Browse by Tags

Tagged Content List
  • Blog Post: Scale testing the world’s largest PKI… all running on WS08R2 and Hyper-V

    This week, we've been in the Enterprise Engineering Center (EEC) doing our scale testing on a project to help build the world's largest PKI. When fully implemented over the next couple of years, this PKI will be the world's largest, issuing 100s of millions of certificates from 100s of CAs to devices...
  • Blog Post: Top 10 Reasons for Deploying BitLocker on Branch Office Servers

    Top 10 Reasons for Deploying BitLocker on Branch Office Servers 1. Information Loss is Costly Information is the key asset of IT industry. Losing this asset or getting it in wrong hands can be equally damaging for all businesses small, medium or large. In 2004, the U.S. Department of Justice...
  • Blog Post: NAP Customer Web Cast

    Jeff Sigman (NAP Release Manager) just added a post I wrote to the NAP blog about an upcoming customer webcast. If you weren't able to make it to TechEd, you probably missed the session that fellow WinCAT PM Pat Fetty did with Hunter Ely, who is charge of Louisiana State University's IT security technology...
  • Blog Post: Deployment Security Designs for Forefront IAG/UAG Virtual Appliances

    One of the most compelling capabilities being added in IAG SP2 (which will also be available in UAG) is the 'virtual appliance' installation option. A virtual appliance is a preconfigured, ready to use Virtual Machine that already has Windows Server and IAG / UAG installed. Microsoft will build the VHD...
  • Blog Post: The Definitive Guide to NAP Logging

    Pete Rivera is the Windows Team Lead on one of our DoD support teams and we've been working together on a NAP project. In addition to being a master of style and male fashion, Pete also puts together some great guidance for his customers. Recently, he wrote a detailed description of all the various logging...
  • Blog Post: WinCAT on Channel9

    I'm John Morello, the WinCAT PM for security and anywhere access which encompasses a lot of interesting Microsoft technologies, like Terminal Server, Forefront Edge, and the Certificate Server. I've been a frequent contributor to TechNet magazine on these topics so you may have read some my articles...
  • Blog Post: WinCAT the recording artist

    I've written a number of articles for TechNet magazine over the past year ( http://search.live.com/results.aspx?q=morello+site%3Amicrosoft.com%2Ftechnet&mkt=en-us&FORM=LVCP ) and they recently interviewed me for their monthly podcast series. The article from the April issue was focused on the...
  • Blog Post: Planning for Windows Server 2012 Dynamic Access Control Deployments - DAC

    HI this is Kevin Beares, Senior Community Lead for the Windows Server and System Center Group. The following post comes from Robert Paige who has written earlier on the topic of Dynamic Access Control on the Server and Cloud Partner and Customer Solutions Team Blog. Enjoy! Kevin Hi, I am Robert...
  • Blog Post: Keep up with new blogs from Windows Server/System Center MVPs!

    Hi, all, Christa Anderson here. Here’s a quick summary of what you’ll find in the MVP blogs this week. The blogs themselves are linked below, organized according to the blogger’s MVP expertise. (MVPs can have only one official expertise, but frequently have experience with more than...
  • Blog Post: BitLocker & Application Compatibility

    Recently I received an interesting question around BitLocker & Application Compatibility. In other words will an application, which works on a machine without BitLocker also work on a machine with BitLocker enabled? I believe it sounds as simple a question as important it is. Quick answer is...
  • Blog Post: Microsoft Rights Management Server (RMS) Knowhows

    RMS is one of the new Windows Server workload I'm playing around these days. As I dive into this technology quite a few interesting scenarios are coming my way every day. In an effort to consolidate the useful know-hows into something like an RMS FAQ (Frequently Asked Questions) I'm starting this *live...
  • Blog Post: Using the FREE network security tools you get in Windows (and who doesn't love free tools?)

    In my last post I talked extensively about the use of 802.1x for network authentication (wired or wireless) and talked about the benefits of the 2 common approaches to controlling machine access (VLAN vs. Port ACL). While 802.1x remains a very popular mechanism for controlling port based access for machines...
  • Blog Post: BitLocker Protected Exchange Server 2010 Deployment - an interesting case study...

    Here is an interesting case study around how BitLocker is providing businesses a reliable way to protect sensitive data on Windows Servers. Ufone Ufone, a leading mobile phone service provider in Pakistan, wanted to offer greater mailbox capacity to employees and improved security and compliance,...
  • Blog Post: Operating System Deployment in an 802.1x Environment

    For those that have investigated, or deployed 802.1x port authentication on either a wireless or a wired network understand the benefits and additional security that such a solution offers. The ability to stop traffic at layer 2, at the port is a powerful security measure and one that has been tested...