TechNet Magazine: June 2010

ff721823(v=msdn.10).md Editor’s Note: Securing the Cloud

By Lafe Low

One of the greatest concerns IT managers voice over moving to cloud computing is security. How secure will my data be when stored in the cloud? How secure is the data in transit? Those are indeed valid questions and concerns. While technology vendors and cloud computing service providers have gone considerable distances to protect data and assuage any customer worries, data security remains the prevailing concern. Read more…

ff720178(v=msdn.10).md
ff742836(v=msdn.10).md
ff721824(v=msdn.10).md
ff720178(v=msdn.10).md
ff709382(v=msdn.10).md
ff718600(v=msdn.10).md
ff721826(v=msdn.10).md

 


Columns

Windows PowerShell: Implicit Remoting
By Don Jones

A little-known feature in Windows PowerShell 2.0 can easily add an incredible amount of flexibility to your environment.  Implicit remoting makes it easier to use cmdlets that are only available on a remote computer and have them behave pretty much the same way they would if they were installed locally.

 

Windows Confidential: Start Me Up?
By Raymond Chen

What happened to the Fast Items on your Start menu? They got folded in and sorted alphabetically with your other programs.

 

Exchange Q&A: Migrating Mailboxes
By Henrik Walther

Moving and securing Exchange mailboxes can be tricky business, especially across forests or from one domain server to another.

Toolbox: New Products for IT Professionals
By Greg Steen

This month’s tools include a utility for helping users manage their own passwords, the latest iteration of a venerable server configuration utility, and a handy copy utility that works on files of all sizes.

 

Utility Spotlight: Bing Webmaster Center
By Lance Whitney

The Webmaster Center can tell you what pages Bing is indexing or crawling, and the keywords people are using to find them.

Geek of All Trades: Automate Baseline Security Settings
By Greg Shields

Microsoft continues to strengthen its tools for centrally configuring computer settings. Group Policy and Group Policy Preferences have long provided a simple solution for enforcing security policy via Active Directory. System Center Configuration Manager (SCCM) takes this enforcement a step further through its Desired Configuration Management (DCM) functionality.

 

The Cable Guy: DirectAccess with Network Access Protection (NAP)
By Joseph Davies

DirectAccess is good. Team it up with Network Access Protection and the two are even better. DirectAccess with NAP lets you specify that only DirectAccess clients that meet system health requirements can reach intranet resources across the Internet.