In-Depth Features


Q&A: Protect Users From Phishing Scams

Just because something "appears" to be from a legitimate sender doesn't make it so.

Users Latch on to SQL Reporting Tool

SQL Server Reporting Services earns solid if not stellar marks from early adopters—and you can't beat the price.

Best of the Best

2005 Redmond Magazine Readers' Choice Survey: Find out how your favorite tool fared as nearly 2,200 readers pick their favorites in more than 40 product categories.

Intrusion Interrupted

We test three software-based intrusion detection systems that can help alert you when you've got barbarians at the gate.

Valid ID Required

Fighting spam requires authenticating e-mail addresses on the fly. Despite igniting a battle of its own, the Microsoft-backed Sender ID spec is shaping up as the best option.

10 Ways to Debunk ROI Claims

Vendors have lots of ways to manipulate ROI data to their advantage, making it seem as if every product is the answer to your IT prayers. Don't believe the hype.

Storage Gets Slim

Forget about low-carb diets. Storage consolidation is the new craze hitting the fat-conscious world.

Windows Server 2003 Maintenance Made Easy

Following a management and maintenance regimen reduces administration, maintenance, and business expenses while increasing reliability, stability, and security.

You're Fired

Ditch your server dead weight: Consolidate to streamline management.

E-Mail Central

Exchange 2003 allows for a more consolidated e-mail architecture. Here's how to pull it off.

New Password Mantra: Go Long

New hacking methods make short passwords unsafe, but Microsoft makes it tough to go long. Her's how to forge an effective policy.

RAP Traps

Remote access policies are at the heart of remote access--and at the root of most problems. Learn how they work and avoid the mistakes that can lock out your remote users.

5 Essential Scripts

Time is money and money is tight, but these five scripts can help any admin get more done every day.

7 Steps to a Better Bargain

Patrick Collins saved more than $1 million in his Microsoft negotiations. Learn how he did it and how to hammer out your own sweet Microsoft deal.

ISA 2004 Passes the Test

Early adopters laud GUI, VPN and administration features.

Manage Patches and Updates

Round out your new or updated security strategy by establishing a process to evaluate, manage, and deploy patches in your network. Here are some guidelines and tool recommendations.

Grunt Work

Keeping systems patched is time-consuming and laborious, but it's crucial. Here are seven tools that can help you automate the process.

Plan Your Defense Strategy

Concentrate on awareness, process, readiness, and privacy as you put your security plan into action.

Sweet Enticement

Honey drops can help you detect attacks in progress--without sticking you with false positives.

Use Server Roles to Heighten Security

Securing your network goes beyond your hardware or software firewalls. You must define the role of each server and then implement delta security policies to protect your services.

Subscribe on YouTube