How to add a user role in System Center Operations Manager

Unlike Microsoft Operations Manager (MOM) 2005 System Center Operations Manager (SCOM) 2007 includes effective role based security. There’s a high degree of granularity available allowing the administrator to define exactly which operations are available and what information can be viewed on an Active Directory user and/or group level. Here’s a blogcast that demonstrates the options available.


How to secure a wireless network: Part 2 of 5 – How to change the SSID

This post follows on from How to secure a wireless network: Part 1 of 5 – Enabling WPA on a wireless router which includes a detailed description of some key security myths pertaining to wireless security. The first post also goes into detail about why these steps are only appropriate for small networks as found at home -…


How to secure a wireless network: Part 1 of 5 – Enabling WPA on a wireless router

This is the first part in a series of five blogcasts (video demonstrations showing you “how to”) that look at how to secure a wireless network by configuring Wireless Protected Access (WPA) on both the Access Point (AP) and Vista/XP clients. Note: These instructions are appropriate for typical home networks and very small offices as a…


Tricks tips and shortcuts to help you get the most from your infrastructure – check out the updated blogcast repository

  Brian Tucker is doing a great job of helping the IT PRO community to help itself by hosting your short video demonstrations of how to solve technical problems – otherwise known as blogcasts. The beauty of blogcasts is that you can easily create them for yourself using freely available tools such as Windows Media…


How to roll back a Security Configuration Wizard Policy to remove the lock down

Security Configuration Wizard (SCW) makes it so easy to roll back a policy that I nearly didn’t record this blogcast. I went ahead as I appreciate that you may not have had chance to try this for yourself and it’s always nice to see someone else demonstrate something before you go ahead yourself. Click here…


Do your systems meet your security policy? Here’s an easy way to find out

It’s one thing to define a security policy, it’s quite another thing to be confident that all of your servers comply to the associated technical requirements. Click here to view a blogcast that shows you how to use the Security Configuration Wizard’s command line interface to assess the compliance of a system to the security…