Welcome to TechNet Blogs Sign in | Join | Help

February 2006 - Posts

We'll be back in Barcelona once again for TechEd 2006. Click here to find out more about TechEd Europe. The following information was taken directly from the event site: Microsoft Tech·Ed 2006: Developers Microsoft’s premier European conference Read More
Click here to register for a free security event taking place in our Reading office in the UK. We'll take a look at how to adopt the principles of least privilege and thereby reduce the impact of malware including worms viruses and root kits. Our focus Read More
Public Key Infrastructure (PKI) was once touted as the answer to all security evils. Of course there's no such “Silver Bullet” as effective security requires people, processes and technology to work in union based on a meaningful security policy. When Read More
Browse to the DesignIT website to find out how you can take part in a competition whereby you can showcase your design skills and possibly win a prize or help a charity of your choice. The top prize is a trip to the Ice Hotel in Sweden. The following Read More
Several presenters at events such as TechEd and ITForum make use of a a really handy utility named "whoami". It's a resource kit utility that you can use to query attributes from your user context. Those of you who have experience of UNIX shell commands Read More
TechNet Webcast: Network Isolation Using Group Policy and IPsec (Part 1 of 3) (Level 300) Monday, February 20, 2006 - 9:00 AM - 10:00 AM Pacific Time Matthew Hester, TechNet Presenter, Microsoft Corporation Data Isolation: How can it make your information Read More
Thanks to Nathan Mercer for his post that raises awareness of the Windows Vista Step-by-step Guides for IT Professionals The guides provide interesting details of many areas of Windows Vista including security of course. The following documents Read More
Click here to find out more about our updated AntiSpyware offering. Windows Defender is the new name for Microsoft AntiSpyware and it's built into the current Beta of Windows Vista. The website includes an interesting comparison of Windows Defender to Read More
It's one thing to define a security policy, it's quite another thing to be confident that all of your servers comply to the associated technical requirements. Click here to view a blogcast that shows you how to use the Security Configuration Wizard's Read More
You may have seen the short video clips of Bill Gates' keynote speech at RSA 2006. If you're anything like me you'll want to find out exactly what Bill had to say for the entire speech. The transcripts of most speeches made by Microsoft executives Read More
The following events are taking place at our offices in Reading (UK) - in true TechNet fashion the events are free to attend and will give you technical guidance showing you how to apply these important technologies. Bring your questions and look forward Read More
Microsoft Client Protection is a new security product that will help businesses to protect their Windows computers from emerging threats including spyware, rootkits and viruses. The product is targetted at providing unified protection for laptops, Read More
An interesting announcment was made yesterday of Microsoft's intention to acquire a product named "i:filter" from a company named Futuresoft. i:filter enables you to control the internet surfing habits of users on your corporate network. Your policy Read More
As mentioned last week Internet Security and Acceleration Server (ISA) Service Pack 2 is now available. Maarten Goet has kindly recorded a blogcast showing the installation of ISA SP2 and discussing the benefits of the upgrade. You can view Maarten's Read More
The BlogCastRespository is a great community resource that's available for you to learn from other people's experience of the best way to use software. Being a community resource you are able to sumbit your own demonstrations too. To view the extensive Read More
There's a nice summary of Microsoft's Secure Development Lifecycle (SDL) available here. Michael Howard's article for MSDN magazine explains how the coding practises of our development teams were changed to formalise building all code from a security Read More
Note: The information in this post is based on the features of beta software and hence they may change before Windows Vista ships. To make the most of Windows Vista's advanced security features you need to ensure that new machines are TPM 1.2 compliant. Read More
Click here (or on the image below) to view a BlogCast that demonstrates how to create a new policy via the Security Configuration Wizard (SCW) GUI. The BlogCast is a little long (ten minutes) as it takes you through the entire wizard which includes Read More
Internet Security and Acceleration Server (ISA) Service Pack 2 is now available. You can find out more and download SP2 for yourself by browsing to this link. There's a detailed white paper here. SP2 brings with it enhanced support for the "branch office Read More