• Exploring The Windows Firewall

    Mobility has changed computer threats and the techniques that guard against them. As laptops wander outside the perimeter and come back to the network, you need better ways to protect your systems. Find out how you can use Windows Firewall to protect your computers—on the Internet and on your own internal network. In this article, Steve Riley discusses inbound vs. outbound protection, the Windows Filtering Platform, the Advanced Security interface, and network profiles.

    http://www.microsoft.com/technet/technetmag/issues/2007/06/VistaFirewall/default.aspx

    Urs

     

  • Keys to Protecting Data with BitLocker Drive Encryption

    BitLocker serves two very important purposes: it provides both full-volume data encryption and a way to validate the integrity of early startup components before Windows Vista starts. Check out this TechNet Magazine article for an overview of how BitLocker works and how it can help IT professionals protect their organizations with full volume encryption, secure decommissioning, and more.

    http://www.microsoft.com/technet/technetmag/issues/2007/06/BitLocker/default.aspx

    Urs

     

  • Take a Tour Through the Features and User Interface of Forefront Client Security

    Microsoft Forefront Client Security provides three important functions: protection, control, and reporting. This TechNet Library topic introduces the Forefront Client Security user interface and discusses the major features in more detail. As this library topic is intended to provide an overview, links are provided to more detailed reference materials. Additionally, a detailed description of the user interface and available features are available through the Client Security Administrator's Guide.

    TechNet Library: http://technet.microsoft.com/en-us/library/bb432639.aspx
    Client Security Administrator's Guide: http://technet.microsoft.com/en-us/library/bb434993.aspx

    Urs


     

  • The Struggle to Protect Enterprise Data

    The problem of enterprise data protection is so big, companies have just begun wrapping their arms around it. Most experts and customers admit that in most companies the process of tracking down every piece of valuable company data -- and applying the appropriate tools to shield information from unwanted access or misuse -- remains in its beginning stages. The InfoWorld article discusses how enterprise companies are discovering their vulnerabilities, and the steps they are taking to address those vulnerabilities.

    http://www.infoworld.com/article/07/06/25/26FEdataprotection_1.html

    Urs

     

  • Inside Windows Vista User Account Control

    User Account Control (UAC) is an often misunderstood feature in Windows Vista, see online article by Mark Russinovich on TechNet:
    http://www.microsoft.com/technet/technetmag/issues/2007/06/UAC/default.aspx

    Urs