October 2010The “Defense in Depth” approach represents a complete security philosophy—one that helps protect the computing environment from numerous attack vectors.
Exchange Queue & A: Gone to the DAGs
October 2010Using database availability groups is a great idea, especially because you can copy and store them in multiple locations—but mind the addressing issues.
Geek of All Trades: Monitoring Servers with System Center Essentials 2010
October 2010Where PerfMon falls short, Essentials comes in with a powerful, flexible, configurable option for monitoring just about any aspect your servers exhibit.
Cloud Computing: Cloud Security: Safely Sharing IT Solutions
October 2010You can share IT solutions between the fixed cost of local resources and the variable cost of cloud resources without losing control of access to enterprise assets. Let us show you how.
Windows Confidential: Leftovers from Windows 3.0
October 2010Some leftover interface elements dating back to the days of Windows 3.0 let you remove and hide icons in several different ways.
Cloud Computing: Get to Know SQL Azure
October 2010With SQL Azure, you can realize the benefits of a familiar relational database platform, plus the benefits of cloud computing.
IT Management Issues: The CIO Conundrum
October 2010The challenges faced by your CIO have a direct impact on your job today, and your future as an IT and business professional.
Windows Azure: Cost Architecting for Windows Azure
October 2010Designing applications and solutions for cloud computing and Windows Azure requires a completely different way of considering the operating costs.
Editor’s Note: The Many Facets of Security
October 2010The job of securing your company’s networks, endpoints, desktops, mobile devices, storage, cloud efforts and everything else can seem overwhelming at times.
Network Security: The Four Pillars of Endpoint Security
October 2010By focusing on these fundamental aspects of network security, you can keep the bad guys out and the good data in.
Toolbox: New Products for IT Professionals
October 2010This month, the TechNet IT toolbox includes tools for consolidating monitoring data, automatically adjusting the brightness of your monitor, and scheduling and managing tasks.
Toolbox: New Products for IT Professionals
October 2010This month, the TechNet IT toolbox includes tools for consolidating monitoring data, automatically adjusting the brightness of your monitor, and scheduling and managing tasks.
Windows PowerShell: The Many Options for Out
October 2010There are more ways to generate output using Windows PowerShell than you may think. Here are some that have recently come to light.
Simplified Implementation of the Microsoft SDL
This document illustrates the core concepts of the Microsoft Security Development Lifecycle (SDL) and discusses the individual security activities that should be performed in order to claim compliance with the SDL process
Manage, Monitor, and Report: Implementing a Power Management Strategy with System Center Configuration Manager 2007 R3
Using System Center Configuration Manager 2007 R3, Microsoft IT deployed a client power management solution to 165,000 desktop and laptop computers. Through new tools that enable centralized management, powerful reporting, and a deep understanding of c…
Virtualization Overview, Methods, and Models
Describes and illustrates how to plan virtualization for your organization.
Volume Activation of Office 2010
Describes and illustrates how to manage Office 2010 Volume Activation methods: Multiple Activation Key (MAK) and Key Management System (KMS).
Deployment Options for Office 2010
Describes and illustrates the client deployment methods for Microsoft Office 2010.
Microsoft Chart Controls for Microsoft .NET Framework 3.5
ASP.NET and Windows Forms Chart Controls for .NET Framework 3.5 SP1
Office 365 Beta Data Sheets
These documents provide an overview of the features and benefits of the Office 365 services currently in beta.