AOH :: ISN-1070.HTM

Inside Windows IT Security UPDATE -- June 24, 2005




Inside Windows IT Security UPDATE -- June 24, 2005
Inside Windows IT Security UPDATE -- June 24, 2005



======================Our name has changed!
Make sure your copy of Inside Windows IT Security UPDATE doesn't get 
mistakenly blocked by antispam software! Be sure to add 
Inside_WindowsITSecurity_Update@list.windowsitpro.com to your list of 
allowed senders and contacts.

======================
This email newsletter comes to you free and is supported by the 
following advertisers, which offer products and services in which you 
might be interested. Please take a moment to visit these advertisers' 
Web sites and show your support for Windows IT Security UPDATE.

Download Your Risk-free Trial of UpdateEXPERT Now

http://list.windowsitpro.com/t?ctl=D06A:4FB69 

Remote Control Your Systems Anywhere from your Pocket PC

http://list.windowsitpro.com/t?ctl=D069:4FB69 

======================
1. What's New in the Latest Issue

     July 2005 Issue
     - Focus: Pick the Right Firewall
     - Feature: Firewall Appliances, Part 1
     - Access Denied

2. New Additions to the Online Article Archive

     July 2004 Issue
     - Focus: Dissecting a Suspect Disk
     - Features
     - Access Denied

==== Sponsor: Download Your Risk-free Trial of UpdateEXPERT Now ===
   UpdateEXPERT streamlines the tedious tasks of patching, allowing you 
to conserve IT resources. With UpdateEXPERT's centralized inventory and 
management, you can quickly and accurately patch every machine on your 
network, even those that are disconnected or remote. Plus, unlimited 
management consoles are included with all purchases. Be confident your 
business is completely secured. Test our powerful patch management 
solution for yourself today with a risk-free trial. Yes I want to try 
UpdateEXPERT!
http://list.windowsitpro.com/t?ctl=D06A:4FB69 

======================
Windows IT Security is a monthly, paid, print newsletter loaded with 
news and tips to help you manage, optimize, and secure your Web-enabled 
enterprise. Nonsubscribers can access all the newsletter content in the 
online article archive from the premiere issue of Windows IT Security 
(February 2001) through the print issue released 1 year ago and featured 
below.

In addition to receiving the monthly print newsletter, subscribers can 
access all the newsletter content, including the most recent issue, at 
the Windows IT Security Web site.
http://list.windowsitpro.com/t?ctl=D070:4FB69 

Subscribe today and access all the issues online!
   
http://list.windowsitpro.com/t?ctl=D067:4FB69 

======================
==== 1. What's New in the Latest Issue ===
July 2005 Issue

Focus: Pick the Right Firewall
   Learn which firewall appliance is right for you, get familiar with 
network ports, clean up your systems with Microsoft's free malware 
removal tool, and more.

The following article is available at no charge to nonsubscribers for a 
limited time:

Feature

Firewall Appliances, Part 1
   Firewalls aren't what they used to be, which is a good thing. As 
attacks have become increasingly sophisticated, firewall solutions have 
had to adapt. In this first part of a two-part series, we look at 
firewall solutions for low-security SMBs.
   --Thomas W. Shinder and Debra L. Shinder

http://list.windowsitpro.com/t?ctl=D061:4FB69 

Nonsubscribers now have access to the Q&As that run in every issue of 
Windows IT Security and are featured below.

Access Denied

Preventing Data Loss When Using EFS
   Back up the data recovery agent certificate and/or the user's EFS 
certificate and private key to prevent losing encrypted data.
   --Randy Franklin Smith

http://list.windowsitpro.com/t?ctl=D05D:4FB69 

Understanding the Importance of Host Firewalls
   Layer your security by using both a network firewall and firewalls on 
your workstations and servers.
   --Randy Franklin Smith

http://list.windowsitpro.com/t?ctl=D065:4FB69 

Subscribers have access to the entire contents of the July 2005 issue. 
For a list of the other articles available in this issue, visit the URL 
below.

http://list.windowsitpro.com/t?ctl=D068:4FB69 

======================
==== Sponsor: Remote Control Your Systems Anywhere from your Pocket PC 
===
   Manage Windows, Linux and Mac remotely from your Pocket PC. 
NetSupport Manager offers complete, scalable and secure remote control 
software for IT professionals. NSM is so easy to use, it will quickly 
help you reduce support costs and increase response rates. Perform 
remote support and management on multiple systems simultaneously over a 
LAN, WAN and the Internet. A great SMS add-on. New Mac beta. Named 
Editor's Choice by Network Computing magazine. Free 30 day trial. $99.00 
1 user license.

http://list.windowsitpro.com/t?ctl=D069:4FB69 

======================
==== Events & Resources ===   (from Windows IT Pro and its partners)

Anti-spam product not working?
   Many email administrators are experiencing increased frustration with 
their current anti-spam products as they battle new and more dangerous 
email threats.  In-house software, appliances and even some services may 
no longer work effectively, require too much IT staff time to update and 
maintain, or satisfy the needs of different users.  In this free Web 
seminar, learn how you can search for a better way to protect your email 
systems and users.

http://list.windowsitpro.com/t?ctl=D059:4FB69 

Back By Popular Demand - SQL Server 2005 Roadshow in a City Near You
   Get the facts about migrating to SQL Server 2005. SQL Server experts 
will present real-world information about administration, development, 
and business intelligence to help you implement a best-practices 
migration to SQL Server 2005 and improve your database computing 
environment. Attend and receive a 1-year membership to PASS and 1-year 
subscription to SQL Server Magazine. Register now!
 
http://list.windowsitpro.com/t?ctl=D05B:4FB69 

Token Authentication: Getting It Right
   Perhaps you need tokens for management or mobile workers or your only 
applications that need token support are VPN, extranet access, or PC 
security. In this free Web seminar, join industry guru Randy Franklin 
Smith and learn how you can make a solid business case to management 
that justifies tokens.  You'll also discover what the right combination 
of token devices and middleware can do? Plus - receive checklists of key 
evaluation and testing points for rollout time. Register now!

http://list.windowsitpro.com/t?ctl=D058:4FB69 

Recover Your Active Directory
   Get answers to all your Active Directory recovery questions here!  
Join industry guru Darren Mar-Elia in this free Web Seminar and discover 
how to use native recovery tools and methods, how to implement a lag 
site to delay replication, limitations to native recovery approaches and 
more.  Learn how you can develop an effective AD backup strategy =C3=83=C2=83=C3=82=C2=A2=C3=83=C2=82=C3=82=C2=80=C3=83=C2=82=C3=82=C2=93 
Register today!

http://list.windowsitpro.com/t?ctl=D057:4FB69 

Get The SQL Server BI Essentials
   This eBook will give you a solid foundation for understanding where 
BI has come from and where it's headed.  You'll learn about what's 
coming in SQL Server 2005 and help validate what you already know.  
Download this free eBook now to get the wealth of BI tips and techniques 
you shouldn't be without.

http://list.windowsitpro.com/t?ctl=D05A:4FB69 

==== Featured White Paper ===
Avoiding Availability Pitfalls in Microsoft Exchange Environments
   Many solutions are targeted at making Exchange email environments 
more reliable, however a wide range of potential difficulties still 
lurk, waiting to interrupt service and, ultimately, your business.  In 
this free white paper, discover the more common pitfalls that can lessen 
Exchange availability and the recommendations for what you can do to 
avoid the problem and better plan your Microsoft Exchange messaging 
environment.

http://list.windowsitpro.com/t?ctl=D055:4FB69 

==== Hot Release: FREE Download - The Next Generation of End-point 
Security is Available Today ===
   NEW NetOp Desktop Firewall's fast 100% driver-centric design offers a 
tiny footprint that protects machines from all types of malware even 
before Windows loads and without slowing them down. NetOp provides 
process & application control, real-time centralized management, 
automatic network detection & profiles and more. Try it FREE.

http://list.windowsitpro.com/t?ctl=D056:4FB69 

======================
==== 2. New Additions to the Online Article Archive ===
July 2004 Issue
   To access this issue of Windows IT Security, go to the following URL:

http://list.windowsitpro.com/t?ctl=D066:4FB69 

Focus: Dissecting a Suspect Disk
   Use the Penguin Sleuth Kit to analyze a compromised disk, integrate 
directories with Microsoft Identity Integration Server 2003 (MIIS), and 
learn about client tools for managing PKI trusts.

Features

Performing Forensic Analyses, Part 2
   Analyzing a compromised hard disk is a time- and resource-intensive 
operation. Two tools--Sleuth Kit and Autopsy--can help you with this 
arduous task.
   --Matt Lesko

http://list.windowsitpro.com/t?ctl=D064:4FB69 

Secure Directory Access with MIIS
   Microsoft Identity Integration Server 2003 is a powerful tool for 
deploying directory-enabled applications while ensuring that data across 
individual directories remains synchronized.
   --John Howie

http://list.windowsitpro.com/t?ctl=D062:4FB69 

User-Side PKI Trust Management
   Learn how PKI administrators manage PKI user-side trust decisions.
   --Jan De Clercq

http://list.windowsitpro.com/t?ctl=D05F:4FB69 

Access Denied

Letting Users View Security Logs
   Simply editing a GPO will let a group of users view Security logs but 
will also allow them to clear the logs. A more restrictive solution 
takes more work.
   --Randy Franklin Smith

http://list.windowsitpro.com/t?ctl=D05C:4FB69 

Using Log Parser to Audit Domain Logons
   The Log Parser tool lets you use SQL-like queries to extract data 
from log files.
   --Randy Franklin Smith

http://list.windowsitpro.com/t?ctl=D060:4FB69 

Understanding Wireless-Security Protocols
   The pursuit of wireless security has led to a plethora of protocols. 
Clear up the confusion with this high-level view of the relationship 
between 802.11, 802.1x, 802.11i, WEP, and WPA.
   --Randy Franklin Smith

http://list.windowsitpro.com/t?ctl=D063:4FB69 

The Importance of Windows XP SP2
   The soon-to-be-released XP SP2 is so important to the security of 
your network that you should start testing it now.
   --Randy Franklin Smith

http://list.windowsitpro.com/t?ctl=D05E:4FB69 

======================
==== Announcement ===(brought to you by Windows IT Pro)

Monthly Online Pass = Quick Security Answers!
   Sign up today for your Monthly Online Pass and get 24/7 access to the 
entire online Windows IT Security article database, including exclusive 
subscriber-only content. That's a database of over 1,900 Security 
articles to help you get all the answers you need, when you need them. 
Sign up now for just US$14.95 per month:

http://list.windowsitpro.com/t?ctl=D06D:4FB69 

==== Sponsored Link ===
Quest Software
   Eleven things you must know about quick AD recovery!

http://list.windowsitpro.com/t?ctl=D073:4FB69 

==== Contact Us ===
About the newsletter -- letters@windowsitpro.com 
About technical questions -- http://list.windowsitpro.com/t?ctl=D071:4FB69 
About product news -- products@windowsitpro.com 
About your subscription -- securityupdate@windowsitpro.com 
About sponsoring UPDATE -- emedia_opps@windowsitpro.com 

======================
   This email newsletter is brought to you by Windows IT Security, the 
leading publication for IT professionals securing the Windows enterprise 
from external intruders and internal users. Subscribe today! ( 
http://list.windowsitpro.com/t?ctl=D06C:4FB69 ) 

View the Windows IT Pro Privacy policy at
http://list.windowsitpro.com/t?ctl=D06B:4FB69 

Windows IT Pro is a division of Penton Media Inc.
221 East 29th Street, Loveland, CO 80538,
Attention: Customer Service Department

Copyright 2005, Penton Media, Inc.  All Rights Reserved.
 
 
 
 

_________________________________________
Attend the Black Hat Briefings and
Training, Las Vegas July 23-28 - 
2,000+ international security experts, 
10 tracks, no vendor pitches.
www.blackhat.com 

Site design & layout copyright © 1986-2014 CodeGods