New column -- Using IPsec for network protection

I'm now writing semi-regular articles for TechNet. These are part of the security management series, and they're also linked from the security newsletter.

 

The first column is a two-parter about IPsec. Part 1 describes the technology: how it operates, its various modes and methods, a bit on IKE, and how it works over NAT.

 

https://www.microsoft.com/technet/community/columns/secmgmt/sm121504.mspx

 

Part 2 illustrates three excellent scenarios that you can apply IPsec to today: stopping worms, protecting servers, and isolating domains -- a very cool approach for requiring domain membership of all your computers. Get rid of the rogues!

 

https://www.microsoft.com/technet/community/columns/secmgmt/sm0105.mspx

 

 

Security newsletter

 

If you haven't already, I urge you to sign up for the security newsletter. Hundreds of thousands of subscribers -- many of whom might be your competitors (LOL) -- already benefit from the tips, tricks, updates, guidance, and news we publish every month. So sign up today! My columns are always linked from here, too.

 

https://www.microsoft.com/technet/security/secnews/default.mspx