Editor’s Note: Securing the Cloud|
By Lafe Low
One of the greatest concerns IT managers voice over moving to cloud computing is security. How secure will my data be when stored in the cloud? How secure is the data in transit? Those are indeed valid questions and concerns. While technology vendors and cloud computing service providers have gone considerable distances to protect data and assuage any customer worries, data security remains the prevailing concern. Read more…
SharePoint 2010 Deployment: Get Ready to Upgrade to SharePoint 2010
Cloud Security: Managing the Cloud with Windows Intune
Active Directory Federation Services 2.0: Open Doors to the Cloud
Compliance Reporting: First Step in Controlling Client Cloud Access
Cloud Computing: Where to Start When You Have Already Started
Windows Azure: Getting to Know the Runtime Environment
Desktop Image Management: Build a Better Desktop Image|
By Mitch Tulloch
Building and maintaining corporate desktop images is a core IT task, but it doesn’t have to be overwhelming. Here are some ways to streamline the process.
Windows PowerShell: Implicit Remoting
A little-known feature in Windows PowerShell 2.0 can easily add an incredible amount of flexibility to your environment. Implicit remoting makes it easier to use cmdlets that are only available on a remote computer and have them behave pretty much the same way they would if they were installed locally.
Windows Confidential: Start Me Up?
What happened to the Fast Items on your Start menu? They got folded in and sorted alphabetically with your other programs.
Exchange Q&A: Migrating Mailboxes
Moving and securing Exchange mailboxes can be tricky business, especially across forests or from one domain server to another.
Toolbox: New Products for IT Professionals
This month’s tools include a utility for helping users manage their own passwords, the latest iteration of a venerable server configuration utility, and a handy copy utility that works on files of all sizes.
Utility Spotlight: Bing Webmaster Center
The Webmaster Center can tell you what pages Bing is indexing or crawling, and the keywords people are using to find them.
Geek of All Trades: Automate Baseline Security Settings
Microsoft continues to strengthen its tools for centrally configuring computer settings. Group Policy and Group Policy Preferences have long provided a simple solution for enforcing security policy via Active Directory. System Center Configuration Manager (SCCM) takes this enforcement a step further through its Desired Configuration Management (DCM) functionality.
The Cable Guy: DirectAccess with Network Access Protection (NAP)
DirectAccess is good. Team it up with Network Access Protection and the two are even better. DirectAccess with NAP lets you specify that only DirectAccess clients that meet system health requirements can reach intranet resources across the Internet.