The Application Virtualization Best Practices Analyzer is a diagnostic tool that verifies configuration settings for a computer running a Microsoft Application Virtualization Streaming Server version 4.5 or Microsoft Application Virtualization Management Server version 4.5. Microsoft Download Link…
Category: Microsoft Download
Microsoft Download Center RSS Feed
App-V ADM Template
The Microsoft Application Virtualization ADM template allows you to administer App-V client settings via Preferences. Microsoft Download Link…
Architecture and Design Datasheet
Architecture and Design offerings play a key role in our Microsoft Dynamics Sure Step for deploying Microsoft Dynamics AX or Microsoft Dynamics CRM—to help ensure that your Microsoft Dynamics solution provides optimal benefits. Microsoft Download Link…
Architecture Assessment Datasheet
Sure Step is a comprehensive methodology for deployment of Microsoft Dynamics AX or Microsoft Dynamics CRM. Architecture Assessment is one of five Sure Step Decision Accelerators: short engagements that help enterprises make purchasing decisions for Microsoft Dynamics solutions. Microsoft Download Link…
SLM Datasheet
This is Microsoft Services SQL: Service Level Management (SLM) datasheet. Microsoft Download Link…
Proactive Monitoring with Microsoft System Center Operations Manager Datasheet
Proactive Monitoring combines the implementation of incident and problem management processes with technical tools and reports to tune Microsoft System Center Operations Manager for your environment. Microsoft Download Link…
Remote Access Datasheet
The Microsoft Intelligent Application Gateway 2007 is a comprehensive, secure remote access gateway that provides secure socket layer (SSL)-based application access and protection with endpoint security management. Microsoft Download Link…
IT Service Mapping Datasheet
IT Service Mapping is designed to help you evaluate the availability of your enterprise-wide IT infrastructure services. Microsoft Download Link…
WCF Modifying Messages
This white paper tells how to use the WCF adapters to modify both incoming BizTalk messages and outbound WCF messages. Microsoft Download Link…
Network Access Protection with 802.1x Enforcement Datasheet
Network Access Protection with 802.1x Enforcement is designed to assist you in implementing a network access control solution. Microsoft Download Link…
SUM Datasheet
This is Microsoft Services Software Update Management (SUM) datasheet. Microsoft Download Link…
MEC Datasheet
Microsoft Enterprise Cube empowers organizations to increase revenue and make excellent strategic decisions with real-time access to critical business knowledge for all workers. Microsoft Download Link…
HyperVGetStarted.docx
This guide helps you get started with Microsoft Hyper-V Server 2008. Microsoft Download Link…
DCM for SharePoint Datasheet
This offering is designed to help you achieve significant, measurable, and sustained improvements in your Microsoft Office SharePoint Server-based collaboration environment and, in turn, deliver the productivity, efficiency, and return on investment required by your business. Microsoft Download Link…
PMM for Windows Core Services Datasheet
This is Microsoft Services Windows: Core Services Proactive Monitoring Management (PMM) datasheet. Microsoft Download Link…
Deployment for Forefront Server Security Datasheet
Deployment for Forefront Server Security integrates the level of security into your environment, and Microsoft Services can turn that vision into reality in as little as six weeks Microsoft Download Link…
Security Watch: Revisiting the 10 Immutable Laws of Security, Part 2
November 2008It’s been about 8 years since “The 10 Immutable Laws of Security” were first published, and a lot has changed since then. In this installment, Jesper Johansson continues his analysis of the the immutable laws to see if they still hold true…
Security Watch: Revisiting the 10 Immutable Laws of Security, Part 2
November 2008It’s been about 8 years since “The 10 Immutable Laws of Security” were first published, and a lot has changed since then. In this installment, Jesper Johansson continues his analysis of the the immutable laws to see if they still hold true…
Security Watch: Revisiting the 10 Immutable Laws of Security, Part 2
November 2008It’s been about 8 years since “The 10 Immutable Laws of Security” were first published, and a lot has changed since then. In this installment, Jesper Johansson continues his analysis of the the immutable laws to see if they still hold true…
Inside SharePoint: Extending Office Applications with Web Services
November 2008Web services are fundamental building blocks of distributed business applications. Here’s an overview of how you can use Web services in a SharePoint environment to extend Microsoft Office applications.