Browse by Tags

Tagged Content List
  • Blog Post: Scale testing the world’s largest PKI… all running on WS08R2 and Hyper-V

    This week, we've been in the Enterprise Engineering Center (EEC) doing our scale testing on a project to help build the world's largest PKI. When fully implemented over the next couple of years, this PKI will be the world's largest, issuing 100s of millions of certificates from 100s of CAs to devices...
  • Blog Post: Thinking Thru Building a Virtualized Datacenter

    In most if not all enterprise customers most technology areas are driven by various teams responsible for a technology area. Some enterprise customers have more integrated technology teams then others. So how does this affect the common approach today of infusing virtualization into datacenters and building...
  • Blog Post: Top 10 Reasons for Deploying BitLocker on Branch Office Servers

    Top 10 Reasons for Deploying BitLocker on Branch Office Servers 1. Information Loss is Costly Information is the key asset of IT industry. Losing this asset or getting it in wrong hands can be equally damaging for all businesses small, medium or large. In 2004, the U.S. Department of Justice...
  • Blog Post: NAP Customer Web Cast

    Jeff Sigman (NAP Release Manager) just added a post I wrote to the NAP blog about an upcoming customer webcast. If you weren't able to make it to TechEd, you probably missed the session that fellow WinCAT PM Pat Fetty did with Hunter Ely, who is charge of Louisiana State University's IT security technology...
  • Blog Post: The Datacenter Dynamic or Otherwise

    Allen Stewart from the WinCat team I focus on the Datacenter from an Architecture standpoint across many technologies and I have expertise in Virtualization Technologies as well. Service Oriented Applications, Real Time Infrastructure. Service Oriented Infrastructure is all new buzz words to describe...
  • Blog Post: IIS 7: Extending Our Extensions Into Your Platforms

    With the introduction of IIS 7.0 in Windows Server 2008 the game has changed. IIS 7.0 is built using a modular architecture from the ground up. This means two very important things. The first is you only have to install/enable the core set of features YOU want to use, gone are the days of a monolithic...
  • Blog Post: Longhorn Beta3 Ships!

    Little late on this post, nevertheless, it is great news for the Server Division and our customers. The highly anticipated release of Longhorn Server Beta3 is available as of yesterday. Beta3 is a big deal, it is a public release and is feature complete! Beta3 enables some of the coolest scenarios purely...
  • Blog Post: The Definitive Guide to NAP Logging

    Pete Rivera is the Windows Team Lead on one of our DoD support teams and we've been working together on a NAP project. In addition to being a master of style and male fashion, Pete also puts together some great guidance for his customers. Recently, he wrote a detailed description of all the various logging...
  • Blog Post: Keep up with new blogs from Windows Server/System Center MVPs!

    Hi, all, Christa Anderson here. Here’s a quick summary of what you’ll find in the MVP blogs this week. The blogs themselves are linked below, organized according to the blogger’s MVP expertise. (MVPs can have only one official expertise, but frequently have experience with more than...
  • Blog Post: Building a Windows Server 2012 Cloud Infrastructure with PowerShell

    “Hi there! I’d like to reintroduce Josh Adams, a Senior Program Manager in the Enterprise Engineering Center ( EEC ), a facility dedicated to validating Microsoft’s next wave of enterprise solutions. Josh’s current area of focus is on building IaaS clouds with Window Server 2012...
  • Blog Post: Introducing Windows Server 2008 R2 - Free eBook

    Introducing Windows Server 2008 R2 - Free eBook Fantastic new book hot off of Microsoft Press covering Windows Server 2008 R2. Excerpt from the book: “This book is targeted primarily at Windows server administrators who are responsible for hands-on deployment and day-to-day management...
  • Blog Post: Using the FREE network security tools you get in Windows (and who doesn't love free tools?)

    In my last post I talked extensively about the use of 802.1x for network authentication (wired or wireless) and talked about the benefits of the 2 common approaches to controlling machine access (VLAN vs. Port ACL). While 802.1x remains a very popular mechanism for controlling port based access for machines...
  • Blog Post: BitLocker Protected Exchange Server 2010 Deployment - an interesting case study...

    Here is an interesting case study around how BitLocker is providing businesses a reliable way to protect sensitive data on Windows Servers. Ufone Ufone, a leading mobile phone service provider in Pakistan, wanted to offer greater mailbox capacity to employees and improved security and compliance,...
  • Blog Post: Operating System Deployment in an 802.1x Environment

    For those that have investigated, or deployed 802.1x port authentication on either a wireless or a wired network understand the benefits and additional security that such a solution offers. The ability to stop traffic at layer 2, at the port is a powerful security measure and one that has been tested...