TechNet Magazine September 2013

TechNet Magazine September 2013

Identity Management:Use two-factor authentication to mitigate fraud

You can – and should – use two-factor authentication with mobile and desktop devices. Dan Griffin, Tom Jones

Windows 8:File history explained

File History is a new automated system for continuously protecting your personal files stored in several key locations. Bohdan Raciborski

SharePoint:Secure SharePoint content

Keeping the content stored within your SharePoint storage resources secure may be more complicated than you thought. Dan Sullivan

Cloud Computing:Challenges in cloud configuration

The selection, configuration and performance of your cloud-based applications will have a massive impact on performance. Dan Marinescu

Windows 8:Painless printing

There’s an entirely new printer support architecture built into Windows 8 that improves support both now and in the future. Adrian Lannin

Security:Don’t forget the basics

While much of the focus – and much of the funding – goes to advanced security technologies, it pays to not overlook the fundamentals. John Vacca

Active Directory:Protect your Active Directory data

There are a number of tactics for ensuring only the right people have access to the right data within your Active Directory infrastructure. Darren Mar-Elia

Windows 7:Manage disks and file systems

You can configure and reconfigure disks, files, partitions and volumes to suit your specific needs. Jorge Orchilles

칼럼

Editor's Note:Secure new platforms

Besides contending with an evolving cast of new viruses, malware, and other threats, you have to secure new platforms and new technologies.Lafe Low

Windows Confidential:Brand loyalty

The Windows 95 10K program goes on tour to promote Windows 95 (and silences an annoying IT person).Raymond Chen