Windows 7 – Parental Controls

Good Morning AskPerf!  Today’s post is a bit of a departure from what we normally discuss, but since this past Sunday was Father’s Day, I thought this might be an interesting topic to share.  Actually, this conversation came up while I was having lunch with my parents.  My daughters are somewhat internet-savvy, but they are… Read more

APP: Application Compatibility – User Account Control (Windows Vista +)

APPLICATION COMPATIBILITY – USER ACCOUNT CONTROL (UAC) Description: User Account Control (UAC) is the functionality within Windows Vista that allows a user to run under a safer, less privileged context, but switch to an Administrator context when needed. Under normal circumstances, every user on Windows Vista will run with UAC enabled, which means they are running… Read more

MS08-067: Worms, Worms, Worms

Over the last couple of weeks, there has been an uptick in the number of different malware programs aimed at exploiting the vulnerability patched in MS08-067.  If you’ve been monitoring the various security websites and blogs, then you’ve probably already seen information on malware such as Worm:Win32/Conficker.A and Backdoor:Win32/IRCbot.BH.  The major AV software packages are… Read more

“Unknown Publisher”??? Part Two

Hello AskPerf readers, it’s Don Geddes again and I’m back with that post that I promised you about that pesky dialog box that we all know so well. In this post, I’m going to walk through some common client/server scenarios and explain the technical details of what generates the “Unknown Publisher” dialog as well as… Read more

Two Minute Drill: Five Things to think about regarding Anti-Virus software

Hello AskPerf readers!  My name is Leena Nair, and I am a Support Engineer on the Performance team.  Over the last couple of months, I’ve had some very interesting discussions with customers regarding anti-virus software selection, and I thought it might be interesting to share some pieces of those discussions with you.  Almost anyone that… Read more

NAP 101 – The Components of NAP

Welcome back AskPerf Readers.  In my last post we covered the basics of Network Access Protection (NAP) – what it is, and what it can (and can’t!) do for you.  Today we’re going to go over the various components of NAP.  The diagram below from the NAP Architecture Whitepaper (the link to the Whitepaper is… Read more

Network Access Protection for the non-Network Admin

We’ve talked about security in previous posts.  We’ve also talked about SMB, Large File Copies and a number of other networking-related issues.  Today we’re going to talk about Network Access Protection (NAP) and its role in the enterprise.  Now, I know you’re probably asking yourself why we’re going on Networking safari, instead of sticking to… Read more

IE8 and Privacy

Privacy.  Personally Identifiable Information.  Choice.  Disclosure.  These are all key concepts in the digital age.  We expose more of our personal data electronically than at any time in our history.  IE8 gives users more choice about controlling what information is shared – browsing history, cookies, preferences etc.  Andy Ziegler and Dean Hachamovitch, who are both… Read more

Terminal Servers and the “Man in the Middle”

We often get questions on configuring Terminal Server Authentication.  The questions have less to do with configuring a simple logon scenario than they do with preventing attacks, in particular “Man in the Middle” attacks – especially when the Terminal Servers may be publicly accessible.  For those of you who are unfamiliar with the “Man in… Read more

Key Principles of Security

OK, so today’s isn’t really something "Performance" related, but nevertheless, I think we can all safely agree that this is something that all administrators should be aware of.  During our Windows Vista and Windows Server 2008 posts we’ve been talking about "reducing the attack surface" and other security enhancements.  So today we’re going to go… Read more