Throw away your digital picture frames

Surely time itself has warped and it’s suddenly April 1st. Come on, if you read the following, wouldn’t you first think it was a hoax, as did I? Virus from China, the gift that keeps on giving An insidious computer virus recently discovered on digital photo frames has been identified as a powerful new Trojan…

4

Supporting your family, friends, and neighbors

By Steve RileySenior Security StrategistTrustworthy Computing Group, Microsoft Corporation(originally published at http://www.microsoft.com/technet/community/columns/secmgmt/sm0208.mspx) I’ve met thousands of IT pros during my years speaking at conferences around the world. And if there’s one thing that’s true for all of us it’s that all IT pros become support professionals for their family, their friends, and their neighbors—your “FFN”…

5

Plan now to eliminate "power users" from your domains

I’ve seen some conversations lately about the Power Users group — how powerful is it, really, and why did we remove the group from Windows Vista? That group had rights install software and drivers. And if you can install software and drivers, then you can elevate yourself to Administrator or SYSTEM. Vista includes a signed…

1

Who should do your security audits? Or, how do you organize the security department?

An interesting question came up today. The group responsible for configuring and maintaining the firewalls at a customer also believes that they should be the only ones to audit their configurations. Others in the security department are uneasy with this, and prefer that someone else do the auditing. I’ve encountered similar tension before, and it…

2

Videos of some of my presentations

TechNet Spotlight features videos of many presentations from our TechEd conferences. Here are some of mine. It’s 11:00 PM, do you know where your data is?IT Forum: TechEd Europe, November 2007 The fortified data center in your futureTechEd US, June 2007 Windows Mobile 6 security in depthTechEd US, June 2007 Making the tradeoff: be secure…

1

NAP case study published

Another new resource for you… I know from my time with customers in meetings and at events that NAP is something you’re all very interested in. You’re also being a bit cautious, waiting to see how the market matures, and hoping to learn how some customers have implemented it. Recently we published our first NAP…

1

Microsoft IPsec diagnostic tool

IPsec is a wonderful technology for identifying computers and securing the exchange of data between them. I’ve written and spoken extensively about in the past. It is, however, a bit of a challenge to configure, especially if you’re newly learning about it. Microsoft recently released a diagnostic tool to help you create and test your…

2