Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
ff721823(v=msdn.10).md | Editor’s Note: Securing the Cloud By Lafe Low One of the greatest concerns IT managers voice over moving to cloud computing is security. How secure will my data be when stored in the cloud? How secure is the data in transit? Those are indeed valid questions and concerns. While technology vendors and cloud computing service providers have gone considerable distances to protect data and assuage any customer worries, data security remains the prevailing concern. Read more… |
ff720178(v=msdn.10).md |
ff742836(v=msdn.10).md |
ff721824(v=msdn.10).md |
ff720178(v=msdn.10).md |
ff709382(v=msdn.10).md |
ff718600(v=msdn.10).md |
ff721826(v=msdn.10).md |
Windows PowerShell: Implicit Remoting A little-known feature in Windows PowerShell 2.0 can easily add an incredible amount of flexibility to your environment. Implicit remoting makes it easier to use cmdlets that are only available on a remote computer and have them behave pretty much the same way they would if they were installed locally.
Windows Confidential: Start Me Up? What happened to the Fast Items on your Start menu? They got folded in and sorted alphabetically with your other programs.
Exchange Q&A: Migrating Mailboxes Moving and securing Exchange mailboxes can be tricky business, especially across forests or from one domain server to another. |
Toolbox: New Products for IT Professionals This month’s tools include a utility for helping users manage their own passwords, the latest iteration of a venerable server configuration utility, and a handy copy utility that works on files of all sizes.
Utility Spotlight: Bing Webmaster Center The Webmaster Center can tell you what pages Bing is indexing or crawling, and the keywords people are using to find them. |
Geek of All Trades: Automate Baseline Security Settings Microsoft continues to strengthen its tools for centrally configuring computer settings. Group Policy and Group Policy Preferences have long provided a simple solution for enforcing security policy via Active Directory. System Center Configuration Manager (SCCM) takes this enforcement a step further through its Desired Configuration Management (DCM) functionality.
The Cable Guy: DirectAccess with Network Access Protection (NAP) DirectAccess is good. Team it up with Network Access Protection and the two are even better. DirectAccess with NAP lets you specify that only DirectAccess clients that meet system health requirements can reach intranet resources across the Internet. |