Redux of some “Favorite” Tweets
- MS_Virt – Missed this webcast? Watch it on-demand now: TechNet Webcast: Hyper-V for the VMware Administrator… http://bit.ly/cxDXJo (March 2010)
- old_bubba – Really good article on what Microsoft doesn’t do with your data and Google DOES: http://bit.ly/cVhtxG (July 2010)
- SFGate – The end of the (land) line http://sfg.ly/cScq9Z (July 2010)
- rhalbheer – A very good paper you should read: Data Governance in the Cloud http://bit.ly/aS7iEE (Sept 2010)
- EmilyF – Risks with integrating iPhone in the enterprise via @deloitte http://bit.ly/9u77jR (Sept 2010)
- adfskitteh – RT @MassWomen: How to Use Twitter to Network at Conferences. http://bit.ly/aatGaZ (Sept 2010)
- henet – Spend at least 2 minutes and 9 seconds with IPv6 today: HE Webcast 32 – 6in4, 6to4, & Teredo: a brief comparison http://j.mp/webcast32 (Nov 2010)
- mitchjoel – Well, this explains why the majority of us suck at work: http://bit.ly/gDoQ1S (Dec 2010)
New SharePoint 2010 Books to Consider
Happy Holidays!
Like most of you, I’ll be spending the holidays with my family and friends – and giving my hands a break from the keyboard.
Best wishes for a great holiday season with your family and friends. Stay warm!
She’s Geeky unConference – Early Bird Registration Ends 12/22
Google Calendar and the “Unsupported” Browser
Upcoming Tech Events in 2011
- TechNet Events Presents: Virtualization 101 – Microsoft Evangelists will talk about the creation of the hypervisor and demonstrate usage scenaros ranging from the home user up to multinational corporations. Discussions will also include how virtualization has given rise to “the Cloud”. The event is free and will be in San Francisco on 2/2/11, but check the list for dates in Los Angeles, Irvine, Denver, Portland and others locations on the west coast.
- Data Connectors Tech-Security Conferences – Just like the one-day event I attended a few weeks ago, Data Connectors will be all over the west coast in early 2011. In particular, find it in San Jose, CA on 2/10/11.
- She’s Geeky unConference – For all those women who embrace their geekiness, save the date for “She’s Geeky Bay Area #4” running January 28-30th.
- Register by 1/21 and snag a free Expo Only pass to the SPTechCon (The SharePoint Technology Conference) in San Francisco February 7-9th. The full event doesn’t fall into the “low cost” category, but if SharePoint is your thing, you might want consider more than just the expo.
- RSA 2011 – Another one of my favorites, the “Expo Plus” pass at RSA gets you into the expo hall, the keynotes and one conference session of your choice. RSA will be at the Moscone Center in San Francisco, February 14-18th.
Inside MDOP: AGPM 4.0
In case you missed the PacITPros meeting on December 7th, you missed out on some interesting vendor and technical presentations. In addition to a presentation from BlueCat Networks and Hurricane Electric, I did a short demo of one of the MDOP tools – the Advanced Group Policy Manager 4.0.
This tool hooks right into the existing Group Policy Manager snap-in you know and love in your MMC and with the use of a designated archive server, extends the functionality to include better search features and change management. No matter the size of your organization or the number of IT staff you share group policy tasks with, you can benefit from this tool. Even if you are the only person who does anything with group policies, this tool will make your life easier.
First, the change control features take away much of the pain of keeping track of what was changed when and potentially by who. Policies that are controlled by the system must be checked in and out for adjustments, which automatically creates a history record capturing the state of a policy at any given time. These records can easily be reviewed for corporate compliance and policies can even be rolled back to previous states.
With new roles created within the tool, non-admininstrators (even regular domain users) can be granted the ability to review or edit policies… leaving the actual deployment and linking of the GPOs to system administrators.
The abililty to search and filter your view of policies is much improved. You can search by name, state (checked in, checked out), even by variables such being updated “last month” or “last week”.
Finally, you can easily import and export policies, even across forests. No more manual recreation of the perfect policy just because you want to use it in your test lab environment or in another forest.
Finally, keep in mind that APGM 4.0 adds support for Windows Server 2008 R2 and Windows 7, as well as runs on Windows Server 2008 and Vista. If you are supporting an environment with older versions of Windows Server, consider version 2.5 or 3.0 of the tool. Not of all of the features are included, but if you are looking specifically for the change management aspects, those older versions may work for you until you upgrade your servers.
Out of the six tools in the Microsoft Desktop Optimization Pack, APGM isn’t one I’d overlook.
Take Aways from the Data Connectors Tech-Security Conference
Last week, I attended a free one-day conference hosted by Data Connectors. Sometimes free conferences aren’t worth the time it takes to get there, but I was really happy with this one. While all the presentations were vendor sponsored, the majority were product neutral and really shared some decent content. In addition to the vendor presentations, there was a decent sized expo area with other security vendors to peruse.
Here are some of the stats and tidbits I left with. As some of the themes overlapped throughout the presentations, so I’m not going to attribute each bullet point to a specific presenter. However the presentations were sponsored by the following companies: WatchGuard, Axway, Sourcefire, Top Layer Security, JCS & Associates, Kaspersky Lab, Cyber-Ark, FaceTime and Arora / McAfee. You can learn more about the presentations specifics and download some of the slide decks here on the event agenda page.
End Users
- End users in the workplace expect to have access to the web and popular web applications, however 25% of companies need to update their policies related to web use. Instead of addressing the policy issues, companies simply block access to web applications entirely.
- End users need more education about threats like email scams, pop-ups offering anti-virus solutions, links sent via social media sites, tiny URLs, etc. End users are your biggest threat – often due to error or accidents.
- The average employee spends 3 hours a day doing non-work items on their computer.
General Company Security and Policies
- Consider reviewing and improving on your file transfer management practices. How do people share data within your organization and externally? Is it secure and managed?
- Most companies feel secure, but aren’t really. Check out http://www.idtheftcenter.org/ for a list of companies that have experienced data breaches. Many companies simply rely on their vendors to declare that they are secure and protected.
- Consider using different vendors to protect your data at different levels. Different vendors use different mechanisms to detect and deter threats.
- As an administrator, you have to review logs on computers, firewalls, servers, etc. This way you are familiar with what is “normal” and can easily recognize potential breaches.
- Consider data encryption as means to enable your company to meet regulation compliance. Encryption technology has evolved and it doesn’t have to be as painful as it has been in the past.
- You should patch all your computer regularly – don’t forget that your printers, routers and switchers are computers too.
Browsers and the Internet
- The top Internet search terms that are likely to lead you to site with malware on it are “screensavers” (51.9% chance of an exploit), “lyrics” (26.3%) and “free” (21.3%).
- In 2009, the Firefox browser had the greatest number of patches and overall, vulnerabilities in applications exceeded operating system vulnerabilities.
- The web browser is the #1 used application, but the patch cycle for browser add-ins is slower than for other applications and operating systems.
- Drive-by downloads are still the #1 way to exploit computers.
Sometimes I leave conferences scared by the massive list of items that I feel I need to address, however, I left this conference with not only some tasks in mind, but some great leads on how to go about completing those projects. Check out the Data Connectors events list to see if there is a similar conference coming up in your area in 2011. They have well over two dozen other planned dates across the US, including Los Angeles in January and San Jose in February.