May • June 2006
Security:[Deconstructing Common Security Myths](cc160979(v=msdn.10).md "Deconstructing
Common
Security Myths")
Jesper Johansson and Steve Riley
Security:[First Look: New Security Features in Windows Vista](cc160980(v=msdn.10).md "First Look:
New Security
Features
in
Windows Vista")
Chris Corio
Security:[Behind The Scenes: How Microsoft Built a Unified Approach to Windows Security](cc160981(v=msdn.10).md "Behind The Scenes:
How Microsoft Built a
Unified Approach
to
Windows Security")
Robert Hensing
Segurança:19 dicas inteligentes para proteger o Active Directory
O Active Directory não te deixa dormir à noite? Isso é bastante compreensível. Trata-se, muito provavelmente, do maior sistema distribuído em sua empresa, e o mais crítico. Juntamente com Sean Deuby
Security:Reduce Your Risk: 10 Security Rules To Live By
Wes Miller
Security:Group Policy: Ins And Outs Of Delegation And Control
Jeremy Moskowitz
Desktop Deployment:[Techniques for Simplifying Desktop Image Creation](cc160985(v=msdn.10).md "Techniques for
Simplifying Desktop Image Creation")
Shelly Bird
Windows Server 2003 R2:Get Control of File System Resources with Windows Server 2003 R2
John Savill
Windows Server 2003 R2:Reaveja sua largura de banda com os novos recursos de replicação do Windows Server 2003 R2
Alan von Weltin
Windows Server 2003 R2:[Give Your Server An Identity: New Roles In Windows Server 2003 R2](cc160988(v=msdn.10).md "Give Your Server An
Identity:
New Roles In
Windows Server 2003 R2")
Derek Melber
bb978519(v=msdn.10).md
cc135917(v=msdn.10).md
Columns
From the Editor:The premiere issue of TechNet Magazine,
The premiere issue of TechNet Magazine, published almost two years ago, featured a security theme. Since then, security has been the topic of many of our most popular articles. And with good reason—as the number of potential threats increase, systems have also become more complex with more entry points per system, and the number of users connected in an enterprise is also growing. Joshua Trupin
|
ToolBox:New Products for IT Professionals
Cobian BackupGreg Steen
|
Utility Spotlight:Automate Device Driver Integration
When you’re deploying thousands of Windows-based computers, configuring a single system and duplicating its hard drive (or system image) onto other corporate computers can save you a lot of time and free up IT resources. Michael Murgolo
|
SQL Questions & Answers:Server Tuning, Log Shipping, Mirroring, and More
Your queries answered by Microsoft IT professionals.Nancy Michell
|
How It Works:Encrypting File System
Mobile users can be a pain in the neck for the IT pro. The convenience and portability of laptops must be weighed against the potential for data loss and the possible compromise of confidential company information. Randy Muller
|
BetaBox:First Look at Exchange 12
In much of corporate America, e-mail is now the most important means of communication. But each corporate citizen views e-mail differently. Workers want access to corporate e-mail at home and on the go. Laura Euler
|
Ei, Equipe de Scripts!:Todos nós somos loucos por descritores de segurança
Às vezes, as coisas simplesmente são mais complicadas do que deveriam. Pense em uma tarefa bem simples, como decidir o sabor de um sorvete. Tempos atrás, quando a Equipe de Scripts ainda estava se formando, isso era fácil; na maior parte do tempo, a escolha era sempre entre chocolate e baunilha. The Microsoft Scripting Guys
|
Inside Microsoft.com:Moving Microsoft Update Downloads to x64
One of the responsibilities of the Microsoft. com operations team is to manage the infrastructure that supports the Windows Update and Microsoft Update services, which have client bases in the hundreds of millions and growing. Deighton Maragh and Mark W. Roellich
|
Serving the Web:Nine Tips to Enhance IIS Security
Securing your IIS 6.0 installation is an important task. The amount of work required can vary greatly depending on the complexity of your application as well as your infrastructure and how these combine with your need to secure content.Brett Hill
|
Field Notes:Building Sound Walls
As IT professionals, we need to build an ordered realm. We want the citizens within our network realm to work and live safely and securely, and we want to protect the assets of this realm. We know there are barbarians out there who might want to acquire our assets and use them for their own nefarious ends, so we build a wall around our corporate computing assets. Mark Scott
|
TechNet Update:Tools from the TechNet Security Center
You are probably all too aware that IT security is about much more than just installing a few key tools and applications and then keeping current with security updates. You not only have to keep your systems secure on a day-to-day basis by taking the right preventative measures and having the most appropriate security and management tools, but you also have to find ways to foresee future threats and implement strategies to combat them. Geof Wheelwright
|
Windows Confidential:The Intranet Can Be a Scary Place
If you’ve installed Windows Server™ 2003, you’ve probably discovered that Microsoft® Internet Explorer® doesn’t behave quite the same as it used to. You get prompted for your domain password more often, script doesn’t run, downloading from Web Folders is blocked—it’s just not fun. Raymond Chen
|