May • June 2006

Security:Deconstructing Common Security Myths

Jesper Johansson and Steve Riley

Security:First Look: New Security Features in Windows Vista

Chris Corio

Security:Behind The Scenes: How Microsoft Built a Unified Approach to Windows Security

Robert Hensing

Security:Active Directory를 보호하는 19가지 유용한 팁

Active Directory 때문에 늦게까지 작업하십니까? Active Directory가 기업 환경에서 가장 규모가 크고 중요한 분산 시스템인 것을 감안하면 충분히 그럴 수 있습니다. 장애 복구와 함께 Sean Deuby

Security:Reduce Your Risk: 10 Security Rules To Live By

Wes Miller

Security:Group Policy: Ins And Outs Of Delegation And Control

Jeremy Moskowitz

Desktop Deployment:Techniques for Simplifying Desktop Image Creation

Shelly Bird

Windows Server 2003 R2:Get Control of File System Resources with Windows Server 2003 R2

John Savill

Windows Server 2003 R2:Windows Server 2003 R2의 새로운 복제 기능으로 대역폭 확장

Alan von Weltin

Windows Server 2003 R2:Give Your Server An Identity: New Roles In Windows Server 2003 R2

Derek Melber

bb978519(v=msdn.10).mdcc135917(v=msdn.10).md

Columns

From the Editor:The premiere issue of TechNet Magazine,

The premiere issue of TechNet Magazine, published almost two years ago, featured a security theme. Since then, security has been the topic of many of our most popular articles. And with good reason—as the number of potential threats increase, systems have also become more complex with more entry points per system, and the number of users connected in an enterprise is also growing.Joshua Trupin

ToolBox:New Products for IT Professionals

Cobian BackupGreg Steen

Utility Spotlight:Automate Device Driver Integration

When you’re deploying thousands of Windows-based computers, configuring a single system and duplicating its hard drive (or system image) onto other corporate computers can save you a lot of time and free up IT resources.Michael Murgolo

SQL Questions & Answers:Server Tuning, Log Shipping, Mirroring, and More

Your queries answered by Microsoft IT professionals.Nancy Michell

How It Works:Encrypting File System

Mobile users can be a pain in the neck for the IT pro. The convenience and portability of laptops must be weighed against the potential for data loss and the possible compromise of confidential company information.Randy Muller

BetaBox:First Look at Exchange 12

In much of corporate America, e-mail is now the most important means of communication. But each corporate citizen views e-mail differently. Workers want access to corporate e-mail at home and on the go.Laura Euler

Hey, Scripting Guy!:난해한 보안 설명자

때로는 단순한 일이 필요 이상으로 복잡해지는 경우가 있습니다. 어떤 종류의 아이스크림을 주문할지 고르는 일을 예로 들어 보면, 우리가 어렸을 때만 해도 초콜릿 아이스크림과 바닐라 아이스크림 중에서 고르기만 하면 되었습니다. 고급스러운 가게에 가면거기에 딸기 아이스크림이 추가되는 정도였습니다. 하지만 오늘날에는 바닐라만 하더라도 옛날식 바닐라, 프렌치 바닐라, 바닐라 빈 등 여러 종류가 있고 초콜릿도 네덜란드 초콜릿, 독일 초콜릿, 초콜릿 퍼지 등, 종류가 매우 다양합니다.The Microsoft Scripting Guys

Inside Microsoft.com:Moving Microsoft Update Downloads to x64

One of the responsibilities of the Microsoft. com operations team is to manage the infrastructure that supports the Windows Update and Microsoft Update services, which have client bases in the hundreds of millions and growing.Deighton Maragh and Mark W. Roellich

Serving the Web:Nine Tips to Enhance IIS Security

Securing your IIS 6.0 installation is an important task. The amount of work required can vary greatly depending on the complexity of your application as well as your infrastructure and how these combine with your need to secure content.Brett Hill

Field Notes:Building Sound Walls

As IT professionals, we need to build an ordered realm. We want the citizens within our network realm to work and live safely and securely, and we want to protect the assets of this realm. We know there are barbarians out there who might want to acquire our assets and use them for their own nefarious ends, so we build a wall around our corporate computing assets.Mark Scott

TechNet Update:Tools from the TechNet Security Center

You are probably all too aware that IT security is about much more than just installing a few key tools and applications and then keeping current with security updates. You not only have to keep your systems secure on a day-to-day basis by taking the right preventative measures and having the most appropriate security and management tools, but you also have to find ways to foresee future threats and implement strategies to combat them.Geof Wheelwright

Windows Confidential:The Intranet Can Be a Scary Place

If you’ve installed Windows Server™ 2003, you’ve probably discovered that Microsoft® Internet Explorer® doesn’t behave quite the same as it used to. You get prompted for your domain password more often, script doesn’t run, downloading from Web Folders is blocked—it’s just not fun.Raymond Chen