Six Myths of Windows RT Revealed!

Total Page:16

File Type:pdf, Size:1020Kb

Six Myths of Windows RT Revealed! Six myths of Windows RT revealed! There has been a lot of (mis)information being circulated about capabilities of Windows® RT, the new Microsoft operating system for ARM tablets. This discussion should dispel a number of those myths and will highlight the robust capabilities of this new and exciting operating system powering the next generation of Dell tablets. Myth # 1 – Windows RT is not manageable • Maximum inactivity time lock Although Windows RT is not as openly manageable • Minimum device password complex characters as a Windows 8 Pro or Windows 8 Enterprise PC, IT • Minimum password length Administrators will still be able to remotely manage many • Password enabled aspects of a Windows RT device. • Password expiration SCCM and InTune • Password history Microsoft System Center Configuration Manager (SCCM) It also has the ability to query and report back: and Microsoft’s SaaS product, InTune, are widely adopted • Drive encryption status systems management solutions. • Auto update status Utilizing Exchange Active Sync extensions, Windows RT • Antivirus status will have built-in hooks so that it is manageable by SCCM • Anti-spyware status and InTune. For example, using Exchange Server, SCCM This is just a start. In the future, there are many and InTune, the IT admin is able to configure a set of opportunities for Microsoft to open up additional policies including: management capabilities beyond these critical ones • Allow convenience logon listed. As Windows RT becomes more mature, we expect • Maximum failed password attempts Microsoft to continue expanding the list. Myth #2 – Windows RT is not secure RT devices come with full volume data Firmware Trusted Platform Module Out of the box, Windows RT devices encryption, which is based on their own TPMs are devices that securely store are loaded with a number of built-in bitlocker technology (although will not cryptographic keys, such as password security features that will appeal to a be branded BitLocker by Microsoft). This and login credentials (typed and broad set of customers with varying ensures that any sensitive data on the smartcard based) and encryption levels of security enforcement policies. device will be inaccessible in the event keys. Windows RT supports a firmware Secure Boot the device is lost or stolen. The recovery based TPM so that user’s passwords Secure Boot effectively locks down key is stored on the user’s SkyDrive and credentials remain secure and Windows RT devices by preventing account for easy access if needed. protected. it from loading (or booting for that Remote wipe of company sensitive data Myth #3 – Setting up Windows matter) non-Windows operating In the event that a Windows RT RT to work in an enterprise systems. This effectively stops users device is lost or stolen, the user or environment is difficult from loading rogue or pirated copies IT administrator with the proper Windows RT comes with a number of of OS onto Windows RT devices. credentials has the ability to remotely built-in, out-of-the-box tools that allow This maintains the integrity of the wipe EAS managed data (like email, the device to easily connect the user operating system so that it can always contacts, and calendar events) on to their enterprise environment and be trusted. the device, even though the data download LoB applications. So even This same system also helps enforce is encrypted (just to be safe!). If the though Windows RT does not directly that all applications be digitally signed applications were installed through support features like Domain Join, it is using a trusted certificate before the Enterprise Application Store, IT exceptionally “enterprise ready”. being installed on the device. It admins will also be able to disable VPN ensures authenticity (knowing where access to these line of business (LoB) Virtual Private Networking (VPN) the app came from) and integrity apps (see Myth #4 below). creates a secure, reliable tunnel (verifying the app hasn’t been Multi-factor authentication directly through a company’s firewall tampered with since its publication) Windows RT supports many forms that allows users to access corporate for each application on a Windows of secure login, including picture data and email. Windows RT has a RT device, preventing installation of password, typed password, biometric built-in VPN that is compliant with the unauthorized applications. (fingerprint) and smartcards (PIV, majority of advanced VPN systems in Windows Defender GIDS) utilizing firmware trusted the marketplace today. Although the Secure Boot system will platform module (TPM), depending • Inbox VPN client included for prevent the majority of unauthorized on the hardware configuration. Microsoft, Cisco, CheckPoint, and applications from being installed, the Through the InTune management Juniper servers next line of defense will be built-in console, IT admins can also force • VPN protocols supported: L2TP, Windows Defender, protecting the policies such as strong password, PPTP, SSTP, Ipsec (IKEv2) system against spyware and unwanted password expiration, inactivity time • Multiple ways of configuration software. Windows Defender will lock, etc. (client UX, scripts, or management continuously monitor and help Separate user profiles are also infrastructure) remove malicious and potentially supported which isolates and • Encryption protocols: WEP, WPA, unwanted programs from the device. protects user’s data from being WPA2, WPA-Enterprise, WPA2- Full device encryption accessed by other users logged Enterprise, 802.1X Protecting data on the system is into the device at the same time. • Certificate-based authentication Although separate local user profiles important for a number of reasons and Using the built-in management are possible, only one Enterprise encrypting the data on the device is agent, Windows RT allows automatic Application Store credential is the most widely accepted method of configuration of VPN profiles for the supported (i.e. authentication via AD). securing private information. Windows user, so that Windows RT devices easily connect to a corporate network requiring little user action. 2 VDI support • Internally developed Windows RT For companies using Virtual Desktop apps that are not published in the Infrastructure (VDI), Windows RT Windows Store allows the user to connect directly • Apps produced by independent to their full Windows desktop and software vendors that are licensed access legacy applications using the to the organization for internal built-in VDI receiver application. This distribution allows for: • Web links that launch websites • Full VDI experience and web-based apps directly in • Rich experience everywhere the browser (RemoteFX, USB redirection, multi- • Links to app listings in the Windows touch remoting) Store. This is a convenient way • Best value for VDI (Fairshare) for IT to make users aware of • Efficient management useful business apps that are publicly available. So even though legacy native apps written purely in native WIN32 code Discovering and cannot execute directly on Windows downloading LoB RT devices, these apps may still be applications on Windows accessible to the user through a RT devices is quite connected VDI session. Plus, all the simple. The Windows RT advantages of VDI such as session Management Agent and mobility, security and IT image Enterprise Application management will be available to the Store allows the user Windows RT user through the built-in to simply enter their VDI receiver. corporate email address and password and the Myth #4 – It’s difficult to install device will automatically line of business (LoB) apps on Windows RT present a set of LoB available for the user to Enterprise customers have many download and install. options available to distribute LoB applications to their employees (or This same system also students). One way is through the allows the IT Administrator Windows Store or through the Dell to populate, manage and Shop (store within a store) application. audit which applications Although this method is a convenient are available to each user. way to discover and download most This is accomplished popular off-the-shelf apps, it requires by simply adding the the user to log on using their personal user’s credentials to the Microsoft Live ID, which may not be Active Directory (AD) appropriate for companies or school service in the SCCM or systems that have developed or InTune console. negotiated separate volume license By specifying which AD agreements for their LoB applications. domain a particular user Enterprise Application Store is a member of, IT admins So by using the built-in Windows RT can offer different applications to Management Agent and Enterprise different sets of users. For example, Application Store, a curated set of they can offer expense management, company approved LoB apps can contact management and sales be easily discovered, downloaded tracking applications to their road and installed directly to the device. warriors and offer quality control, Microsoft allows the user to browse inventory management and logistics and discover these types of LoB apps applications to team members on the that have been made available to them factory floor. by the IT admin: 3 The Windows RT Management Agent Today, Windows RT is a perfect Myth #6: Windows RT is not like also performs daily maintenance tasks, complement to the BYOD trend, having a “full” Windows OS updates downloaded applications and primarily because it has the consumer The new Windows RT is a purpose-built checks for new apps available to the features end users desire and the operating system designed specifically user. It will also report back which apps enterprise enablers corporate to be used on ARM-based mobile and are installed on which machine for customers require. Its main focus is tablet devices. Its design intent was inventory and software license audits. security, manageability, productivity to leverage the many advantages of The result is a system in which and application access, when and Windows 8, but it’s optimized for an ARM-based processor. enterprise customers can populate a where appropriate to the company set of curated LoB applications they or user.
Recommended publications
  • NTFS • Windows Reinstallation – Bypass ACL • Administrators Privilege – Bypass Ownership
    Windows Encrypting File System Motivation • Laptops are very integrated in enterprises… • Stolen/lost computers loaded with confidential/business data • Data Privacy Issues • Offline Access – Bypass NTFS • Windows reinstallation – Bypass ACL • Administrators privilege – Bypass Ownership www.winitor.com 01 March 2010 Windows Encrypting File System Mechanism • Principle • A random - unique - symmetric key encrypts the data • An asymmetric key encrypts the symmetric key used to encrypt the data • Combination of two algorithms • Use their strengths • Minimize their weaknesses • Results • Increased performance • Increased security Asymetric Symetric Data www.winitor.com 01 March 2010 Windows Encrypting File System Characteristics • Confortable • Applying encryption is just a matter of assigning a file attribute www.winitor.com 01 March 2010 Windows Encrypting File System Characteristics • Transparent • Integrated into the operating system • Transparent to (valid) users/applications Application Win32 Crypto Engine NTFS EFS &.[ßl}d.,*.c§4 $5%2=h#<.. www.winitor.com 01 March 2010 Windows Encrypting File System Characteristics • Flexible • Supported at different scopes • File, Directory, Drive (Vista?) • Files can be shared between any number of users • Files can be stored anywhere • local, remote, WebDav • Files can be offline • Secure • Encryption and Decryption occur in kernel mode • Keys are never paged • Usage of standardized cryptography services www.winitor.com 01 March 2010 Windows Encrypting File System Availibility • At the GUI, the availibility
    [Show full text]
  • System Requirements for LWC Connect to Learning
    System Requirements for LWC Connect to Learning Run the Adobe Connect Diagnostic to see if you meet the Flash, connection, and add-in minimum requirements https://na3cps.adobeconnect.com/common/help/en/support/meeting_test.htm MINIMUM COMPUTER SYSTEM REQUIREMENTS: Windows • 1.4GHz Intel® Pentium® 4 or faster processor (or equivalent) for Microsoft® Windows® XP, Windows 7 or Windows 8 • Windows 8.1 (32-bit/64-bit), Windows 8 (32-bit/64-bit), Windows 7 (32-bit/64-bit), Windows XP • 512MB of RAM (1GB recommended) for Windows XP, Windows 7 or Windows 8 • Microsoft Internet Explorer 8, 9, 10, 11; Mozilla Firefox; Google Chrome • Adobe® Flash® Player 11.2+ Mac OS • 1.83GHz Intel Core™ Duo or faster processor • 512MB of RAM (1GB recommended) • Mac OS X 10.7.4, 10.8, 10.9 • Mozilla Firefox; Apple Safari; Google Chrome • Adobe Flash Player 11.2+ Linux • Ubuntu 12.04; Red Hat Enterprise Linux 6; OpenSuSE 12.2 • No Add-in support for Linux. Users on Linux can attend meetings in the browser. • Mozilla Firefox • Adobe Flash Player 11.2+ Mobile • Apple supported devices: iPhone 5S, iPhone 5, iPhone 4S, iPad with Retina display, iPad 3, iPad 2, iPad mini, and iPod touch (4th & 5th generations) • Apple supported OS versions summary: iOS 6 and higher • Android supported devices: Motorola DROID RAZR MAXX, Motorola Atrix, Motorola Xoom, Samsung Galaxy Tab 2 10.1, Samsung Galaxy S3 & S4, Nexus 7 tablet • Android supported OS versions summary: 2.3.4 and higher 1 ADDITIONAL REQUIREMENTS • Latest version of Adobe Flash Player installed o Download latest version at http://get.adobe.com/flashplayer/ .
    [Show full text]
  • Active @ UNDELETE Users Guide | TOC | 2
    Active @ UNDELETE Users Guide | TOC | 2 Contents Legal Statement..................................................................................................4 Active@ UNDELETE Overview............................................................................. 5 Getting Started with Active@ UNDELETE........................................................... 6 Active@ UNDELETE Views And Windows......................................................................................6 Recovery Explorer View.................................................................................................... 7 Logical Drive Scan Result View.......................................................................................... 7 Physical Device Scan View................................................................................................ 8 Search Results View........................................................................................................10 Application Log...............................................................................................................11 Welcome View................................................................................................................11 Using Active@ UNDELETE Overview................................................................. 13 Recover deleted Files and Folders.............................................................................................. 14 Scan a Volume (Logical Drive) for deleted files..................................................................15
    [Show full text]
  • Microsoft'sevolving App Strategy
    CAN MICROSOFT MAP THE FUTURE OF IT? Microsoft’s Evolving App Strategy Microsoft is trying to better align its applications through a new interface and improved cloud connectivity. Is this the right strategy? BY BRIEN M. POSEY THE NEW INTERFACE WHERE RT AND OFFICE FIT CLOUD CONNECTIVITY CAN MICROSOFT MAP THE FUTURE OF IT? VER THE PAST two decades, Microsoft’s strategy for desktop and mobile ap- plications has remained relatively static. Microsoft devoted much of its energy to creating operating systems and allowed applications to develop almost as an afterthought. THE NEW Even today the company adheres to this haphazard approach to applications. INTERFACE O At the same time, the company’s most recent product-release cycle demonstrates that Microsoft’s support for desktop and mobile apps is evolving. WHERE RT AND OFFICE FIT When it comes to application support in the company’s latest releases, two major themes have emerged: the new tile-based user interface (UI) and cloud con- nectivity. While both of these technologies benefit a segment of Microsoft’s cus- CLOUD CONNECTIVITY tomer base, they have also created numerous challenges for IT professionals. In particular, the new Windows 8 interface has been an impediment to adop- tion among business users, but it is part of a concerted effort on Microsoft’s part to build consistency throughout its application set. Despite this imperfect strat- egy, there are signs that the approach is pointing Microsoft in a direction that al- lows business users to productively use Windows, Office and other applications on PCs, tablets and smartphones. 2 MICROSOFT’S EVOLVING APP STRATEGY THE NEW INTERFACE WINDOWS’ NEW INTERFACE The most well-known element of the Windows 8 operating system is the new user interface (which at one time was called the Metro interface and is now known as the Windows 8-style UI).
    [Show full text]
  • Accessing Windows 8 with Window-Eyes
    Window-Eyes Training GW Micro, Inc. Accessing Windows 8 with Window-Eyes Microsoft released the Windows 8 operating system to the consumer market in late 2012 and is the first version of Windows designed to be used on both mobile devices with touch screens as well as conventional desktop and laptop computers. Windows 8 includes a brand new Start screen and many other user interface changes that you will want to learn how to use for a higher level of productivity on your new computer. This webinar study guide worksheet focuses on the most notable features and changes found in Windows 8 and includes a number of helpful tips for accessing Windows 8 with Window-Eyes. Learning Objectives • Identify and explain the different Windows 8 editions • Practice logging in, restarting and shutting down • Discover how to access, navigate and customize the Start screen • Discover how to access and navigate the Apps screen • Discover how to use the Search charm to find apps, settings and files • Describe the difference between Windows 8 apps and traditional programs (also known as desktop apps) • Identify the Charm bar and the five Charms of Windows 8 • Identify and explain the purpose of Toast messages • Discover the benefits of the Power User menu Review Questions 1. Window-Eyes version <fill-in-answer> and higher is compatible with Windows 8. 2. Windows 8 is available in four different editions: a. <fill-in-answer> is geared towards the home market segment and includes all of the basic new features including the Start screen with semantic zoom, live tiles, Windows store, Microsoft account integration, Internet Explorer 10 and more.
    [Show full text]
  • Run-Commands-Windows-10.Pdf
    Run Commands Windows 10 by Bettertechtips.com Command Action Command Action documents Open Documents Folder devicepairingwizard Device Pairing Wizard videos Open Videos Folder msdt Diagnostics Troubleshooting Wizard downloads Open Downloads Folder tabcal Digitizer Calibration Tool favorites Open Favorites Folder dxdiag DirectX Diagnostic Tool recent Open Recent Folder cleanmgr Disk Cleanup pictures Open Pictures Folder dfrgui Optimie Drive devicepairingwizard Add a new Device diskmgmt.msc Disk Management winver About Windows dialog dpiscaling Display Setting hdwwiz Add Hardware Wizard dccw Display Color Calibration netplwiz User Accounts verifier Driver Verifier Manager azman.msc Authorization Manager utilman Ease of Access Center sdclt Backup and Restore rekeywiz Encryption File System Wizard fsquirt fsquirt eventvwr.msc Event Viewer calc Calculator fxscover Fax Cover Page Editor certmgr.msc Certificates sigverif File Signature Verification systempropertiesperformance Performance Options joy.cpl Game Controllers printui Printer User Interface iexpress IExpress Wizard charmap Character Map iexplore Internet Explorer cttune ClearType text Tuner inetcpl.cpl Internet Properties colorcpl Color Management iscsicpl iSCSI Initiator Configuration Tool cmd Command Prompt lpksetup Language Pack Installer comexp.msc Component Services gpedit.msc Local Group Policy Editor compmgmt.msc Computer Management secpol.msc Local Security Policy: displayswitch Connect to a Projector lusrmgr.msc Local Users and Groups control Control Panel magnify Magnifier
    [Show full text]
  • Netbackup ™ Enterprise Server and Server 8.0 - 8.X.X OS Software Compatibility List Created on September 08, 2021
    Veritas NetBackup ™ Enterprise Server and Server 8.0 - 8.x.x OS Software Compatibility List Created on September 08, 2021 Click here for the HTML version of this document. <https://download.veritas.com/resources/content/live/OSVC/100046000/100046611/en_US/nbu_80_scl.html> Copyright © 2021 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo, and NetBackup are trademarks or registered trademarks of Veritas Technologies LLC in the U.S. and other countries. Other names may be trademarks of their respective owners. Veritas NetBackup ™ Enterprise Server and Server 8.0 - 8.x.x OS Software Compatibility List 2021-09-08 Introduction This Software Compatibility List (SCL) document contains information for Veritas NetBackup 8.0 through 8.x.x. It covers NetBackup Server (which includes Enterprise Server and Server), Client, Bare Metal Restore (BMR), Clustered Master Server Compatibility and Storage Stacks, Deduplication, File System Compatibility, NetBackup OpsCenter, NetBackup Access Control (NBAC), SAN Media Server/SAN Client/FT Media Server, Virtual System Compatibility and NetBackup Self Service Support. It is divided into bookmarks on the left that can be expanded. IPV6 and Dual Stack environments are supported from NetBackup 8.1.1 onwards with few limitations, refer technote for additional information <http://www.veritas.com/docs/100041420> For information about certain NetBackup features, functionality, 3rd-party product integration, Veritas product integration, applications, databases, and OS platforms that Veritas intends to replace with newer and improved functionality, or in some cases, discontinue without replacement, please see the widget titled "NetBackup Future Platform and Feature Plans" at <https://sort.veritas.com/netbackup> Reference Article <https://www.veritas.com/docs/100040093> for links to all other NetBackup compatibility lists.
    [Show full text]
  • Supported Server-Side Configuration
    Server and hosting requirements Supported server-side configuration Supported operating systems: Windows 7 Service Pack 1 (32bit or 64bit) Windows 8 or 8.1 (32bit or 64bit) Windows 10 (32bit or 64bit) Windows Server versions: 2008 R2 Service Pack 1, 2012, 2012 R2 We recommend that you install the following components on the computer where you want to run Kentico. If you do not install these components on your computer before installing Kentico, the Installer is capable of downloading and installing them or their suitable alternatives on its own (except for the Visual Studio built-in server). In such cases, your computer must be connected to the Internet. Microsoft .NET Framework 4.5 or 4.6. Microsoft Internet Information Services (see the table below) or Visual Studio 2012/2013/2015 built-in web server. Microsoft SQL Server 2008 R2, 2012, 2014 (including the free SQL Server Express Edition 2008 R2/2012/2014). The collation set for the SQL server must be case-insensitive. Internet Information Services overview The following table lists instructions on how to install different versions of IIS on different operating systems. Internet Information Services version Operating system Details and installation instructions IIS 7.0 Windows Vista not supported Windows Server 2008 IIS 7.5 Windows 7 SP1 IIS 7 Installation and Deployment Windows Server 2008 R2 SP1 IIS 8.0 Windows 8 Installing IIS on Windows Server 2012 Windows Server 2012 IIS 8.5 Windows 8.1 Installing IIS 8.5 Windows Server 2012 R2 IIS 10 Windows 10 Same process as IIS 8+ For the Kentico
    [Show full text]
  • Tablets in the Enterprise: Comparing the Total Cost of Ownership
    TABLETS IN THE ENTERPRISE: COMPARING THE TOTAL COST OF OWNERSHIP EXECUTIVE SUMMARY Windows 8 tablets provide a PC experience, which for many workers is essential to maintaining productivity. With Windows 8, users can run familiar desktop applications, maintaining productivity without having to find new ways to carry out their tasks. They can read, edit, and print their emails and Office documents—tasks that can be a challenge on other tablets. In addition to these productivity advantages, Intel Core i5 processor and Windows 8 tablets can provide enterprises with total cost of ownership (TCO) savings of up to 18 percent compared to other tablets. We expect additional TCO savings with Intel Core vPro™ processor-based tablets due to their additional manageability capabilities. We estimate tablets with Intel Architecture and Windows 8 will have lower TCO than other tablets, primarily due to the following: reduced software costs lower management costs improved end-user productivity JANUARY 2013 A PRINCIPLED TECHNOLOGIES WHITE PAPER Commissioned by Intel Corp. TOTAL COST OF OWNERSHIP OF TABLETS IN THE ENTERPRISE In this paper, we first present a TCO analysis for a hypothetical enterprise considering four major categories of tablets for their employees: Microsoft Windows 8 tablets, Windows RT tablets, Android tablets, and Apple iPads. Because the ranges of prices and capabilities differ among models within each category, we selected a single representative model for each. Following this analysis, we discuss the dominant issues in enterprise tablet computing as of this writing. We base our TCO analysis on the primary assumptions in Figure 1. Tablets must be nine inches or larger with 64 GB of storage and Wi-Fi support.
    [Show full text]
  • Models Step 1: Identify Which Version of the Windows Phone Operating
    Nokia Lumia – All Models (Excluding models 710 and 800) Step 1: Identify which version of the Windows Phone operating system is installed on your phone: 1. Go to your App list. 2. From there, tap “Settings” > “About” > “More info”. 3. The “Software” section indicates which version of the Windows Phone operating system is in use. a. If your phone is currently running Windows Phone 7, proceed to page 2 for instructions on how to wipe your device. b. If your phone is currently running Windows Phone 8, 8.1, or 10, proceed to page 3 for instructions on how to wipe your device. ______________________________________________________________________________ Nokia Lumia - Tous les modèles (À l'exclusion des modèles 710 et 800) Étape 1: Déterminer la version du système d'exploitation Windows Phone installée sur votre téléphone: 1. Accédez à votre liste d’applications. 2. Presse « Paramètres » > « À propos » > « Plus d'info ». 3. La section « Logiciel » indique le nom de la version du système d'exploitation Windows Phone. a. Si votre téléphone utilise actuellement Windows Phone 7, aller à la page 2 pour obtenir des instructions sur la façon de réinitialiser votre téléphone. b. Si votre téléphone utilise actuellement Windows Phone 8, 8.1, ou 10, aller à la page 4 pour obtenir des instructions sur la façon de réinitialiser votre téléphone. Nokia Lumia (Windows 7.5) Model Numbers: 610, 900 The following instruction will give you all the information you need to remove your personal information from your phone. Before recycling your device please also remember to: The account for the device has been fully paid and service has been deactivated.
    [Show full text]
  • Copyrighted Material
    Index Note to the Reader: Throughout this index boldfaced page numbers indicate primary discussions of a topic. Italicized page numbers indicate illustrations. IUSR_computername account, 274–275 Numbers disabling, 61 mapping certificates to, 283–286 3DES, 125–126, 416, 494 user accounts, configuring for 802.1x standard (IEEE), 181–184, 494 delegation, 46 authentication for, 182 ACEs (Access Control Entries) combining VPNs with, 190 authentication for clients, 494 802.11a standard (IEEE), 494 in Discretionary Access Control List, 7 vs. 802.11b, 170 Active Directory (AD), 3, 494 802.11b standard (IEEE), 494 assigning GPO to container in, 28 for certificate store, 404 Configuration container for certificate templates, 360 A mapping certificates to accounts, 283–286 Access Control Entries (ACEs), 494 in mixed mode, 324 in Discretionary Access Control List, 7 publishing certificates through, 404–409 Access Control List (ACL), 494 in child domain, 406–409 Access Control Settings dialog box, 16 from standalone online CA, 404–406 Auditing tab, 16, 440 to view published certificates and CRLs, “Access Is Denied” error message, 420 358–359 access point, 494. See also wireless access Active Directory domain controller point (WAP) client security to traffic, 226–229 access token, 260, 494 testing, 227–229 account lockout policy, in security Active Directory domains templates, 9 Properties dialog box, General tab, 228 account logon events, tracking, 15, 445 trust relationships, 271–273, 272 account management events, tracking, 15, Active Directory object, auditing, 18 445–446 Active Directory Properties dialog box, 228 Account Policies Active Directory Sites and Services (ADSS), security template configuration, 12, 5, 494 12–14, 13 configuration, 407–408 in security templates, 9 Active Directory Users and Computers (ADUC), accountability trail, 14 COPYRIGHTED5, MATERIAL494 accounts Active Server Pages (ASP), SUS and, 111 Administrator account, renaming, 55, 56 AD.
    [Show full text]
  • Jim Allchin on Longhorn, Winfs, 64-Bit and Beyond Page 34 Jim
    0805red_cover.v5 7/19/05 2:57 PM Page 1 4 Scripting Solutions to Simplify Your Life Page 28 AUGUST 2005 WWW.REDMONDMAG.COM MrMr WindowsWindows Jim Allchin on Longhorn, WinFS, 64-Bit and Beyond Page 34 > $5.95 05 • AUGUST Make Room for Linux Apps Page 43 25274 867 27 Active Directory Design Disasters Page 49 71 Project1 6/16/05 12:36 PM Page 1 Exchange Server stores & PSTs driving you crazy? Only $399 for 50 mailboxes; $1499 for unlimited mailboxes! Archive all mail to SQL and save 80% storage space! Email archiving solution for internal and external email Download your FREE trial from www.gfi.com/rma Project1 6/16/05 12:37 PM Page 2 Get your FREE trial version of GFI MailArchiver for Exchange today! GFI MailArchiver for Exchange is an easy-to-use email archiving solution that enables you to archive all internal and external mail into a single SQL database. Now you can provide users with easy, centralized access to past email via a web-based search interface and easily fulfill regulatory requirements (such as the Sarbanes-Oxley Act). GFI MailArchiver leverages the journaling feature of Exchange Server 2000/2003, providing unparalleled scalability and reliability at a competitive cost. GFI MailArchiver for Exchange features Provide end-users with a single web-based location in which to search all their past email Increase Exchange performance and ease backup and restoration End PST hell by storing email in SQL format Significantly reduce storage requirements for email by up to 80% Comply with Sarbanes-Oxley, SEC and other regulations.
    [Show full text]