There are a variety of features and settings for securing your Microsoft Windows Server infrastructure, so be sure you make the right choice.
An independent study found that Microsoft's search results included much more malware than Google's.
Bulletin MS13-036 was pulled after incompatibility issues arose with a popular third-party antivirus program.
Will adding a second step when logging in lower the amount of hijacked accounts?
The recent explosion of the storage market has provided a huge amount of choice for your enterprise. Here are five options that are vying to be your data storage solution.
- By Scott D. Lowe
An Internet Explorer fix should be the top priority for IT on Tuesday.
Can Microsoft's sandbox protect applications from the attacks of yesterday?
Your guide to using System Center Virtual Machine Manager to configure your VMs and hosts.
According to Mary Jo Foley, it's not jut Xbox consoles and tablets -- Microsoft also has it's eye on PPI displays (and they'll play into Redmond's services aspirations, as well).
- By Mary Jo Foley
Help Greg Shields settle an ongoing debate regarding app virtualization with Don Jones by "voting" in the comments!
- By Greg Shields
System Center has morphed into a true private cloud platform. Here's a quick overview of what this means and how your IT infrastructure can take advantage of it.
Readers' thoughts on whether the Start button should return.
- By Jeffrey Schwartz
Being bogged down by application messages can disrupt anybody's productivity. Brien discusses how you can cut down on these nagging (and sometimes harmful) messages.
Brien discusses his process of replacing a backup battery and gives some insight on how to avoid this issue in the future.
And one security expert unravels the tangled web of related attacks.
The Pwn2Own contest has already taken down Microsoft's latest Internet browser.
Is it true you don't receive the full version of Office on your Surface tablet? Can you not upgrade to a different version? Brien Posey takes some time to clear the air on these and many other questions.
You, as the IT manager, are responsible for finding places to automate and making sure it happens.
Apple would like to remind you that attackers like infect Android customers with malware.
This month will bring us four "critical" and three "important" bulletins.