I am very excited to announce that my new DirectAccess book, “Implementing DirectAccess with Windows Server 2016“ from Apress media, is now shipping! The book is available on popular online sites like Amazon.com, Barnes & Noble, Springer.com, Apress.com, and others. The book is also available in electronic formats such as Amazon Kindle and Barnes & Noble Nook, as well as a variety of subscription formats including Safari, Books24x7, and SpringerLink.
This book contains detailed and prescriptive guidance for the planning, design, implementation, and support of a DirectAccess remote access solution on Windows Server 2016. It also includes valuable insight, tips, tricks, and best practice recommendations gained from my many years of deploying DirectAccess for some of the largest organizations in the world.
Current DirectAccess administrators will also find this book helpful, as the majority of content is still applicable to DirectAccess in Windows Server 2012 and Windows Server 2012 R2. In addition, the book also includes essential information on the design and deployment of highly available and geographically redundant DirectAccess deployments.
Troubleshooting DirectAccess can be a daunting task, so I’ve dedicated an entire chapter in the book to this topic. For those responsible for the maintenance and support of DirectAccess in their organization, this chapter alone will be worth the investment.
Be sure to order your copy today!
The WindowSecurity.com monthly newsletter is out! In this month’s edition I talk about the importance of “core” deployments of Windows Server. I’ve always been a big fan of server core, and Microsoft has been hard at work adapting workloads to this deployment configuration. They’ve made great progress, and in fact Windows Server 2016 will only install in either core or minimal server interface configurations – no GUI option by default! Yes, you can still add the GUI later, but Microsoft is really trying to shape user behavior and drive adoption of this important configuration option. Server core also has important security benefits too. Read the latest WindowsSecurity.com monthly newsletter to learn more.
The WindowSecurity.com monthly newsletter is out! In this month’s edition I’ll discuss the recently released Verizon Data Breach Investigations Report (DBIR). This annual report is essential reading for anyone involved in information security. It provides detailed insight in to successful attacks that result in the theft of data from organizations large and small. Be sure to check it out!
The WindowSecurity.com monthly newsletter is out! The main topic of this month’s newsletter is…passwords. Boring, right? I know, it’s been hashed over thoroughly and anyone even remotely concerned with security understands the problems passwords pose. However, I chose the topic this month based on recent information that indicates, in spite of the fact that we all know how bad passwords really are, that we don’t seem to be making any progress making them better! Read this month’s newsletter to learn more.
The WindowSecurity.com monthly newsletter is out! In this month’s newsletter I discuss the impending end-of-support date for Microsoft Windows 2003 Server and potential opportunities to migrate services running on that platform to public cloud services such as Microsoft Azure. Check it out!
The WindowSecurity.com monthly newsletter is out! In this month’s edition I take a look back at security happenings in 2014. It certainly was an interesting year! Microsoft finally ended support for Windows XP, there were serious security vulnerabilities in open source platforms announced, and data breaches galore. Never a dull moment! As always, news and current events are covered too. Check it out!
Can you install Microsoft Forefront Threat Management Gateway (TMG) 2010 in Microsoft Azure? Should you? Are there any uses cases for which installing TMG in Azure is a good fit? I answer these questions and more in my latest article on ISAserver.org. Check it out!
The WindowSecurity.com monthly newsletter is out! In this month’s edition I provide highlights about the recently released Microsoft Security Intelligence Report (SIR) volume 17. The SIR is always interesting and important for security administrators across all vertical as it provides valuable information regarding the current threat landscape and successful attacks by cybercriminals. Do yourself a favor and read the newsletter, then download and read the report. This is something you don’t want to miss.
The WindowSecurity.com monthly newsletter is out! In this month’s edition I discuss recent security vulnerabilities in open source operating systems and the SSL protocol. I also touch upon recent data breaches and some important changes inside Microsoft that may affect security. Check it out!
The Firewall Client, an optional client-side component that can be deployed with Forefront TMG 2010, is arguably the most powerful tool a security administrator can use to control network traffic destined for the public Internet in their organization. The Firewall Client provides seamless and transparent proxy services for all Winsock TCP and UDP communication. More importantly, all Firewall Client communication is authenticated, allowing TMG administrators to enforce strong user and group based access control on traffic using the Firewall Client. In this month’s article on ISAserver.org I provide detailed information about how the Firewall Client works. I also break down how communication takes place at the network level, providing deep insight as to how the Firewall Client communicates with the TMG firewall.