TechNet Event: Identity & Access Management with Forefront

During this half day event you will learn more about the Microsoft Identity and Access Management portfolio. We will kick off the event with a talk delivered by Kim Cameron, Distinguished Engineer and Chief Architect of Identity.   Kim will take us to a wider identity conversation. Henk Den Baes will dive into the needs…

0

TechNet Live Meeting – Forefront Threat Management Gateway – Technisch overzicht – Q & A

I’m cleaning up my mailbox and I came across this Q&A from one of the TechNet livemeetings. (It’s in Dutch)   URL categorisatie ook voor Belgische (Europese) sites ? Ja, je kunt dit nagaan op http://www.microsoft.com/security/portal/mrs/ Zijn er quota’s mogelijk voor bandbreedte en/of voor data volume (per dag, maand,…) ? cfr. slide 64 Er zijn…

0

Microsoft DirectAccess Connectivity Assistant

Help customers lower the costs of supporting DirectAccess users! The Microsoft DirectAccess Connectivity Assistant (DCA) is designed to help DirectAccess customers reduce the costs of supporting mobile users, and significantly improves mobile users’ connectivity experience.   The DirectAccess Connectivity Assistant informs DirectAccess users of their connection status with the organization’s intranet; provides tools to help them…

0

Internet Explorer 8 Security features

In deze korte screencast bespreekt Paul Loonen (MVP ILM) een aantal van de security features die in IE8 zijn toegevoegd of verbeterd.

0

Beveiligingsverbeteringen in Windows 7 en Windows Server 2008 R2

In deze sessie belicht Windows beveiligingsexpert Paul Loonen de essentiële beveiligingsfeatures van Windows 7 en het beheer ervan in een bedrijfsomgeving. Enkele van de vele verbeterde functies die in deze sessie aan bod komen, zijn de wijzigingen aan UAC, de Software Restriction Policies, de verbetering van Bitlocker, wat Managed Service Accounts zijn, welke verbeteringen er…

2

Améliorations au plan de la sécurité dans Windows 7 et Windows Server 2008 R2

  Au cours de cette session, Paul Loonen, expert de la sécurité Windows, débattra des principales fonctions de sécurité de Windows 7 et expliquera comment les gérer à l’échelle d’une entreprise. Vous découvrirez notamment les changements au niveau de l’UAC, l’évolution des  Software Restriction Policies, les perfectionnements apportés à Bitlocker, l’utilité des Managed Service Accounts,…

0

TechNet Livemeetings in Januari en Februari

TechNet-webcasts zijn live-uitzendingen van 60 tot 90 minuten met interactieve technische presentaties, productdemonstraties en vraag-en-antwoordsessies die worden gepresenteerd door een deskundige op het gebied van Microsoft-technologie, uit de industrie of beide. Alle inhoud wordt opgenomen en op aanvraag beschikbaar gesteld.   Beveiligingsverbeteringen in Windows 7 en Windows Server 2008 R2 In deze sessie belicht Windows…

1

TechDays 2010: Deep dive Security and Active Directory sessions with John Craddock

With this post I want to put John Craddock one of the main speakers at the event in the Spotlight. John is a well known speaker and he delivered some amazing sessions at the latest TechEd 2009 conference. As track-owner for TechEd I worked with John onto the Direct Access sessions he delivered there. Because…

0

Infrastructure Planning and Design Guides – Microsoft Forefront Unified Access Gateway

The Infrastructure Planning and Design team has released a new guide: Microsoft Forefront Unified Access Gateway. This guide outlines the critical infrastructure design elements that are key to a successful implementation of Forefront Unified Access Gateway (Forefront UAG). The reader is guided through the logical three-step process of selecting the Forefront UAG features required, determining…

1

Chopsticks Replay – Do you have the skills, techniques, technology to secure your environment?

  Attacks Trend & Techniques What are the current Trends and Techniques used by hackers ?   http://www.microsoft.com/belux/technet/nl/chopsticks/default.aspx?id=447     Oh no, we’ve been hacked, now what? Developing an incident response process Sooner or later, the unimaginable becomes the inevitable: your information security will get breached and your systems will get attacked. It might be…

0