Jeff Raikes, head of Microsoft's Information Worker unit, expounds on Office, Software Assurance and the changing nature of life at work.
The more work you put in up front, the easier it will be to get and stay current when the patches hit.
The Group Policy Management Console can be a powerful troubleshooting too—if you know how to use it.
Rollout pain aside, users laud the long overdue enhancements that
SP2 brings to IE, along with new GPOs, RPC lockdown and more.
- By Stephen Swoyer
- 02/01/2005
Fighting spam requires authenticating e-mail addresses on the fly. Despite igniting a battle of its own, the Microsoft-backed Sender ID spec
is shaping up as the best option.
- By Karen Epper Hoffman
- 01/01/2005
2005 Redmond Magazine Readers' Choice Survey: Find out how your favorite tool fared as nearly 2,200 readers pick their favorites in more than 40 product categories.
Just because something "appears" to be from a legitimate sender doesn't make it so.
- By Ben Schorr and Jim McBee
- 01/01/2005
We test three software-based intrusion detection systems that can help alert you when you've got barbarians at the gate.
Ensuring maximum asset availability requires multiple layers of security working in concert to protect against intrusions, enforce usage policies, and allow machines to remain resilient to attacks - even when patching is not an option.
SQL Server Reporting Services earns solid if not stellar marks from early adopters—and you can't beat the price.
- By Stephen Swoyer
- 01/01/2005
Ditch your server dead weight: Consolidate to streamline management.
- By Danielle Ruest and Nelson Ruest
- 12/01/2004
Vendors have lots of ways to manipulate ROI data to their advantage, making it seem as if every product is the answer to your IT prayers. Don't believe the hype.
Exchange 2003 allows for a more consolidated e-mail architecture. Here's how to pull it off.
- By Bill Boswell
- 12/01/2004
Following a management and maintenance regimen reduces administration, maintenance, and business expenses while increasing reliability, stability, and security.
- By Kenton Gardinier and John McMains
- 12/01/2004
New hacking methods make short passwords unsafe, but Microsoft makes it tough to go long. Her's how to forge an effective policy.
- By Derek Melber
- 12/01/2004
Forget about low-carb diets. Storage consolidation is the new craze hitting the fat-conscious world.
Early adopters laud GUI, VPN and administration features.
- By Stephen Swoyer
- 11/01/2004
Patrick Collins saved more than $1 million in his Microsoft negotiations. Learn how he did it and how to hammer out your own sweet Microsoft deal.
Concentrate on awareness, process, readiness, and privacy as you put your security plan into action.
- By Danielle Ruest and Nelson Ruest
- 11/01/2004
Honey drops can help you detect attacks in progress--without sticking you with false positives.
- By Mark Burnett and James C. Foster
- 11/01/2004