Even if you’re not headed back to school, it’s academic—our September issue will take you to the head of the class.
Many organizations rely on ISA Server 2006 to secure their environment, but few take the important step of securing ISA Server itself. Alan Maddison provides a guide to using the Security Configuration Wizard and Administrative roles to limit its attack surface and secure your ISA Server 2006 implementation.
Using the new TS Gateway feature, Windows Server 2008 lets users access their desktops from anywhere, without using a VPN. Dr. Thomas W. Shinder and Yuri Diogenes show you how you can publish the TS Gateway through ISA Server 2006 and extend the ISA Server 2006 publishing scenario to include client health enforcement.
The latest release of IIS introduces a modular and extensible platform with improved support for common deployment and management scenarios, enabling significant performance improvements. Mike Volodarsky reveals 10 key areas in IIS 7.0 that provide these improvements.
Many mobile professionals today need the line of business applications they use in the office to be accessible from a mobile device when they are in the field. Matt Fontaine describes how Windows Mobile and Mobile Device Manager allow you to deploy rich mobile functionality for critical line of business applications.
Shared and privileged account passwords are commonplace, but far too many organizations fail to adequately manage these shared passwords. This creates a serious security issue. Chris Stoneff explores the risks involved with shared and privileged accounts, and details better approaches to managing more secure passwords.
In the Toolbox column, Greg Steen takes a look at the book Mastering SQL Server 2005 Reporting Services Infrastructure Design by Joseph L. Jorden (Sybex, 2007), a helpful reference for those who are interested in SQL Server Reporting Services; auditing your environment with Alloy Discovery Professional Edition from Alloy Software; managing
passwords with Password Corral from Cygnus Productions; and auditing file usage with File System Auditor from Scriptlogic.
In Exchange Queue & A, Henrik Walther answers questions about calculating the number of Global Catalog servers you’ll need, changing a server’s site membership, and more.
In this month’s Utility Spotlight, Lance Whitney describes how the free Windows Memory Diagnostic utility can help you determine whether problems you are experiencing while running Windows are caused by faulty memory.
In our Inside SharePoint column, Pav Cherny discusses the limitations of the built-in Directory Management Service in SharePoint and explains how you can replace this component with a custom solution that lets you synchronize SharePoint recipient information with other directory solutions.
Don Jones shows how, despite its object oriented nature, Windows PowerShell is also able to parse complicated strings. See the September Windows PowerShell column.
The Microsoft Scripting Guys reveal how you can use disconnected recordsets—virtual database tables—to work around VBScript limitations relating to data-sorting and working with large data sets. A Hey, Scripting Guy! exclusive.
In his third installment on Windows Deployment Services in The Desktop Files, Wes Miller explores features that enhance performance and scalability, logging, and command-line automation.
In the final part of this three-part Security Watch series, Jesper Johansson looks at how software vendors, security suites, and marketing efforts hinder true security efforts and he warns us about how these practices can lead to the collapse of the technology security ecosystem.
Romi Mahajan explains his theory of “Innovation from Within” in the September Field Notes column, which emphasizes both human creativity and capital as keys to sustained comparative advantage.
In Windows Confidential this month, Raymond Chen explains how a bit of diagnostic code unexpectedly brought the Windows 95 build to crawl.