Implementing DirectAccess with Windows Server 2016

I am very excited to announce that my new DirectAccess book, Implementing DirectAccess with Windows Server 2016 from Apress media, is now shipping! The book is available on popular online sites like, Barnes & Noble,,, and others. The book is also available in electronic formats such as Amazon Kindle and Barnes & Noble Nook, as well as a variety of subscription formats including Safari, Books24x7, and SpringerLink.

Implementing DirectAccess with Windows Server 2016

This book contains detailed and prescriptive guidance for the planning, design, implementation, and support of a DirectAccess remote access solution on Windows Server 2016. It also includes valuable insight, tips, tricks, and best practice recommendations gained from my many years of deploying DirectAccess for some of the largest organizations in the world.

Current DirectAccess administrators will also find this book helpful, as the majority of content is still applicable to DirectAccess in Windows Server 2012 and Windows Server 2012 R2. In addition, the book also includes essential information on the design and deployment of highly available and geographically redundant DirectAccess deployments.

Troubleshooting DirectAccess can be a daunting task, so I’ve dedicated an entire chapter in the book to this topic. For those responsible for the maintenance and support of DirectAccess in their organization, this chapter alone will be worth the investment.

Be sure to order your copy today! Monthly Newsletter – June 2015

WindowSecurity.comThe monthly newsletter is out! In this month’s edition I talk about the importance of “core” deployments of Windows Server. I’ve always been a big fan of server core, and Microsoft has been hard at work adapting workloads to this deployment configuration. They’ve made great progress, and in fact Windows Server 2016 will only install in either core or minimal server interface configurations – no GUI option by default! Yes, you can still add the GUI later, but Microsoft is really trying to shape user behavior and drive adoption of this important configuration option. Server core also has important security benefits too. Read the latest monthly newsletter to learn more. Monthly Newsletter – February 2015
The monthly newsletter is out! The main topic of this month’s newsletter is…passwords. Boring, right? I know, it’s been hashed over thoroughly and anyone even remotely concerned with security understands the problems passwords pose. However, I chose the topic this month based on recent information that indicates, in spite of the fact that we all know how bad passwords really are, that we don’t seem to be making any progress making them better! Read this month’s newsletter to learn more. Monthly Newsletter – December 2014

The monthly newsletter is out! In this month’s edition I take a look back at security happenings in 2014. It certainly was an interesting year! Microsoft finally ended support for Windows XP, there were serious security vulnerabilities in open source platforms announced, and data breaches galore. Never a dull moment! As always, news and current events are covered too. Check it out! Monthly Newsletter – November 2014

The monthly newsletter is out! In this month’s edition I provide highlights about the recently released Microsoft Security Intelligence Report (SIR) volume 17. The SIR is always interesting and important for security administrators across all vertical as it provides valuable information regarding the current threat landscape and successful attacks by cybercriminals. Do yourself a favor and read the newsletter, then download and read the report. This is something you don’t want to miss.

Deconstructing Forefront TMG 2010 Firewall Client Operation and Communication

The Firewall Client, an optional client-side component that can be deployed with Forefront TMG 2010, is arguably the most powerful tool a security administrator can use to control network traffic destined for the public Internet in their organization. The Firewall Client provides seamless and transparent proxy services for all Winsock TCP and UDP communication. More importantly, all Firewall Client communication is authenticated, allowing TMG administrators to enforce strong user and group based access control on traffic using the Firewall Client. In this month’s article on I provide detailed information about how the Firewall Client works. I also break down how communication takes place at the network level, providing deep insight as to how the Firewall Client communicates with the TMG firewall.

Microsoft Forefront TMG 2010