Welcome to TechNet Blogs Sign in | Join | Help

May 2005 - Posts

I'll record blogcasts showing you how to do the following: Use the Encrypting File System(EFS) and backup/recover the keys Configure Protected Extensible Authentication Protocol(PEAP) for wireless security Configure Extensible Authentication Protocol Read More
Head to http://www.microsoft.com/ipsec for details of how to use this important feature of Windows XP, Windows 2000 Server and Windows Server 2003.  Read More
Those of you who join us at the Technical roadshow in Birmingham earlier in the week may recall that I mentioned a series of links - particularly at the end of the show. Here's a list: http://www.blogcastrepository.com - this is a site hosted by Brian Read More
It was great to see so many of you at yesterday's technical roadshow in Birmingham. Many people asked me what software I was running on the demo machines as they had information listed on the backdrop detailing IP address, hostname et al. I use a utility Read More
Check out Aaron Margosis' blog for tricks and tips to make it easier for you (and those around you!) to run with Least Privilege User Access(LUA). We're no doubt all familiar with the argument of "I need Administrator/root access to do my job" - and of Read More
I'm a huge fan of getting the most value from the software I already have - I always talk about this at events and in papers I write. The Microsoft Solutions for Security(MSS) team produce prescriptive guidance to show you exactly HOW to get the most Read More
Matthew Fisher has written written an interesting article for the Industry Insider's blog which is hosted on TechNet. We're getting quite a few submissions from people like Matt who have best practise advise for you based on their practical experience. Read More
With SMS to Spaces you can easily send text messages to your MSN Space even if you are not near a PC! There is no charge for sending messages to your MSN Space however standard mobile charges apply. So you can be out on the road and still post text entries Read More
Follow this link to access free webcasts from technical experts showing you how to get the maximum value from a range of Microsoft technologies including Security of course. Please give feedback to this post if there are topics you'd like us to cover Read More
IMHO many of the most interesting security labs are actually listed under "Microsoft Windows Server 2003" in the labs - these include IPSec, Group Policy and Rights Management. I've listed the available sessions for both below - just incase my earlier Read More
People often ask me when TechNet plan to host security events North of London. I was born in Yorkshire and hence am well aware that we should head outside of the South East when we can. Well as you may be aware the Technical roadshow has already visited Read More
TechNet Virtual LabsEver wanted to test Microsoft's newest software in a totally secure sandbox environment? Wouldn't it be great to be able to test new servers immediately, without formatting hard drives or dedicating one or more computers to the project? Read More
There's a discount of Three Hundred Euros if you register for this year's TechEd Europe in the next three days. The event includes a pre-conference day on Monday 4th July, the main conference runs from Tuesday 5th to Friday the 8th July in Amsterdam. Read More
I'm sure I'm not alone in getting frustrated that I can find what I'm looking for so quickly on the Internet and yet until recently it took forever to find information by keyword search on my local PC! The finished code for MSN Search Toolbar is now Read More
I'm a firm believer in making the most of what you have. If you've ever seen me speak you'll be familiar with my message that Windows includes a comprehensive range of security features and functions that quite often can be used out of the box to effectively Read More
If you'd like more information to help dispel security myths in your organisation then I suggest you take a look at an extract from the upcoming book "Protect Your Windows Network" which was written by Jesper M. Johansson and Steve Riley. You can download Read More
How do you compare and make sense of the security vulnerability announcements from different vendors? Jeff Jones's short article looks into the way Redhat, Novell Suse and Microsoft announce vulnerabilities in their software and suggests Read More
You may recall that I mentioned this event a couple of weeks ago with the detailed post that's accessible here. Well as promised the event's now open for registration via the TechNet site - just click here to browse to the registration site. The event Read More
Many people ask me what substance exists to the Trustworthy Computing Initative and specificially what changes Microsoft have made to our development process to significantly increase the resilience of code. There's a interesting paper which was written Read More
Some members of the community have asked me about the Jericho Forum, what is it and where can they find out more. The Jericho Forum is completely vendor neutral and was formed by the heads of information security in a number of international organisations. Read More
Microsoft are running a competition whereby entrants record a short film to highlight the growing problem of Intellectual Property(IP) theft and raise awareness at a consumer level. Details of the competition can be found here. I'm not expecting many Read More
Incase you're not familiar with MBSA is a free utility which can be downloaded from <http://www.microsoft.com/mbsa> which you can use to scan systems in your environment to determine where patches are missing and where systems are misconfigured. Read More
A number of people have asked me for suggestions of third party online references which provide guidance upon how to make better security policies. Clearly Risk and Security policy should be the foundation of all things security in each of our organisations Read More
The team @ Skilldrive http://www.skilldrive.com have put together a really interesting presentation which is targetted at developers but I think it works well for IT Professionals too. If you'd like to understand how the logon process works, how Windows Read More
There are quite a few people in the Information Security Industry these days. Who do you like to listen to? and more importantly who provides you with useful information you can act upon? Such people may not be well known - let me know who you'd recommend. Read More
There are a number of videos which can be freely downloaded from here - they are not technical but may be useful to help your friends and colleagues. The following sessions are available: 3 things you can do to prevent spyware What you should Read More
It’s amazing how much you can find out about a person or organisation from simple "non-sensitive" pieces of information. I’m staggered how much information is freely available in public areas of most corporations. I view most large offices (apart Read More
I'm trying to avoid the tendancy of assuming that I know the pain you're going through when it comes to applying effective security techniques to your environment and/or that of your customers/clients. What I'm asking for hear is a reality check in the Read More
Recently my Blog was moved from http://blogs.msdn.com/steve_lamb to http://blogs.technet.com/steve_lamb and a redirect was set up from the old one to the new. Please use the technet address in future (and update your aggregator if you're using one) Read More
I've recorded a Blogcast(short focused webcast) which demonstrates how to secure a home wireless network using Wireless Protected Access(WPA). The Blogcast itself can be accessed via this link. I show how to configure a LinkSys wireless access point to Read More
Rhys Wilkins recently made me aware of an article which advises several good practises in making sure your code isn't susceptable to SQL Injection attacks. The first prosecution (that I've heard of) was way back in 1996! The article is Read More
Rights Management provides the capability for the author of a document or email to define the way in which the information can be used - the data is encrypted and it's rights "live" with the document. General information about Rights Management can be Read More
Come and spend a day with Microsoft and partner Identity Management experts who will demonstrate how to deal with user administration, security, compliance, directory services, single sign on, password management, and self service. There Read More
It seems like no time since ITForum and yet it's almost time for TechEd Europe which will take place in Amsterdam, there's a pre-conference day on 4th July, the main conference runs from 5 - 8th July. The pre-conference day offers a wide range of subjects Read More
Windows Server 2003 Service Pack 1 includes support for the Quarantine feature of Routing and Remote Access(RRAS). Quarantine can be used to automatically assess the "health" of client machines which attempt to access corporate resources via dial up or Read More
I've spoken to a number of people recently about how to improve the level of security in software that's written both "in house" and by third party developers. One thing that came up again and again is that it's very rare for security requirements to Read More
It was great to meet so many of you at InfoSec last week in London. As promised all of the presentations from our Security Academy(in the Pillar Room) will be posted for free download to the following URL http://www.microsoft.com/uk/technet/learning/ Read More
A series of seven papers covering all aspects of IPsec are now available for free download from our website. Microsoft recently deployed IPsec internally to isolate our network domains and prevent traffic from automatically passing between boundaries. Read More