous replication (SCR). We want to have a second set of data for each of the mailbox databases created on our non-clustered...
13 Oct 2008
Security Watch: Revisiting the 10 Immutable Laws of Security, Part 1
It's been about 8 years since Scott Culp published " The 10 Immutable Laws of Security ." It is one of the best and most important essays on computer security ever published. And it's a must-read article that is fundamental to all work in the field of information security. If you haven't read...
30 Sep 2008
August 2008 issue of TechNet Magazine available online
The August 2008 issue of TechNet Magazine is now available online. FEATURE ARTICLES Far too often, people who are not trained database administrators end up responsible for managing one or more databases. In the latest issue of TechNet Magazine , Paul Randal offers a crash course for all those involuntary...
14 Jul 2008
Security: New Elevation PowerToys for Windows Vista
You may be familiar with the Elevation PowerToys created by Michael Murgolo, which he discussed in the June 2007 issue of TechNet Magazine. In the June 2008 issue, he's back with an update to his Elevation PowerToys for Windows Vista. You'll find enhanced Run as Administrator functionality that...
15 May 2008
Active Directory Backup and Restore in Windows Server 2008
Active Directory is one of the most critical components of your infrastructure. If it goes down, your network is rendered useless. Therefore, to ensure business continuity and compliance, you need to have a solid backup and recovery plan in place for Active Directory. Now, you may already have...
30 Apr 2008
SQL Server 2008: Security
SQL Server 2008 may be a mature product, but security continues to be an area of deliberate improvement. The new release includes numerous enhancements and new features that can help you improve the overall security of your database environment. You get new encryption and authentication capabilities...
16 Apr 2008
IEEE 802.1X Wired Authentication
With the rise in popularity of I EEE 802.1X authentication for IEEE 802.11 wireless networks, network administrators want to use this standard for their wired network connections as well. Just as a wireless client must submit a set of credentials to be validated prior to allowing wireless frames to be...
4 Mar 2008
Security Watch: Windows Domain Password Policies
Administrators know that there are many constraints when it comes to password policies for domain user accounts. Windows Server 2008 , however, makes at least one of those issues a thing of the past . In the December installment of Security Watch , Derek Melber explains how Windows Server...
26 Dec 2007
THE CABLE GUY: Network Policy Server
Nothing’s more critical to the health of your enterprise than a secure network, and Network Policy Server (NPS), new in Windows Server 2008, is an important tool for manag ing access. It lets you implement organization-wide policies, providing centralized authentication, authorization, and accounting...
25 Dec 2007
Utility Spotlight: The Microsoft Security Assessment Tool
Tracking down network security problems can be tricky and time-consuming, but we have a tool that can help. In the December issue, Lance Whitney presents the Microsoft Security Assessment Too l, a free utility that asks you describe your security environment, then provides an analysis along with recommendations...
20 Dec 2007
The Microsoft Security Intelligence Report
What does Microsoft do with the massive amounts of data it collects from millions of Internet-connected systems and some of the world’s busiest online services? For one, twice a year it publishes the Microsoft Security Intelligence Report , which covers trends in software vulnerability disclosures...
18 Dec 2007
Security Watch: Securing a mobile workforce
Many organizations have staff that operate from far-flung offices, telecommute, or frequently travel to visit customers. Empowering these users to easily access applications and data, regardless of location, makes them more productive. However, until recently, enabling secure remote access often meant...
8 Nov 2007
Utility Spotlight: Script Elevation PowerToys for Windows Vista
We have a very exciting Utility Spotlight this month! One of our very talented contributing editors, Michael Murgolo, has created a powerful (and free!) set of Script Elevation PowerToys for Windows Vista. These tools allow for command line and UI-based UAC elevation of VBScript and Windows PowerShell...
24 May 2007
Inside Windows Vista User Account Control
You may recall that the final part of Mark Russinovich's three-part series, Inside the Windows Vista Kernel , Mark discussed kernel changes in Windows Vista related to reliability, recovery, and security. However, one notable security feature - User Account Control - was tabled for future discussion...
17 May 2007
© 2014 Microsoft Corporation.
Privacy & Cookies