May • June 2006

Security:[Deconstructing Common Security Myths](cc160979(v=msdn.10).md "Deconstructing

Common

Security Myths")

Jesper Johansson and Steve Riley

Security:[First Look: New Security Features in Windows Vista](cc160980(v=msdn.10).md "First Look:

New Security

Features

in

Windows Vista")

Chris Corio

Security:[Behind The Scenes: How Microsoft Built a Unified Approach to Windows Security](cc160981(v=msdn.10).md "Behind The Scenes:

How Microsoft Built a

Unified Approach

to

Windows Security")

Robert Hensing

Segurança:19 dicas inteligentes para proteger o Active Directory

O Active Directory não te deixa dormir à noite? Isso é bastante compreensível. Trata-se, muito provavelmente, do maior sistema distribuído em sua empresa, e o mais crítico. Juntamente com Sean Deuby

Security:Reduce Your Risk: 10 Security Rules To Live By

Wes Miller

Security:Group Policy: Ins And Outs Of Delegation And Control

Jeremy Moskowitz

Desktop Deployment:[Techniques for Simplifying Desktop Image Creation](cc160985(v=msdn.10).md "Techniques for

Simplifying Desktop Image Creation")

Shelly Bird

Windows Server 2003 R2:Get Control of File System Resources with Windows Server 2003 R2

John Savill

Windows Server 2003 R2:Reaveja sua largura de banda com os novos recursos de replicação do Windows Server 2003 R2

Alan von Weltin

Windows Server 2003 R2:[Give Your Server An Identity: New Roles In Windows Server 2003 R2](cc160988(v=msdn.10).md "Give Your Server An

Identity:

New Roles In

Windows Server 2003 R2")

Derek Melber

bb978519(v=msdn.10).md
cc135917(v=msdn.10).md

Columns

From the Editor:The premiere issue of TechNet Magazine,
The premiere issue of TechNet Magazine, published almost two years ago, featured a security theme. Since then, security has been the topic of many of our most popular articles. And with good reason—as the number of potential threats increase, systems have also become more complex with more entry points per system, and the number of users connected in an enterprise is also growing. Joshua Trupin
ToolBox:New Products for IT Professionals
Cobian BackupGreg Steen
Utility Spotlight:Automate Device Driver Integration
When you’re deploying thousands of Windows-based computers, configuring a single system and duplicating its hard drive (or system image) onto other corporate computers can save you a lot of time and free up IT resources. Michael Murgolo
SQL Questions & Answers:Server Tuning, Log Shipping, Mirroring, and More
Your queries answered by Microsoft IT professionals.Nancy Michell
How It Works:Encrypting File System
Mobile users can be a pain in the neck for the IT pro. The convenience and portability of laptops must be weighed against the potential for data loss and the possible compromise of confidential company information. Randy Muller
BetaBox:First Look at Exchange 12
In much of corporate America, e-mail is now the most important means of communication. But each corporate citizen views e-mail differently. Workers want access to corporate e-mail at home and on the go. Laura Euler
Ei, Equipe de Scripts!:Todos nós somos loucos por descritores de segurança
Às vezes, as coisas simplesmente são mais complicadas do que deveriam. Pense em uma tarefa bem simples, como decidir o sabor de um sorvete. Tempos atrás, quando a Equipe de Scripts ainda estava se formando, isso era fácil; na maior parte do tempo, a escolha era sempre entre chocolate e baunilha. The Microsoft Scripting Guys
Inside Microsoft.com:Moving Microsoft Update Downloads to x64
One of the responsibilities of the Microsoft. com operations team is to manage the infrastructure that supports the Windows Update and Microsoft Update services, which have client bases in the hundreds of millions and growing. Deighton Maragh and Mark W. Roellich
Serving the Web:Nine Tips to Enhance IIS Security
Securing your IIS 6.0 installation is an important task. The amount of work required can vary greatly depending on the complexity of your application as well as your infrastructure and how these combine with your need to secure content.Brett Hill
Field Notes:Building Sound Walls
As IT professionals, we need to build an ordered realm. We want the citizens within our network realm to work and live safely and securely, and we want to protect the assets of this realm. We know there are barbarians out there who might want to acquire our assets and use them for their own nefarious ends, so we build a wall around our corporate computing assets. Mark Scott
TechNet Update:Tools from the TechNet Security Center
You are probably all too aware that IT security is about much more than just installing a few key tools and applications and then keeping current with security updates. You not only have to keep your systems secure on a day-to-day basis by taking the right preventative measures and having the most appropriate security and management tools, but you also have to find ways to foresee future threats and implement strategies to combat them. Geof Wheelwright
Windows Confidential:The Intranet Can Be a Scary Place
If you’ve installed Windows Server™ 2003, you’ve probably discovered that Microsoft® Internet Explorer® doesn’t behave quite the same as it used to. You get prompted for your domain password more often, script doesn’t run, downloading from Web Folders is blocked—it’s just not fun. Raymond Chen