TechNet Magazine Online – June 2007

TechNet MagazineJune 2007

It's security month again. Learn how User Account Control in Windows Vista protects the machines you manage by limiting the administrator privileges users normally run with. BitLocker Drive Encryption, another Vista feature, adds security as well by providing full volume encryption and the validation of startup components.

Also this month, finally get the tools you need to manage and control the kinds of hardware users install and connect to your network. You may be surprised at the range of security improvements this provides. Plus, read up on the four security must-haves: risk management, anti-malware, network anomaly detection, and configuration monitoring.

Finally, see how the Windows Vista firewall offers protection right at your doorstep and how ACL enhancements offer better permissions control.

Inside Windows Vista User Account Control
User Account Control, or UAC, is one of the most misunderstood new features in Windows Vista. But its goal—to enable users to run with standard user rights—can solve many security issues. Get an inside look at the problems UAC is designed to address and see exactly how this new feature works. Mark Russinovich

Keys to Protecting Data with BitLocker Drive Encryption
BitLocker serves two very important purposes: it provides both full-volume data encryption and a way to validate the integrity of early startup components before Windows Vista starts. Get an overview of how BitLocker works and see how it can help you protect your organization. Byron Hynes

Exploring the Windows Vista Firewall
Mobility has changed computer threats and the techniques that guard against them. As laptops wander outside the perimeter and come back to the network, you need better ways to protect your systems. Find out how you can use Windows Firewall to protect your computers—on the Internet and on your own internal network. Steve Riley

New ACLs Improve Security in Windows Vista
While ACLs haven't had a major overhaul, there are a number of important changes you need to know about when managing ACLs in a Windows Vista environment. Discover how 30 ACLs have changed to improve security, find out how they will impact your organization, and learn how to manage these changes in your infrastructure. Jesper Johansson

Managing Hardware Restrictions via Group Policy
USB thumb-disk keys and other removable devices can make your personal life easier but your professional life harder. For improved security, you need a way to control what hardware devices your users are installing on their work systems. Now you can use Group Policy to control which devices they can use and which ones they can't.
Jeremy Moskowitz

4 Security Technologies Every IT Organization Must Have
Most businesses share similar security issues. In today's connected world, there are four general types of security tools that every organization absolutely must have. Find out what these tools are and explore how the technologies involved may work together in the future to create the ideal security solution. Matt Clapham and Todd Thompson

A Powerful New Tool for Certificate Management
Certificates are a key component in your infrastructure— when one expires, productivity can come to a halt. If you rely on a Microsoft PKI environment, the new Identity Lifecycle Manager Certificate Management (ILM-CM) solution can help keep things running smoothly. Find out how this tool can help you improve authentication processes and reduce certificate management costs. Kevin Dallmann

Comments (0)

Skip to main content