Tuesday, April 29, 2008

Group Policy Survival Guide

Yes, it's true - there's a new GP guide out there from Microsoft...

Check it out here - it's pretty cool!

 

<source>

Tuesday, April 22, 2008

No place like 127.0.0.1

So, I'm back home from a great trip to Seattle, Washington, US. The MVP Summit 2008 was a cool experience with lots of info and room for dialog with the product teams at the Microsoft Campus in Redmond.

We had some awesome talks on the future of Group Policy and I would really like to share it with you, but because of Non-Disclosure Agreements 'n' stuff I can't really say anything - yet.

Seattle is a very interesting city with a lot of great restaurants, nice architecture and friendly people. I had 2½ day to spend after the summit and even though I was missing my family Seattle took great care of me :)

Anyway, I hope to go back there next year - better prepared for jetlag (which basically means I'll travel a few days before the event next time) - but, that all depends on how much time I get to share information with you guys/girls out there... No sharing, no MVP award - that's the rule ya' know ;-)

Thanx to the GP team and the other MVPs for a great experience!

 

.

Thursday, April 10, 2008

Protect Public Computers with Windows SteadyState (Part 2)

This is my 2nd article that deals with the Windows SteadyState product and how use it to protect public computers!

If you haven't read part 1, please read it here...

Enjoy!

 

.

Wednesday, April 09, 2008

StarterGPOs available for download

Microsoft introduced the concept of StarterGPOs with GPMC version 2.0 in Vista SP1 + RSAT and Windows Server 2008. The idea is that it should be easy to share Group Policy settings, read more here!

The GREAT thing is that Microsoft has now released some StarterGPO samples - go download the first shipment here!

Saturday, April 05, 2008

Security White Papers & Guides for download

This post gives you some links to online available White Papers and Guides from the Microsoft download site - I hope you can use some of it to analyze and protect your own network(s)!

New Security White Paper of April 2008:

"The Microsoft US National Security Team is composed of strategic security advisors who work with Microsoft customers, partners, MS internal constituencies and the information security industry to promote the adoption of security processes and technologies. The NST also focuses on driving vertical security solutions for a wide range of industries. To this end, the NST has produced a number of white papers that address the specific security needs of particular industries, such as the professional services and financial services industries."

You will find these papers:

- Electronic Signature Assurance and the Digital Chain-of-Evidence
- Enabling Secure Collaboration for Professional Services Firms
- Establishing the Foundation of Authenticity for Electronically Stored Information
- Information Protection Strategies For Financial Services
- Optimizing Branch Office Security and Productivity in the Financial Services Sector
- Secure Software Development for the Financial Services Industry
- Securing the Retail Store-Securing the Data

Go get them here!

 

Also, go check out the "Fundamental Computer Investigation Guide for Windows":

"The Fundamental Computer Investigation Guide for Windows Solution Accelerator is intended for IT professionals who need to effectively conduct investigations of Microsoft® Windows®–based computers in their organizations. It provides a computer investigation model as well as process and best practice information. The guide also provides a fictitious example of an investigation that involves unauthorized access to confidential information. This investigation uses the provided guidance and demonstrates the use of numerous tools. Information is also included about how to configure a lab to create the example scenario. An appendix provides information about how to prepare for computer investigations, sample worksheets, contact information for reporting different types of computer-related crimes to appropriate law enforcement agencies, and lists of useful tools."

Go get that document right here!

 

And finally, what about checking out the "The Security Risk Management Guide"?:

"The Security Risk Management Guide explains how to conduct each phase of a security risk management project and create an ongoing process that drives the organization towards the most useful and cost-effective controls to mitigate security risks. It incorporates real-world experiences from Microsoft IT and also includes input from Microsoft customers and partners.
This guide references many industry accepted standards for managing security risks. It is an important example of Microsoft's commitment to delivering quality guidance to help customers secure their IT infrastructures.
"

That document is available right here!

 

Enjoy...

.

Tuesday, April 01, 2008

MVP:Enterprise Security

Yup, a wish came through - I'm now an MVP!

Receiving the Microsoft Most Valuable Professional Award is a great honor and much appreciated - thank you.

MVP_Horizontal_FullColor_small

Sharing Rocks - Information wants to be free!

Time to get a beer :-)

 

.

Core with a GUI

If you have messed around in Windows Server 2008 Core installation you've probably had some challenges along the way - like: how do I join a computer to the domain using a command prompt, how can I add Features, tweak the firewall etc. Well, a nice and very useful solution to many of the basic configuration tasks is out there - and it's free of course!

Go check out CoreConfigurator (Server Core Configurator) written by Guy Teverovsky - look how easy it is and stop acting like a geek sent back to the early 90s :-)

Download here and enjoy!

.