Tag: Security
-
5 Steps to Building a Strategic Tech Plan for Your Business
Introduction: As a business owner, you already know how essential technology is to staying competitive. But without a clear and strategic tech plan, it’s easy to waste resources or fall behind your competitors. jIT Solutions recently shared a step-by-step guide on how businesses can create a strategic tech plan that aligns with their goals and…
-
Boston Apr-5 TechNet on Tour | What’s new in Hybrid IT Infrastructure
Seats still available… What are you waiting for? This is an AWESOME Event!!! TechNet on Tour | What’s new in Hybrid IT Infrastructure DATE: Apr 05, 2016 TIME: 8:30 AM – 4:30 PM REGISTER: https://www.microsoftevents.com/profile/form/index.cfm?PKformID=0x1120252212 Increasing efficiency and scalability with Windows Server 2016 and Microsoft cloud Prepare to deliver a true hybrid IT…
-
Powershell Script to Create Registry Files to Change Powershell Execution Policy
In a prior post, I showed you how to manually configure your computer to enable ExecutionPolicy so you can run Powershell scripts. To make it even better, I now have a powershell script that will create the .REG files you need so all you have to do is run the script and double-click on the…
-
How Secure is Windows Azure … Microsoft First Public Cloud Provider To Be Granted FedRAMP Security Authorization
Microsoft received notice that Windows Azure was granted the FedRAMP Joint Authorization Board (JAB) Provisional Authority to Operate (P-ATO). Windows Azure is the first public cloud platform, with infrastructure services and platform services, to receive a JAB P-ATO The Federal government is moving to the cloud, and early on it recognized that, although each agency…
-
Create a Windows Azure Network using PowerShell (Part 19 of 31)- Kevin Remde
The 19th day of 31 Days of Server (VMs) in the Cloud is now live at Create a Windows Azure Network using PowerShell – 31 Days of Servers in the Cloud (Part 19 of 31) Back in Part 10 of our “31 Days of Servers in the Cloud” series, my good friend Bob Hunt wrote…
-
Where Is The Best Virtualization and Cloud Technical Content?
VTUG is looking for the best online technical content in the world. Why? Because our members spend hours upon hours doing research duplicating the research process literally millions of times! VTUG wants to aggregate the best content on their site so members have a single place to go to get the best info about IT. …
-
IE9 Security Overwhelms the Field With VERY Impressive Stats
In a recent test, NSS subjected Apple Safari 5, Google Chrome 15-19, Microsoft Internet Explorer 9 and Mozilla Firefox 7-13 to over 3 million test runs against over 84,000 URLs determined to be active and malicious out of a unique sample set of 227,841. · Out of 750,000 test cases per browser, NSS labs found…
-
IE9 Security Overwhelms the Field With VERY Impressive Stats
In a recent test, NSS subjected Apple Safari 5, Google Chrome 15-19, Microsoft Internet Explorer 9 and Mozilla Firefox 7-13 to over 3 million test runs against over 84,000 URLs determined to be active and malicious out of a unique sample set of 227,841. · Out of 750,000 test cases per browser, NSS labs found…
-
Free Technology Training from TechEd NA 2012 Available NOW
TechNet 2012 – North America has wrapped and what a great show it was. I was able to attend but had to work so I did not get the opportunity to sit in on many sessions. However, now I am going to make the opportunity to sit in on the sessions. How can I do…
-
IT-Pro Tech Update 2012 Event Coming May 2nd To Providence–Great Lineup!
IT Pro Tech Update 2012 On Wednesday May 2nd 2012, the IT-Pro User Group is hosting Tech Update 2012 an all day FREE event. Come join us for this FREE event and discover the next phase of Information Technology as we discuss Windows 8 in the business environment, Virtualization, Security, Interoperability, and Systems Management. Here…
-
TechNet Radio: IT Time – Private Cloud Security Basics (Part 1)
TechNet Radio: IT Time – Private Cloud Security Basics (Part 1) the player will be placed here Video: WMV | MP4 | WMV (ZIP) | PSP Audio: WMA | MP3 About This Video In today’s episode Sr. IT Pro Evangelists Blain Barton and Dan Stolts talk candidly about Security concerns and issues many IT Pros…
-
Community Event In Waltham MA – Secure remote access in a connected SMB world – the next generation of server solutions
SMB-MVP Community Roadshow comes to the Boston area October 20, 2011 from 6:30pm-9:00pm.
-
How To Open Firewall Port 1433 for SQL Server Database Engine For Use With SCOM (or anything else)
In this very short video, I walk you through the step by step process of opening the 1433 firewall port for SQL Server. I am doing it because I am setting up a new System Center Operations manager server but the procedures would be the same for any other application that uses SQL Server for…
-
What is Forefront: Microsoft Security Solutions
Forefront is a family (suite) of products that are all focused on security. Together they offer a very comprehensive security solution protecting applications, systems, networks and other assets. Individually they all have there own function and there is some overlap between some of the products that make up the family. Because of the overlap, understanding…
-
Hyper-V Architecture Poster
Similar to the Windows Server 2008 R2 component poster, the Hyper-V poster is a great visual tool to help in the understanding of the key features and components. It highlights key Hyper-V components including: Architecture Virtual Networking Virtual Machine Snapshots Live Migration Storage Interfaces Storage Types Storage Location and Paths Import and Export This large-format…
-
Management and Security on Tap – Changes To Technology Focus Area For New Fiscal Year
A New Way Of Doing Business 🙂 I am an IT Pro Evangelist in the US East Region (Developer and Platform Evangelism [DPE]). Starting FY11 (July 2010) we are changing our way of doing business so ITE’s (that’s me) are going to be focusing on specific product areas and I am chartered with obtaining…
-
Hyper-V Security 101 – Virtualization Administration Delegation of Hyper-V and SCVMM
When running Hyper-V you do not need to be at the console to manage your virtualization platform. In fact, it is strongly recommended that you delegate these rights. If you let someone login to a server with administrative permissions they basically have the “keys to the kingdom”. We do not usually want to do this. …
-
How To Configure BitLocker on Windows 7 RC – Everything You Need To Know About BitLocker
I have had many questions about BitLocker so I thought I would answer them in this blog post. What is BitLocker and Why Should I Care? BitLocker is a Trusted Platform Module (TPM) component that allows you to protect data on hard drives. BitLocker is the name given to the encryption component that works…
-
Disable Adding USB Drive and Memory Sticks via Group Policy and Group Policy Preferences
If you do not have Group Policy Preferences installed see Install Group Policy Preferences. This link tells you how to do it in a 2003 domain. In a 2008 domain it is much easer as all you have to do is enable the feature. See “The Steps” section below if you need a step by…