Home
May 2010 - 1105 Media
Contents
1. Asysops com www tinyurl com x7f9akm Windows IT Pro Apr 10 InstantDoc ID 103641 This tool can save the day if someone accidentally or intentionally deleted a bunch of Active Directory objects It provides granular object level and even attribute level restore capabilities to quickly rollback unwanted changes e g mistakenly deleted users modified group memberships etc Download link www tinyurl com oigy83 File Server Change Reporter Asysops com www tinyurl com wjw64f9 This tool continues the line of auditing tools this one for file servers It detects changes in files folders permissions tracks deleted and newly created files and sends daily summary reports This is a very useful tool to detect mistakenly deleted files and recover from backup or to see 1f someone changes some important files Download link www tinyurl com vye839 Inactive Users Tracker MS TechNet Magazine May 08 www tinyurl com jvskv7 This feature tracks down inac tive user accounts e g terminated employees so you can easily disable them or even remove them entirely to eliminate potential security holes The tool sends reports on a regular schedule showing what accounts have been inactive for a configurable period of time e g 2 months Download link www tinyurl com b2hs93 Password Expiration Notifier Redmond Magazine Feb 09 4sysops www tinyurl com m8cbg26 This tool will automat ically remind
2. applications you want to execute in your environment 2 Log on to the computer with a user account that has local Administrator privileges 3 Start the Local Group Policy Editor by running Gpedit msc from the Search programs and files textbox 4 Navigate to Computer Configura tion Windows Settings Security Settings Application Control Policies AppLocker Executable Rules of the local GPO Right click on the Execut able Rules node and then click automatically generate new rules This will launch the Automatically Generate Executable Rules wizard 5 In the textbox labeled Folder that contains the files to be analyzed enter c In the textbox labeled Name to identify this set of rules enter All Executables and then click Next 6 On the Rule Preferences page select Create publisher rules for files that are digitally signed and in case a file isn t signed also select File hash rules are created using a file s hash Ensure that the option Reduce the number of rules by grouping similar files isn t selected and then click Next 7 Rule generation will take some time When they ve been generated click Create When prompted as to whether you want to create the default rules click No You don t have to create these by creating rules for all executables on the reference computer you ve created the equivalent of more comprehensive default rules 30 May 2010 Redmond Re
3. whether they were working in the main office or home offices Winebarger looked at nearly 10 different Options before deciding on a 15 per month service from Nomadesk After _ installing the free client Nomadesk lets users choose either a personal or a team file server the latter of which lets users synchronize an unlimited number of systems Ihe client software maps a local drive letter to your folder on Nomadesk s servers and synchronizes files between your L local workstation and Nomadesk s servers for easy and quick MC ccessing and saving of files explains Winebarger When users edit files or folders the change is uploaded to the Nomadesk file server Any other users download the change the Nomadesk client checks on a short regular interval for any changes on the server or you can force synchronization manually The setup was simple Winebarger just downloaded the client set up a team account invited other users via e mail and amp picked a drive letter After three months he says it s working well and is used consistently to sync files between machines Data resides on local machines and in the Nomadesk cloud so there s a degree of backup But the cautious Winebarger uses a hosted backup service just in case If we were a large company I wouldn t consider Nomadesk an asan option he says Midsize and large companies would still be best served by on site server infrastructure S
4. May 2010 Redmond Redmondmag com client to use the new search capabilities in SharePoint 2010 to find users with specific knowledge or skills Communi cations Server 14 will support 911 capa bilities which will detect a caller s location and direct a caller to the proper dispatch site The new Office Commu nicator client will also support social net working and activity streams that are being added to the forthcoming Office 2010 and SharePoint 2010 releases Promising Partnerships Pall said Communications Server 14 the APIs for which were made available at the Microsoft Professional Developers Conference in November will be more extensible and interoperable than prior releases though company officials declined to elaborate on that statement Pall predicted that within three years 75 percent of applications will be enabled to have UC capabilities embedded in them Office Communicator will also be better suited for branch offices Pall added Built in branch office surviv ability means that if a connection between a remote location and a head quarters is severed the branch will still have communications capability Several partners also say they re developing products to support the Communications Server 14 branch survivability capa bility including Ferrari Electronics AG and Hewlett Packard Co Last year HP and Microsoft agreed to tie together Communications Server and HP ProCurve networking switche
5. and if I delete a file in the source it s not deleted from the destination Terdik elaborates This covers my hole of deleting a file and then realizing a couple of months later that I goofed and really need the file With the Pro version it will copy locked files I also use it to back up my Outlook 2007 files both the Local and Roaming folders Enterprise Function Without the Price Mike Powell an IT professional with Legend Brands had a simple aim To have enterprise like functionality without the enterprise price Powell put an unRAID OS based NAS server from Lime Technology LLC as the core It has RAID like parity protection against drive failure and unlike most RAID systems the drives can be moved to a different system in case hardware other than a drive fails Powell explains The next step was setting up backup which he did with Jungle Disk Seryer Edition My critical family photos and documents are only about 6GB so I have the single server Synchronization was the final step Powell explains To synchronize files I use my unRAID server as the master source I set up Microsoft SyncToy on my PCs to sync ANOTHER TECHNOLOGY CLOSE TO RAY OZZIE S HEART I GROOVE KEVIN B WOOD SENIOR SOLUTIONS ARCHITECT AT STRUCTURED COMMUNICATIONS SYSTEMS INC ISA GROOVE AFICIONADO AND USES IT TO SYNC HIS LAPTOP DESKTOP AND NETBOOK anything that I may need while mobile onto my PCs and back I
6. Remove Module Quest I only have one Quest module so I ll take a shortcut and use a wild card to save some typing Modules appear to be the preferred method going forward for adding functionality to your shell and I m sure I ll be writing more about them in the future Snap ins probably won t go away anytime soon but you might start using Import Module instead of Add PSSnapin May 2010 Redmond Redmondmag com PPRECT EROM SELECT customerid year sales from dbo SALES AS SourceTable PIVOT SUM sales FOR year IN 2007 12008 AS PivotTable customerid 2007 20068 667 745 00 5254809700 2 425352975 00 35290505543 00 3 25647195 00 840055799 00 This query provides a nice clear table with one row for each client and a column with the sales total for that year Let s look at the syntax and see how this is defined The meat of this query is the two derived tables in this example they re called SourceTable and PivotTable The first SELECT defines your raw data that will be fed into the PIVOT This is just the SELECT statement we looked at earlier returning the columns we want to see The source data 1s followed by the PIVOT portion of the code Here we define that we want to see a SUM of the sales data for the year column where the year value is 2007 or 2008 The result is the table shown previously By no means is this the only way to pivot data you ll find other methods in SQL Server Integration Servic
7. When you really stop and think about it the ultimate goal behind optimizing SharePoint s search engine is to have it return exactly the document set that the user Is searching for nothing more and nothing less As I explained in the previous section enforcing metadata usage will help to ensure that all of the relevant documents are returned among the search results However we haven t done anything to prevent SharePoint s search engine from returning irrelevant query results Back in the early days of the Internet I remember watching someone do a search engine query on the term angels T he search engine returned results such as Charlie s Angels angel food cake Hell s Angels and angelfish There was so much clutter among the search results that it made finding the requested pages difficult Ur fune uci ue gp ENE TD Tg peo vui Cei Type eg FR popand fae rap iacent Ce PU rper Bed Ae ER Mi D p Puy PE TES 6n hl Erpa Barren ard Cererripisn THM p rasa and ERTE fe Tua piri pa T ERTE sl Dag phan qe E A Buen Org eee ie toe ee ee pei ret F eod nag ey no ui Es Sed Eh Bai Mai ke Ok Tr Plai E tas pou uses Content Types E his arum Figure 1 This is how you create a custom content type Now that you ve defined one or more content types the next step in the process is to integrate those content types into your document library To do so click the Site Actions button and then choose the Site Set
8. a synchronization tool from Microsoft similar to Live Mesh called Windows Live Sync Oddly enough Poorman and his son were both using Sync already they just didn t know it _ My son uses Sync to keep his college work synchronized between a laptop and a desktop computer Poorman 4 May 2010 Redmond Redmondmag com ai 4 ue i L PETER POORMAN WANTED TO BACK UP FILES FROM HIS SON S COLLEGE MACHINE AND OTHER PCS AND ENDED UP DISCOVERING A SYNCHRONIZATION TOOL FROM_MAICROSOFT SIMILAR TO LIVE KAESH CALLED LIVE SYNC ODDLY ENOUGH POORMAN AND HIS SON WERE BOTH USING LIVE SYNC ALREADY THEY JUST DIDN T KNOW IT explains Adding me to his existing Sync places a copy of his files on my computer I then include these in my regular backup process which I do using EMC Retrospect Sync is set up so that my copy of the data is read only so I can t accidently delete or modify his files _ i The system works great and files are synced quickly and transparently It handles disconnects such as the laptop being put to sleep completely seamlessly Poorman says i A Groove y Answer Another technology close to Ozzie s heart is Groove Kevin Wood senior solutions architect at Structured Communication Systems Inc 1s a Groove aficionado and uses it to sync his laptop desktop and netbook T might be at a client site and the client gives me a document I want to read later Wood says I might take a
9. machine he s using Not wanting to use a remote connection to the desktop Macek investigated cloud solutions After trying a few approaches Macek settled on Live Mesh the brainchild of Microsoft Chief Software Architect Ray Ozzie While the documentation wasn t the best Live Mesh was easy to set up Unlike some systems that synchronize all files automatically with Live Mesh you choose the folgags you wish to sync For Macek the folders are part of a Live Desktop and are in the cloud as well as on the laptop and the desktop IMAGE FROM GETTY JOSE LUIS PELAEZ Fu ut 5 4 a a x Redmondmag com Redmond May 2010 33 7 A act i i LE os DATA SYNC Redmond reader Bruce Thompson is another Live Mesh adherent and uses it both personally and for a client The lient a sales manager for an outfit with offices across the i country kept losing pictures and documents on his laptop Flis IT department tried to tie him to a company server in l Seattle through Windows offline files but the manager rarely h d a high speed connection to the office I set him up with Live Mesh so that any time he connected to the Internet his files would be synced to the Live Mesh site in the cloud Thompson says A very nice side benefit was that he could allow select people in the corporate office access to documents when he was on the road Since we set this up he hasn t lost an
10. 20 000 users or even more than that a lot of them need commu nities they re craving communities says Mauricio Duran president of Los Angeles based Sieena a Microsoft Gold Certified Partner with three large customers who want to deploy SharePoint 2010 as soon as it s released They want people to use their Web sites and they want them to get to know each other to find the expertise they re looking for within the com pany Duran adds The questions are exactly the same they basically come to us and say I want Facebook within my company Todd Klindt a Microsoft Most Valuable Professional and senior con sultant with Mainville Ohio based SharePoint911 agrees T haven t yet decided there s a good business case for the social networking capabilities but a lot of people are excited about them he says Among the new social networking features in SharePoint 2010 is the ability for organizations to create profiles of their employees that simplify the discovery of subject matter experts As with Facebook employees can create their own networks within an enter prise SharePoint environment post status updates list activities post questions and create both individual Redmondmag com Redmond May 2010 11 RedmondReport FCI Adds Structure to SharePoint Me is recommending customers deploying SharePoint 2010 run it on the most recent release of Windows Server SharePoint 2010 requires Windows
11. Is driving innovation in the industry and is continually delivering cutting edge solutions to address the evolving needs of customers around archiving retention ediscovery and backup SharePoint Archiving with Mimosa Systems Protect your Organization from Costly Growth and Possible eDiscovery Nightmares According to an Enterprise Storage Group research article around one in three 33 North American and Western European organizations are currently using SharePoint and an additional 13 plan to do so in the near future In fact SharePoint is the fastest growing server product for Microsoft today With fast growth and rapid adoption come many challenges as nearly one quarter 25 of early adopters believe the backup process is more challenging for SharePoint than for other applications With most mailboxes and file shares blocked with storage limits SharePoint is rapidly becoming the next dumping ground in organizations and special care needs to be taken to prevent excessive growth In addition to the increased use of SharePoint as a dumping ground by users the rapid growth of document libraries is also caused by the lack of deduplication of content within SharePoint It is apparent that organizations are still confused about the difference between backup and archiving since more than half 54 of those archiving SharePoint are using traditional backup applications to do so which is the wrong approach to solve this growing pr
12. LinkedIn It s a rich and complex array of offerings with myriad ways of communi cating Where we used to have a tele phone fax and the U S mail with this combo you have telephony e mail video and Web conferencing IM social media and various kinds of alerts plus you can still use fax and the U S mail The only thing I didn t see or maybe missed was the ability to text For me a simple man of the past it s a bit much It s as though I spend all my time communicating and no time working Too much of this and I m ready to have a nervous breakdown drive me insane The good news of course is IT can choose which mechanisms to invoke maximizing communication efficiency and hopefully minimizing disruption All of this is a prelude to news about the next version of OCS The new rev expected this year not only detects whether you re present on the network but also where you are physically As a boss this is tempting but I d rather resist watching my employees every move And as an employee it seems a little uncomfortable In the old days we had a device that could immedi ately detect one s presence We called it a telephone You rang someone up and if they answered they were there And with landlines you knew precisely where n they were Just 10 years ago I d break for lunch remember when we used to do this come back and have 10 phone messages These days if I somehow manage to slip a
13. President Event Operations Chairman of the Board Henry Allain Matt Morollo Doug Barney Michele Imgrund Tracy Cook MEDIAS Neal Vitale Richard Vitale Michael J Valenti Abraham M Langer Christopher M Coates Erik A Lindgren Carmel McDonagh David F Myers Jeffrey S Klein Reaching the Staff Staff may be reached via e mail telephone fax or mail A list of editors and contact information is also available online at Redmondmag com E mail To e mail any member of the staff please use the following form FirstinitialLastname NO5media com Framingham Office weekdays 9 00 a m 5 00 p m ET Telephone 508 875 6644 Fax 508 875 6633 600 Worcester Road Suite 204 Framingham MA 01702 Irvine Office weekdays 9 00 a m 5 00 p m PT Telephone 949 265 1520 Fax 949 265 1528 16261 Laguna Canyon Road Suite 130 Irvine CA 92618 Corporate Office weekdays 8 30 a m 5 30 p m PT Telephone 818 814 5200 Fax 818 734 1522 9201 Oakdale Avenue Suite 101 Chatsworth CA 91311 The opinions expressed within the articles and other contents herein do not necessarily express those of the publisher BPA WORLDWIDE m Century Mo wing Business Forward iwn Western Publications Association ILLUSTRATION BY ALAN TAO IMAGE FROM GETTY Oy SpectorSoft Do you still p believe that Filters work IT SECURITY WARNING Internet Filters Cause a False Sense of Sec
14. also hoping the new Outlook and Communicator clients will help replace the telephone or at least tie the com munications software more closely to it Microsoft aims to do this with a new release of Office Communications Server OCS code named Communications Server 14 which is slated to ship later this year Office 2010 was designed to be a key front end interface to SharePoint 2010 both of which Microsoft will launch on May 12 The pairing will be crucial to enabling enterprise social networking and document sharing Later this year though Microsoft is taking a step toward enabling Office 2010 to function as a more viable telephony platform This is not a new effort for Microsoft T he company has long evangelized its goal of creating unified communications UC It has released several versions of OCS designed to let Office interface with business telephone systems including private branch exchange PBX and Voice over Internet Protocol VoIP services Largely Untested More than 100 million Office users are connected to OCS said Gurdeep Singh Pall corporate VP of the Microsoft Office Communications Group speaking in a keynote address at the recent VoiceCon show in Orlando Fla Still usage has been scattered and few organizations have replaced their existing PBX services with OCS says IDC analyst Jonathan Edwards OCS has not been enterprise ready for the majority of organizations he explains Edwards add
15. collaboration server deployed Social networking enhancements are a key draw 14 Microsoft Seeks to Replace PBXs New Office Communications Server planned for year end release promises to address deficiencies in existing offering TIPS amp TRICKS 16 Professor PowerShell Snap In Modules 16 Windows Advisor Installing FrontPage Server Extensions on 64 Bit Windows 18 SQL Advisor Pivots Turn Ugly to Pretty TECHNET PRACTICAL APP 27 Windows 7 Security Tips Keep your files safe with BitLocker and AppLocker COLUMNS 8 Barney s Rubble Doug Barney Communication Breakdown 51 Decision Maker Don Jones Back up Active Directory and GPOs 53 Windows Insider Greg Shields Windows PowerShell Is Not a Scripting Language 56 Foley on Microsoft Mary Jo Foley Windows Phone 7 A Good Bet COVER IMAGE FROM GETTY JOSE LUIS PELAEZ MAY 2010 VirtualizationReview com JT Questions with Virtualize Your Servers Safely Don Jones Don Jones Redmond s new Sg virtualization has come into the spotlight as a way to save money Decision Maker columnist and maximize efficiency You may be planning to virtualize servers in your highlights some of the biggest organization and examining the pros and cons of the procedure Before you IT issues of 2010 j begin make sure to read Redmond contributor Brien M Posey s recent feature p for Virtualization Review magazine Avoiding the Pitfalls of Virtuali
16. compatibility for Windows Mac OS X and Linux The user guide was only five pages long but seemed to cover everything in an adequate manner Focus on Features Although each of the applications reviewed here is designed to make data available in alternate locations the applications could not be more different Tiga Via n oo Vour storage GA Tou pet Le dress the Vua team bo qut rated nca your frierda and get up te 3 6B 06 06 0B ol 1 68 ured ant rari frien li Figure 5 Wuala works similarly to a torrent application for ITB One particularly unique aspect of Wuala s pricing model is that the company allows subscribers to trade local storage for online storage The amount of online storage space that you receive in return for your trade is based on the amount of time that you re online For example if you trade in 100MB of local storage space and you re online 75 percent of the time you ll receive 75MB of free online storage In case you re wondering why Wuala is interested in trading storage space it s because the Wuala app is based on 26 May 2010 Redmond Redmondmag com from one another Therefore when selecting a synchronization application it s more important to choose an appli cation that offers features that meet your needs rather than the application with the highest score R Brien Posey MCSE is a Microsoft MVP and the co founder and vice president of research at Relevant Technologies wh
17. device I m using That being the case I wanted to look at some of the data synchronization products on the market and see how they stack up The first synchronization application that I tried was SpiderOak Secure Sync Secure Sync is actually a cloud based backup application that offers synchro nization as an extra feature Even though file synchronization seems to have been an afterthought the company has done a good job with its synchronization software Users are required to use the Secure Sync soft ware to back up any data they want to synchronize Once backed up the data can be synchronized between PCs or between a PC and an external storage device SpiderOak offers versions of its software for Windows Linux and Mac OS X so it s possible to share and synchronize files across platforms The installation process is easy and makes use of a standard setup wizard Once installation completes you re asked to set up a Secure Sync account The entire process of downloading and installing the software and setting up the account takes less than five minutes One of the things I liked about setting up Secure Sync was that the software 22 May 2010 Redmond InThisRoundup RedmondRating Installation Features Ease of use Administration Documentation Overall Rating Key Virtually inoperable or nonexistent initially provides you with a free account The free account comes with 2GB of space and can be
18. error Additionally the time involved to In a single line this command reads through the list of new users contained within an Excel spreadsheet s CSV file It pipes the users it sees to the New ADUser cmdlet to create those users then pipes them again to I submit that Windows PowerShell 2 0 is a text based administrative automation solution Enable ADAccount to enable their accounts and then completes the thread by piping the entire result to Add ADGroupMember to add their accounts to the New Users global group Using what s likely the same spreadsheet of users that you ve received from your HR department four commands in a single line have accomplished the task That being said I ll admit that this columns title isn t an entirely true statement Windows PowerShell indeed comes equipped with some powerful accomplish the task grows linearly with the number of users there are to create This process is so time consuming that many of the aforementioned graphically oriented administration solutions have built their own wizards for batch user creation On the other hand consider the elegance of this single Windows PowerShell command Import CSV newusers csv New ADUser passthru Enable ADAc count passthru Add ADGroup Member New Users scripting constructs that enable it to accomplish all the tasks you re used to seeing in a scripting language But at its very core Windows PowerShell is something far
19. hosting provider would perform tasks such as configuration changes patch management and server backups So which duties would be left for the network administrator of the future Not many Occasionally network admins might need to set up user accounts but I think the hosting providers will probably develop Web front ends that make user manage ment idiot proof Go Daddy for instance is already doing just that with its Web hosting packages When it gets to the point where network administration consists solely of mundane tasks and those tasks have all been made idiot proof skilled network administrators will no longer be needed I realize this is a bold statement but consider this Most companies are not in the IT business IT is simply a department within the organization that 1s there to facilitate the organiza tion s business needs Owners or shareholders want the company to be as profitable as possible and one way of increasing profitability is to get rid of unnecessary costs If it becomes cheaper to outsource an organization s IT needs and doing so does not impact reliability you can bet it will only be a matter of time before shutting down IT departments becomes a new business trend Once a com pany stops seeing you as an asset and starts seeing you as an expense you re in trouble However I don t have a crystal ball and I don t believe IT is going to vanish completely There will still be IT jobs but those jo
20. offers excellent protection many IT profes sionals find it problematic because they tend to encounter it only when they must perform recovery operations Data recovery requires access to the BitLocker keys or passwords associated with the locked volumes While it s relatively easy to keep track of these for a small number of computers doing so for several hundred is much more challenging Group Policy helps IT professionals configure BitLocker so it can be activated only when the recovery keys and passwords have been successfully backed up to Active Directory Extracting this recovery data has been vastly simplified by improvements to the Active Directory Users and Com puters ADUC console in Windows Server 2008 R2 and to the Remote protect go to Computer Configuration Windows Settings Administrative Templates Windows Components BitLocker Drive Encryption 2 Now if the computer has only one storage drive navigate to the Operating System Drives node and edit the Choose how BitLocker protected operating system drives can be recov ered policy If the machine has more than one storage drive you should also go to the Fixed Data Drives node and edit the Choose how BitLocker protected fixed data drives can be recovered policy Note that although you can configure their settings identically the policies apply to different drives 3 To configure BitLocker so that passwords and keys are backed up to AD
21. or try to determine whichzof pe files is the latest is fantastic he sayssfOne work space is for all of my clients So as I work on multiple clients the data is synchronized When a project is finished from my mail laptop I can move the folder from the ji pat s ai Microsoft Jac ITM i y anager A Salesman Microso 1 e m i ft Windows 7 Enterprise n Windows Server 2008 R2 IP Forefront A n gt Drive efficiency and fuel inspiration Where if strikes Windows 7 Enterprise Edition Windows Server 2008 R2 Microsoft System Center and Forefront can help drive the success of your business How exactly Well when deployed together they help streamline management of your desktops minimize threats and data loss while maximizing secure remote access and user productivity across applications locations and devices End result Inspired users Efficient business Happy IT To learn more about the benefits of these products go to itseverybodysbusiness com deploy Snap this tag to get the latest news on deploying optimized desktops or text DEPLOY to 21710 Get the free app for your phone at A http gettag mobi Because it s everybody s Jt business Standard messaging and data charges apply DATA SYNC workspace to my backup archive location The file is now gone from all the computers If I need the files back I just copy from the a
22. over reason some pundits have argued I m not convinced that the company has made the optimal set of bets with Windows Phone 7 Some Windows Mobile developers and customers who stuck with Microsoft s meandering mobile platform and strategy say they re feeling abandoned and disen franchised They re taking their business elsewhere they re telling me As much as I find the Metro UI on my Zune HD to be fun and intuitive Online For more on Windows Mobile 7 go to Get 56 May 2010 Redmond Redmondmag com people who care more about showing off their gamer tags and achievement scores than they do about accessing custom line of business applications on the go Microsoft has yet to finalize the operating system that will power the first Windows Phone 7 devices which are due out by this year s holiday season so there s still room for some technology and strategy tweaks But the company is still taking a huge gamble with its new platform Will it pay off We ll see R Mary Jo Foley mjfoley redmondmag com is editor of the ZDNet All About Microsoft blog and bas been covering Microsoft for about two decades She bas a new book out Microsoft 2 0 fohn Wiley amp Sons 2008 which looks at what s next for Microsoft in the post Gates era TRANSFORMATION through innovation FACIE ASE EIVir b yi A l COLLABORATION A Are you struggling to identify analyze and report on the right data
23. photo while I m traveling and want to share the photo with my siblings So the challenge is that I get files while I m using one computer that I will need on another computer How do I easily get the right file to the different destina tion For my personal files I could use a thumb drive I could use an Internet based storage application but then I would have to log on the recipient would Sl to check for new files etc Groove wasn t hard to find As a Microsoft Office Ultimate user Wood had the Groove client right on his hard drive Once he found it Wood went to work setting up Groove workspaces that includesdocuments discussions and calendars Workspaces can be based on folders which are instantly shareable once invitations have been offered and accepted The tools and data are stored on each individual s workstation Wood explains All any individual needs to do is drag and drop a file into the Groove workspace on their desktop The file can be opened and edited in the local workspace The individual does not need to be connected to the Internet Wood continues When theindividual does connect new or updated files are copied to the server New or changed files are downloaded to the user s workspaces The workspace files can be copied to external drives removed and treated like normal files For Wood Groove is a near perfect solution Not having to copy files to a thumb drive
24. populate the column by setting the Require That This Column Contain Information option Creating Custom Content Types Although it s easy to require users to populate custom meta data fields blanket requirements aren t always practical The reason for this is the terms that users are likely to enter into a search query vary depending on the type of documents they re searching for Furthermore document libraries often contain multiple file types For instance a set of meta data tags that s perfectly suited to an accounting spreadsheet probably wouldn t be appropriate for use with a marketing proposal created in Microsoft Word It s therefore important to let SharePoint know that a document library is going to contain multiple types of doc uments and to define some metadata tags that are going to be specific to each custom content type that you define Defining Custom Content Types To define a custom content type click the Site Actions button and choose the Site Settings All Site Settings options from the resulting menus When you arrive on the Site Settings page click on the Site Content Types link located in the Galleries section Clicking the link will take you to the Site Content Type Gallery page Click the Create link and SharePoint will display the New Site Content Type page Figure 1 p 48 Enter a name and an optional description for the content type that you want to create You must also select a parent content type G
25. to undertake the migration from Novell NetWare in the near future There are several technology paths these organizations can take depending on their business requirements technical constraints and availability of resources Many lack information on the alternatives for migration an analysis on the strengths and weaknesses of the alternatives and how those alternatives address their present and future business requirements Further once you have made a migration decision you need to address planning and execution To view the Quest white paper go to Redmondmag com Quest510 Alternatives and Strategies i mi m EO CC CIC T DOOREEXAXXXWE XXI including having the right skills training project management and business continuity Making a mistake during migration can cost you in terms of business productivity customer satisfaction and missed opportunities Download this white paper to learn more about how to why you need to migrate from NetWare today what your alternatives are and why Windows Server and Active Directory may be your best choice for a network infrastructure of the future Most important learn how you can get from where you are to where you need to be with your network QUEST SOFTWARE Smart Systems Management Redefining X When an organization needs more computing power for today s memory intensive workloads the conventional wisdom is to buy more servers This can l
26. unique pass words or pins for a particular computer account a data recovery agent DRA This is a special type of certificate assoclated with a user account that can be used to recover encrypted data DRA recovery will work only on BitLocker protected volumes where BitLocker was enabled after the policy was enforced BitLocker To Go Many of today s removable storage drives have an average storage capacity which approaches that of most small and midsize departmental level file shares from 10 years ago This pres ents several challenges First when a removable storage device is lost or stolen a significant amount of organizational data can be compro mised Perhaps a bigger problem is that e Deny write access to removable drives not protected by BitLocker This policy lets you restrict users so they can only write data to devices protected by BitLocker To Go encryp tion When this policy is enabled an unauthorized person can t easily access data written to a removable device as it will be protected by encryption Choose how BitLocker protected removable drives can be recovered This policy lets you configure a DRA or save BitLocker To Go recovery information within AD This policy is important because if you choose to implement BitLocker To Go to protect BitLocker To Go is a new feature introduced with Windows 7 BitLocker DRAs are configured by editing Group Policy and specifying a DRA certificate throug
27. used for life This free account provides you with full access to all of the SpiderOak software s features including file backup and sync There s also a sharing feature which Redmondmag com Roundup Average performs adequately Exceptional allows you to give others access to a subset of the files you ve backed up SpiderOak pricing is based on the amount of space you use Pricing is set at 10 per month or 100 per year for every 100GB of space leased Although the software is designed to retain every TOP 10 Independently reviewed by industry experts these free tools Advertisement Bagley proved to be useful for IT pros Yet Another 10 Free Tools for System Administrators Audit Active Directory and file servers detect inactive users block USB devices and more for free he following freeware tools by Windows IT Pro Community Choice Awards finalist NetWrix Corporation can save you a lot of time and make your network more efficient at absolutely no cost Some of these tools have advanced commercial versions with additional features but none of them will expire and stop working when you urgently need them Disk Space Monitor MS TechNet Magazine Sep 09 www tinyurl com dkj5z2w Even with today s terabyte large hard drives server disk space tends to run out quickly and unexpectedly This simple monitoring tool will send you daily summary reports regarding all serve
28. when BitLocker protection is acti vated make sure to enable the settings You can access BitLocker recovery keys and passwords from a BitLocker Recovery tab Server Administration Tools for com puters running Windows 7 Locating recovery passwords and keys is much easier than with the tools in Vista Instead of downloading installing and configuring special tools you can access BitLocker recovery keys and passwords from a BitLocker Recovery tab Ensuring BitLocker keys and passwords are backed up is a three step process 1 In the Group Policy for the computer accounts of the system BitLocker will e Save BitLocker recovery informa tion to AD Domain Services DS for operating system drives or fixed data drives where appropriate e Do not enable BitLocker until recovery information is stored in AD DS for OS drives or fixed data drives where appropriate Keys and passwords will be backed up for protected volumes only after the policy is applied Volumes configured for BitLocker protection prior to Redmondmag com Redmond May 2010 27 MAGAZINE Net 3 implementing the policy won t have their keys and passwords automatically stored in AD You ll have to disable and re enable BitLocker on these computers to ensure that this recovery information makes it to the AD DS database Configuring a DRA There s another option available if you need to recover BitLocker protected volumes without entering
29. 10 Redmond Redmondmag com Windows Advisor Installing FrontPage Server Extensions on 64 Bit Windows A reader wants to install FPSE By Zubair Alexander Q How do I install FrontPage Server extensions FPSE on my 64 bit Windows Server 2008 A A lot of people especially those who are relatively new to managing and editing Web sites use Microsoft FrontPage Those who have worked with Web pages for a while prefer other tools such as Adobe Dreamweaver Microsoft SharePoint Designer or even Expression Web because those tools do a much better job editing HTML pages than FrontPage Once you ve upgraded your Windows Server 2003 to Windows Server 2008 you may realize that the IIS7 in Windows Server 2008 no longer supports FPSE The same is true for IIS7 in Windows Vista Because there are tons of Web hosting providers who rely on FPSE Microsoft and Ready to Run Software offer a special version of FPSE This new version is called FPSE 2002 and will work on IIS7 running on 32 bit and 64 bit ver sions of Vista and Windows Server 2008 computers You can download FPSE 2002 from www rtr com fpse To install FPSE on your Windows Server 2008 log in with an administrator account or start the command prompt using Run As Administrator and type this Continued on page 18 UBDR GOLD IS UAL WE VE BEEN A PART OF VIRTUAL BACKUP AND DISASTER RECOVERY SINCE ITS INFANCY Did you
30. 608 Return Undeliver able Canadian Addresses to Circulation Dept or IMS NJ Attn Returns 310 Paterson Plank Road Carlstadt NJ O7072 COPYRIGHT STATEMENT Copyright 2010 by 1105 Media Inc All rights reserved Printed in the U S A Repro ductions in whole or part prohibited except by written permission Mail requests to Per missions Editor c o Redmond 16261 Laguna Canyon Road Ste 150 Irvine CA 92618 LEGAL DISCLAIMER The information in this magazine has not undergone any formal testing by 1105 Media Inc and is distributed without any warranty expressed or implied Implemen tation or use of any information contained SALES STAFF Tanya Egenolf Advertising Sales Associate 760 722 5494 phone 760 722 5495 fax tegenolf lNO5media com IT CERTIFICATION amp TRAINING USA EUROPE Al Tiano Advertising Sales Manager 818 814 5227 phone 818 754 1529 fax atiano lNO5media com PRODUCTION Jenny Hernandez Asandas Director Print Production 818 814 5289 phone 818 734 1528 fax jhernandez NO5media com Jennifer Shepard Senior Print Production Coordinator 818 814 5285 phone 818 754 1528 fax redmondadproduction NO5media com herein is the reader s sole responsibility While the information has been reviewed for accuracy there is no guarantee that the same or similar results may be achieved in all environments Technical inaccuracies may result from printing errors and or new developments in the ind
31. AC COM MCPmag com s TI 18 s amp lricks SQL Advisor Pivots Turn Ugly to Pretty Here s a cool way to look at data formatted using simple T SQL PIVOT syntax By Eric Jonnsom You ll often find that data stored in rows in normalized tables isn t in the prettiest form to display to an end user Often data will make more of an impact if it s displayed as a single row for each object with multiple columns of data If you re looking at sales for specific customers it s more pleasing to see one row for each customer and a column for each year of data It also makes it easier to compare one client to another for a particular year Getting the data in a nice format means turning to some PIVOT syntax Let s look at an example of using PIVOT to get data out of rows and into columns Take a look at the following sales table some rows are omitted SELECT FROMDBO SALE customerid year sales p 2007 2500000 2008 27000 00 2290077 34555 00 2 2 2007 2550000 2 2005 56800 00 2007 784747 00 3 5 2007 1560000 amp 2008 9560000 This table contains one row of sales data for each quarter for each customer This is a little hard to look through and we only have three customers in this sample table We can use the PIVOT syntax to make this data more clear First I ll show you the code and then we ll see how it works Running the following SELECT with a PIVOT returns the data shown Continued from page 16 PS CA
32. BN E GFI Backup BUSINESS EDITION When the unexpected happens We ve got your back GFI Backup 2010 at a glance Fast efficient backup restore and synchronization solution and highly cost effective You don t have to be in a disaster zone to risk losing Back up to all popular storage devices critical data What happens if one or more of your users are affected by a virus or a malicious attack or suffer interface loss or theft of hardware Get peace of mind and I l Ease of configuration and maintenance securely back up files and data across your network with GFI Backup 2010 Business Edition Simple restore through use of standard Zip archives Find out more and download your FREE trial GFI Backup BUSINESS EDITION we tel 1 888 243 4329 fax 1 919 379 3402 Email ussales gfi com www gfi com GF Partner All product and company names herein may be trademarks of their respective owners m rod c J pS indo hone gt d i e cnt e N r wm p od MAY 2010 cn _ n E INI DEI PE DENT VOICE OF THE MICROSOFT IT COMMUNITY lt ppn LM lis m 2f Redmond readers share _ _file syncing strategies tS Cloud S rvival Skills e o pe M Orgahize Your gt P A I tm SharePoint Libraryse LI 4 d Aa x Eh BETTER BUSINESS INTELLIGENCE AT A BETTER PRICE UP TO 2 LESS Turn
33. Locker makes creating the rule list for authorized applications simple certificate to recover data from the drives without necessitating the recovery of individual passwords Configuring AppLocker AppLocker lets you create a list of applications known to be safe and limit execution to those that are on the list While this type of approach to securing a computer would be cumbersome to someone who regularly runs new and unusual software most organizations have a standard system environment where changes to applications occur more gradually so allowing the execu tion of only green lighted applications is more practical You can extend this set of AppLocker authorization rules to include not only executable files but also scripts DLLs and files in MSI format Unless the executable script DLL or installer is authorized by a rule it won t execute AppLocker makes creating the rule list for authorized applications simple with a wizard that automates the process This is one of the significant improvements of AppLocker over soft ware restriction policies a technology in prior Windows versions that has similar core functionality AppLocker can also use rules that identify files using the file publisher s digital signature so you can create rules that include the current and future versions of the file This saves administrators the chore of updating current rules after applying software updates The revised executable file
34. ME 2008 L WGU is honored to receive the USDLA 21st Century Award for Best Practices in 21st Century Distance Learning for 2008 Distance Learning AdvertisingSales Ow O9 9 4 Kv JD Holzgrefe Associate Publisher 804 752 7800 phone 255 595 1976 fax jdholzgrefe NO5media com Northwest Bruce Halldorson Northwestern Regional Sales Manager 209 333 2299 phone 209 729 5855 fax bhalldorson llOo5media com So Cal Central Amy Winchell So Cal Central Regional Sales Manager 949 265 1566 phone awinchell lO5media com Danna Vedder Microsoft Account Manager 253 514 8015 phone 775 514 0350 fax dvedder 1lO05media com ID STATEMENT Redmond ISSN 1553 7560 is published monthly by 1105 Media Inc 9201 Oakdale Avenue Ste 101 Chatsworth CA 91311 Periodicals postage paid at Chatsworth CA 91511 9998 and at additional mailing offices Complimentary subscriptions are sent to qual ifying subscribers Annual subscription rates for non qualified subscribers are U S 39 95 Canada 54 95 U S funds International 64 95 U S funds Subscription inquiries back issue requests and address changes Mail to Redmond P O Box 2166 Skokie IL 60076 7866 email REDmag 1105service com or call 866 293 3194 for U S amp Canada 847 763 9560 for International fax 847 763 9564 POSTMASTER Send address changes to Redmond PO Box 2166 Skokie IL 60076 7866 Canada Publications Mail Agreement No 40612
35. Server 2008 at a bare minimum but by going to the recently released Windows Server 2008 R2 organizations can take advantage of a new feature called File Classification Infrastructure FCI FCI is a new feature within the File Server Role and File Server Resource Manager FSRM FCI can be customized for various enterprise content management implementa tions according to Microsoft IT pros who work with Windows Server are typically already familiar with FSRM They can use it to auto matically classify files run reports and apply policies based on different file classification properties and enterprise wikis that can be tied into the SharePoint content management repository Among other things tying wikis and other content to the SharePoint repository lends itself to discovery for knowledge management and compliance The new social networking features also support tagging which allows for the classification of information Everyone can create their own groups through what is called My Network which provides real time activity streams Through integration with Microsoft s unified communications tools it offers support for presence For public Web sites SharePoint will be more practical than its predecessor Duran says That s because Microsoft is expected to offer a Standard Edition that s half the price of the 2007 release That can really give the incentive that many of these companies were waiting for to build t
36. They re slow full of bugs and Legend across x axis Megabytes hard to manage VIPRE Enterprise Premium is a revolutionary new approach It combines high performance antivirus antispyware and desktop firewall CPU U into a single agent so you get comprehensive endpoint malware ENA o Used During Scan i protection with low system resource usage It s fast powerful didi and easy McAfee INTERNES e TrendMicro III Plus advanced anti malware technology protects your system Windows 7 mec alins as Lic against the new wave of malware threats No more juggling multiple programs No more dealing with user complaints about slow workstation performance Webroot III a 0 10 20 30 40 50 60 70 80 COMPLETE All in one protection from today s malware VIERE Enterprise 27 RU scuza uzina mones scan FAST High performance and low impact on system resources EASY Manage everything easily from one command screen RELIABLE Configurable real time monitoring technology wo dm A Med MORTE AFFORDABLE Ask for a quote with our 5096 competitive nterprise Scans at a Dris secan r p nt uses just 27 of CPU and 50 MB of RAM In idle it upgrade discount uses a mere 13 3 MB RAM with a disk footprint of just Wh TRUE h h 113 MB You ll hardly notice its running y struggle with slow resource hogs when you can manage Community ALL your malware threats with one fast easy application GOLD WindowsITPro 200 C
37. When you re ready to use a module use the Import Module cmdlet PS CN Import Module ActiveDirectory Now if you run Get Module you ll see the new module and its commands So if conceptually a snap in and a module are the same can we use the same command Sure Just about any snap in can be imported as a module To import the snap in you ll is to get the full pati to the ni file PS C id Import Module get pssnapin Quest ActiveRoles ADMa nagement Registered ModuleName na my S CORE I have the free Quest Revive Directory PSSnapin installed It s not loaded in my current PowerShell session so I need to use the Registered parameter with Get PSSnapin to retrieve information about What I need is the ModuleName that returns the full path to the DLL C Program Files Quest Software Management Shell for AD Quest ActiveRoles ArsPo ShellSnapiln dil To uns this as module I xiu need to pass it as a value for Import Module Even though the Quest tool was packaged and intended to be used as a snap in it won t show when I call Get PSSnapin That s because I imported it as a module PS Que get module Modulelype Ne ame ExportedCommanc Binary X Quest ActiveRoles ArsP Get QADComputer New QADUSer Functionally there s no difference with one exception When you load a PSSnapin there s no way to unload it It remains until you end the PowerShell session But modules can be unloaded Continued on page 18 16 May 20
38. a lot of time has passed since the incident that I just described and search engines have improved a lot ve found that SharePoint s search results can still be polluted with irrelevant data To give you a more concrete example of what I m talking about let me tell you what Documents page and your custom content types will be listed in the Content Types section Now that you ve added the custom content type to the document library users are able to select the appropriate 48 May 2010 Redmond Redmondmag com happens when I enter the word Quick into the search field The search returns 10 results as shown in Figure 3 p 50 However a closer inspection reveals that none of those 10 results is a Microsoft Office document Instead the results cht Easy Fast Mapping of Your Data Silverlight SharePoint SQL Server 2008 m F js d gm St ua ep a sib i Lap kapim Pe ee pom mm peerless oce ems Rome ee Ses Heat maps clearly display actionable information Configure your maps with simple to use dialog boxes Derive more value from your business data by ArcGIS Mapping for SharePoint includes visualizing and analyzing it on maps in SharePoint ESRI ArcGIS Mapping for SharePoint transforms data from Excel and SQL Server into actionable gt Geolist Web Part Provides an interactive multifunctional tabular view of SharePoint lists informat
39. ach R Don Jones don concentratedtech com is a 12 year industry veteran author of more than 45 technology books and an in demand speaker at industry events worldwide His broad technological background combined with his years of managerial level business experience make him a sought after consultant by companies that want to better align their technology resources to their business direction Tones is a contributor to TechNet Magazine and Redmond and writes a blog at Concentrated Tech com same time degree programs offered at WGU Flexible ONLINE learning already have certifications Software and IT Management Call Toll Free Oks D gt Isa n Earn your degree and IT certs at the Earn up to 10 respected industry certifications with your online IT degree program At No Additional Cost Heres what you can get from the online The opportunity to advance quickly if you e Programs in Networks Databases Security 888 455 6001 or visit us at www wgu edu timel5 WESTERN GOVERNORS UNIVERSITY e best id cheapest lege you ve never eard of is found nly online bi ME magazine November 17 2008 IME WGU is honored to receive the USDLA 21st Century Award for Best Practices in Distance Learning for 2008 21st Century Distance Learning Windowslinsider Windows PowerShell Is Not a Scripting Language find myself amazed at how many IT professi
40. al information through the various repositories and data knowledge shares within their enterprises Obviously this has an impact on the bottom line How can enterprise search help Enterprise search can help even in environments with existing content management systems While a CMS is good at creating content and workflow business users often still have difficulty finding information The ability to search across your CMS and other sources such as databases and file servers gives employees truly universal search The right enterprise search solution should address this need through algorithms specifically designed to maximize relevance for enterprise content regardless of the data s format repository software or source How does Google Search apply to the enterprise Google applies the power of its always evolving search technology to enterprise data with the Google Search Appliance GSA Content on web servers intranets file shares databases business applications ERPs wikis and content management systems including SharePoint can be searched with equal ease and relevance For more information please visit Rajat Mukherjee Group Product Manager Enterprise Search What does this add to SharePoint environments While business users find that content manage ment systems give them the ability to create content easily this ease of use is not matching when it comes to finding this content Moreover these user
41. and one on my laptop Checa says The solution is to run Microsoft RichCopy or Robocopy nightly between my laptop and my Home Server to sync my files so when I m on the go they re available to me There s also a mirror at home for my family to enjoy the pictures and photos in our collection R Doug Barney is editor in chief of Redmond magazine Doug Says wrote this story fora selfish reason have two laptops and soon will have a netbook and want a central place to keep key files What better source of advice than you the Redmond reader There were 19 of you who wrote and detailed your solutions That s the power of the Redmond reader Many of these interactions happen through my Redmond x uw Report newsletter so if you d like to be part of s this interactive experience sign up today at Redmondmag com newsletters And yes I m going to use one of these solutions for my own file sync Thanks for the advice Redmondmag com Redmond May 2010 5257 ADVERTISEMENT REDMOND VENDOR PROFILE Increasing the Value of Business Data with Enterprise Search Why do you think search is important for businesses One of the main lessons we ve learned in the past decade is that search has become the point where people start when they want information This is as important in the enterprise as it is on the internet In fact IDC research states that employees spend up to 2096 of their time looking for essenti
42. ariety of configurations The success of NetSupport Manager lies in its ability to continually evolve to meet the needs of any environment Combining comprehensive multi platform support for Windows Linux MAC Solaris CE Pocket PC and Windows Mobile systems with a range of PC Management tools designed to ensure that critical IT infrastructure is available when needed most NetSupport Manager offers complete compatibility for today s business environment Planning for upgrades and the rollout of new technology is now even easier thanks to NetSupport Manager version 11 s restyled interface Auto Grouping of machines by operating system and platform provides an instant overview of your IT environment you can even identify which laptops or desktop PCs are powered by Intel vPro technology Complete integration with Windows 7 introduces Touch Screen compatibility and enhanced Task Bar operations to NetSupport Manager s toolkit www netsupportmanager com email salesQnetsupport inc com telephone 1 888 665 0808 E m NT deme ied t m a 7 l ProductReview Microsoft Seeks to Replace PBXs New Office Communications Server planned for year end release promises to address deficiencies in existing offering E By Jeffrey Schwartz ile the new version of Microsoft Office which is due out this month will make it easier for individuals to collabo rate and communicate the company is
43. at the right time Are users demanding ore streamlined and efficient ways to collaborate Are budget and other constraints Oo o0 hindering your ability to find the right solutions REDUCE OPERATING COSTS o0 9 o9 9o Fujitsu provides an end to end service offering around SharePoint from roadmap to implementation hosting and support Acceler ate ROI through rapid implementation methodology and business e STANDARDIZE IT PLATFORMS C scenario templates to reduce your implementation lifecycle 877 445 4425 solutions us fujifsu com INNOVATION THAT TRANSFORMS BUSINESS Microsoft MAXIMIZE YOUR ENTERPRISE DATABASE INVESTMENT There are several features in SQL Server 2008 that provide a tremendous return on investment For example database compression and backup compression We determined that we would save between 25K and 50K in the first year alone and increasingly save money going forward just because of the decrease in disk space needed David P Smith Chief Technology Officer ServiceU MAXIMIZE ROI AT DELL COM SQL
44. be able to contain all the new features If you don t want to change just stick to the old version rue innovation is disruptive Wanderlei Santos Chicago Ill PHOTO ILLUSTRATION BY ALAN TAO RedmondReport Chomping at the SharePoint Bit Customers are eager to get the forthcoming 2010 release of the collaboration server deployed Social networking enhancements are a key draw E By Jeffrey Schwartz e Orange County School District in Florida is among numerous organizations that hope to deploy the new Microsoft SharePoint 2010 Server the widely anticipated upgrade of Redmond s rapidly growing collaborative computing plat form that s set to be released May 12 SharePoint 2010 boasts improved search enterprise content management and bi directional connectivity to external data sources New social net working capabilities include the ability to let users create wikis additionally SharePoint 2010 has an improved devel opment environment and is easier for IT pros to administer It s also more conducive for public facing Web sites There are many features that are interesting as we begin to roll out col laboration sites and more apps that run on the portal says Michael Antonovich Orange County School District s assistant director of Web Services Indeed this month s SharePoint Office launch is arguably the corner stone of the Microsoft 2010 release wave It s joined by other key
45. bs are going to be concentrated in different areas I The first skill that s here to stay Is network engineering The very nature of cloud computing means organizations will be absolutely dependent on think it makes a lot of sense to hone your skills in preparation for the inevitable changes that are coming to IT That way you can be ahead of those who remain unprepared Which IT skills are going to be needed over the next decade or so The key is to consider what we know about cloud computing and about how businesses IT needs are changing There are three areas in which I predict IT growth Network Engineering The first skill that s here to stay is network engineering The very nature of cloud computing means organizations will be absolutely dependent on Internet connectivity If connectivity to the outside world fails the entire cloud computing model breaks I expect organizations to hire network engineers whose job it will be to ensure optimal connectivity Network engineers will have to focus on ensuring network reliability as their top priority I also expect traffic shaping to become a hot skill for engineers In case you aren t familiar with traffic shaping it s a science that deals with prioritizing network bandwidth On any network there s a collection of applications all competing for a finite amount of bandwidth This isn t a problem if there s plenty of bandwidth to go around but in a cloud computing environm
46. chnology Microsoft through its Business Productivity Online Suite BPOS offers hosted versions of Exchange SharePoint and Office Live Meeting Then there s Dynamics CRM Online with much more to come Why the Cloud So why is there such interest in cloud computing among big software vendors Cloud computing is a sweet deal for software companies and here s why Applications that reside in the cloud are almost always subscription based This means an organization that subscribes to such a plat form will never fully own a license for hosted apps Even though the subscription fee may be small organizations may well pay more over time than they would have if they had simply purchased licenses for the application Besides the increased revenues that the cloud model delivers software publishers also save money on support costs Because the publisher hosts the application itself it can be sure that the application is configured correctly and is running on reliable hardware These factors are likely to eliminate the vast majority of the support calls the software publisher receives There s another reason why cloud computing is such a big moneymaker for software publishers When an Redmondmag com Redmond May 2010 gt Cloud Survival Skills application is hosted it becomes almost impossible for it to be pirated It goes without saying that some organizations that would ve taken a few liberties with software licenses will b
47. ckup application that also happens to have a synchronization feature The similarities end there though Unlike Figure 2 SyncBackPro lets you simulate a synchronization before executing it 24 May 2010 Redmond Redmondmag com also offers a light version of the software called SyncBackSE that s available for 30 Grig Software Synchronize It Another synchronization application that s worth looking into is Synchronize It from Grig Software Unlike Secure Sync and SyncBackPro I consider Synchronize It to be a true synchroni zation utility rather than a backup application with some synchronization features built in Synchronize It is jam packed with so many features that listing them all here would be next to impossible Sadly though Grig has implemented these features in a less than intuitive way I found Synchronize It to have a notable learning curve To give you a better idea of what I m talking about take a look at Figure 3 Toward the bottom of this cluttered dialog box you ll notice an Action drop down list The available actions include Synchronize Update Target Backup and Duplicate In my opinion Update Target Backup and Duplicate all sound like different phrases for the same basic operation but in Synchronize It this 1s not the case After wading through the exten sive online help files I was able to determine that there are some critical differences between these features I wish the UI w
48. d completely intuitive If you endup data at risk You can see the results of efficient and reduces storage costs needing help 2BrightSparks providesa such a simulation in Figure 2 Secure Sync doesn t seem to offer any comprehensive user manual that s It s hard to argue with the price of a traditional documentation for its nearly 400 pages long SyncBackPro license A single license product but it does have a series of video Whether you want to perform a sells for a mere 49 95 with upgrade based tutorials on its Web site These backup or synchronize your data you licenses priced at 19 95 2BrightSparks tutorials are more than adequate because the Secure Sync software is fairly intui tive Figure 1 shows what the backup Sae bries Date Time aen interface looks like As you can see LOER b Copy bo Dati 11 25 2005 6 17 3 amp Copy io Duta SpiderOak has tried to make the backup amp 11 21 2005 6 30 20 H Copy to Data i O Duta process easy for end users but those EN users wanting more control over the data 11 28 3905 LLL b Copyto Data that s backed up can click the Advanced button to access a hierarchical view of the file system and select the individual resources that they want to back up 12 955 95 12 5004 3 308 T8KB 38 785 2BrightSparks SyncBackPro The next file synchronization applica tion I tried was SyncBackPro from 2BrightSparks Like Secure Sync SyncBackPro is primarily a ba
49. dmondmag com 8 If the computer has applications stored on multiple volumes repeat steps five through seven entering the appropriate drive letter when running the automatically generated executable rules wizard 9 Once rules have been generated you can export the list of allowed applications in XML format by right clicking on the AppLocker node then clicking on Export Policy You can also import these rules into other GPOs such as those that apply to portable computers in your organization By applying these rules through policy you can limit the execution of applica tions so only those present on the reference computer are allowed 10 When configuring AppLocker you need to ensure that the Application Identity service is enabled through the services console and that executable rules are enforced through policy If this service is disabled AppLocker policies won t apply Although you can configure service startup status within Group Policy you must limit which users have local administrator access so that they are unable to circumvent AppLocker You enable executable rule enforcement by right clicking on the Computer Configuration Windows Settings Security Settings Applica tion Control Policies AppLocker node and then clicking on Policies Enable the Configured option under Execut able Rules and then ensure that Enforce Rules is selected Hopefully this has helped you learn how to implement and recover Bi
50. e 7 meaning program mers will have to create applications using managed code and using only the C programming language Providing no backward compatibility meaning Windows Mobile 6 x apps even Microsoft apps like Microsoft Office Mobile 2010 need to be rewritten to run on the new mobile platform Requiring all application downloads and purchases to go through the Windows Phone Marketplace Windows Phone 7 is an example of the Softies newfound love of design I m not convinced that it will be as useful on a phone I am also not con vinced that Windows Phone 7 is going to attract as many or as large a variety of developers and applications as the iPhone and Android platforms have managed to do Do business users really want to see a broken heart icon show up every time they delete a tile from their Windows Phone 7 device Do they really want Facebook and Twitter integration more than they want CRM data that they quickly cut paste and mail to their bosses Microsoft execs say they ve done a lot of research and are targeting Windows Phone 7 at life maximizers who want to use a single phone for both work and play I say Who are these I m not convinced that the company made the optimal set of bets with Windows Phone 7 overshadowing the usual Microsoft values like backward compatibility developer tool choice and partners as king It s also an example of Microsoft execs letting their iPhone envy triumph
51. e forced to properly license their software once it becomes available as a cloud only solution All this being the case it s safe to say that cloud computing isn t going to go away any time soon Cloud computing might be one of the best things to ever happen to software publishers but it isn t exactly the best thing to ever happen to IT professionals Sure cloud computing has the potential to make your job easier but it also has the potential to eliminate your job IT Must Adjust For many years now IT has had a reputation for being a high demand profession in which skilled professionals can earn an above average income Unfortunately I believe IT professionals are on the verge of becoming obsolete If the obsolescence of IT professionals seems ridiculous think about other industries the cloud has fundamentally changed In the 1980s one of the surest ways to get rich was to open a video store The VCR had just gone mainstream and home video rentals were a hot new trend Today you d be No D your jok 2 easier but Al eliminate y your jok hard pressed to even find a video store that s still in business Instead movies are delivered through the mail or over the wire from the cloud In some ways the same thing has happened to the video game industry Video games have always been something of a soclal experience I remember sitting around the living room as a kid and playing Nintendo with my friends Console games still e
52. ead to massive inefficiency and server sprawl with the majority of servers today running at only 1096 utilization As the computational demands of a smarter planet continue to explode this sort of inefficiency has become a problem a problem IBM engineers have now solved The 5th generation of Enterprise X Architecture from IBM featuring the Intel Xeon Processor 7500 Series lets you add memory independently of the processor As a result IBM ex5 systems can leverage 6x more memory than current x86 servers reduce storage costs by up to 9796 and cut licensing fees by 5096 A smarter business needs smarter software systems and services Let s build a smarter planet ibm com systems ex5 vis 69 i jut inside Powerful Intelligent 1 McKinsey study htto www datacenterknowledge com archives 2009 04 1 5 mckinsey data centers cheaper than cloud 2 Comparison of IBM System x3850 X5 MAX5 with total 96 DIMMs x 16 GB for total 1 5 TB of memory vs IBM System x3850 M2 with 32 DIMMs x 8 GB 256 GB Comparison of processor based licensing fees on current Generation 4 processor systems with 64 DIMMs vs the IBM System x3690 MAX5 IBM eXFlash technology would eliminate the need for a client to purchase two entry level servers and 80 JBODs to support a 240 000 IOPs database environment saving up to 97 in server and storage acquisition costs IBM the IBM logo ibm com X Architecture Smarter Planet and the planet icon are trad
53. ed workflows into a sandbox SharePoint 2010 allows for external connections to running workflows so users can send and receive external events from workflows making it easier to communicate with running instances says Phillip Wicklund a senior SharePoint consultant with Wayzata Minn based RBA Consulting Deploying customizations into SharePoint takes a pretty deep under standing of how things work in SharePoint 2007 but in SharePoint 2010 a lot of it is abstracted All you really do is hit F5 and it will do the deployment for you Wicklund says 12 May 2010 Redmond Redmondmag com Business Connectivity SharePoint 2010 will also be popular for those who want to integrate it with external data sources such as informa tion from SAP Oracle or Lotus Notes as well as with custom applications With SharePoint 2007 developers could pull data from those systems but with the new Business Connectivity Services or BCS which replaces the Business Data Catalog there s com plete read write data access The Search Is On The new search features in SharePoint 2010 could prove compelling The search engine moves away from traditional links by rendering visual results offering more personalized information based on context and allows users to search from their PCs browsers or mobile devices SharePoint 2010 will be available with Standard or FAST Search The latter will be an option for enterprises looking f
54. emarks of International Business Machines Corp registered in many jurisdictions worldwide A current list of IBM trademarks is available on the Web at www ibm com legal copytrade shtml Intel the Intel logo Xeon and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the United States and other countries O International Business Machines Corporation 2010 uw 4 by Doug Barney THE INDEPENDENT VOICE OF THE MICROSOFT IT COMMUNITY REDMONDMAG COM MAY 2010 n VOL 16 NO 5 Editorial Staff Communication Breakdown hile Redmond magazine sounds like it s based in Redmond Wash we re actually bi coastal Half the staff luxuriates in sunny Irvine Calif while I and a few others call Framingham Mass home So recently it was just a short hop from here to the Waltham Mass offices of Microsoft where I enjoyed the Customer Immersion Experience and saw many 2010 products up close and personal They even made me use them On the sixth floor of a typical upscale suburban New England office building Microsoft regularly entertains customers showing how new and unre leased products work in the real world That s where I got a hands on demo of Office 2010 SharePoint 2010 Exchange SQL Server and Office Communications Server OCS all working together And with Outlook 2010 there s tight integration with social media such as Facebook Twitter and job searchers delight
55. en it comes to compliance audits the stakes are extremely high The process of becoming compliant with various regulations can sometimes cost organizations millions of dollars and require several months of concen trated effort With so much at stake you can bet most organizations are not going to trust their compliance initiatives to someone who merely claims to know about compliance they re going to demand proof As such compliance related IT certifications should become highly coveted over the next few years This theory isn t purely speculative I happen to know that the staff at FISMA Center an organization that certifies individuals as Federal Information Management Security Act Compliance Practitioners is barely able to keep pace with the demand for training and certification Prepare Today for Tomorrow I don t believe today s IT skills will become completely obsolete Hosting companies for example will have to hire employees to manage and maintain the hosted services There will also be organizations that refuse to outsource their IT operations Even so network administration jobs are going to be in short supply and it makes sense to focus on some of the skills that will be needed going forward R Brien Posey MCSE is a Microsoft MVP and the co founder and vice president of research at Relevant Technologies which specializes in IT best practices and information security Posey is the author of many technical articles for o
56. enerally you re going to want to Select the Parent Content Type from Document Content Types and set the Parent Content Type to Document Click OK to create your new custom content type Plan OUTSIDE THE BOX for an Easy and Flexible Upgrade to SharePoint 2010 Database Attach Upgrade In Place Upgrade Metalogix O O OOOOOOOOOOOO SharePoint 2010 s out of the box upgrade options leave gaps that can cost you time and money The In place and Database Attach upgrade options don t provide the flexibility you need to take full advantage of the new features and capabilities of SharePoint 2010 and give only limited support for 32 bit source systems You need to go beyond the box with Metalogix s SharePoint Site Migration Manager 2010 With it you can get SharePoint 2010 into production faster than you think SharePoint Site Migration Manager 2010 from Metalogix gives you gradual granular migration support with no service pack or hardware prerequisites allows content owners to control the migration and lets you define when specific content is migrated With it you can re organize and re template SharePoint sites and lists easily as you migrate Microsoft GOLD CERTIFIED Partner SharePoint Site Migration Manager 2010 is 10096 Microsoft compliant It interacts with SharePoint only through supported APIs with no direct writes to the database and supports SharePoint Online Look outside the box with ShareP
57. ent in which every application and possibly even the operating system is being hosted remotely efficient bandwidth management becomes critical The idea behind traffic shaping is that while every packet of data needs to be delivered some packets are more time sensitive than others Packets related to things like video conferencing or VoIP must be delivered as quickly as possible to avoid jitter Packets related to something like a PowerPoint presentation on the other hand are a lot less time sensitive Traffic shaping leverages technologies such as Quality of Service to reserve bandwidth according to an application s Internet connectivity U needs The trick is to do so in a way that doesn t rob any of the applications of the bandwidth they really need This is where network engineers come in If every single application is hosted then Internet band width saturation becomes a very real possibility Traffic shaping will be essential to ensuring that hosted applica tions will be able to run in parallel without suffering from network bottlenecks Security Another major growth area will be security and most organizations security needs will likely change After all server level security becomes a non issue if you don t have any servers Likewise desktop security at least by its current definition will go away as bloated desktop OSes give way to bootable thin client components Having said that network security w
58. entation is vital The Standard Operating Environment Lowering network operating costs with efficiencies of scale There are multiple dynamics that make up overall network efficiency but because file fragmentation is created at the operating system level regardless of how much free space is on the disk its negative effect on the network is one of the most basic issues to resolve When not effectively addressed fragmentation creates a perfect storm of network issues including e Slow read write times e Slow backups and higher failure rates e Database lockups e Shorter productive disk life e Spiraling energy costs e Slow boot time e Increased Help Desk traffic e Higher re imaging costs Resolving fragmentation at base image level would clearly make sweeping improvements to a network lowering the cost of ownership with the least amount of effort The Economics of Fragmentation Prevention Diskeeper 2010 technology and the system performance paradigm Eliminating fragmentation as a performance issue has four basic goals the reestablishing of optimum performance reliability longevity and energy efficiency in every system on a network Only Diskeeper 2010 includes the innovative functionality to achieve this It prevents up to 85 of all fragmentation before it occurs e It eliminates any remaining fragmentation in real time e It quickly handles even the largest mission critical enterprise servers tis completely auto
59. ertain files This is handy if you need to ensure you have copies of specific documents music or photos available while you re on the go ZumoDrive provides more than cloud based storage The service also allows for file sharing browser based file access and of course synchroniza tion between multiple devices As with most cloud based services ZumoDrive s pricing is subscription based The company offers a free IGB plan so you can try the product The free plan can be extended to 2GB if you work your way through the ZumoDrive Redmondmag com Redmond May 2010 25 _RedmondRoundup Date modified TLOMNxKISTIHAAM N E Secumens E Pictures i Musk Mor Foldert amp Computer id Floppy Disk Drive EL Local Disk C4 ol DD Drive r ba dumga 7 Network A Centrel Panal Figure 4 ZumoDrive mounts seamlessly as a network drive Dojo The Dojo is a sort of online tutorial that teaches you how to per form various tasks using ZumoDrive As you master each task you re rewarded with additional free storage space The Dojo seems to take the place of traditional documentation For users requiring more than 2GB of storage space subscription prices range from 2 99 per month for 10GB to 79 99 per month for 500GB My only complaint about ZumoDrive has to do with the company s Web site Although ZumoDrive claims to work on platforms other than Windows I was unable to locate download links for anyt
60. es third party applications and even T SQL itself The example I show here happens to be a handy little syntax and because you may encounter code or situations that call for it it s good to know how PIVOT works You can even build more complex pivots using the PIVOT operator So go forth and play with this a little Happy coding Continued from page 16 msiexec i fpseO2_win2008_vista_rtm_ENG msi Installing FPSE 2002 on Windows Server 2008 requires that you install several additional services and features If you don t want these services installed then you won t be able to install FPSE 2002 it s all or nothing Visit tinyurl com yl9htlp for more information on system requirements and the list of services that will be installed on your server Note Microsoft FPSE has a history of known issues so be careful and back up your server before installing it R Advertisement 3 TOP TECH INITIATIVES TARGETED BY FRAGMENTATION s CIOs and IT managers gear up to meet the challenges of stringent budgets and new tech initiatives how they handle file fragmentation will contribute to the difference between cost effective consolidation and increased overhead Virtualization Efficiency vs fragmentation on top of fragmentation The hard disk is the slowest component of a system s throughput File fragmentation only makes the bottleneck worse In the case of virtualization the disk must do far more it must support nume
61. es document management and collaboration features What s nice is there s no infrastructure to purchase and it s available to all of our employees in different loca tions without VPN access Lugo says Before that we had a SharePoint portal at the office but we didn t use it much because the VPN access was too slow for our employees out of the office Given the Web only nature of the product BPOS setup was simple 20 workers were up and running in about a day All Lugo had to do was set up the user accounts through a HOME SERVER TO THE RESCUE endless home e mail account called it a night and planned on leaving my home PC running called the machine Bigred The case had two strips of red lights and what the heck l don t have to follow the corporate naming standards at home I awake Saturday morning to my cup of coffee and head back to Bigred s keyboard It s time to catch up with my corporate e mail But Bigred is off Maybe a Microsoft update caused a reboot or shutdown Press the power button and nothing Bigred is dead The Molex connector for the power on the motherboard had melted Backup I am not worried at all Bigred was part of my home network that runs Home Server What is that you ask Probably one of the most guarded secrets from Redmond Home Server is based on Windows 2003 Server with some pretty cool and important added features One of those is backup of all machines attached to the Home Serve
62. ft is taking a lot of risks with its forthcoming Windows Phone 7 platform To be fair the Softies had little choice Windows Mobile has steadily lost significant market share to the point where it s no longer a major player in the overall market for smartphones The question is no longer whether Microsoft should ve embarked on a Photon reset which officials acknowledge the company did a year ago when it went back to the drawing board with the coming version of the Microsoft mobile platform Instead the real question is whether Microsoft has made the right bets in the mobile space Microsoft is still trickling out infor mation about Windows Phone 7 But here s a list of some of the biggest risks the company is taking e Tailoring the platform for con sumers rather than for business users Yes I know the Softies are saying Windows Phone 7 devices are being designed for both consumer and busi ness use But the reality is that Windows Mobile 1s Microsoft s enterprise mobile play and Windows Phone 7 is its consumer play Going with an entirely new and far more locked down UI known as Metro which Microsoft pioneered with Media Center and the Zune HD Deciding against providing cut and paste functionality in the first release of the Windows Phone 7 platform e Opting against enabling multitasking for third party applications e Selecting Silverlight and XNA as the development environments for Windows Phon
63. g the miracle of pipe lining that same Windows PowerShell expert can string together a series of cmdlets elegantly feeding the output of one cmdlet into the next all the way down the pipeline to some con cluding result Yet with all its elegance and power why aren t more IT professionals embracing Windows PowerShell today If it is possible and indeed it is to accomplish so much with so little why aren t more IT pros lining up in took a step back from the Microsoft messaging as well as from much of its aficionados online content To best explain its capabilities to students we needed to determine what Windows PowerShell is at its core Absolute Precision When we looked at the scripts the scripting suggestions and the scripting constructs that you can find virtually everywhere on the Internet these days Jones and I realized that Windows PowerShell s problem is that to the uninitiated it s a scripting language But in fact it s not This misperception is not a good thing Think for a minute about how IT neophytes perceive scripting languages Solutions like batch KiXtart and VBScript are all widely considered to be some of the most historically sig nificant Windows scripting languages While powerful in their own right for today s freshly minted IT professionals these languages are too complicated too difficult to learn and a potential source of catastrophe if not wielded with absolute precisio
64. h the Add Data Recovery Agent wizard which I ll dis cuss shortly To use the wizard though there must be a DRA certificate avail able on an accessible file system or published in AD Computers that host the Active Directory Certificate Services role can issue the certificates When you have to recover data a user account that has the DRA certifi cate installed locally will be unable to unlock the BitLocker protected volume You can access the Add Data Recovery Agent wizard by navigating to the Computer Configuration Windows Settings Security Settings Public Key Policies node right clicking on BitLocker Drive Encryption and selecting the Add data recovery agent option To use BitLocker with a DRA you must also select Enable data recovery agent in the Choose how BitLocker protected operating system drives can be recovered policies as well as in the fixed data drives policy where appro priate You can use both DRA and AD key password backups for the recovery of the same BitLocker protected volumes while users will quickly make the IT department aware of a missing laptop computer they don t feel the same urgency when a USB storage device that may contain gigabytes of organiza tional data has gone missing BitLocker To Go is a new feature introduced with Windows 7 It lets you protect USB storage devices in a way similar to what BitLocker offers for OS and fixed drives Through Group Policy y
65. have SyncToy scheduled to run at log on andlog off to make sure I catch everything Powell built the server using old parts he had lying around keeping costs to less than 400 T won t argue that my setup isn t quite as slick as pushing out a GPO from my domain controller to automatically configure folder synchronization on my client machines he says But I do think my solution comes close enough to call it enterprise like and the price is certainly tough to argue with Home Server Fen Last year reader Antonio que 4 Checa set up a Windows T Home Server for personal files The server holds program installers photos videos and other items Checa wants to access no matter S ER where he is o ER Administration is Dun and the number of available plug ins for it allows me to leave it downloading files all day or performing other tasks without too much overhead ra he explains 5 i The server offers a DNS name allowing Checa tO access files on shared directories remotely The box even auto configured the required ports on my Universal Plug and Play enabled NAT router so far it s been a breeze working with it he reports proudly But that s not the whole story The major problem is actually having on my laptop wherever I travel my music and important pictures since if I use the Windows Home Server approach completely I would have to have two copies of my information one on the server
66. he docu ments that they need all comes down to SharePoint s search engine Therefore it makes a lot of sense to look at some ways in which SharePoint can be tuned to provide better search results Share Metadata Tags When SharePoint indexes a document library there are two distinct ways that can be performed As you would expect SharePoint indexes the content of each document in the library The other thing it indexes are the document s metadata tags In case you aren t familiar with metadata tags they re essentially attributes that are pinned to a document For example Microsoft Word 2007 automatically associates several metadata tags with its documents If you click on the Microsoft Office Orb and then select the Prepare Properties commands from the resulting menus you can see several different document attribute fields that can be populated The contents of these fields become the docu ment s metadata In my years of working with SharePoint I ve found that a lot of organizations don t bother using metadata tags with their documents Although SharePoint doesn t force you to associate metadata with your documents Microsoft designed SharePoint to index metadata tags for a reason Experience has shown that populating metadata tags can go a long way toward improving search results In order for document metadata to play a useful role in the indexing process we need to do two things First we need to require use
67. he public sites using SharePoint Duran says Honing in on Workflows SharePoint has much improved options for helping organizations enhance the automation of business according to Microsoft Developers can use the APIs associated with FCI to create custom file classification extensions as well With social networking trends and all this unstructured content being created it s more of a challenge to manage that file data says Joel Garcia Microsoft senior product manager for Windows Server who s focused specifically on file services Some of that challenge is deciding what file data is actually relevant to move into a more collaborative environment like SharePoint FCI lets users classify their data and then apply a policy for how that data is managed For example that could mean how the data is stored and retained or how personally identifiable information data such as a Social Security number is handled Garcia explains J S processes SharePoint 2010 comes with out of the box workflows that can be plugged into certain processes These workflows include common operations such as approvals and reviews according to Microsoft Power users can create their own workflows with SharePoint Designer and Visio Workflow Designer which create business process diagrams stored in the Process Design Reposi tory SharePoint 2010 lets developers using Microsoft Visual Studio 2010 deploy custom code bas
68. hing other than the Windows version As I said earlier though ZumoDrive is marketed as a consumer application so it could be that the company has tried to make things easy on its customers by automatically detecting the OS version and providing the appropriate version of the software for download Wuala Like ZumoDrive Wuala is a cloud based storage application As with all of the other applications I ve reviewed the installation process 1s simple Given that Wuala uses cloud based storage you re required to create a free account which comes with 1GB of space You can earn an extra 250MB of free storage for every friend you invite to join Wuala up to a maximum of 3GD As you d expect Wuala s pricing model is subscription based Prices range from 25 per year for 10GB to 1 000 per year Khung Dacumesi e ot ORR E org grid storage technology Data resides in an encrypted state on other subscribers hard drives This approach is similar to that used by torrents which is why the price for storage is so inexpensive So what about features As you can see in Figure 5 the Wuala interface is pretty simple As such it doesn t include any true file synchronization features Instead the software is pri marily designed for backing up and restoring applications and for remote access to files Everything considered I found Wuala to be light on features although I did like that the software offers cross platform
69. ich specializes in IT best practices and information security Posey is the author of many technical articles for online publications and bas also written numerous white papers MAGAZINE Vet A amp amp Content provided by TechNet Magazine y a Am a Microsoft s premier publication for IT Professionals Windows 7 Security Tips Keep your files safe with BitLocker and AppLocker 8 By Orin Thomas here are several obvious basic steps to securing a computer Keep it current with the latest operating system and application updates ensure you ve installed the latest anti spyware and anti virus software and use complex passwords changing them regularly In this article I ll cover some security tips that go beyond these basic strategies and help you better utilize the security features of Windows 7 Prepare for BitLocker One of the most notable security improvements in Windows 7 is in BitLocker the technology for hard disk encryption and boot environment integ rity protection that debuted in Windows Vista In Windows 7 the Enterprise and Ultimate Editions include BitLocker The technology ensures that unauthor ized users can t recover data from the hard disk drives of a stolen or lost laptop as long as the computer was powered off when it went missing One challenge BitLocker presents however is recovering data after a hardware failure that locks protected volumes So although BitLocker
70. ill become vitally important even more so than it is now Not only will orga nizations have to prevent packet sniffing on the network they will also have to take measures to prevent denial of service DoS attacks Bandwidth saturation has the poten tial to be the Achilles heel for cloud computing so a DoS attack could prove to be crippling Additionally as cloud computing becomes more preva lent Public Key Infrastructure PKI will play a more important role in IT security PKI is nothing new its been widely used for years The reason why PKI will increase comes down to trust For example if you install an applica tion onto one of your servers you have a natural tendency to trust that application because you re the one who installed it You also know that the application is running on one of your servers which you also trust on a trusted private network In a cloud computing environment all of the applications are hosted in different places and trust becomes more of an Redmondmag com Redmond May 2010 41 Cloud Survival Skill issue Network administrators are going to expect remote servers to prove their identities so that admins know workstations aren t being redirected to a malicious server Likewise there s going to be an expectation for all remote applications to be digitally signed as a way of verifying that code hasn t been tampered with Eventually hosting providers are going to expect subscribers to p
71. ince w are a small startup Nomadesk is a perfect option MCSE Jesper Bockfeldt was also looking for a solution suited for small shops Bockfeldt has clients that aren t just small 32 May 2010 Redmond Redmondmag com By Doug Barney they re one man shops Yet most have multiple machines so these shops still need a way to synchronize them That s where Dropbox comes in This service is free for the first 2GB and then goes to 99 for 50GB and 199 for 100GB The system synchronizes your machine s folders be they PC Mac Linux or iPhone to the Dropbox repository While Dropbox will place an icon in the system tray Bockfeldt likes to put the Dropbox folder in the root directory so it s easy to find he says Dropbox has come in handy on more than one occasion I used it when I went backpacking for a month where I always have a computer if I have to support my customers Bockfeldt explains I scanned my documents such as pass port Visas driver s license and health insurance and have it on my computer Should I lose all my belongings then my lifelines Dropbox on the Net Microsoft Live Mesh Not surprisingly quite a few Redmond readers use Microsoft solutions John Macek owner of JM Consulting is one of them Macek s need is fairly simple synchronize the laptop that he uses for customer calls with his desktop so that he can access spreadsheets and documents regardless of which
72. include your first and last name city and state If we use it you ll be entered into a drawing for a Redmond T shirt 10 May 2010 Redmond Redmondmag com Microsoft has lost touch with reality This is the problem with monopolies I as a consumer have no choice but to use their products I could use OpenOffice or another open source solution but then I d have to format my files to be compatible with Microsoft products which everyone else uses Computers were supposed to make life easier When folks found that they could make bundles of money by capturing a market computers became profit engines for the companies and the end user was forgotten Robert T Kambic Baltimore Md Defending the Ribbon Based on the fact that Barney only received 30 letters with no statisti cally correct sampling I m not sure I agree with his conclusions You re more likely to hear from angry unsatisfied users rather than the happy majority who actually like the Ribbon For the record I based this statement on my opinion not a scientific poll From what I know the Ribbon wasn t created by Microsoft alone it was the result of extensive usability research Also complaining a UI has changed is pointless and I m actually glad that at last something new came to the Office UI If people spent a fraction of the time they spend complaining instead learning the new features they d gain more Classic menus wouldn t
73. ings it s mainly intended as a bare minimum feature for smaller environments that simply can t afford any kind of third party recovery tools There s been a lot of community based hype around the feature that builds it up to be something it isn t So If all new AD objects are created at a certain time in your organization then scheduling a directory backup immediately after those changes are made can help ensure that nothing is ever subject to loss backed up immediately after any changes are made as well and GPOs are more commonly managed under change control processes making it easier to add a specific backup step to that process I have mixed feelings about the recycle bin feature in Windows Server 2008 R2 Microsoft doesn t intend it to if you do opt to use the feature just take the time to understand what it really does and doesn t do Also given its requirement for an all Windows Server 2008 R2 domain it will be some time before the feature is even an option for many companies Should Microsoft have included more robust AD GPO recovery capabilities in the native toolset I don t think so The reason so many vendors play in this space is that each one approaches the problem somewhat differently and each resulting solution works slightly better for different types of companies A more robust native solution from Micrsoft would kill off the third party diversity and force us into a one size fits all appro
74. ion Interpreting mapped information gt Location Map Field Shows the location of becomes straightforward highlighting trends not each SharePoint list on a map evident through spreadsheets and tables Map Web Part Quickly deploys rich No programming is required interactive Web applications in SharePoint For more information or to download ArcGIS Mapping for SharePoint visit www esri com agm4sp eeu cere E S R GOLD CERTIFIED Partner Copyright 2010 ESRI All rights reserved ESRI the ESRI globe logo ArcGIS and www esri com are trademarks registered trademarks or service marks of ESRI in the United States the European Community or certain other jurisdictions Other companies and products mentioned herein may be trademarks or registered trademarks of their respective trademark owners SharePoint you see in the figure are all ASPX files ASPX files are Active Server Page files that are used internally by SharePoint In other words SharePoint is returning elements from the server s own file structure among the search results Because ASPX files have nothing to do with what we re looking for it would be prudent to configure SharePoint so that it doesn t display them among the search results To do so click the Site Actions button and then choose the Site Settings option When you arrive on the Site Settings page click the Search Visibility link which is located in the Site Administration section The Search Visibilit
75. ion for multi object recovery such as recovering an entire organizational unit OU and all of the user accounts that were in it Group Policy backups are handled separately You can manually use the Group Policy Management Console to back up GPO files or in Windows Server 2008 R2 you can use the Group Policy Windows PowerShell module to run backups either manu ally or as a scheduled task The native restoring associated groups OUs or other items as needed to completely recover an object Many can recover individual attributes too enabling you to undo specific granular changes without rolling back others The same manufacturers often offer a GPO recovery product as well and typically provide features to compare a backed up GPO to a current version sometimes even across domains This can enable single setting recovery making it easier to undo a specific change more easily Many of these tools rely on point in time backups meaning that an object My feeling is that all but the very smallest organizations should supplement Windows native capabilities with a commercial AD GPO backup solution tools don t really provide a means of comparing backups to current versions of a GPO meaning that it s absolutely critical that you document GPO changes and backups Going Commercial There has long been a market for commercial solutions in this space Quest Software NetPro Computing which is now part of Quest NetWr
76. is the Update Target mode Synchronize It isn t a bad application but the interface needs some work However the product does have an impressive set of features You can synchronize data sources and there are many options for comparing data using various methods Although Synchronize It isn t an IT security product I think that some of the comparison features may be handy to security professionals especially because diffing is a technique commonly used to track malware A license for Synchronize It sells for 19 with volume discounts available Grig Software also offers bundles that include Synchronize It and a companion product named Compare It for 39 ZumoDrive Although primarily marketed as a con sumer application ZumoDrive seems to be the most practical of the synchroni zation applications that I reviewed ZumoDrive is a cloud based storage application that allows data to be syn chronized across PCs and mobile devices Currently there are versions of ZumoDrive for Windows Mac OS X and Linux as well as for the iPhone What I like about ZumoDrive is that it integrates seamlessly into Windows Figure 4 p 26 shows ZumoDrive has mounted as a network drive This means you can use the data on the shared drive as if it were stored locally Of course sometimes Internet con nectivity simply isn t available As such it s possible to use shortcut menu options to tell ZumoDrive to keep local copies of c
77. ix Symantec and dozens of others all offer tools to bring AD objects back from the dead These tools typically offer a graphical recycle bin either as a stand alone tool or as an add in to the Active Directory Users and Computers console They perform single object recovery without taking a DC offline and most will help coordinate dependencies like that s created and deleted in between backups may not be recoverable In those cases the Windows Server 2008 R2 recycle bin feature which doesn t rely on backups but rather copies objects as they re deleted can be a complementary recovery technique The Decision My feeling is that all but the very smallest organizations should supple ment Windows native capabilities with a commercial AD GPO backup solution If you have more than one or two DCs then the added flexibility of online single object recovery through a GUI not through AD restore mode or a low level tool can save an incredible amount of time when a recovery is necessary Look for tools that support frequent backups or Redmondmag com Redmond May 2010 51 DecisionMaker that can be incorporated into a change management process For example if all new AD objects are created at a certain time in your orga nization then scheduling a directory backup immediately after those changes are made can help ensure that nothing is ever subject to loss GPOs can be replace more robust third party offer
78. ization is going to use BitLocker To Go you ll need some sort of data recovery strategy in the event of lost or forgotten passwords Configuring BitLocker To Go recovery is similar to configuring BitLocker recovery In this case you ll have to set the Computer Configuration Windows Settings Administrative Templates Windows Components BitLocker Drive Encryption Removable Data Drives Choose how BitLocker protected drives can be recovered policy You can have the BitLocker To Go passwords backed up to AD where RE hiugspgzEURIT DIVE UF THE SVIGRU DUA COMMUNITY Ba Each month Redmond magazine gives you practical tips product reviews interviews news analysis and strategic insights into all things Microsoft Join our community today by becoming a subscriber to Redmond magazine To begin receiving Redmond magazine for FREE please visit Redmondmag com subscribe Redmond MAGAZINE Vet they ll be available to administrators who have access to the ADUC console and the computer account where the device was originally protected You can also configure a policy so that data is protected with a DRA allowing a user assigned the DRA script installer or DLL will still be covered by the original rule To create a reference set of AppLocker policy rules you can apply to other computers perform the following steps 1 Configure a reference computer running Windows 7 with all the App
79. know UBDR Gold was the first Windows backup software to offer physical to virtual P2V based disaster recoveries This allows organizations to recover a server and emulate it virtually 100 in as little as 15 minutes Did you know UBDR Gold also supports virtual to virtual V2V and virtual to physical V2P recoveries This provides users with every available virtual disaster recovery option at their fingertips Separate software is not required to restore virtual machines to physical machines You can even use UBDR Gold as a migration tool The software recently added a new industry first to its already impressive resume the ability to create native VMware ESX or GSX Virtual Machine Disk VMDK files in one simultaneous operation while backing up a live system The new VMDK Agent greatly simplifies a disaster recovery by eliminating the conversion required by a typical P2V operation Another unique feature of the agent is that subsequent differential and incremental backups can automatically update the base VMDK file This produces more up to date data in case a quick restart is needed With a virtual machine on standby an administrator would simply create a VM using the new VMDK file and boot to perform a complete disaster recovery operation And there is anew addition to our VMDK Agent for UBDR Gold direct write to ESX datastores ULTRABAC SOFTWARE CREATING BIG SURPRISES IN VIRTUAL BACKUP AND DISASTER RECOVERY WWW ULTRAB
80. l likely take less time than you think Once everything is complete you can boot your new system normally nothing will change Windows 7 behaves exactly as it did before The one noticeable migration What you end up with is your old desktop OS with all its pro grams and one new completely blank OS For someone who wants to actually take advantage of all the new things Windows 7 has to offer having the old files with their old desktop tagging along for the ride isn t all that helpful However the one thing you can do in that case is use the new interface to easily copy over files you need You can cut and paste from the old desktop to the new one And if you forget to move some files over well they re still right New computers will likely all ship with Windows 7 and old computers won t last forever difference will be a little Zinstall icon that appears on the desktop and in your system tray Clicking on that will allow you to switch to old desktop And it really means it When you select that button presto you ll be looking at your old computer and good old XP Every thing about the old desktop s behavior will be the same as before All your photos documents and even personal files will still be there and they ll be in the exact same locations as before Powerful Performance Everything we tried worked from the old desktop Outlook brought in e mail Photoshop was able to edit and save documents Ge
81. matic and invisible e It includes a centralized graphical administration console scalable to any size In reality since every system fragments any global solution must meet stringent requirements or its operational overhead will negate gains Diskeeper 2010 with an edition for every Windows system from laptops to the largest mission critical enterprise servers is the only solution that increases performance and lowers total cost of ownership at the same time Diskeeper The only way to prevent fragmentation 201 Q TURCA before it happens eee lip Special Offer Try Diskeeper 2010 FREE for 45 days Download at www diskeeper com specialtrial2 Note Special 45 day trialware is only available at the above link Volume licensing and Government Education discounts are available from your favorite reseller or call 800 829 6468 2010 Diskeeper Corporation All Rights Reserved Diskeeper and The only way to prevent fragmentation before it happens are trademarks or registered trademarks of Diskeeper Corporation All other trademarks are the property of their respective owners ADVERTISEMENT RVP REDMOND VENDOR PROFILE Mimosa Systems Next Generation Archiving Solutions ho is Mimosa Systems Mimosa Systems enables enterprises to efficiently manage their unstructured and semi structured information while reducing business process costs and risk As the recognized visionary in enterprise content archiving Mimosa
82. n Their feelings aren t far from the truth With languages like VBScript we ve all heard the stories of how a few misplaced characters caused a massive deletion or of the all server reboot script that somehow got launched in the middle of the day VBScript and others weren t without their own security problems with unprotected runtime environments being automati cally installed and listening on every Windows desktop and server As a result entire industries have emerged to create management software that automates the job of the IT profes sional all without the nasty scripting interface For many the entire process of scripting has become demonized to the point at which it has even been disabled from running in the domain Administrative Automation So if Windows PowerShell isn t a scripting language then what is it I submit that Windows PowerShell 2 0 is a text based administrative automation solution Through the simple connec tion of a few key cmdlets even the greenest of IT pros can speed up the completion of the most difficult IT tasks Consider for example the common problem of adding new AD users and granting them access into one or more global groups Accomplishing that task Redmondmag com Redmond May 2010 53 Windowslinsider using the Windows GUI today requires a set of mouse clicks for each and every user created Information must be entered multiple times increasing the chance for
83. ndRoundup start by creating a profile A single screen PIERRE E CUPRUM MELE offers the option of performing a backup synchronizing two datasets using a two way synchronization or mirroring a dataset a one way synchronization There s also a Group option that allows you to group multiple profiles together so they can be assigned to the same schedule The scheduling is the one thing I didn t like Don t get me wrong it works fine What I didn t like was that synchronizations must be scheduled The software doesn t detect changes to the datasets and perform real time syn chronizations on an as needed basis It s possible however to schedule synchro nizations to occur frequently enough that it s almost like having a real time synchronization feature By far my favorite SyncBackPro feature is the simulation This feature allows you to perform a trial run of Figure 1 The SecureSync backup interface is intuitive version of each file that has been backed SpiderOak 2BrightSparks does not your backup or synchronization profile up the software only backs up the offer cloud based storage without moving any data That way you portion of each file that has changed All in all I found SyncBackPro easy to can find out about any mistakes you rather than backing up the entire file use The user interface is well executed might have made before putting any This makes the backup process more an
84. ndmag com subscribe SpectorSoft Corp www spectorsoft com Sunbelt Software 2 www sunbelt software com Ultrabac Software 17 ww w ultrabac com Western Governors University 52 54 WWwW wgu edu EDITORIAL INDEX Company Page URL 2BrightSparks 2S www 2brightsparks com Adobe Systems Inc 16 www adobe com Apple Inc D www apple com Caleido AG 22 WW w wuala com Ferrari Electronics AG 14 www ferrari electronic de en Google Inc 1 www google com Grig Software 2 www grigsoft com Hewlett Packard Co 14 www hp com IBM Gero 1 www iom com Lime Technology LLC 57 www lime technology com NetWrix Corp 5 www netwrix com Nomadesk 52 www nomadesk com Oracle Corp 1 www oracle com Quest Software Inc 5 www quest com Research In Motion Ltd 56 WWW rim com SAP AG 12 www sap com Sieena 11 www sieena com SpiderOak Inc p www spideroak com Symantec Corp 5 www symantec com VMware Inc 1 www vmware com Zecter Inc Do WWW Zumodrive com Zinstall www zinstall com SUBSCRIPTION INQUIRIES BACK ISSUE REQUESTS AND ADDRESS CHANGES Mail to Redmond P O Box 2166 Skokie IL 60076 7866 email REDmag 1105service com or call 866 293 3194 for U S amp Canada 847 763 9560 for International fax 847 763 9564 This index is provided as a service The publisher assumes no liability for errors or omissions Redmondmag com Redmond May 2010 55 ES FoleyOnMicrosoft Windows Phone 7 A Good Bet icroso
85. nerally everything was just like it was before Although the Zinstall program is pretty cool it s not exactly a true there on your old desktop which is only a click away We like what Zinstall does Seeing our old XP desktop running under Windows 7 is something akin to a magic trick especially when you can switch between the two on the fly We bench marked the new system before and after the old desktop data moved over and we found nearly identical results Zinstall is also good at keeping system resources under control If you re looking for a different way of moving files between systems or OSes Zinstall and its 89 price tag are a good deal It might take a little getting used to but it s cleverly implemented and helpful R Jobn Breeden II jbreeden 1105govinfo com directs the GCN Labs for 1105 Media s Government Computer News Redmondmag com Redmond May 2010 21 Data Synchronization Tools In a field of applications that offers a wide range of functionality two products shine By Brien M Posey en I travel I take either my laptop or a netbook which doesn t have the space to accommodate a full copy of my data I also work from my Windows Mobile phone and I have one other mobile device that I sometimes use I never know which device I ll be working on while traveling As such I find it impor tant to be able to access all of my data on a moment s notice regardless of which
86. nline publications and bas also written numerous white papers Office is in Exchange is in SharePoint is in SQL Server is in Dynamics CRM is in Windows is in The most widely used software in the world is now made for the cloud We re Find out more at microsoft com cloud Microsoft itii SharePoint performance manager SharePoint performance monitor Locating Documents In a SharePoint Irrelevant SharePoint search e fes ry results and lost documents can turn into a waste of time and money but a few simple steps will helo IT pros avoid these problems 8 By Brien M Posey n m Redmon May 2010 b Point ith SharePoint Server 2010 coming out this month Microsoft will be talking up its new search and enterprise content management capabilities Nevertheless 1f you re like many enterprises you ll be grappling with SharePoint Server 2007 for the foreseeable future before making the leap Although Microsoft Office SharePoint Server 2007 offers a variety of different capabilities it seems to be used most often in the real world as a document repository And as with any other type of document repository a SharePoint document library can become cluttered which often makes searching for specific documents a cumbersome process SharePoint 2007 offers features such as document lifecycle management that help to keep the clutter under control but ultimately users ability to locate t
87. nsurance company in Ohio _ plan with 10GB free for 5 per month Powell says a document on my laptop at portal To ease multiple configurations user configuration data can come from an Excel spreadsheet The system works great Lugo says The actual solution Stores the fiTe fh the cloud No sync to the computers is neeessary It s seamless with most files Microsoft Office 2007 opens and saves the files from its own interface as though the files were on your computer SyncBackPro Redmond reader John Terdik found an answer to syncing his My Documents and other folders with SyncBackPro from 2BrightSparks 2brightsparks com For more on data sync products see this month s Redmond Roundup on p 22 Terdik set it up so that one machine acts as a master Each eve ning all of the other related computers sync to this master Thus if I make a change to the next syne cycle it will be synced to the master system Terdik explains Then when my wife s system syncs to the master the cycle after the laptop has synced and her system will pick up the changed files All of her changed files are synced to the master and my laptop will pick them up on its next sync cycle SyncBackPro is pretty sophisticated Terdik argues supporting both backup and mirroring For example I have one backup that I run for My Documents where I copy source any changed file to a special folder destination
88. oblem Archiving as in moving content from expensive SharePoint document libraries to cheaper storage makes sense from a cost and growth management perspective It allows for the content to still be accessible for the end user while reducing the cost associated with large SharePoint farms By implementing an archiving strategy organizations also gain the benefit of improved backup and recovery times and assistance with complying with regulations and policies that can be hard to track and support These increasingly stricter compliance policies affect all content in an organization and the inevitable eDiscovery requests that will come not only require email content to be handed over but also content residing inside SharePoint farms For more information please visit www mimosasystems com spbackup to get a copy of our new whitepaper Backup and Recovery Challenges with SharePoint For more information please visit www mimosasystems com Proc Zero Hassle with Zinstall With Zinstall you don t have to leave your old desktop behind when moving from Windows XP to Windows 7 E By John Breeden o many people have decided to S skip Windows Vista altogether that trying to migrate from Windows XP to Windows 7 is becoming a common occurrence and the equivalent of a virtual natural disaster There are several patchwork programs that attempt to migrate your files and folders to the new operating system These program
89. oint Site Migration Manager 2010 from Metalogix Make your upgrade to SharePoint 2010 flexible easy and painless id your free trial of Metalogix igration Manager 2010 at alogix com ssmm2010 trial metalosix SharePoint without Boundaries 2010 Metalogix Software Inc All rights reserved Metalogix and Site Migration Manager are trademarks of Metalogix Software Inc All other brand names are the property of their respective owners SharePoint At this point SharePoint will display a page that allows you to customize the content type you ve just created You can add columns to the content type in the same way you added columns to your document library earlier In this case though the columns you add should be specific to the content type you ve just created As you add columns to the custom content type don t forget to require users to populate the various metadata fields whenever they upload a document content type whenever they upload a document You ll notice the document check in page contains a Content Type drop down list that users can use to specify the appropriate content type for the document You ll also notice just beneath the Name field there are Title and Subject fields These fields directly reflect the names of the columns that are bound to the selected content type If I were to select a different content type SharePoint would display a different set of fields Pre Filterin Search Results
90. onals still avoid the command line Even if you re no longer a hands on technical IT practitioner you ve surely got some familiarity with it The command line text based interface has been around since long before the first GUI appeared It is in fact so old that today s nth generation Windows PowerShell enabled com mand line now ships with many almost graphical elements of its own Windows PowerShell is ridiculously powerful Using today s Windows PowerShell a skilled professional can quickly craft a useful single line com mand All at once that single line can interrogate remote computers interact with Active Directory accomplish one droves to learn and make use of its ridiculously powerful capabilities I believe that Windows PowerShell has a perception problem I discovered this perception problem only recently In the past few months another of Redmond s columnists Don Jones and I have been contracted by a major software vendor to develop training on Windows PowerShell Given almost complete flexibility in designing the courseware Jones and I With all its elegance and power why aren t more IT professionals embracing Windows PowerShell today or more actions and report back with a fully manipulatable object This object can ultimately take the form of a dynamically constructed table a list of data or even an exported CSV or XML document for use in some external IT applications Usin
91. or higher end search capabilities and is the first release of the technology for SharePoint that Microsoft acquired from FAST in 2008 Both versions include improved navi gation with refined and related results according to Microsoft Other areas addressed are relevance people the ability to find individuals using algorithms associated with social net working connectivity via Microsoft Business Connectivity Services and extended scalability Meanwhile FAST Search for SharePoint was designed to utilize the SharePoint management interfaces and deployment offerings such as Windows PowerShell It also offers metadata extraction structured data searches refined searches and visual search and is much more scalable than the standard search features according to Microsoft R Jeffrey Schwartz is editor at large of Redmond magazine You can reach him at jschwartz 1105media com NetSupport Manager computing DAIBSSS ees NETWORK HURL AWARDS 2016 ac AWARDS 7055 Remote Support For Any Environment rinatisTS MEN Winner 2009 NetSupport Manager has been helping organizations optimize the delivery of their IT support services since 1989 and while the use of Remote Control software is now common place unlike 20 years ago the diverse range of platforms protocols and physical assets now in use provide PC Management and Remote Control Software solutions with the continuous challenge of being able to offer support to a v
92. ou can restrict computers in your orga nization so that they can only write data to removable storage devices protected by BitLocker To Go This increases security by ensuring that if a user does lose a removable device at least the data on it is encrypted and can t be easily accessed by unauthorized third parties The relevant BitLocker To Go policies are located in the Computer Configu ration Administrative Templates Windows Components BitLocker Drive Encryption Removable Data Drives node of a Group Policy Object GPO These policies include Control use of BitLocker on removable drives This lets you configure how BitLocker is used on removable drives including whether ordinary users can enable or disable the facility on removable devices 28 May 2010 Redmond Redmondmag com data on removable devices you should have a strategy to recover data for the inevitable case where a user forgets his or her BitLocker To Go password When you ve configured BitLocker To Go for a removable storage device a user must enter a password to unlock the device on another computer When the password is entered the user will have read write access to the device on a computer running the Enterprise or Ultimate Editions of Windows 7 You can also configure BitLocker To Go to allow the user read only access to BitLocker To Go protected data on computers running other versions of Microsoft operating OSes If your organ
93. ould do a better job of explaining what these differences are Anyone who accidentally picks the wrong action could be in for a rude sur prise because the Backup and Duplicate options will delete any files that exist solely in the target folder To be fair though Synchronize It does provide a preview of the outcome of the operation you re about to perform Still I can t help but wonder how many people have fallen victim to not paying attention to what the preview screen is showing them After all it seems a little weird to think that a backup operation would cause data loss and yet that s exactly what my preview screen displayed when testing the product Indeed a Grig support official says the names of some of the Synchronize It RedmondRoundup A Synchrone t 3 5 E al Om as o eb dor i df All A m cm Orphans only Action 2 Saco Figure 3 Synchronize It has features that initially appear to be identical to each other but have key differences operations are misleading and that Backup mode really isn t what some users might think it would be Duplicate mode is designed to dupli cate the source folder on target so it deletes everything not found in the original path the official says With Backup mode there s a little confusion We have chosen the name for this mode wrong and now it s too late to change The actual mode fitted for regular backup
94. out two weeks until we realized that Word documents were getting corrupted and then switched back to DOC formatting It will sure be nice when Microsoft gets this fixed Jeff Hall Minneapolis Minn I think the Ribbon is a disaster and that all the Microsoft Office products for which the Ribbon was introduced are failures A product is a failure when users go shopping on the Internet to find add on tools to make it look like its previous iteration in the Ribbon s case the classic interface Duro Musa received via e mail The Ribbon seems to be a good idea but Microsoft often introduces new technologies and leaves us old tech guys behind After the changes most users get lost and can t find what they want until tech support is able to assist them How hard would it be to have the old clunky menu and the Ribbon and slowly phase out the old menu in later versions Edwin Matos received via e mail I ve been using PCs since they were invented WordPerfect was my favorite word processing software I used to send e mails to Bill Gates telling him to buy it He ignored my good advice and continued to produce software that s less and less user friendly I use Word Excel and PowerPoint Because of the Ribbon I spend hours searching for functions that used to be useful but are now hidden in the depths of Ribbons sub Ribbons menus and so on Think sl C Send your rants and raves to Letters Redmondmag com Please
95. r I have six backups to choose from for Bigred On this Saturday it s time for an upgrade and a restore of my files could replace the motherboard insert a CD and restore to bare metal but hey we have to help the t was a cold night l d been up late cleaning up my 36 May 2010 Redmond Redmondmag com economy and one of the mail order places has an AMD quadcore machine with 8GB of RAM a 750GB hard drive and a case all for less than 400 Why not I had no problem after installing Windows 7 and all my applications connected my new machine to Home Server and selected a backup for Bigred and the backup is attached to my machine as a Z drive net use select what want restored and the job s done This is one of the reasons purchased Home Server have three children and each of them has a machine plus there s also my machine and our two notebooks All are backed up and I could restore any and all So what else can it do With shared folders I ve ripped all of my music to store there and play from my Xbox which is hooked to the entertainment center in my family room know that I can do that with another PC and media center but would be able to get to my files from a ski condo on the other side of the country With Home Server can It provides a secure gateway that allows me to log in and obtain files along with RDP to machines on the home network Redmond reader Ken works for a large i
96. rchive drive back into the workspace Exchanging Information C Marc Wagner has an unusual approach to synchronizing data and it centers around using Microsoft Exchange Server Thanks to Microsoft Exchange and Outlook BlackBerry Enterprise Server and a BlackBerry I can keep every important piece of data synced says Wagner a services development specialist at Indiana University Wagner 1s speaking for himself and not on behalf of the University There is the problem that Exchange only allows me to dump files of a limited size into an Exchange folder but that number is several megabytes Wagner s approach doesn t actually require synchronization It uses Outlook Web Access OWA to get at files onto the server If the telecommuter is accessing Exchange from a machine for which they have administrator privileges and they have access to Outlook a superior approach is to con figure Outlook to communicate directly with your employer s Exchange Server via MAPI Wagner explains This solu tion allows the telecommuter to not only have access to the full range of their e mail calendar tasks and notes it also gives them access to Exchange based file folders which can store pretty much any kind of file either as e mail attach ments or just as files Waener s system takes a bit of forethought but is effective for key files I have Outlook configured for all of my telecommuting needs I use Remote Desktop RDP onl
97. rePoint and implement chargeback mechanisms as appropriate Permissions Management managing user permissions on various SharePoint sites enables users to meet compliance goals by providing a complete picture of who has access to each area SharePoint Group Management Unify allows employees to add themselves to SharePoint groups on a self service basis if permitted by IT policy Compliance Reporting Real time user and resource reporting with full audit trails Business Process Automation Automate business processes by mapping security and compliance objectives into Ensim Unify which automatically enforces those rules without disrupting existing business processes Infrastructure Connectivity Connect to existing Identity management solutions and policy engines to ensure that security and compliance goals are met throughout the provisioning de provisioning and management processes www ensim com products sharepoint com For more information please visit 9 WWW ensim com BE SECRETS TS Lj d Pus is P n i s par s E x 28 Li T OF THE DATA SYNC MASTERS Most IT pros have multiple machines but keeping files in sync can be a challenge hen Chris Winebarger launched Hercules Home Investors he couldn t afford a dedicated IT staff or server hardware for his startup company He did however want to implement fairly cutting edge IT capabilities that would allow him and his staff to share files
98. releases Microsoft just shipped Visual Studio 2010 along with the Microsoft NET Framework 4 and is readying SQL Server 2010 R2 But Office is Redmond s cash cow with more than 500 million installa tions Under siege by lower cost alternatives from Google Inc IBM Corp Oracle Corp and VMware Inc Microsoft is betting its revamped Office will keep many users in the fold see A New Decade of Office March 2010 Introduced to the suite with Office 2007 the controversial Ribbon interface revamped with When we talk to companies with 10 000 to 20 000 users or even more than that a lot of them need communities they re craving communities 39 Mauricio Duran President Sieena improved usability features can now be found throughout the new release including SharePoint By launching both Office 2010 and SharePoint 2010 together Microsoft is looking to deliver a one two punch While Office 2010 ushers major new features such as a much improved Outlook client with a social network connector the ability to do faster business intelligence queries in the revamped Excel and new Web capa bilities the Professional Edition also boasts the new SharePoint WorkSpace 2010 a refinement of the technology formerly known as Groove SharePoint Gets Social he sexiest feature in SharePoint 2010 and the one that s generating the most buzz is support for social networking When we talk to companies with 10 000 to
99. rous simultaneous operating systems and a greatly compounded rate of fragmentation both on the logical disk and the virtual disks These virtual disk files fragment just as any other file can resulting in what amounts to a logically fragmented virtual hard disk which still has typical file fragmentation contained within it In other words virtualization brings about a fragmentation on top of fragmentation that can quickly cripple system speed and negate the efficiency virtualization is designed to deliver Data Storage Management on SAN Devices Is fragmentation still really an issue A storage area network SAN provides the ability to make remote disks appear to be local SAN storage virtualization involves the creation of a usually very large logical pool of data Via software that pool appears to be physically located all on one server In actuality that data may be located across hundreds of physical disks spread across dozens of servers The local disk file system does not know of and cannot control the physical distribution or location in a virtualized storage environment As a result of fragmentation NTFS has to make multiple requests regardless of the physical or virtualized storage environment SANs cannot address file system level fragmentation and neither can proprietary architectures or data retrieval technologies The overhead on the operating system is heavily impacted by fragmentation Local disk file defragm
100. rovide digital signatures too Doing so will make it easier for the providers to verify that their wares are being used by legitimate paying customers My advice is to bone up on network security While you re at it getting a Certified Information Security Systems Professional certification won t hurt either Compliance The biggest area of growth will be around compliance Regardless of whether you love or hate the current admin istration in Washington it s abundantly clear that it has set its sights on increasing regulations for businesses While this will most likely be bad news for organizations that are trying to control costs increased regulations will provide opportunities for IT professionals There isn t a doubt in my mind that hosting providers will help with regulatory compliance to some degree However I can t help but recall something that was often said when I was working with the military You can delegate authority but not responsibility In other words hosting providers will be able to assist organizations with maintaining regulatory compliance but ultimately it s the organizations responsibility to ensure that they re compliant with the various regulations It will be essential for organizations to employ IT professionals who have a good working 42 May 2010 Redmond Redmondmag com knowledge of the various regulations and who know how to ensure that the organization is able to pass an IT audit Wh
101. rs that are running low on disk space below the configurable threshold Download link www tinyurl com yjfx93c Bulk Password Reset reviewed by SoftPedia www tinyurl com 4g93jp While most companies have strong password policies for their employees one critical issue is still neglected local Administrator passwords on all servers are usually managed in a set and forget fashion sometimes using some well known passwords opening a major surface for security attacks The Bulk Password Reset tool quickly resets local account passwords on all servers at once making them more secure Download link www tinyurl com w84nfa Windows Service Monitor WindowsReference com www tinyurl com mbke9s2 This very simple monitoring tool alerts you when some Windows service accidentally stops on one of your servers The tool also detects services that fail to start at boot time which sometimes happens for example with Exchange Server Download link www tinyurl com k7fs9w VMware Change Reporter TechTarget SearchVirtualDesktop www tinyurl com jwdk29d If you don t know what is being changed by your colleagues in the VMware infrastructure it s very easy to get lost and miss changes that can affect the things for which you are responsible This tool tracks and reports configuration changes in VMware Virtual Center settings and permissions Download link www tinyurl com s93axy Active Directory Object Restore Wizard
102. rs to populate the various metadata fields Second we need to figure out which types of metadata are going to be the most useful given the organization s business needs and then create custom metadata tags if necessary Requiring Metadata Tags for Users The first thing I want to demonstrate is how to create custom metadata fields and how you can require users to populate those fields when they upload a document to a SharePoint library Begin by opening your SharePoint site and signing in as an Administrator Now click on the Site Actions 46 May 2010 Redmond Redmondmag com button and then choose the Site Settings Modify AII Site Settings options from the resulting menus When SharePoint displays the Site Settings page click on the Site Libraries and Lists link it s located in the Site Administration column Now click on the Customize Documents link At this point you should be looking at the Customize Documents page About halfway down the page you ll notice a section called Columns SharePoint stores metadata in columns Although SharePoint only defines a few columns by default you can use the Create Column link to define any additional metadata fields that you like Creating a column involves assigning a name and a data type to the column You must also decide whether or not you want to require Experience has shown that oopulating metadata tags can go a long way toward improving search results users to
103. s At VoiceCon HP said its Survivable Branch Communication zl module will enable Communications Server 14 to work with the HP ProCurve 820021 and 5400zl switches R Jeffrey Schwartz is editor at large of Redmond magazine You can reach him at jschwartz 1105media com MCPmag coms Tips amp Tricks Professor PowerShell Snap In Modules Windows PowerShell 2 0 takes snap ins a bit farther by adding the module concept By Jeffery Hicks In Windows PowerShell 1 0 you could add functionality by installing PSSnapins A PSSnapin is a binary file usually a DLL developed by a third party vendor sometimes Microsoft that contains new cmdlets you can use within a PowerShell session script or function Use the uon command to view all of the currently loaded snap ins PS C Get PSSnapin However this will only show snap ins that have been loaded using Add PSSnapin To see other snap ins registered with PowerShell use the Registered beni PS CA Get Snapin registered PowerShell 20c can continue to use PSSnapins but now offers a new concept for extending functionality called a module A module can be a set of script files or a binary file like a DLL Modules offer a number of benefits and are easier to use The Get Module cmdlet displays all D loaded modules PS CN Get Module Like snap ins you may have modules installed but not loaded Use the ListAvailable d to display available modules PS C Get Module ListAvailable
104. s can be helpful though you generally need to specify which files and folders will make the move Zinstall is a horse of a different color Instead of moving programs and files from the old OS to the new one Zinstall moves the entire desktop What you end up with is basically a dual boot machine but one on which you can switch back and forth on the fly For our test we used a typical setup for an XP machine In this case the old computer was a Pentium 4 with a 3 2GHz processor The new system was a quad core model running Windows 7 Setting up the program was easy All we had to do was run it on each com puter It asks you Which computer is this each time and you simply tell it Then you ll get to the main screen where both computers will be displayed A big arrow points away from the old Installation 2096 9 0 Features 2096 7 0 Ease of use 20 8 0 Administration 2096 ZO Documentation 2096 7 0 Overall 8 0 Key 1 Virtually inoperable or nonexistent 5 Average performs adequately 10 Exceptional Zinstall Price 89 Zinstall 877 444 1588 www zinstall com system toward the new one If every thing looks right simply click the Go button to begin the process After Zinstall started working a status screen appeared with basic information about what it was doing Mostly it just analyzed files and then copied them Zinstall can compress files during the transfer process so moving everything wil
105. s need to locate information across multiple repositories beyond their CMS Because the GSA works across all search environments getting the right results is not limited to or dependent upon the tuning of specific data structures or content formats The GSA empowers users to find the data that they need regardless of where it is housed or how it is formatted This is not true of standalone CMS search which is optimized to locate native data Can the Google Search Appliance work with existing CMS security protocols Yes The GSA s access control capabilities integrate with your existing enterprise security systems and enforce the policy already in place in content systems and applications The GSA allows document and user level access control ensuring that users only see results for the documents that they are authorized to view What kinds of companies use the Google Search Appliance Any business where effective knowledge management is important can benefit from the Google Search Appliance This is why more than 50 000 organizations depend on Google for their enterprise search needs Organizations in tech pharma energy education finance and banking professional services and countless other industries around the world rely on the GSA to ensure accurate relevant results in enterprise search Googl Cloud computing may fundamentally chan Skills ge the way IT professionals do their jobs Smart IT pro
106. s that OCS lacks key features such as Enhanced 911 support caller admission control and branch office resiliency all deal breakers for OCS as an enterprise communications platform Communications Server 14 promises to address those deficiencies Pall took the wraps off of Communications Server 14 during his VoiceCon keynote Though Microsoft hasn t officially said what it will be called most observers expect Redmond to use the name Communications Server 2010 in keeping with the naming of the rest of the product releases that are part of the company s 2010 roadmap The new release will offer a new Communicator client that ties to the amp 0CS has not been enterprise ready for the majority of organizations 99 Jonathan Edwards Analyst IDC forthcoming 2010 releases of Office SharePoint and Exchange Communications Server 14 will offer location based presence support meaning the interface will allow others to know if someone is in their office is mobile or is in some other setting A user s location can be detected based on the network s subnet or wireless access point 1f mobile and published based on policies selected This system is designed to work from anywhere Pall said It s designed to be simple both from an end user perspective and from an IT management perspective and the system is designed to be cost effective In the demo he showcased a feature that will allow the Communicator 14
107. s will be prepared ll never forget the first time I heard about cloud computing It was at least a decade ago maybe lon ger at a trade show in Las Vegas where Bill Gates gave the keynote address Gates outlined a vision that involved universal connectivity with data and vari ous services living in the cloud Although I can t remember exactly when Gates gave this speech or even which trade show it was I distinctly recall the conversation I had with attendees as we left the keynote We all thought Gates had lost his marbles After all who would ever turn over all of their data to a service provider Besides at that time high speed Internet connectivity was virtually nonexistent In the weeks following the conference I all but forgot about Gates cloud vision As the years went on cloud computing gradually crept onto the scene Initially the transition involved applications that connected to the Internet to complete various functions Some of the earliest examples I can recall involved Microsoft Office retrieving the latest help files from the Internet or certain Microsoft products requiring online activation As high speed Internet connectivity became more available entire applications became Internet based Today there are dozens of companies that offer Web based backup services PHOTO FROM SHUTTERSTOCK DRAZEN VUKELIC for the upheaval to come By Brien M Posey Cloud computing is now a mainstream te
108. superior to a scripting language It s a not that difficult mechanism to swiftly accomplish I T s daily tasks all without the repeated steps and potential for error that accompanies using the mouse So if you haven t yet taken a look at Windows PowerShell for fear of having to learn a new language give it another chance You may find that its capabili ties are easier and more fulfilling than you think R Greg Shields gshields concentratedtech com MVP vExpert is a recognized IT author speaker and strategic consultant sharing his 15 years of technical and IT business alignment experience with companies worldwide Get more of Shields s inside look at Windows along with other useful tips and tricks at Concentrated Tech com Use your IT Certifications to accelerate your degree online Microsoft Sun Oracle Cisco Comp TIA SAS PMI GIAC or ISC certifications could waive up to 25 of your fully accredited bachelor s degree Heres what you can get from the online degree programs offered at WGU e Flexible ONLINE learning e Upto 10 certifications built in at no extra cost e Programs in Networks Databases Security Software and IT Management Call Toll Free 800 918 4830 or visit us at www wgu edu time9 CORE 5 E WESTERN GOVERNORS UNIVERSITY E e SAN X ebest 1d cheapest lege you ve never card of is found n ly online j 008 IME magazine November 17 2 I
109. t 2010 SpectorSoft Corporation All rights reserved PC Magazine Editors Choice Award Logo is a trademark of Ziff Davis Publishing Holdings Inc Used under license Letters Redmondmag com Unwelcome Changes In a recent Barney s Rubble column Doug Barney wrote about the Microsoft Ribbon interface and the opposing user views about its usefulness The Great Ribbon Debate April 2010 Here s my two cents When I first installed Office 2007 I thought the Ribbon was a pain I couldn t understand why Microsoft needed to change things again If you remember the Ribbon has changed with each of the releases of Office since Office 1997 The Ribbon has made Word and Excel easier to use for newbies however for someone who s been working with Word and Excel for years the Ribbon has become a big pain in the neck Older users now have to go hunting for things they used to know where to find One of the complaints I ve heard from our administrative people concerns hidden dialog boxes They tell me there are some dialog boxes that are so well hidden they have to go digging to find them However the biggest problem we ve come across Is the Microsoft imple mentation of OpenXML for Word otherwise known as the DOCX format When you use Change Tracking Mode with DOCX files there seems to be a problem with Word determining which changes are the current changes depending on the user viewing the document We used DOCX for ab
110. tLocker to use BitLocker To Go and to configure AppLocker Policies Using these technologies along with normal house keeping tasks such as ensuring that computers are kept current with updates anti virus software and anti spyware programs will enhance the security of computers in your organiza tion running Windows 7 R Orin Thomas orin thomas gmail com works as an author in Melbourne Australia and bas written more than a dozen textbooks for Microsoft Press He 1s the convener of the Melbourne Security and Infrastructure Interchange and a Microsoft Security MVP ADVERTISEMENT REDMOND VENDOR PROFILE ig nave bras Coca b bug MRE ENA Madsen dq 5 Le ud FH M meta Cai ung BA wb ordner ia i Cartier loh letras rio Tsm bw Jiili Kou Ain Gupta SeA heben Denier urari rage fc neg ire be Ensim Unify Painless er SharePoint Management nsim Unify Enterprise incorporates fine grain provisioning and application management for SharePoint Ensim Unify SharePoint Manager provides enhanced security management and compliance capabilities for SharePoint Server 2007 as well as SharePoint Server 2010 whether in the cloud or on premise Key features of Ensim Unify SharePoint Manager include Full Control automated provisioning of SharePoint sites including site collection and sub sites allowing administrators to centralize administration of Sha
111. tings command from the shortcut menu Once you arrive on the Site Settings page click on the Libraries and Lists link located in the Site Administration section Now click on the Customize Documents link While on the Customize Docu ments page click the Advanced Settings link located in the Gen eral Settings section When you arrive at the Document Library Advanced Settings page choose the Yes option in the Content Types section to allow the man agement of content types Click OK and you ll be returned to the Customize Documents page You ll notice however that this page now contains a Content Types section Figure 2 Now click the Add From Existing Site Content Types link located just beneath the list of content types SharePoint will display a page that allows the document library to include the types of content you want to add Select the content type that you ve just defined and click the Add button followed by OK You ll now be returned to the Customize x Delete Perm T Spelling Content Type My Seton m Conbma Tree Tha iz a custom content type crested solely for demeratrahen purposes Name Title Subject Vermen Q0 1 Created at 3 18 2030 DICTI AM by Acreage Last modified at 3 13 2020 XE 11 4M by Admiristrasx Figure 2 Metadata fields are displayed based on the selected content types even though the desired results were included among the billion or so other search results Even though
112. urious Download your FREE copy of VIPRE Enterprise Premium and give it a test drive When you compare VIPRE Enterprise Premium to Symantec Su n belt Softwa e McAfee Trend Micro or whatever antivirus program you re using you WILL want to switch Don t worry though You can get VIPRE VIRUS Enterprise Premium with a 50 competitive upgrade discount virusbtn com Plus we will buy out your existing maintenance contract for 1 year Download now FEATURES 59 Cloud Survival Skills COVER STORY Secrets of the Data Sync Masters Most IT pros have multiple machines but keeping files in sync can be a challenge Page 32 Cloud computing may fundamentally change the way IT professionals do their jobs Smart IT pros will be prepared for the upheaval to come Locating Documents in a SharePoint Library Irrelevant a SharePoint search results and lost documents can turn into a waste of time and money but a few simple steps will help IT pros avoid these problems REVIEWS Product Reviews 21 Zero Hassle with Zinstall With Zinstall you don t have to leave your old desktop behind when moving from Windows XP to Windows 7 Roundup 22 Data Synchronization Tools In a field of applications that offers a wide range of functionality two products shine CONTENTS REDMOND REPORT 11 Chomping at the SharePoint Bit Customers are eager to get the forthcoming 2010 release of the
113. urity by Failing to Monitor and Record EVERYTHING Your Employees do on their Desktop PCs Filtering software leaves your company s health at risk because it fails to monitor desktop computer activity Employees can bypass content filters install rogue applications copy confidential information or worse and it s all undetected Monitor Where It Matters At The Desktop Spector 360 is the only software that gives you the ability to m monitor record archive and report all PC and Internet activity Nothing Gets Past Spector 360 Ot Unlike filtering Spector 360 captures EVERYTHING your te e e employees do web site visits file transfers emails chats IMs application usage keystrokes and so jm much more Spector 360 even provides screen snapshots of employee PC and Internet activity s that give undisputable proof or erase all doubt o Where There s Smoke There s Fire Spector 360 s easy to read and intuitive summary reports quickly identify employees conducting high risk activity See something suspicious Drill down for a detailed employee focused investigation that reveals every detail of their PC and Internet activity r 36 Spector 360 even sends immediate alerts if your data is threatened Eugene O Neal Carlile Transportation Systems Increase Employee Productivity and Protect Callustoday 1 888 598 2788 Your Company Data with Spector 360 Visit us online Watchwith360 com Copyrigh
114. users to change passwords before they expire to keep you safe from password reset calls It works nicely for users who don t log on inter actively and thus never receive standard password change reminders at log on time e g VPN and OWA users Download www tinyurl com bu476f USB Blocker Windows IT Pro Nov 09 Users bring tons of consumer devices flash drives MP3 players cell phones etc into the office and this aptly named tool can block them with a couple of mouse clicks to prevent the spread of a virus and to restrict the take out of confidential information The product is integrated with Active Directory and is very easy to use Download link www tinyurl com gf7dj2 Active Directory Change Reporter Windows IT Pro Sep 09 InstantDoc ID 102446 Windows IT Pro Jan 09 InstantDoc ID 100593 TechTarget www tinyurl com vxa39e3 This is a simple audit ing tool to keep tabs on what s going on inside Active Directory The tool tracks changes to users groups OUs and other types of AD objects and sends summary reports with full lists of what was changed and how it was changed In addition it has a nice rollback feature that helps rollback un wanted changes including deletions very quickly Download link www tinyurl com r7hid8t JOHN BAGLEY john_bagley sbcglobal net is an award winning professional writer and independent consultant who contributes to newspapers and magazines Redmo
115. ustry CORPORATE ADDRESS Corporate Headquarters 1105 Media 9201 Oakdale Ave Ste 101 Chatsworth CA 91311 www llObmedia com MEDIA KITS Direct your Media Kit requests to Matt Morollo VP Publishing 508 532 1418 phone 508 875 6622 fax mmorollo l05media com REPRINTS For single article reprints Gin minimum quantities of 250 500 e prints plaques and posters contact PARS International Phone 212 221 9595 E mail 1O05reprints parsintl com www magreprints com QuickQuote asp LIST RENTAL This publication s subscriber list as well as other lists from 1105 Media Inc is available for rental For more information please contact our list manager Merit Direct Phone 914 368 1000 E mail 1O5media meritdirect com Web www meritdirect com 1105 RedmondResources AD INDEX Company Page URL Dell Computer C2 CA www dell com Diskeeper Corporation 19 www diskeeper com Ensim Corporation 5 www ensim com ESKI 49 www esri com Fujitsu Computer Systems C3 www fujitsu com GFI Software Ltd CIA CIB WWw gfi com Google 58 www google com enterprise IBM Corporation 6 7 www iom com Idera 44 www idera com Metalogix Software Corporation 47 www metalogix net Microsoft Corporation 35 43 www microsoft com Mimosa Systems Inc 20 mimosasystems com NetApp 15 netapp com and NetSupport Software 5 www netsupport inc com Netwrix Corporation 25 www netwrix com Quest Software 5 www quest com Redmond 29 www redmo
116. way for lunch I come back to 40 e mails and zero voice mails So just for the record my number is 978 582 0066 Do you miss the telephone or is electronic communication where it s at I want to publish your responses so VII contradict myself and ask you to write me at dbarney redmondmag com R 8 May 2010 Redmond Redmondmag com Editor in Chief Executive Editor Features Editor at Large Managing Editor Associate Managing Editor Associate Managing Editor Doug Barney Lee Pender Jeffrey Schwartz Wendy Gonchar Katrina Carrasco Marti Longworth Contributing Editors Mary Jo Foley Don Jones Greg Shields Art Staff Art Director Senior Graphic Designer Brad Zerbel Alan Tao Online Digital Media Online News Editor Executive Editor New Media Director Online Media Associate Web Editor Site Administrator Designer Kurt Mackie Michael Domingo Becky Nagel Chris Paoli Shane Lee Rodrigo Mufioz ia RedmondMediaGroup President Vice President Publishing Vice President Editorial Director Director Marketing Online Marketing Director 1105 President amp Chief Executive Officer Senior Vice President amp Chief Financial Officer Executive Vice President Senior Vice President Audience Development amp Digital Media Vice President Finance amp Administration Vice President Information Technology amp Application Development Vice President Attendee Marketing Vice
117. way to address this is to capability should IT pros get to know prevent ActiveSync connections from iPhones You can do this by configuring windows PowerShell In five years a policy in Exchange that prevents connections from unapproved devices IT pros who aren t proficient in For more tips on protecting your iPhone and to follow Joern s column at Windows PowerShell are going to be its new online home go to Redmondmag com SecAdvisor struggling to keep their jobs RELIMONDMAG COM RESOURCE What Are FindiT Codes What we once called FindiT codes are now Resources Enter FindIT Code easy URLs You ll see these embedded gt gt Daily News News throughout Redmond so you can access any gt gt E Mail Newsletters Newsletters additional information quickly Simply type gt gt Free PDFs and Webcasts TechLibrary in Redmondmag com followed by the FindIT i code into your URL address field Note that gt gt Subscribe Renew Subscribe all URLs do not have any spaces and they are gt gt Your Turn Editor Queries YourTurn not case sensitive Redmondmag com RCPmag com RedDevNews com VisualStudioMagazine com VirtualizationReview com MCPmag com CertCities com TCPmag com ENTmag com RedmondEvents com ADTmag com ESJ com 4 May 2010 Redmond Redmondmag com Your NetWare Migration SILLS FIF PI prize eee Peer ee i L TIT E M MM DM Ll AL i A Ji aL P EEELLETTV 7 any enterprises have
118. which is located in the Look and Feel section The resulting page allows you to select metadata columns that shouldn t The ultimate goal behind optimizing SharePoint s search engine is to have it return exactly the document set that the user is searching for nothing more and nothing less be crawled If the list appears blank try going to the site s main page and then trying to access the Searchable Columns page again Smart Searching Although the built in search engine in SharePoint 2007 works relatively well straight out of the box its performance is far from optimal Microsoft has improved the search engine in SharePoint Server 2010 and while there are some similarities these guidelines are focused around SharePoint 2007 By creating custom content types and specifying metadata types that are appropriate for each type of content it s possible for users to receive better query results by searching on metadata fields Omitting unwanted metadata columns and excluding ASPX files from the indexing process also helps to fine tune the query results R Brien Posey brien_posey hotmail com MCSE is a Microsoft MVP and the co founder and vice president of research at Relevant Technologies which specializes in IT best practices and information security Posey is the author of many technical articles for online publications and bas also written numerous white papers DecisionMaker p v Os 00000 Back up Active Director
119. xist but the social aspect has changed dramatically Xbox 360 for example is connected to a back end cloud service that lets gamers compete with online opponents Likewise my wife subscribes to an online service called Pogo 40 May 2010 Redmond Redmondmag com where all of the games are hosted in the cloud and an entire online community has formed around the games My point is that cloud computing has dramatically trans formed certain industries and has already rendered some of them obsolete In the next few years we may see the same thing happen to IT Although not yet widespread there are already companies offering cloud hosted desktops It s conceivable that in the not so distant future organizations will begin to replace traditional desktop computers with terminals that boot from a virtual hard drive hosted by a service provider In fact this technology already exists Imagine what would happen 1f the company you work for decided it was less expensive to outsource its desktops to a hosting provider than to maintain physical desktop hardware How many of the company s help desk staff would no longer be needed I realize many of you reading this article are network administrators or IT pros in other areas and not help desk technicians but other IT pros are also in danger of becoming obsolete Think about how many of your day to day duties would go away 1f your company decided to outsource its server applications The
120. y when I need access to a file not stored on Exchange he notes Then I usually send myself the file to my local Outlook configuration as an attachment resorting to download over RDP only when it s too large a file to be supported by our Exchange servers Anything I can store in Exchange I can access from my BlackBerry or my notebook or desktop computer at home or on the road Wagner sees ease of setup as a key advantage to his plan There are a number of synchronization strategies built into Windows but they all require the telecommuter to be sure to synchronize their files regularly My solution doesn t require the telecommuter to remember anything OWA is accessible from any publicly accessible workstation with a compatible browser The other solutions require a one time setup on the systems the telecommuter anticipates using BPOS Is Boss Alberto Lugo president of Microsoft Certified Partner Internet Vision Development Corp in San Juan Puerto Rico needed to synchronize several PCs and a server In effect he wanted to build a sharable document repository As a partner Lugo came across the Business Productivity Online Standard Suite BPOS a set of Microsoft hosted apps that sells for 10 per month per user The key to syncing is SharePoint Online Lugo nabbed the system which offers access to SharePoint Online Exchange Online Live Meeting and Office Communications Online SharePoint Online is a portal that includ
121. y and GPOs ctive Directory is obviously a critical part of your infrastructure so what are you doing to protect it Furthermore what are you doing to protect the important Group Policy Objects GPOs that help configure and secure both client and server com puters in your organization Windows native backup capabilities for AD are pretty straightforward Windows Server Backup can grab a server s system state and when you do this on a domain controller DC you re also grabbing the AD database You ll need to explicitly grab the GPO files that sit on the disk however because those aren t in the AD database Using those backups can be troublesome because Windows Server Backup doesn t support online restores Instead you ll be taking a DC offline to perform an authoritative restore of the directory Recovering a single object such as an accidentally deleted user can be time consuming when done this way Windows Server 2008 R2 adds a new Active Directory Recycle Bin feature that provides some basic single object recovery It doesn t rely on backups rather it copies deleted objects to a special container in AD You ll still need to use low level tools to recover objects because there isn t actually a recycle bin icon in any of the native tools This feature must be explicitly enabled and is only available in domains running at the Windows Server 2008 R2 functional level The feature doesn t provide coordinat
122. y more files Thompson not only uses Live Mesh to keep his own three machines in sync he also used it to solve his password woes Passwords used to be the bane of my existence he explains It seemed like I never had the password that I needed I found a way to make passwords easy I use the open source KeePass Tt encrypts the data with 256 bit AES encryption T store the database in a Live Mesh folder Thompson adds Anywhere I am I have secure access to all of my passwords even from my phone Live Mesh supports file locking if I try to open a file that s open on another computer it warns me Right now Live Mesh is free and offers 5GB of storage After that files are stored on a peer to peer basis using other Live Mesh clients Thompson says As is the case with the other tools already discussed set uv ting up Live Mesh was simple Thompson logged into Live Mesh and installed the client The sync was then set up for that computer After that Thompson picked the folders he wanted to submit If he s on another machine he logs into Live Mesh and downloads or uploads files He doesn t even need the client Thompson only minor complaint synchronization only happens when he s logged into Live Mesh Poorman s Solution Peter Poorman an enterprise software product manager in Plano Texas wanted to back up files from his son s college machine and other PCs and ended up discovering
123. y page allows you to choose whether or not ASPX files should be included within the search results Omitting Metadata Columns Just as indexed ASPX files are usually going to be irrelevant when included in search results you may find that certain metadata tags also contribute to irrelevant results Normally it s advisable to allow SharePoint to index all of the metadata columns If you begin to notice that certain columns contribute to the irrelevance of search results however it s possible to disable indexing on a per column basis To disable indexing for a column click on the Site Actions button and choose the Site Settings option from the resulting menu When SharePoint displays the Site 4 Document Center Hove Document Center fers Reperts Search Sites R 1 100 20 Your search feck 3 19 seconds Document Center http abaeenont Dods Sou Ef Document Center Announcements Ey Documents Explorer View Quick Launch El Document Center Tasks 2 Document Center Tasks By Assigned To Quick Launch http sharenont Docs Lists T asies byowmer amps Ac E Document Center Tasks My Tasks Quick Launch IZ Docurnent Center Tasks Active Tasks Quick Launch hec eharenanti Doe ALT eo actio apr uimeetraree 3080201 Figure 3 It s a good idea to exclude ASPX files from search results 50 May 2010 Redmond Redmondmag com Settings page click on the Searchable Columns link
124. your raw data into a powerful strategic advantage with Business Intelligence solutions from Dell and Microsoft and do it for up to 72 less per terabyte than the competition Built on industry standards Microsoft SQL Server 2005 systems from Dell are designed to speed T implementations lower risk and reduce complexity all while delivering rifthe est price for performance in the industry SIMPLIFY YOUR IT AT DELL COM SQLBI AMD Smarter Choice 72 claim based upon a comparison of list prices of typical Business Intelligence offerings from leading hardware manufacturers versus Dell Microsoft combined offerings Benchmarked systems configured with 4 5 TB of data storage database application software and Business Intelligence analytic software Dell is a trademark of Dell Inc 92008 Dell Inc All rights reserved Kiss yourantivirus bloatware goodbye WEUWV r SS os camcn P m a T a a i 33 LEE karg Figli Ey Bey 1 dmm 91 i H TM e uterus a se deeem Ss eS ae ee SS ei E MER dtt esci Er TE E F t Memory Used During Scan TEST DRIVE S ENTERPRISE PREMIUM TrendMicro III a Sophos III Webroot III Symantec III Mcafee mr x EE a EDU Until now antivirus engines have been Frankensteins bolted together P T e from bits and pieces of different products
125. zation What new technology should IELI April May 2010 Posey writes that server virtualization has often been every Windows shop be using portrayed as deceptively simple to implement when in fact potential pitfalls Identity and access management abound These include IAM controls Windows native IAM e Subpar server performance toolset is underpowered for today s e Virtual server sprawl business needs and both Microsoft e The cost of learning new skills and third parties offer tools that can The underestimation of the required number of hosts save time and money while improving Read the full article at VirtualizationReview com Posey0410 and make sure security overall you re fully prepared for server virtualization What will be the biggest Windows ll Redmondmag com product of 2010 think we ll see a re emergence of Security Advisor Moves Online remote vesitop services RDS People will start to realize how Sg Advisor our popular column by Joern Wettern has moved to a heavy Virtual Desktop Infrastructure new home online at Redmondmag com Here s a preview of Wettern s solutions are and they ll turn back to latest security tips for business users of iPhones from iSecurity Keeping RDS for some scenarios Your E mail Safe April 1 2010 If you let users access corporate e mail remotely you need to come up What little used native Windows with a strategy to mitigate the resulting risks One
Download Pdf Manuals
Related Search
Related Contents
幼児~小学校低学年 - デュッセルドルフ日本人学校 The Motorhome Service Manual FICHE PRODUIT MORTIER - ADH Création de légendes sur vos photos dans Word 取扱説明書 品番 PT-CW331R PT Taro-03 仕様書(SEM)修正10月10 Oxygène n°177 - Aulnay sous Bois Descarga el manual 6800AK Series Camera User Manual Version 1.0 Copyright © All rights reserved.
Failed to retrieve file