AOH :: ISN-1185.HTM

Inside Windows IT Security UPDATE -- July 22, 2005

Inside Windows IT Security UPDATE -- July 22, 2005
Inside Windows IT Security UPDATE -- July 22, 2005

This email newsletter comes to you free and is supported by the 
following advertisers, which offer products and services in which you 
might be interested. Please take a moment to visit these advertisers' 
Web sites and show your support for Windows IT Security UPDATE.

Download a Free Trial of Desktop Authority 

Bindview: Security Management in a Multi-platform World 

1. What's New in the Latest Issue

     August 2005 Issue
     - Focus: Network Port Fundamentals
     - Feature: Keep Your Secrets Safe
     - Access Denied

2. New Additions to the Online Article Archive

     August 2004 Issue
     - Focus: Use Certificates to Secure Your WLAN
     - Features
     - Access Denied

==== Sponsor: Download a Free Trial of Desktop Authority ===
   Looking for a way to proactively secure and manage all your desktops 
from one central location? Download a 30-day FREE trial of Desktop 
Authority at . Desktop Authority 
is an award-winning desktop management solution that combines the 
functionality of logon scripting, group policies and user profile 
management into a comprehensive management console. Secure your network 
by locking down users' desktops, configuring security policies, 
detecting and removing spyware, and deploying patch updates without 
visiting client machines! Increase security, maintain regulatory 
compliance, and improve productivity throughout your enterprise. Try 
Desktop Authority FREE today and receive a cool "C:Users\Less Often" T-

Windows IT Security is a monthly, paid, print newsletter loaded with 
news and tips to help you manage, optimize, and secure your Web-enabled 
enterprise. Nonsubscribers can access all the newsletter content in the 
online article archive from the premiere issue of Windows IT Security 
(February 2001) through the print issue released 1 year ago and featured 

In addition to receiving the monthly print newsletter, subscribers can 
access all the newsletter content, including the most recent issue, at 
the Windows IT Security Web site. 

Subscribe today and access all the issues online! 

==== 1. What's New in the Latest Issue ===
August 2005 Issue

Focus: Network Port Fundamentals
   In this issue, we wrap up our network port fundamentals and firewall 
appliances series, and we provide essential information about 
encryption, logon rights, and a terrific little log-analysis tool called 

The following article is available at no charge to nonsubscribers for a 
limited time:


Keep Your Secrets Safe
   Although encryption is about keeping information secret, there's 
nothing secret about the encryption process. Here are the basics of 
symmetric key encryption and public/private key encryption.
   --Randy Franklin Smith 

Nonsubscribers now have access to the Q&As that run in every issue of 
Windows IT Security and are featured below.

Access Denied

Securing the Administrator Account
   Take steps to lessen the risk of attacks that use a computer's 
Administrator account.
   --Randy Franklin Smith 

Protecting Information on XP Laptops
   Use offline files and EFS to ensure that laptop data is available, 
backed up, and secure.
   --Randy Franklin Smith 

Preventing Users from Disabling a Screen Saver
   Use an AD or local computer GPO to hide the Screen Saver tab from 
   --Randy Franklin Smith 

Running Services Under SYSTEM or Administrator
   Here's why you should use the least amount of privileges necessary 
for performing tasks on your computer.
   --Randy Franklin Smith 

Subscribers have access to the entire contents of the August 2005 issue. 
For a list of the other articles available in this issue, visit the URL 

==== Sponsor: Bindview: Security Management in a Multi-platform World 
   In this free white paper you'll learn how to reduce management 
overhead when dealing with multiple platforms such as Windows, UNIX, 
Linux and NetWare, and the costs and benefits of a centralized 
"holistic" approach to security management. Get the ins and outs of 
managing multi-platform security and how you can safely, securely, and 
sanely manage the security infrastructure of complex, multi-platform 

==== Events & Resources ===   (from Windows IT Pro and its partners)

Sort Through Sarbanes-Oxley, HIPAA, and More Legislation Quicker and 
   In this free Web seminar, get the tips you've been looking for to 
save time and money in achieving IT security and regulatory compliance. 
Find out how you can simplify these manually intensive, compliance-
related tasks that reduce IT efficiency. Turn these mandates into 
automated and cost-effective solutions. Register now! 

All High-Availability Solutions Are not Created Equal--How Does Yours 
Measure Up?
   In this free Web seminar, you'll get the tools you need to ensure 
your systems aren't going down. You'll discover the various categories 
of high-availability and disaster-recovery solutions available and the 
pros and cons of each. You'll learn what solutions help you take 
preemptive, corrective action without resorting to a full system 
failover, or in extreme cases, that perform a non-disruptive, automatic 
switchover to a secondary server. 

Antispam Product Not Working?
   Many email administrators are experiencing increased frustration with 
their current antispam products as they battle new and more dangerous 
email threats. In-house software, appliances, and even some services may 
no longer work effectively, require too much IT staff time to update and 
maintain or satisfy the needs of different users. In this free Web 
seminar, learn how you can search for a better way to protect your email 
systems and users. 

Ensure High Availability with Microsoft Exchange Server
   Taking into account all of its capabilities, Exchange is more than 
just a mail server. And for many businesses, when Exchange is down, the 
business is down. In this free eBook, learn new ways to improve Exchange 
recoverability and availability by exploring Exchange Server clusters, 
Exchange data management, Volume Shadow Copy Service (VSS), and Exchange 
availability tips and tricks. Get your copy now! 

Integrate Fax Services with Business Applications for Big ROI
   In this free eBook, you'll discover all you need to know about fax 
technology! You'll learn how to improve business processes by minimizing 
manual faxing and integrating faxing into your business workflow for 
improved ROI. The eBook will also look at the how-to of the desktop fax 
client, fax automation, faxing hardware and software technologies, and 
the future of faxing. Let this important guide help you stay on top of 
fax server technology within your business environment. 

==== Featured White Paper ===
Do You Know If Your Network Is At Risk Of A Trojan Attack?
   Discover the various methods available for controlled Internet access 
and how to use them to increase security and decrease legal exposure.  
Download your free white paper now! 

==== 2. New Additions to the Online Article Archive ===
August 2004 Issue
   To access this issue of Windows IT Security, go to the following URL: 

Focus: Use Certificates to Secure Your WLAN
   In this issue, learn about WLAN security, digital certificate 
validation in Windows PKI, the basics of Windows Firewall, and more.


Using Certificates to Secure Your WLAN
   Learn the simplest way to implement 802.1x and certification-based 
authentication on a typical network of Windows XP and Windows 2000 
computers and a Win2K AD domain.
   --Randy Franklin Smith 

Windows Firewall Basics
   Learn how to configure and manage Windows XP SP2's new Windows 
   --Jeff Fellinge 

Validating Digital Certificates in Windows PKI
   Certificate validation is a key part of authenticating users and 
systems through digital certificates. Take an in-depth look at how the 
Windows PKI validates certificates and be better prepared to solve 
validation problems when they occur.
   --Jan De Clercq 

Access Denied

A Basic File Encryption Tool
   Windows provides no built-in utility for encrypting files, but two 
scripts in the Platform SDK use CryptoAPI to let you encrypt and decrypt 
text files from the command line.
   --Randy Franklin Smith 

Enabling Users to Access Two Domain Accounts
   In some cases (e.g., during a migration), you might need to let users 
log on to two domain accounts and access files. A freeware tool makes 
setting up such a scenario easy.
   --Randy Franklin Smith 

Requiring VPN Users to Run Certain Software
   Using Windows 2003's IAS, you can prevent VPN users who aren't 
running antivirus or other necessary software from logging on to your 
   --Randy Franklin Smith 

Using Windows Server 2003's Certificate Templates
   Microsoft significantly enhanced certificate templates in Windows 
2003 but makes the new functionality available only in Enterprise 
Edition and Datacenter Edition.
   --Randy Franklin Smith 

Securely Administering a Remote Server
   Learn why remotely administering a server through Terminal Services 
is more secure that using MMC snap-ins.
   --Randy Franklin Smith 

==== Announcements ===(brought to you by Windows IT Pro)

Check Out the New Windows IT Security Newsletter!
   Security Administrator is now Windows IT Security. We've expanded our 
content to include even more fundamentals on building and maintaining a 
secure enterprise. Each issue also features product coverage of the best 
security tools available and expert advice on the best way to implement 
various security components. Plus, paid subscribers get online access to 
our entire security article database (over 1900 security articles)! 
Order now: 

Exclusive Content for VIP Subscribers!
   Get inside access to all of the content and vast resources from 
Windows IT Pro, SQL Server Magazine, Exchange & Outlook Administrator, 
Windows Scripting Solutions, and Windows IT Security, with over 26,000 
articles at your fingertips. Your VIP subscription also includes a 1-
year print subscription to Windows IT Pro and a VIP CD (includes entire 
article database). Sign up now: 

==== Sponsored Link ===
Argent versus MOM 2005
   Experts Pick the Best Windows Monitoring Solution 

==== Contact Us ===
About the newsletter -- 
About technical questions -- 
About product news -- 
About your subscription -- 
About sponsoring UPDATE -- 

   This email newsletter is brought to you by Windows IT Security, the 
leading publication for IT professionals securing the Windows enterprise 
from external intruders and internal users. Subscribe today! ( ) 

View the Windows IT Pro Privacy policy at 

Windows IT Pro is a division of Penton Media Inc.
221 East 29th Street, Loveland, CO 80538,
Attention: Customer Service Department

Copyright 2005, Penton Media, Inc.  All Rights Reserved.

Attend the Black Hat Briefings and
Training, Las Vegas July 23-28 - 
2,000+ international security experts, 
10 tracks, no vendor pitches. 

Site design & layout copyright © 1986-2015 CodeGods