Was searching for some resources on Group Policy in Windows 2003 and found this:
http://blogs.technet.com/johnbaker/archive/2008/04/05/group-policy-webcast-series.aspx
Very useful resource. Looking forward to the Windows 2008 ones.
Monday, June 23, 2008
Monday, June 16, 2008
Microsoft and research
Microsoft ranks ahead of IBM in terms of international patent applications, according to the World Intellectual Property Organization. Microsoft was eighth overall last year, with Japan's Matsushita on top.
To produce its IP, Microsoft invests $7 billion a year on research and development. Most of it is actually spent outside its Microsoft Research (MSR) division, which still boasts 800 researchers worldwide -- more than many major universities.
source: computerw world
To produce its IP, Microsoft invests $7 billion a year on research and development. Most of it is actually spent outside its Microsoft Research (MSR) division, which still boasts 800 researchers worldwide -- more than many major universities.
source: computerw world
Tuesday, June 10, 2008
Looking to add social networking component to SharePoint?
Check out the blueKiwi SharePoint Connector article at the SharePoint Team blog.
http://blogs.msdn.com/sharepoint/archive/2008/06/08/how-we-did-it-bluekiwi-sharepoint-connector-and-officeassistant.aspx
Note: blueKiwi Software is the leading European provider of Enterprise Social Software.
http://blogs.msdn.com/sharepoint/archive/2008/06/08/how-we-did-it-bluekiwi-sharepoint-connector-and-officeassistant.aspx
Note: blueKiwi Software is the leading European provider of Enterprise Social Software.
Monday, June 02, 2008
I am presenting at TechNet Security Series Seminar IV
My topic:
Session 2: Using Log Parser for Correlating Window’s log data for Forensics in Investigating Intrusions
Time: 3.20pm to 4.05pm
Synopsis: Microsoft has Application, Security and System event logs built into the OS from Windows®NT v3.51 forward. This session will dwell into understanding how this logs can be configured properly to audit success and failures of all security related events. Additionally, other services (IIS™, ISA™, Routers etc.) have their own logs that contain vital information independent of the OS.
Next, we will learn about what is Log Parser, how does it work and what can it do. Next we will walk through some scripts and even build some from scratch to identify many suspicious activities. Most of the time these activities are going to be followed by some sort of malicious activity. So next, we will attempt to find these indicators by checking the files and system services for “strange” activity. Finally, we will look at other “cool” Uses of the Log Parser.
Link to the event: http://go.microsoft.com/?linkid=8861657
Session 2: Using Log Parser for Correlating Window’s log data for Forensics in Investigating Intrusions
Time: 3.20pm to 4.05pm
Synopsis: Microsoft has Application, Security and System event logs built into the OS from Windows®NT v3.51 forward. This session will dwell into understanding how this logs can be configured properly to audit success and failures of all security related events. Additionally, other services (IIS™, ISA™, Routers etc.) have their own logs that contain vital information independent of the OS.
Next, we will learn about what is Log Parser, how does it work and what can it do. Next we will walk through some scripts and even build some from scratch to identify many suspicious activities. Most of the time these activities are going to be followed by some sort of malicious activity. So next, we will attempt to find these indicators by checking the files and system services for “strange” activity. Finally, we will look at other “cool” Uses of the Log Parser.
Link to the event: http://go.microsoft.com/?linkid=8861657
Subscribe to:
Posts (Atom)