Skip to main content
TechNet

TechNet Magazine: June 2010

Securing the Cloud Editor’s Note: Securing the Cloud

By  Lafe Low

One of the greatest concerns IT managers voice over moving to cloud computing is security. How secure will my data be when stored in the cloud? How secure is the data in transit? Those are indeed valid questions and concerns. While technology vendors and cloud computing service providers have gone considerable distances to protect data and assuage any customer worries, data security remains the prevailing concern. Read more…

Featured Articles

Go to SharePoint 2010 Deployment: Get Ready to Upgrade to SharePoint 2010.

SharePoint 2010 Deployment: Get Ready to Upgrade to SharePoint 2010
By Brien Posey
It may be tempting to jump right into a SharePoint 2010 upgrade, but it requires a substantial amount of planning. This will guide you through the upgrade planning process.

 

Go to Cloud Security: Managing the Cloud with Windows Intune.

Cloud Security: Managing the Cloud with Windows Intune
By Paul Bourgeau
Windows Intune is a new cloud-based PC management solution that can help you keep your organization’s PCs secure, updated and manageable, no matter where they're located.

 

Go to Active Directory Federation Services 2.0: Open Doors to the Cloud.

Active Directory Federation Services 2.0: Open Doors to the Cloud
By Jeffrey Schwartz
The new Microsoft Active Directory Federation Services release promises to up the ante on cloud security.

 

Go to Compliance Reporting: First Step in Controlling Client Cloud Access.

Compliance Reporting: First Step in Controlling Client Cloud Access
By: Dan Griffin and Lee Walker.
Establishing secure access is a logical first step to extending the enterprise into the cloud. Improve your auditing and compliance reporting by using NAP and IPsec to control client access through DirectAccess.

 

Go to Cloud Computing: Where to Start When You Have Already Started

Cloud Computing: Where to Start When You Have Already Started
By Ric Merrifeld and Dennis Stevens
The issues and opportunities surrounding SOA, SaaS, and cloud computing effectively amplify the conversational divide between business and IT, in part because of the newness of the architecture and the technology. Find guidance on linking the technical opportunities presented by these new models to the needs of the organization.

 

Go to Windows Azure: Getting to Know the Runtime Environment.

Windows Azure: Getting to Know the Runtime Environment
By Jose Barreto
There’s a lot to learn in developing apps for a new platform like Windows Azure. Here’s a step-by-step tale of one developer’s experience creating and deploying a sample application.

 

Go to Desktop Image Management: Build a Better Desktop Image Desktop Image Management: Build a Better Desktop Image
By Mitch Tulloch
Building and maintaining corporate desktop images is a core IT task, but it doesn’t have to be overwhelming. Here are some ways to streamline the process.

 


Columns

Windows PowerShell: Implicit Remoting
By Don Jones

A little-known feature in Windows PowerShell 2.0 can easily add an incredible amount of flexibility to your environment.  Implicit remoting makes it easier to use cmdlets that are only available on a remote computer and have them behave pretty much the same way they would if they were installed locally.

 

Windows Confidential: Start Me Up?
By Raymond Chen

What happened to the Fast Items on your Start menu? They got folded in and sorted alphabetically with your other programs.

 

Exchange Q&A: Migrating Mailboxes
By Henrik Walther

Moving and securing Exchange mailboxes can be tricky business, especially across forests or from one domain server to another.

Toolbox: New Products for IT Professionals
By Greg Steen

This month’s tools include a utility for helping users manage their own passwords, the latest iteration of a venerable server configuration utility, and a handy copy utility that works on files of all sizes.

 

Utility Spotlight: Bing Webmaster Center
By Lance Whitney

The Webmaster Center can tell you what pages Bing is indexing or crawling, and the keywords people are using to find them.

Geek of All Trades: Automate Baseline Security Settings
By Greg Shields

Microsoft continues to strengthen its tools for centrally configuring computer settings. Group Policy and Group Policy Preferences have long provided a simple solution for enforcing security policy via Active Directory. System Center Configuration Manager (SCCM) takes this enforcement a step further through its Desired Configuration Management (DCM) functionality.

 

The Cable Guy: DirectAccess with Network Access Protection (NAP)
By Joseph Davies

DirectAccess is good. Team it up with Network Access Protection and the two are even better. DirectAccess with NAP lets you specify that only DirectAccess clients that meet system health requirements can reach intranet resources across the Internet.