OK. 4 out of N IT Pro bloggers can not be wrong, right? One of the big ideas driving IT Pro blogs is that you start watching a couple of blogs because you somehow connect with the blogger. You read the blogs because the blogger "gets it". Let's test the theory, shall we?
Check out this link, Grins Guaranteed (maybe even LOLs). Let's see how far this "word of mouth" idea goes...
Note: Work Safe, but will waste a couple of minutes of your time with subversive marketing messages:-)
Redmond Magazine today lists the top 10 Microsoft blogs. 6 of them are on blogs.technet.com. Yay TN bloggers, keep it up. Less than 6 months old, and with zero "promotion" - you are having impact.
At TechReady1 both BV and SS mentioned reading Microsoft blogs in their keynotes.
As TechReady1 closes down, I am wondering about role-based bloggers. We have good evangelist representation, and some product dev and product support folks, where are the TSPs bloggers???
Exchange 2003 Clustering Features
Understanding Exchange Server 2003 Clustering
Look at the results of your MBSA scans in Visio to get that right-brain stuff going on the problem. Use the Visio Connector for MBSA (Microsoft Baseline Security Analyzer). The VCMBSA is a Visio COM add-in that allows IT administrators to view the results of an MBSA network scan on a Visio network diagram. How cool is that?
This was demo'd at MMS in Vegas and got a lot of buzz. It is one of those things you have to see to get - how ironic.
Oh, and did I mention lets you import logs from runs on other systems?
Check it out.
Studies have shown that human error—primarily accidental file deletion or modification—causes over one-third of all data loss. The financial impact of replacing the lost data is at the least an inconvenience and at the worst a critical blow that can jeopardize daily operations for the IT staff, and cripple productivity for the hapless employee who mistakenly hit Save instead of Save As.
Microsoft Windows Server 2003 includes Shadow Copies of Shared Folders to help prevent inadvertent loss of data. Shadow Copies of Shared Folders helps alleviate data loss by creating shadow copies of files or folders that are stored on network file shares at predetermined time intervals. A shadow copy is a point in time copy that for all intents and purposes - to the end user- looks, talks, and acts like a backup. Once the IT department sets it up (it is NOT on by default), users can do single-file restore themselves.
"How do you like me so far?"
This white paper, written for IT architects and system administrators, describes the functionality of Shadow Copies of Shared Folders the fundamentals of how to design a shadow copy strategy, and the basic steps for setting up and using Shadow Copies of Shared Folders on both servers and clients.
After you read the white paper, read the caveat on Adi's blog. Then: turn on VSS, educate your users, and rock on with the extra time you will save.
V1 of the Protect Your PC site launched in August 2003 as a response to the Blaster virus and has since helped protect millions of customers around the world. The new version of the site continues the mission and provides novice users the basic guidance they need to protect their computers online, with easy language that they can understand. Tell all your friends and family and get them of your backs (a bit). With this new and improved version you get:
Read this new paper to understand some enterprise program management best practices from the Microsoft IT group.
Enterprise Project Management at Microsoft. Overview of how Microsoft IT uses Microsoft Office Enterprise Project Management solution to provide a central project management repository that enables integration with other line-of-business and consolidated reporting systems.
This article says that Microsoft's research indicates that 85% of corporate users and 97% of consumers are running their machines as administrators, according to Neil Charney, a director of product management at the software vendor. Charney said the company is hoping those percentages will decline as a result of the User Account Protection feature.
Read up on UAP here.
This article has some good food for thought on SOX impacts on IT, for example:
"There appears to be a prevailing view that SOX is fundamentally a set of regulations that have to be complied with and provided IT Directors and CIOs ‘tick the various boxes’ SOX compliance is in the bag. This is a perilous position because SOX is different from other forms of regulations in three ways: One, external people such as auditors and regulatory bodies check to ensure that controls are in place not only on paper but are being used as well. Two, this legislation has significant penalties and fines built into it. CEOs and FDs can fined up to $20million and serve up to 10 years in prison under the Act. Three, material weaknesses have to be reported publicly in financial statements, the impact on share prices for non-compliance with SOX is hardly likely to be positive. "
Check out the parent site: ITSM Portal International Web Site
There is a potential security issue with RDP - READ THE ADVISORY.
While you are there, it is a good idea to check the main page and review the previous advisories.
IT Showcase has just published a technical paper on how the internal Microsoft IT org configures SMTP gateways. Check it out: Configuring Exchange SMTP Gateways at Microsoft
You may also want to read:
Evan's notes on disk sizing and Marcuss' post aggregating some Showcase materials on SANs. Enjoy
Here are some OneNote resources for training your users:
Downloadable PPT courses:
Get to Know OneNote
Organize Your OneNote Notebook
Note Flags and Search
Audio and Video Notes
Trial version and free OneNote in Education CD
OneNote 2003 for Students and Professors (and midsize business IT Pros and users...)
TechNet online courses and clinics provide hands-on learning to help you build the skills you need to keep systems up and running, prepare for certification, or deploy an infrastructure.
These courses and clinics are accessible FREE to TechNet Plus subscribers for a limited time (offer expires September 30, 2005).
Not a subscriber yet? Buy online here.
Courses and clinics now available include:
2279: Planning, Implementing, and Maintaining a Microsoft® Windows Server™ 2003 Active Directory® Infrastructure
2826: Upgrading to Microsoft® Internet Security and Acceleration Server 2004
Security Clinics and Hands On Labs
Clinic 2263: Exam Preparation for the MCDST Certification
Using the Solution Accelerator for Business Desktop Deployment Standard Edition
Microsoft Windows XP SP2 Clinics and Hands On Labs
Networkworld today notes another spoofed mail disguised as a Microsoft secbul (MS05-039).
Be sure to read this article that tells you how to detect a bogus update e-mail, and spread it around to your friends and family to educate them.
Also keep an eye on the security incidents page.
Susbscribe to the security udpates RSS Feed.
You can also search the secbuls here.
Jason Leznek, senior product manager in Microsoft's Windows and Enterprise Management division, is quoted today in eWeek "There have been more WSUS downloads in the first month of release than SUS's downloads in its first year."
Read the WSUS Deployment Guide
Others who downloaded Deploying Microsoft Windows Server Update Services also downloaded:
1. Microsoft Windows Server Update Services Operations Guide
2. Microsoft Windows Update Services Overview
3. Step-by-Step Guide to Getting Started with Microsoft Windows Server Update Services
4. Update for Background Intelligent Transfer Service (BITS) 2.0 and WinHTTP 5.1 Windows 2000 (KB842773)
5. Update for Background Intelligent Transfer Service (BITS) 2.0 and WinHTTP 5.1 Windows Server 2003 (KB842773)
The new download center has launched with cool new (really helpful) features to save IT Pros time - like the "affinity" download suggestions. For example, DL the anti-spyware beta, and at the bottom of the page you can learn that:
Others who downloaded Microsoft® Windows AntiSpyware (Beta) also downloaded:
How cool is that? No, seriously, how cool is it? Leave feedback and let us know.
But wait, if you call now you also get the clock - pick your speed, and get an estimate of how long your DL is gonna take you so you can make your beverage consumption plans while waiting. Aaaand you also get, free of charge, a scoped search engine.
The new password management paper is part of the refresh of the Microsoft Identity and Access Management Series is available from the Microsoft Download Center. It is also available on TechNet
The Overview and Planning materials (chapters 1 through 4) are meant to aid architects and IT professionals in understanding the variety of threats posed by not proactively managing passwords or enforcing strong password policies. They then examine the options available to increase security and improve manageability. Finally, these materials examine the problems a fictitious company faces and apply these design principles to architect a solution that will mitigate these threats.
The Implementation material provides a concise set of detailed instructions for managing both internal user account passwords and extranet user identities and passwords, and for utilizing Group Policy to enforce "strong" password policy. The Test and Operations content illustrates how to validate the proper installation and configuration of these systems, perform ongoing maintenance tasks, and troubleshoot common issues should they arise.
Microsoft Security Advisory (902333) "Browser Windows Without Indications of Their Origins may be Used in Phishing Attempts" has just been released. Point your IT staff and more advanced users there to educate them on how to spot attempts to make them into Phishing victims.
The advisory includes links to more security resources for end users, like the Security at Home site and the Protect Your PC site.
Oh, and BTW, I invite you to join me in leaving props for the SRC for starting this advisory site to disseminate important security information to supplement the secbulls.Then join the LUA bandwagon and go check out the non-admin wiki - some great tools and howtos there.
TS or audit folder access using the Effective Permissions tool built-in to Windows XP and Windows Server 2003.To view effective permissions on files and folders:
You must have permission to read the membership information. If the specified user or group is a domain object, you must have permission to read the object’s group information on the domain. Here are some relevant default domain permissions:
For more information about how to use the Effective Permissions tool, please review the following topic: View Effective Permissions on Files and Folders
Go check out the new MOM team blog. If you have any doubts about how important subscribing to their feed will be to your future as an enteprise IT Pro - search for some of the TechNet blog posts from MMS 2005.
E-Learn SQL Server 2005 with free Microsoft Learning courses till November 1, 2006. Online training, skills assessments, books, and classroom training all contribute to help you make a smooth transition to Microsoft SQL Server 2005 and Microsoft Visual Studio 2005. Whether you are interested in database administration, database development, or business intelligence, you will find classroom training, books, free skills assessments, and free* e-learning to help you get up to speed on the newest features of the software.