By Lafe Low
One of the greatest concerns IT managers voice over moving to cloud computing is security. How secure will my data be when stored in the cloud? How secure is the data in transit? Those are indeed valid questions and concerns. While technology vendors and cloud computing service providers have gone considerable distances to protect data and assuage any customer worries, data security remains the prevailing concern. Read more…
SharePoint 2010 Deployment: Get Ready to Upgrade to SharePoint 2010By Brien PoseyIt may be tempting to jump right into a SharePoint 2010 upgrade, but it requires a substantial amount of planning. This will guide you through the upgrade planning process.
Cloud Security: Managing the Cloud with Windows IntuneBy Paul BourgeauWindows Intune is a new cloud-based PC management solution that can help you keep your organization’s PCs secure, updated and manageable, no matter where they're located.
Active Directory Federation Services 2.0: Open Doors to the CloudBy Jeffrey SchwartzThe new Microsoft Active Directory Federation Services release promises to up the ante on cloud security.
Compliance Reporting: First Step in Controlling Client Cloud AccessBy: Dan Griffin and Lee Walker.Establishing secure access is a logical first step to extending the enterprise into the cloud. Improve your auditing and compliance reporting by using NAP and IPsec to control client access through DirectAccess.
Cloud Computing: Where to Start When You Have Already StartedBy Ric Merrifeld and Dennis StevensThe issues and opportunities surrounding SOA, SaaS, and cloud computing effectively amplify the conversational divide between business and IT, in part because of the newness of the architecture and the technology. Find guidance on linking the technical opportunities presented by these new models to the needs of the organization.
Windows Azure: Getting to Know the Runtime EnvironmentBy Jose BarretoThere’s a lot to learn in developing apps for a new platform like Windows Azure. Here’s a step-by-step tale of one developer’s experience creating and deploying a sample application.
Windows PowerShell: Implicit RemotingBy Don Jones
A little-known feature in Windows PowerShell 2.0 can easily add an incredible amount of flexibility to your environment. Implicit remoting makes it easier to use cmdlets that are only available on a remote computer and have them behave pretty much the same way they would if they were installed locally.
Windows Confidential: Start Me Up?By Raymond Chen
What happened to the Fast Items on your Start menu? They got folded in and sorted alphabetically with your other programs.
Exchange Q&A: Migrating MailboxesBy Henrik Walther
Moving and securing Exchange mailboxes can be tricky business, especially across forests or from one domain server to another.
Toolbox: New Products for IT ProfessionalsBy Greg Steen
This month’s tools include a utility for helping users manage their own passwords, the latest iteration of a venerable server configuration utility, and a handy copy utility that works on files of all sizes.
Utility Spotlight: Bing Webmaster CenterBy Lance Whitney
The Webmaster Center can tell you what pages Bing is indexing or crawling, and the keywords people are using to find them.
Geek of All Trades: Automate Baseline Security SettingsBy Greg Shields
Microsoft continues to strengthen its tools for centrally configuring computer settings. Group Policy and Group Policy Preferences have long provided a simple solution for enforcing security policy via Active Directory. System Center Configuration Manager (SCCM) takes this enforcement a step further through its Desired Configuration Management (DCM) functionality.
The Cable Guy: DirectAccess with Network Access Protection (NAP)By Joseph Davies
DirectAccess is good. Team it up with Network Access Protection and the two are even better. DirectAccess with NAP lets you specify that only DirectAccess clients that meet system health requirements can reach intranet resources across the Internet.