Windows IT Pro Archived Blogs

Sep 7, 2012
blog

Will You Miss SharePoint Designer Design View in SharePoint 2013?

SharePoint 2013 Preview arrived without SharePoint Designer's Design View. Was it good riddance or a huge mistake?...More
Jun 4, 2012
blog

Veeam Ships Veeam Backup Free Edition with VeeamZIP

Veeam Software has announced that the latest version of its Veeam Backup Free Edition is now available for download. The new product now includes the popular Veeam FastSCP utility and a new feature the company calls VeeamZIP....More
May 7, 2012
blog

VMware Experts on Twitter

Sometime last year I posted an article listing some of the best Microsoft Hyper-V resources on Twitter. It was one of the most well-received articles I'd posted in 2011, so I thought it would be fair to share the love with IT pros that favor VMware virtualization products over what Microsoft has to offer....More
Apr 9, 2012
blog

Ericom Discusses VMware WSX, AccessNow 2.0

AccessNow uses modern web browsers -- specifically those that support the canvas and web sockets features of HTML 5 -- to allow direct access to virtual machines that may be residing on a remote server, in a data center, or in the cloud....More
Mar 22, 2012
blog

VMware WSX: Run VMs Via Web Browser 1

VMware WSX allows VMs to be manipulated through a web browser....More
Feb 7, 2012
blog

Virsto Updates Hyper-V Offering, Brings Storage Virtualization to VMware vSphere

I recently interviewed Gregg Holzrichter, the VP of Marketing for Virsto Software, about two of his company's recently announced products: Virsto 2.0 for Hyper-V, and the first release of Virsto for VMware vSphere. Virsto hopes that these products will help IT administrators make more effective use of their storage by leveraging virtualization....More
Feb 1, 2012
blog

ITC Tosses Out Barnes & Noble Antitrust Claim Against Microsoft 1

On the eve of what promises to be a sensational patent-infringement trial that will finally pit Microsoft against one of its Android-based enemies, an International Trade Commission (ITC) judge has tossed out a major claim against the software giant....More
Jan 17, 2012
blog

System Center 2012 RC Ships, Showcases Revamped Licensing and Branding Strategy

Over the last decade or so, Microsoft's System Center product family has grown to resemble that over-achieving acquaintance we all know who suffers from a hopelessly complex personal life....More
Jan 12, 2012
blog

Why Doesn't Windows 8 Just Look Like THIS? 32

Why can't the Windows 8 desktop really be "no compromises" for those of us with big screens and powerful desktop PCs? That is, why can't we run traditional Windows applications and Metro-style apps, but in this environment as floating windows, side by side?...More
Dec 19, 2011
Sponsored

Controlling Plug-Ins in Your Internet Browser

One of the key features of today’s browsers is the ability to plug-in 3rd party code to add additional capabilities to the browsing experience but as these add-ins add additional capability they can also introduce new security and integrity risks. In this post we will look at approaches to protect our browser environments from plug-ins....More
Dec 9, 2011
Sponsored

Locking Down Applications in a VDI and Session-Based Virtualization World

In previous blog posts we looked at various technologies to control applications running on desktop operating systems. The newest and most promising of these is application whitelisting, which provides the best protection while still allowing users the flexibility needed to run the applications they want....More
Nov 30, 2011
Sponsored

Using Application Control to Limit Administrators on Servers. What Works, What Doesn’t.

First, there are administrators and then there are ADMINISTRATORS. This blog takes a look at what can be done to control administrators in our environments. Why would we want to limit our administrators? After all, they ARE the people who manage our infrastructure. It may be that organizations just make people administrators because it seems like the easiest way to allow them to do their job....More
Nov 22, 2011
Sponsored

2012 State of Endpoint Report Is In – Embrace Change to Win on Security

It seems like only yesterday when I was excited to share the results from our 2010 report on the state of the endpoint. This week, we are releasing data from our third annual State of the Endpoint study conducted by the Ponemon Institute and I have to admit, this year’s data is even more intriguing, albeit discouraging....More
Nov 14, 2011
Sponsored

How Virtualized Applications Affect Application Control Technologies

In previous blog posts we have discussed some application control best practices through application whitelisting. As organizations look at application virtualization technologies, allowing applications to run on an operating system without being installed, it can play havoc with our whitelisting approach....More
Oct 7, 2011
blog

Microsoft TechNet Gallery: TechNet's New IT Pro Scripting Center (Plus A Little More)

The Microsoft TechNet Gallery is a big improvement over previous incarnations of a scripting center on the TechNet site....More
Sep 26, 2011
Sponsored

Think Visibility, Then Control

Having just returned from the annual Black Hat conference in Vegas, the only thing clear these days is things are not getting better. Attackers are persistent and they have significant resources....More
Sep 19, 2011
Sponsored

Using Software Restriction Policies and AppLocker and When We Need Something More

In a previous blog post I talked about different methods to control user installed applications and when the various options were examined it became clear that whitelisting is going to enable the most flexibility while offering great protection for the organization. In this post I wanted to talk about what we actually have built into Windows and really when we need something beyond what’s provided....More
Sep 14, 2011
blog

VMware Ships Fusion 4 and Workstation 8

VMware has updated two of their least expensive virtualization products, announcing this morning that VMware Fusion 4 and VMware Workstation 8 are now shipping and available for purchase....More
Sep 12, 2011
Sponsored

Application Whitelisting: Key Protection Against Targeted Cyber Attacks

The Australian Department of Defense recently updated their Strategies to Mitigate Targeted Cyber Intrusions guidelines, and I think it warrants a little discussion....More
Sep 8, 2011
Sponsored

The good, the bad, and the ugly of user software installation

When we look at how to control the installation of applications, snap-ins, add-ins and anything else that ends in “ins” by users we really have 3 options available to us and you may find you use a combination of the technologies available....More
What's Windows IT Pro Archived Blogs?

Blog entries from the past

Blog Archive

Sponsored Introduction Continue on to (or wait seconds) ×