January 2009Security principals underlie so much of Windows security that it is essential for any administrator to have at least a basic understanding of how the various types of Security principals work and how they are used. Here’s what you need to k…
Sustainable Computing: How to Plan Your Server-Consolidation Strategy with System Center
January 2009Find out how you can use Microsoft System Center and virtualization software to consolidate servers and reduce your IT costs.
Microsoft Office 365 purchase and operation step-by-step guides for midsize businesses and enterprises
The guides include step-by-step instruction to purchase Office 365 and deal with billing using Microsoft Online Portal.
Field Notes: What On Earth Is Green IT?
January 2009Get a quick overview of some simple IT upgrades that can provide both environmental and cost cutting benefits.
Field Notes: IT’s Surprises
January 2009Although many CIOs want to avoid the public eye, a lively discussion at a recent conference revealed that perhaps the opposite is actually true—the IT department should take the time to extol its virtues and reveal its accomplishments to …
Springboard Series Resource Guide for Windows 8
One-page guide to the top technical resources for Windows 8 on TechNet.
Performance tips for Windows Store XAML apps
This paper provides performance tips for Windows Store XAML apps.
Microsoft Malware Protection Center Threat Report: Rootkits
Rootkits provide stealth capabilities to malware. This Microsoft Malware Protection Center threat report examines how attackers use rootkits, and how rootkits function on affected computers.
Windows Confidential: Last Check-In Chicken
January 2009Raymond Chen explains why it is often the developers who have their acts together who end up checking in the final bug fixes to products.
Windows Confidential: Last Check-In Chicken
January 2009Raymond Chen explains why it is often the developers who have their acts together who end up checking in the final bug fixes to products.
Windows Confidential: Last Check-In Chicken
January 2009Raymond Chen explains why it is often the developers who have their acts together who end up checking in the final bug fixes to products.
Windows Confidential: Last Check-In Chicken
January 2009Raymond Chen explains why it is often the developers who have their acts together who end up checking in the final bug fixes to products.
Windows Administration: Deploying Applications with Terminal Services
January 2009Without too much effort, you can deploy a terminal server to host the applications you need in your environment. But there are some important decisions you’ll need to make to ensure your implementation meets user expectations. Greg Shield…
Windows Administration: Expanded Control with Group Policy Preferences
January 2009The new Group Policy Preferences feature found in Windows Server 2008 and Windows Vista provides more than 3,000 settings, greatly expanding what administrators can do with Group Policy. Here’s a guide to using Group Policy Preferences to…
Inside SharePoint: SharePoint Security Accounts
January 2009Take a close look at SharePoint Security Accounts to see how a weak configuration can give an attacker full control over all site collections and sites.
Utility Spotlight: Microsoft Remote Server Administration Tools for Windows Vista
January 2009This column describes the Microsoft Remote Server Administration Tools, which allow administrators to remotely manage roles and features in Windows Server 2008 and Windows Server 2003 from a computer running Windows Vista SP1.
Identity Management: An Introduction to Identity Lifecycle Manager 2
January 2009The upcoming release of Microsoft Identity Lifecycle Manager “2” offers many new features and enhancements. Explore the new portal experience and find out how you can cut costs with self-service tools, increase security compliance with …
Determined Adversaries and Targeted Attacks
This paper shares Microsoft’s insights into the threat that Determined Adversaries and Targeted Attacks pose, identifies challenges for organizations seeking to combat this threat category and provides a context for other papers that will directly a…
Determined Adversaries and Targeted Attacks
This paper shares Microsoft’s insights into the threat that Determined Adversaries and Targeted Attacks pose, identifies challenges for organizations seeking to combat this threat category and provides a context for other papers that will directly a…
Productivity Hub
The Productivity Hub is a Microsoft SharePoint Server 2007 site collection that offers training materials for end-users.