January 2008Security threats don’t just come from e-mail and malicious Web sites. See how a USB thumb drive and some simple social engineering can be used to gain access to your entire network. And find out what you can do to keep your network more sec…
Windows Confidential: Remind Me Never to Do That Again
January 2008Hardware detection in the days before proper Plug and Play devices was a very scary undertaking. Find out why.
Windows PowerShell: Heading Off Malicious Code
January 2008When designing Windows PowerShell, a lot of thought was put into security. But, as with any software, Windows PowerShell can still be exposed to malicious code. Here are some recommendations for choosing an Execution Policy that will keep …
From the Editor: Winning Over a Cynic
January 2008From the Editor: Winning Over a Cynic
Utility Spotlight: Windows Easy Transfer Companion
January 2008This free tool can simplify the migration of key applications from Windows XP to Windows Vista.
Group Policy: Dive into Advanced Group Policy Management
January 2008AGPM, or Advanced Group Policy Management, is a handy tool that lets you work with Group Policy Objects in ways that other tools don’t. And it’s now available to members of the Microsoft Software Assurance program. Check out how you can use…
System Center: Real Control with Virtual Machine Manager 2007
January 2008Virtualization allows organizations to consolidate resources and save money. But as you begin to implement increasing numbers of virtual machines, you’ll want a convenient way to manage them. Here’s a guide to setting up Virtual Machine Man…
Group Policy: Optimizing Group Policy Performance
January 2008All Group Policy is not the same, and knowing the differences between types can help you fine-tune performance on your systems. Explore monolithic and functional GPs, learn how to process Group Policy, and find out what happens when Group P…
Hey, Scripting Guy!: There’s No Mistaking Regular Expressions
January 2008Looking for a way to avoid making mistakes? Validation is a good start. Learn how to perform character pattern matching in a script using regular expressions.
Group Policy: Inside ADM and ADMX Templates for Group Policy
January 2008ADM files are both necessary and often confusing. Don’t let this slow your Group Policy efforts. This guided tour will help you better understand what’s inside ADM files and the new ADMX format, which tools you can use to handle them, and h…
Exchange Queue & A: Adding Voice Prompts, Choosing a PBX , and More
January 2008
Have questions about Exchange Unified Messaging? We’ve got answers. In this installment of Exchange Queue & A, we focus on Unified Messaging, discussing how you can implement phone and fax features, offer high availability, set up voice prompts, and more.
System Center: Online Services Help Simplify Software Inventory
January 2008
Software asset management is an essential task for every business—large or small. But with the amount of software businesses now purchase and deploy, getting a handle on those assets can feel next to impossible. Find out how the new Asset Inventory Service from Microsoft can help.
The Cable Guy: DNS Enhancements in Windows Server 2008
January 2008Windows Server 2008 includes many DNS server enhancements. Take a close look at how these updates make name resolution faster, improve support for IPv6, and add greater flexibility to DNS administration.
System Center: Better Backups with Data Protection Manager 2007
January 2008The latest version of Data Protection Manager offers many new features, delivering a powerful and flexible solution for managing your backups. Here’s an overview of how DPM can protect everything from Exchange and SQL Server to branch offic…
The Desktop Files: Shared Computing with Windows SteadyState
January 2008The new Windows SteadyState toolkit can help you improve security and simplify management of Windows XP systems in a shared-use environment? Take a guided tour to find out how.
Using Visual Studio Team System 2005 to Measure Software Code Stability at Microsoft
Download Center : Using Visual Studio Team System 2005 to Measure Software Code Stability at Microsoft MS IT partnered with Microsoft Research to create a Visual Studio Team System 2005 extension that counts lines of code and predicts system defects. Microsoft Download Link…
APEC Virtualization Case Study
Download Center : APEC Virtualization Case Study This is Microsoft Services Core IO case study. Microsoft Download Link…
APEC Windows Vista Case Study
Download Center : APEC Windows Vista Case Study This is Microsoft Services Core IO case study. Microsoft Download Link…
Enabling Information Security through HBI Information Classification
Download Center : Enabling Information Security through HBI Information Classification Ever wondered how a large enterprise plans and implements design and architecture of its next generation of messaging system? The HBI Information Classification Solution was developed to enable users to classify and protect their sites and shares. Microsoft Download Link…
Daily Operations with Exchange 2007
Download Center : Daily Operations with Exchange 2007 Learn how the Exchange Messaging Team ensures 99.99 percent availability for mission-critical messaging services. Microsoft Download Link…