The need for access control, regulatory compliance
and network complexity makes event auditing more important than ever
before.
November
2011
Joseph Davies
Joseph Davies discusses how the Network Diagnostics
Framework (NDF) from Windows Vista has been integrated into the Windows 7
OS with a host of other new features, which help you more easily
troubleshoot network difficulties.
Greg Shields
With the Microsoft Certified Systems Engineer
credential being retired for all iterations but Windows Server 2003, a
new certification program has been created. Greg Shields explains how
this new certification path helps to better identify where your skills
lie.
August
2009
Joseph Davies
Windows Server 2008 R2 and Windows 7 offer new
features that support IPv6 for local and remote connectivity and for
simplified management of host settings, as Joseph Davies explains.
July
2009
Greg Shields
NAP monitors the health of specified computers when
they attempt to connect to a network and includes a number of mechanisms
to enforce health requirements. This article gives readers an overview
of these enforcement mechanisms and, as an example, takes a closer look
at setting up DHCP enforcement
May
2009
Joseph Davies
DirectAccess is a new feature of Windows 7 and
Windows Server 2008 R2 that enables transparent, concurrent intranet and
Internet remote access and eases the management of remote computers by
combining a number of technologies and components, facilitating the
transition to a thin edge network.
May
2009
Alan Maddison
Many organizations rely on ISA Server 2006 to secure
their environment, but few take the important step of securing ISA
Server itself. Here’s a guide to using the Security Configuration Wizard
and Administrative roles to limit its attack surface and secure your
ISA Server 2006 implementation.
September
2008
Jesper M. Johansson
The recent update to the Windows Vista Firewall
offers some impressive new features that make it a compelling choice for
the corporate environment. Jesper M. Johansson gives a brief overview
of the evolution of the Windows Firewall and delves into
enhancements—such as new rules and profiles, domain isolation, and
encryption—that will have administrators taking a closer look.
June
2008
Joseph Davies
Troubleshooting enforcement behaviors in the Network
Access Protection platform can be challenging. The Cable Guy explains
how NAP health policy evaluation works and how you can troubleshoot the
most common issues.
April
2008
Ian Hameroff and Amith Krishnan
How do you allow network access to those who need it
without sacrificing security? See how new technologies in Windows
Server 2008, such as Windows Firewall with Advanced Security and Network
Access Protection, let you implement a policy-based approach to help
you achieve this goal. Ian Hameroff and Amith Krishnan 62 Configuring
Roles with Server Manager A DNS server need not be a print server. One
approach Windows Server 2008 takes to improve security and manageability
is to simplify server roles so you can easily install only the tools
and services you need, and nothing more. Here's an introduction to using
Server Manager for configuring roles and simplifying deployments.
March
2008
Joseph Davies
Getting ready to move to IPv6? The Cable Guy
explains how you can use an IPv6 transition technology to get IPv6
connectivity and migrate to an IPv6-capable intranet.
March
2008
Joseph Davies
IEEE 802.1X authentication provides an additional
security barrier for access to your intranet. See how Windows Vista and
Windows Server 2008 make it a snap to implement IEEE 802.1X
authentication for your wired network.
February
2008
Joseph Davies
Windows Server 2008 includes many DNS server
enhancements. Take a close look at how these updates make name
resolution faster, improve support for IPv6, and add greater flexibility
to DNS administration.
January
2008
Christopher Stoneff
You've got a machine that isn't communicating with
other machines for no obvious reason. These tips can help you quickly
diagnose and repair the problem.
December
2007
Joseph Davies
The Network Policy Server (NPS) service in Windows
Server 2008 replaces the Internet Authentication Service used in Windows
Server 2003 and brings numerous enhancements, from the ability to
enforce system health requirements to improved management capability.
December
2007
Alan Maddison
A virtual private network can provide improved
connectivity and increased productivity—and it doesn't need to be
difficult to implement and manage. Find out how you can use ISA Server
2006 to address two common VPN scenarios.
November
2007
Joseph Davies
Single Sign On offers many advantages for both end
users and administrators. Here's a look at how Single Sign On can
simplify implementation of wireless authentication for your network.
November
2007
Joseph Davies
The Internet Key Exchange protocol and Authenticated
Internet Protocol are both used to determine keying material and
negotiate security parameters for IPsec-protected communications. Get an
in-depth look at how they work.
October
2007
Joseph Davies
A multihomed host provides enhanced connectivity by
simultaneously connecting to multiple networks. However, services
running on multihomed hosts have an increased vulnerability to being
attacked. To help you prevent attack, here’s a look at the various host
models of multihomed hosts and how they are supported in Windows.
September
2007
Joseph Davies
There's more to IPv6 than just extending the address
space from 32 bits to 128 bits. Here's a look at how IPv6 hosts can
automatically configure themselves, even without the use of an address
configuration protocol.
August
2007
Zubair Alexander
Ever been confused by cryptic remote procedure call
errors? Take a look at some common errors, techniques you can use to
identify errors, and solutions to specific problems.
July
2007
Joseph Davies
Before implementing IPv6 support on your intranet,
you need to understand how it is supported over VPN connections. Here's a
detailed look at what you need to know.
July
2007
Steve Riley
Mobility has changed computer threats and the
techniques that guard against them. As laptops wander outside the
perimeter and come back to the network, you need better ways to protect
your systems. Find out how you can use Windows Firewall to protect your
computers—on the Internet and on your own internal network.
June
2007
Joseph Davies
The VPN protocols in Windows XP and Windows Server
2003 don’t work for some configurations. Get an in depth look at the
various issues and see how Windows Server “Longhorn” and Windows Vista
with Service Pack 1 will use the Secure Socket Tunneling Protocol to
solve these problems.
June
2007
Joseph Davies
The Extensible Authentication Protocol, which is a
framework that enables extensibility for authentication methods, has had
certain limitations on previous Windows platforms. Examine how the
EAPHost architecture in Windows Vista and Windows Server “Longhorn”
addresses these limitations.
May
2007
Joseph Davies
Discover how you can use Group Policy to centrally
configure and distribute wireless network settings to all the computers
in your Active Directory network.
April
2007
Joseph Davies
With an IPv6 network, you don't actually need DHCP
to configure addresses, but there can be good reasons to use it. Find
out why, and learn how to use DHCPv6 in your environment.
March
2007
Jason Leznek
Since the release of Windows XP, networking has
changed drastically—users are more mobile, wireless networking is
everywhere, and security threats are more sophisticated. Take a look at
the innovations in Windows Vista that make networking simpler, more
secure, and easier to manage.
November
2006
Don Parker
TCP/IP is comprised of a set of protocols including
Transmission Control Protocol (TCP), User Datagram Protocol (UDP),
Internet Protocol (IP), and Internet Control Message Protocol (ICMP).
Most IT professionals understand how these protocols work together to
make network communication possible.
Spring
2005
Regis Donovan
Without DNS, the Internet would be an ugly place.
DNS is one of the services responsible for directing network traffic
based on name and numerical IP addresses. Specifically, it's the
service that allows users to type in names instead of numbers to locate a
Web site or Internet resource.
Winter
2005
Zo Sangpy
No comments:
Post a Comment
ကျွန်တော်သည် ပညာရှင်တစ်ယောက် မဟုတ်ပါ ၊ ပညာသင်ယူနေသော လူတစ်ယောက် ဖြစ်သည်/
ပြောချင်တဲ့ စကားလေးတွေ ပြောနိုင်တယ်နော်