All TechNet Magazine Topics
The Cable Guy: Support for IPv6 in Windows Server 2008 R2 and Windows 7
Joseph Davies - July 2009
Windows Server 2008 R2 and Windows 7 offer new features that support IPv6 for local and remote connectivity and for simplified management of host settings, as Joseph Davies explains.
Geek of all Trades: Control Network Access Using DHCP Enforcement
Greg Shields - May 2009
NAP monitors the health of specified computers when they attempt to connect to a network and includes a number of mechanisms to enforce health requirements. This article gives readers an overview of these enforcement mechanisms and, as an example, takes a closer look at setting up DHCP enforcement
ISA Server: A Guide to Securing ISA Server 2006
Alan Maddison - September 2008
Many organizations rely on ISA Server 2006 to secure their environment, but few take the important step of securing ISA Server itself. Here’s a guide to using the Security Configuration Wizard and Administrative roles to limit its attack surface and secure your ISA Server 2006 implementation.
Security: Managing the Windows Vista Firewall
Jesper M. Johansson - June 2008
The recent update to the Windows Vista Firewall offers some impressive new features that make it a compelling choice for the corporate environment. Jesper M. Johansson gives a brief overview of the evolution of the Windows Firewall and delves into enhancements—such as new rules and profiles, domain isolation, and encryption—that will have administrators taking a closer look.
The Cable Guy: Troubleshooting NAP Enforcement
Joseph Davies - April 2008
Troubleshooting enforcement behaviors in the Network Access Protection platform can be challenging. The Cable Guy explains how NAP health policy evaluation works and how you can troubleshoot the most common issues.
Special Coverage: Windows Server 2008: Policy-Driven Network Access with Windows Server 2008
Ian Hameroff and Amith Krishnan - March 2008
How do you allow network access to those who need it without sacrificing security? See how new technologies in Windows Server 2008, such as Windows Firewall with Advanced Security and Network Access Protection, let you implement a policy-based approach to help you achieve this goal. Ian Hameroff and Amith Krishnan 62 Configuring Roles with Server Manager A DNS server need not be a print server. One approach Windows Server 2008 takes to improve security and manageability is to simplify server roles so you can easily install only the tools and services you need, and nothing more. Here's an introduction to using Server Manager for configuring roles and simplifying deployments.
The Cable Guy: Migrating Your Intranet to IPv6 with ISATAP
Joseph Davies - March 2008
Getting ready to move to IPv6? The Cable Guy explains how you can use an IPv6 transition technology to get IPv6 connectivity and migrate to an IPv6-capable intranet.
The Cable Guy: IEEE 802.1X Wired Authentication
Joseph Davies - February 2008
IEEE 802.1X authentication provides an additional security barrier for access to your intranet. See how Windows Vista and Windows Server 2008 make it a snap to implement IEEE 802.1X authentication for your wired network.
The Cable Guy: DNS Enhancements in Windows Server 2008
Joseph Davies - January 2008
Windows Server 2008 includes many DNS server enhancements. Take a close look at how these updates make name resolution faster, improve support for IPv6, and add greater flexibility to DNS administration.
Networking: Track Down Elusive Network Problems
Christopher Stoneff - December 2007
You've got a machine that isn't communicating with other machines for no obvious reason. These tips can help you quickly diagnose and repair the problem.
The Cable Guy: Network Policy Server
Joseph Davies - December 2007
The Network Policy Server (NPS) service in Windows Server 2008 replaces the Internet Authentication Service used in Windows Server 2003 and brings numerous enhancements, from the ability to enforce system health requirements to improved management capability.
Networking: Configure VPN Remote Access with ISA Server 2006
Alan Maddison - November 2007
A virtual private network can provide improved connectivity and increased productivity—and it doesn't need to be difficult to implement and manage. Find out how you can use ISA Server 2006 to address two common VPN scenarios.
The Cable Guy: Wireless Single Sign-On
Joseph Davies - November 2007
Single Sign On offers many advantages for both end users and administrators. Here's a look at how Single Sign On can simplify implementation of wireless authentication for your network.
The Cable Guy: The Authenticated Internet Protocol
Joseph Davies - October 2007
The Internet Key Exchange protocol and Authenticated Internet Protocol are both used to determine keying material and negotiate security parameters for IPsec-protected communications. Get an in-depth look at how they work.
The Cable Guy: Strong and Weak Host Models
Joseph Davies - September 2007
A multihomed host provides enhanced connectivity by simultaneously connecting to multiple networks. However, services running on multihomed hosts have an increased vulnerability to being attacked. To help you prevent attack, here’s a look at the various host models of multihomed hosts and how they are supported in Windows.
The Cable Guy: IPv6 Autoconfiguration in Windows Vista
Joseph Davies - August 2007
There's more to IPv6 than just extending the address space from 32 bits to 128 bits. Here's a look at how IPv6 hosts can automatically configure themselves, even without the use of an address configuration protocol.
How IT Works: Troubleshooting RPC Errors
Zubair Alexander - July 2007
Ever been confused by cryptic remote procedure call errors? Take a look at some common errors, techniques you can use to identify errors, and solutions to specific problems.
The Cable Guy: IPv6 Traffic over VPN Connections
Joseph Davies - July 2007
Before implementing IPv6 support on your intranet, you need to understand how it is supported over VPN connections. Here's a detailed look at what you need to know.
Security: Exploring The Windows Firewall
Steve Riley - June 2007
Mobility has changed computer threats and the techniques that guard against them. As laptops wander outside the perimeter and come back to the network, you need better ways to protect your systems. Find out how you can use Windows Firewall to protect your computers—on the Internet and on your own internal network.
The Cable Guy: The Secure Socket Tunneling Protocol
Joseph Davies - June 2007
The VPN protocols in Windows XP and Windows Server 2003 don’t work for some configurations. Get an in depth look at the various issues and see how Windows Server “Longhorn” and Windows Vista with Service Pack 1 will use the Secure Socket Tunneling Protocol to solve these problems.
The Cable Guy: EAPHost in Windows
Joseph Davies - May 2007
The Extensible Authentication Protocol, which is a framework that enables extensibility for authentication methods, has had certain limitations on previous Windows platforms. Examine how the EAPHost architecture in Windows Vista and Windows Server “Longhorn” addresses these limitations.
The Cable Guy: Wireless Group Policy Settings for Windows Vista
Joseph Davies - April 2007
Discover how you can use Group Policy to centrally configure and distribute wireless network settings to all the computers in your Active Directory network.
The Cable Guy: The DHCPv6 Protocol
Joseph Davies - March 2007
With an IPv6 network, you don't actually need DHCP to configure addresses, but there can be good reasons to use it. Find out why, and learn how to use DHCPv6 in your environment.
The Cable Guy: QoS Support in Windows
Joseph Davies - February 2007
Field Notes: It Just Stops Working
R'ykandar Korra'ti - February 2007
The Cable Guy: TCP Receive Window Auto-Tuning
Joseph Davies - January 2007
Windows Vista: Enterprise Networking with Windows Vista
Jason Leznek - November 2006
Since the release of Windows XP, networking has changed drastically—users are more mobile, wireless networking is everywhere, and security threats are more sophisticated. Take a look at the innovations in Windows Vista that make networking simpler, more secure, and easier to manage.
Field Notes: Where Did the Net Go?
R'ykandar Korra'ti - October 2006
How IT Works: Decoding TCP/IP
Don Parker - Spring 2005
TCP/IP is comprised of a set of protocols including Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Protocol (IP), and Internet Control Message Protocol (ICMP). Most IT professionals understand how these protocols work together to make network communication possible.
How IT Works: Domain Name System
Regis Donovan - Winter 2005
Without DNS, the Internet would be an ugly place. DNS is one of the services responsible for directing network traffic based on name and numerical IP addresses. Specifically, it's the service that allows users to type in names instead of numbers to locate a Web site or Internet resource.