May • June2006May • June 2006

Special Report: Security:Deconstructing Common Security Myths

Jesper M. Johansson and Steve Riley

Security:First Look: New Security Features in Windows Vista

Chris Corio

Security:Behind The Scenes: How Microsoft Built a Unified Approach to Windows Security

Robert Hensing

Security:19 Smart Tips for Securing Active Directory

Does Active Directory keep you up at night? One could easily understand why. It is most likely the largest and most critical distributed system in your enterprise. Along with Sean Deuby

Security:Reduce Your Risk: 10 Security Rules To Live By

Wes Miller

Security:Group Policy: Ins And Outs Of Delegation And Control

Jeremy Moskowitz

Desktop Deployment:Techniques for Simplifying Desktop Image Creation

Shelly Bird

Windows Server 2003 R2:Get Control of File System Resources with Windows Server 2003 R2

John Savill

Windows Server 2003 R2:Take Back Your Bandwidth With New Replication Features In Windows Server 2003 R2

Alan von Weltin

Windows Server 2003 R2:Give Your Server An Identity: New Roles In Windows Server 2003 R2

Derek Melber

https://technet.microsoft.com/en-us/library/bb978519(v=msdn.10)
https://technet.microsoft.com/en-us/library/cc135917(v=msdn.10)

Columns

From the Editor:The premiere issue of TechNet Magazine,
The premiere issue of TechNet Magazine, published almost two years ago, featured a security theme. Since then, security has been the topic of many of our most popular articles. And with good reason—as the number of potential threats increase, systems have also become more complex with more entry points per system, and the number of users connected in an enterprise is also growing. Joshua Trupin
Toolbox:New Products for IT Professionals
Cobian BackupGreg Steen
Utility Spotlight:Automate Device Driver Integration
When you’re deploying thousands of Windows-based computers, configuring a single system and duplicating its hard drive (or system image) onto other corporate computers can save you a lot of time and free up IT resources. Michael Murgolo
SQL Q&A:Server Tuning, Log Shipping, Mirroring, and More
Your queries answered by Microsoft IT professionals.Nancy Michell
How IT Works:Encrypting File System
Mobile users can be a pain in the neck for the IT pro. The convenience and portability of laptops must be weighed against the potential for data loss and the possible compromise of confidential company information. Randy Muller
Beta Box:First Look at Exchange 12
In much of corporate America, e-mail is now the most important means of communication. But each corporate citizen views e-mail differently. Workers want access to corporate e-mail at home and on the go. Laura Euler
Hey, Scripting Guy!:We All Scream for Security Descriptors
Sometimes things are just more complicated than they should be. Take a simple little task like deciding which ice cream to order. Back when the Scripting Guys were growing up this was easy; for the most part, you had your choice between chocolate and vanilla. The Microsoft Scripting Guys
Inside Microsoft.com:Moving Microsoft Update Downloads to x64
One of the responsibilities of the Microsoft. com operations team is to manage the infrastructure that supports the Windows Update and Microsoft Update services, which have client bases in the hundreds of millions and growing. Deighton Maragh and Mark W. Roellich
Serving the Web:Nine Tips to Enhance IIS Security
Securing your IIS 6.0 installation is an important task. The amount of work required can vary greatly depending on the complexity of your application as well as your infrastructure and how these combine with your need to secure content.Brett Hill
Field Notes:Building Sound Walls
As IT professionals, we need to build an ordered realm. We want the citizens within our network realm to work and live safely and securely, and we want to protect the assets of this realm. We know there are barbarians out there who might want to acquire our assets and use them for their own nefarious ends, so we build a wall around our corporate computing assets. Mark Scott
TechNet Update:Tools from the TechNet Security Center
You are probably all too aware that IT security is about much more than just installing a few key tools and applications and then keeping current with security updates. You not only have to keep your systems secure on a day-to-day basis by taking the right preventative measures and having the most appropriate security and management tools, but you also have to find ways to foresee future threats and implement strategies to combat them. Geof Wheelwright
Windows Confidential:The Intranet Can Be a Scary Place
If you’ve installed Windows Server™ 2003, you’ve probably discovered that Microsoft® Internet Explorer® doesn’t behave quite the same as it used to. You get prompted for your domain password more often, script doesn’t run, downloading from Web Folders is blocked—it’s just not fun. Raymond Chen