Contents tagged with admin tools
-
R2: How Would You Manage Without It?
As many of you know, Windows Server 2008 R2 Release Candidate (RC) is made available today to MSDN and TechNet subscribers, with broader availability from Microsoft.com on May 5th. As our final broad test milestone before RTM, this really is the best chance for you to download Windows Server 2008 R2 and put it through its paces while we continue our march to RTM.
-
Secure, cross-company collaboration
Below is a new Microsoft video about a company called Exostar. Using Windows Server Active Directory Federation Services, Certificate Server, and Forefront Security, Exostar enables global aerospace companies, such as BAE Systems, Boeing, Lockheed Martin, Raytheon and Rolls-Royce, to securely collaborate via hosted SharePoint Server 2007. This is a good example of what we are calling "Business Ready Security."
-
The Microsoft Web Platform Installer - One click to Install Them All
If you visited the new Microsoft Web Platform site yesterday, you would have noticed that we’ve performed a radical overhaul of the site, with a fresh new look and articles and media content aggregated from popular external and Microsoft sites. This new portal offers a central location for Web professionals to learn about the various technologies and products that comprise the Microsoft Web Platform.
-
UrlScan 3.0 Beta and Tools to Help Mitigate SQL Injection Attacks
Microsoft published a Security Advisory today providing information for developers and Web administrators on ways in which they can mitigate and prevent SQL injection attacks. As you might have seen, there was a spate of such attacks in late April and it caused quite a few headaches for administrators. Remember that SQL injection attacks target Web application code, not Web server code, so they can only be avoided by making sure that any Web application that accepts user input, which is then used to query a database, follows best practices to ensure that the input does not contain malicious code or syntax that might compromise the database, Web site, or even the whole server.