September2008September 2008

ISA Server:A Guide to Securing ISA Server 2006

Many organizations rely on ISA Server 2006 to secure their environment, but few take the important step of securing ISA Server itself. Here’s a guide to using the Security Configuration Wizard and Administrative roles to limit its attack surface and secure your ISA Server 2006 implementation. Alan Maddison

ISA Server:Enhance TS Gateway Security with ISA Server 2006

Using the new TS Gateway feature, Windows Server 2008 enables users to access their desktops from anywhere, without using a VPN. Find out how you can publish the TS Gateway through ISA Server 2006 and extend the ISA Server 2006 publishing scenario to include client health enforcement. Dr. Thomas W. Shinder and Yuri Diogenes

IIS 7.0:Top 10 Performance Improvements in IIS 7.0

The latest release of IIS introduces a modular and extensible platform with improved support for common deployment and management scenarios, enabling significant performance improvements. Here’s a look at 10 key areas in IIS 7.0 that provide these improvements. Mike Volodarsky

Mobility:Take Your Line of Business Applications Mobile

Many mobile professionals today need the line of business applications they use in the office (CRM, ERP, and the like) to be accessible from a mobile device when they are in the field. See how Windows Mobile and Mobile Device Manager allow you to deploy rich mobile functionality for critical line of business applications. Matt Fontaine

Security:Understanding Shared Account Password Management

Shared and privileged account passwords are commonplace, but far too many organizations fail to adequately manage these shared passwords. This creates a serious security issue. Explore the risks involved with shared and privileged accounts, and discover better approaches to managing more secure passwords. Chris Stoneff

https://technet.microsoft.com/en-us/library/bb978519(v=msdn.10)
https://technet.microsoft.com/en-us/library/cc135917(v=msdn.10)

Columns

From the Editor:Back to School
Joshua Hoffman
Letters:Readers Speak Out
Toolbox:New Products for IT Pros
Greg Steen
Exchange Queue & A:Aligning Disk Partitions, Planning for SCR, and More
In the September 2008 installment of Exchange Queue & A, we answer questions about calculating the number of Global Catalog servers you'll need, changing a server's site membership, and more.Henrik Walther
Utility Spotlight:Windows Memory Diagnostic
See how this free utility can help you determine whether problems you are experiencing while running Windows are caused by faulty memory.Lance Whitney
Inside SharePoint:SharePoint Directory Integration
Pav Cherny discusses the limitations of the built-in Directory Management Service in SharePoint and explains how you can replace this component with a custom solution that lets you synchronize SharePoint recipient information with other directory solutions.Pav Cherny
Windows PowerShell:String Theory
Despite its object oriented nature, Windows PowerShell is also able to parse complicated strings. Don Jones demonstrates how you can do this in Windows PowerShell using Select-String.Don Jones
Hey, Scripting Guy!:Stay Connected with Your Toaster
Discover how you can use disconnected recordsets—virtual database tables—to work around VBScript limitations relating to data-sorting and working with large data sets.The Microsoft Scripting Guys
The Desktop Files:Advanced Functionality in WDS
In his third installment on Windows Deployment Services, Wes Miller explores features that enhance performance and scalability, logging, and command-line automation.Wes Miller
Security Watch:Passwords and Credit Cards, Part 3
In the final part of this three part series, Jesper Johansson looks at how software vendors, security suites, and marketing efforts hinder true security efforts and he warns us about how these practices can lead to the collapse of the technology security ecosystem.Jesper M. Johansson
Field Notes:Innovation from Within
Romi Mahajan explains his theory of “Innovation from Within,” which emphasizes both human creativity and capital as keys to sustained comparative advantage.Romi Mahajan
Windows Confidential:Windows 95 Unplugged
Raymond Chen explains how a bit of diagnostic code unexpectedly brought the Windows 95 build to crawl.Raymond Chen