Readers generally like what they see in the 2005 makeover of Microsoft Operations Manager, citing improved usability, better reporting and expanded monitoring.
- By Steve Ulfelder
Even though IIS gets more secure with each generation, having at least a few Apache Web servers in your shop makes sense.
- By Scott Bekker
Terminal Services is a lot like poker—anyone can play, but it takes smarts and strategy to play well. These seven tips will make you a shark.
- By Greg Shields
The proper level of load balancing services can ensure consistent availability of Web services.
- By Danielle Ruest and Nelson Ruest
With Microsoft animosity behind him, CEO Scott McNealy explains why Windows shops should consider his alternative desktop approach.
- By Doug Barney and Paul Desmond
This veteran penetration tester has seen some stupid security lapses in his time. Here are six of the worst.
As Longhorn looms, we examine Microsoft's track record in hitting product ship dates and offer advice for coping with the inevitable.
- By Paul Desmond
Official Microsoft support is no more, but WCVB-TV's Rick Zach and lots of other users are sticking with their NT servers and piecing together support options.
- By Stuart J. Johnston
These 10 anti-spam software solutions can help you stop spam in its tracks, restore lost productivity and save money and time.
- By David W. Tschanz
Jeff Raikes, head of Microsoft's Information Worker unit, expounds on Office, Software Assurance and the changing nature of life at work.
A private IM environment may be just the answer to give your company all the benefits of IM while mitigating the inherent security risks.
The Group Policy Management Console can be a powerful troubleshooting too—if you know how to use it.
Rollout pain aside, users laud the long overdue enhancements that
SP2 brings to IE, along with new GPOs, RPC lockdown and more.
- By Stephen Swoyer
The more work you put in up front, the easier it will be to get and stay current when the patches hit.
We test three software-based intrusion detection systems that can help alert you when you've got barbarians at the gate.
Ensuring maximum asset availability requires multiple layers of security working in concert to protect against intrusions, enforce usage policies, and allow machines to remain resilient to attacks - even when patching is not an option.
2005 Redmond Magazine Readers' Choice Survey: Find out how your favorite tool fared as nearly 2,200 readers pick their favorites in more than 40 product categories.
Just because something "appears" to be from a legitimate sender doesn't make it so.
- By Ben Schorr and Jim McBee
Fighting spam requires authenticating e-mail addresses on the fly. Despite igniting a battle of its own, the Microsoft-backed Sender ID spec
is shaping up as the best option.
- By Karen Epper Hoffman
SQL Server Reporting Services earns solid if not stellar marks from early adopters—and you can't beat the price.
- By Stephen Swoyer