See all products »
Curah! curation service
Microsoft Tech Companion App
Microsoft Technical Communities
Microsoft Virtual Academy
Server and Tools Blogs
TechNet Flash Newsletter
Cloud and Datacenter
Windows Server 2012 R2
System Center 2012 R2
Microsoft SQL Server 2012 SP1
Windows 8.1 Enterprise
See all trials »
Microsoft Download Center
TechNet Evaluation Center
Compatability & Converters
Microsoft Virtual Academy
Free Windows Server 2012 courses
Free Windows 8 courses
SQL Server training
MCSA: Windows 8
Windows Server Certification (MCSE)
Private Cloud Certification (MCSE)
SQL Server Certification (MCSE)
Second shot for certification
Born To Learn blog
Find technical communities in your area
For small and midsize businesses
For IT professionals
For technical support
For home users
Microsoft Premier Online
Microsoft Fix It Center
Security Bulletins & Advisories
International support solutions
Log a support ticket
Not an IT pro?
Microsoft Customer Support
Microsoft Community Forums
Useful tools, tips & resource for IT professionals including daily news, downloads, how-to info and practical advice from the Microsoft UK TechNet team, partners and MVP's
Day in the Life
Internet Explorer 9
Meet the Team
Microsoft Virtual Academy
Simon on strategy
SQL Server 2008 R2
SQL Server 2012
System Center 2012
System Center 2012 R2
System Center 2012 SP1
System Center Configuration Manager 2012
System Center Virtual Machine Manager 2012
weekly wrap up
Windows 7 deployment
Windows Server 2008 R2
Windows Server 2012
Windows Server 2012R2
Windows Small Business Server
Browse by Tags
Six Essentials of Mobilizing Your Workforce
By Christopher Musico , Vice President, Global Communications, AvePoint Let’s be honest with ourselves: When it comes to workers using technology that wasn’t issued by the company on their first day on the job, it’s no longer a question of if that’s going to happen in your...
20 Jan 2014
Protecting your legacy data in the great migration to the cloud
By Dana Simberkoff, Vice President, Risk Management & Compliance, AvePoint . For most organisations worldwide, it’s no longer a matter of “if” they will move to the cloud but rather “what” they will put in the cloud. Keeping everything on-premises within the...
25 Oct 2013
Lab Ops 5 - Access Rights in PowerShell
In my last post I had a section in my script to create access right to a share I had just created and as promised I wanted to dissect that a bit more. To recap what I wanted to do was to create a share with sufficient privileges to use that share for storing VMs as part of my VDI demo. In order to understand...
10 Oct 2013
Information Security Checklist: Is Your SharePoint Data Safe & Secure?
By Robert B. Yonaitis, CIPP/IT, VP of Software Engineering and Standards at AvePoint Everywhere you turn today you hear about various instances of data loss and data breaches, all of which lead to a general sense of data insecurity. These issues range from loss to theft, or even taking of personal...
19 Aug 2013
SQL Server Spruce up
Landrovers, will take a lot of pounding and neglect, but when my wife drove hers to Australia she made very sure it was properly set up for 2 years on the road Similarly SQL Server is also often out in the wild far from DBA’s and inspection from maintenance tools, like System Center . However now...
9 Aug 2013
Microsoft Security Response Center (MSRC) Progress Report (July 2013)
The fifth annual Microsoft Security Response Center (MSRC) progress report is now available and continues to highlight the year over year advancements in various Microsoft initiatives that share information to foster deeper industry collaboration, increase community-based defenses, and better protect...
6 Aug 2013
VIDEO: Crypto Primer, Understanding Cryptography, Certificates, Public/Private Key and Digital Signatures
I wrote a cryptography post quite some time ago which has proven quite popular. I thought I’d make a cartoon video of it so you could just sit back and enjoy it without having to take an active part in “reading” it… You can always just go through the previous post in your own time absorbing each of the...
12 Jun 2013
Microsoft Free Software – a personal top ten
You might think this will would make for a really short article post but actually there’s a huge amount of free tools and resource out there and I have had to restrict myself to a top ten across the server and client, based on what Simon and I have used. So please feel free to...
22 May 2013
Evaluate This–File Classification
In my last post & screen cast I showed how Dynamic Access Control (DAC) worked; the business of matching a users claims to the properties of a file (Resource Property in DAC), however the problem then becomes how do I correctly tag my files so that DAC works. You shouldn’t necessarily be doing...
19 Mar 2013
Evaluate This – Dynamic Access Control
Managing users access to the right files is a pain on any OS, the best that’s going ot happen is that no one will complain about not having access to a file while none of your sensitive company data gets into the wrong hands. In a traditional hierarchical business life was pretty easy you had a...
14 Mar 2013
Guest Post: Consumerization and SharePoint security challenges
By Geoff Evelyn I was a guest speaker on a general SharePoint Security Webcast today, which was great fun. On the agenda was security of SharePoint relating to mobile devices. Unfortunately, the session did not manage to get into that topic, and I was so keen to talk about it. To counter, I’ve provided...
3 Dec 2012
Guest Post: Secure your applications and systems in an appropriate way at minimum cost to performance and usability
Heinrich Van Der Westhuizen is a technology entrepreneur with more than 17 years’ experience in IT and has managed different businesses within Europe across multiple IT disciplines. Heinrich works for Digital Defence who provide mobile defence solutions. Secure Mobile, encrypts and protects selected...
23 Oct 2012
Guest Post: How to use Fine-Grained Passwords in Windows Server 2012
This post is brought to you by Ed Baker, Windows Server Instructor at Firebrand Training Prior to Windows Server 2008, to allow different groups of users to have different password requirements or lockout policies, the user would have to implement multiple domains or password filters. Both of which...
28 Aug 2012
Introducing Microsoft Dynamics CRM Trust Center
In April 2012, Microsoft Dynamics CRM Online took a major step towards providing transparency by becoming the first CRM service provider to register with the Cloud Security Alliance (CSA) Security, Trust & Assurance Registry program . It was announced yesterday that we’ve now gone even further by...
30 Jul 2012
The Cloud Fundamentals: New Videos Available
The Cloud Fundamentals Video Series - An Inflection Point: Cloud Computing Overview Microsoft Corporate Vice President, Trustworthy Computing, Scott Charney, gives a big picture view of cloud computing today and the forces creating change. Watch the Video The Cloud Fundamentals Video Series...
18 Jul 2012
Guest Post: Part 3–Highly Available BI: Me , Myself and I
About Chris Chris Testa-O'Neill is a Senior Consultant for Coeo Ltd, a leading provider of SQL Server Managed Support and Consulting in the UK and Europe. He is a Microsoft Most Valuable Professional (MVP) for SQL Server, sole author of the MCTS SQL Server 2008 Microsoft E-Learning courses and technical...
16 Jul 2012
Consumerization and SharePoint Security
Geoff Evelyn is a Microsoft MVP and has an active interest in SharePoint security and the consumerization of IT. He recently attended an event and has put together an article that moves beyond that event. The article talks about how personal devices as part of Consumerization have impacted...
4 Jul 2012
Microsoft Security Intelligence Report: The Evolution of Malware and the Threat Landscape – a 10-Year review
Microsoft Trustworthy Computing team have recently published the Microsoft Security Intelligence Report (SIR) which provides information about the changing global threat landscape of exploits, vulnerabilities, and malware. This special edition of the SIR provides summarized information about how malware...
29 May 2012
Contain your Enthusiasm
You may be aware that I am still keen on SQL Server and despite the changing nature of my role at Microsoft I still try and keep my hand in with the latest version. One thing I overlooked until I did SQL Relay was contained database security which is easy to use and can make your life a lot easier...
29 May 2012
Security Best Practice with Windows Azure
Bruce Kyle has been really busy recently and has written a 7 part series on how you can secure applications on Windows Azure. Whilst many of you are not developers it is always good to keep up to date on what best practices are floating around especially when it comes to IT security so I thought...
3 Apr 2012
Anti-Virus and Hyper-V, Yes or No?
The parent operating system in Hyper-V is windows server and it’s a relatively simple matter to install your standard anti-malware tools on it, but is this a good idea? You can in fact install all sorts of applications and roles in the parent/physical ...read more
9 Nov 2011
SQL Server 2012 and the private cloud
Putting up a marketing slide that says SQL Server is a good private cloud citizen is good marketing, but what’s in the box to back the claim up? My top three would be: Windows Server core . Patching is a major maintenance problem with lots of virtual ...read more
1 Nov 2011
Helping you tackle the 10 immutable laws of security
This great TechNet library article calls out ten top security issues and helps you to meet them head on to improve the security of your systems. The article tackles a heavy topic in a refreshingly lightweight style, so grab a cuppa and h ave a read here .
5 Sep 2011
Seen the latest Security Intelligence Report?
The Microsoft Security Intelligence Report (SIR) is a comprehensive evaluation of the evolving threat landscape and trends. The information can help you make sound risk-management decisions and identify potential adjustments to your security posture. Data is received from more than 600 million systems...
22 Oct 2010
New! Springboard Series TechCentre for desktop virtualisation
The great Microsoft Springboard Series has expanded to include the topic of desktop virtualisation , a broad range of offerings to meet operating system, application, data, and user virtualisation needs. This new TechNet resource offers guidance and tools to help you deploy and configure these technologies...
18 Oct 2010
© 2014 Microsoft Corporation.
Privacy & Cookies