Stop the Madness: 6 Steps to Simplify Your

Transcription

Stop the Madness: 6 Steps to Simplify Your
0505red_cover.v7
4/19/05
11:30 AM
Page 1
Stop the Madness: 6 Steps to Simplify Your Network Page 51
M AY 2 0 0 5
W W W. R E D M O N D M A G . C O M
CONTENT
COPS
Should IT Be
the Long Arm
of the Law?
Page 42
Reach out and Manage: Windows
Server 2003 Can Help Page 56
$5.95
1
25274 867 27
7
MAY
•
05 >
Thumbs Sideways for Baseline
Security Analyzer Page 33
7 Ways to Get the Most
out of MOM Page 63
Server Management
Shootout Page 36
Mick Montgomery learned a better
way to patrol his content cop beat.
Project3
3/29/05
3:37 PM
Page 1
EMAILS AT LEGAL SPEED.
What was lost is now found with Enterprise Vault 6.0. Manage to locate anything quickly in a maze of communications
data and email. Even elusive PST files. Securely and cost effectively. Finally. Software for Utility Computing. veritas.com
TM
© 2005 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and Enterprise Vault are trademarks or registered trademarks of
VERITAS Software Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
Project6
4/18/05
1:20 PM
Page 1
ADVERTISEMENT
Applying Email Archiving
for Fast, Efficient
Exchange 2003
Migration
W
ith Microsoft Exchange
5.5 entering into a limited support period prior
to its final termination, your organization may be preparing to upgrade to
Exchange 2003. Also, if you currently
use a non-Microsoft email system,
you may be considering a migration
to Exchange 2003.
Email is a mission-critical function
with a wide variety of dependencies.
Making the transition to Exchange
2003 involves several major challenges: extensive project timelines,
considerable costs in terms of infrastructure upgrades and human
resources, and increased business
risks, including email loss, productivity loss during email migration, and
possible compliance issues both during and after the migration.
VERITAS Enterprise Vault helps
you meet each of these challenges.
Reduce Email Volume Prior to
Migration
A significant proportion of the time,
effort, and risk associated with email
migration can be attributed to the sheer
volume of email that must be moved to
new servers. Also, the new Exchange
data stores can end up consuming considerably more disk space than the
original systems due to the loss of single-instance storage. Large-volume
email moves are especially complex if
the migration involves transition from a
non-Exchange email platform.
It takes considerable time to move
mailboxes. Even with the improved
performance in move-mailbox features
in Exchange 2003, it can take several
hours to move a large mailbox. During
this transition, user access to email is
limited. This makes migration planning more difficult and significantly
increases the visibility of the project.
Moving the content of legacy message stores into VERITAS Enterprise
Vault prior to migration reduces load
on the new Microsoft Exchange 2003
systems. In addition, older and possibly corrupt messages are not introduced into the new Exchange stores
where they could cause problems for
the database engine.
The volume of message traffic is
reduced because only tiny versions
of the original email (shortcuts) and
personal address books are sent to
the new message stores. The messages themselves remain safe in
Enterprise Vault. Users can also take
Project5
4/18/05
1:22 PM
Page 1
ADVERTISEMENT
advantage of a simple web-based
Archive Explorer if administrators
want to avoid populating mailboxes
with shortcuts.
Following the migration, VERITAS
Enterprise Vault continues to reduce
storage costs by using advanced compression technologies and sophisticated single instance storage techniques.
Evidence shows that overall storage
in Enterprise Vault can be up to 50%
less than the same email stored in the
native Exchange databases.
Consolidate Message Storage
To reduce demands on their current
Exchange data stores, many organizations set mailbox quotas and
require users to periodically archive
their email into PST files stored on
the users’ local hard drives or on
server-based file shares.
Imposing quotas and forcing
archival into PST files can become
notorious sources of support calls.
Quotas force users to manually whittle down their inboxes, sometimes
resulting in the deletion of an important message with subsequent need
for tape restores. PST files expose
archived messages to the possibility
With proper planning for network
bandwidth and storage I/O, user
access to archived messages in Enterprise Vault is nearly as fast as access to
messages in the Exchange stores.
of loss due to disk crash, lost laptops,
and file corruption.
Using Enterprise Vault, PST files
can be discovered and their content
automatically transferred into the
Vault. Messages from PST files are
merged with the user’s existing email.
Once safely stored in the Vault, users
get seamless and transparent access to
their messages, dramatically reducing
the size of the native Exchange stores.
Perform Fast, Seamless
Migrations
Using Enterprise Vault to assist in
managing Exchange message storage can be a critical success factor
in a migration.
There are a variety of situations
in which Enterprise Vault can be
deployed to assist in email migration.
For example, Enterprise Vault can be
deployed into a legacy Exchange 5.5
messaging system alongside a deployment into the Exchange 2003 system.
Existing email and public folder content in the legacy system is archived
into the Vault so that email migration
consists of simply transferring shortcuts and personal address books to
the new Exchange mailboxes. The
end result is a nearly instantaneous
transition to the new email servers.
Following the mailbox moves, PST
files can be harvested and placed in
the Vault. Transitions from thirdparty messaging systems such as Nov-
Project4
4/18/05
1:23 PM
Page 1
ADVERTISEMENT
ell GroupWise and Lotus Notes are
supported via PST-based migrations.
If moving the entire content of legacy message stores into Enterprise
Vault seems too aggressive, policies
can be put in place to archive older
messages while retaining current
email in the native Exchange stores.
This shortens the migration by reducing the volume of email that must be
moved across the network while
reducing the risk of corruption due to
unforeseen action by migration utilities or administrative error.
If project needs dictate, Enterprise Vault can be installed only in
the destination system. Following
the mailbox moves, older email can
be archived and PST files can be
harvested, thereby reducing the
storage requirements on the new
Exchange servers.
Engaging VERITAS early in the
planning stages for the migration project brings additional benefits because
VERITAS engineers can help identify
the places where Enterprise Vault can
improve efficiencies. The total cost of
Enterprise Vault could be quickly
reclaimed based on reductions in project time and storage requirements.
Streamline Regulatory
Compliance
In addition to the direct risk of data
loss and service interruption during
an email migration, organizations
face indirect costs associated with
assuring compliance both during and
after the migration.
VERITAS has done extensive
research into the technological
challenges involved with maintenance of historical email records.
Retention is only half the equation,
and often the less expensive half.
Full compliance demands that operational procedures include both
comprehensive retention and expedited discovery practices.
Responding to discovery demands
during regulatory audits or litigation
absorbs considerable operational
resources. Not only does discovery
impose costs in terms of time and
resources, the demands of discovery
can burden the IT staff to the point
that they are forced to forgo other
important duties. This degrades service levels.
VERITAS Enterprise Vault is
designed to address the storage
explosion caused by legal and regulatory requirements by providing
innovative tools for searching and
collecting information to aid in
compliance activities.
Messages are tagged upon receipt
and archived based upon retention
policies. If required, each message
depending on the organization’s
retention policies.
can be mirrored onto Write-Once
Read Many (WORM) media as it
enters the Vault, assuring compliance
with requirements to maintain tamper-proof copies.
To increase the evidentiary weight
of its content, Enterprise Vault
audits every event and action from
the moment a message is captured
throughout any subsequent searches, retrievals, analysis, and deletion.
If encryption is required to assure
compliance, Enterprise Vault supports the archival of pre-encrypted
content and unencrypted messages
can be encrypted as they are
archived using industry standard
encryption techniques.
Enterprise Vault also manages content expiry to ensure that any messages exceeding the retention policy
are highlighted via management
reports or automatically destroyed,
manage storage growth while reducing
associated hardware and management
costs. Most importantly, Enterprise
Vault has tools for simplifying archive
search and discovery to reduce compliance and litigation costs.
For more information, visit
www.veritas.com/enterprisevault.
About VERITAS Enterprise
Vault
VERITAS Enterprise Vault software
allows policy-based archiving of business critical information held within
Microsoft Exchange, Microsoft Office,
SharePoint products and technologies,
and within file systems. Archiving
information into Enterprise Vault
enables organizations to more easily
Copyright © 2003 VERITAS Software Corporation. All rights reserved.
VERITAS, the VERITAS Logo and
all other VERITAS product names
and slogans are trademarks or registered trademarks of VERITAS Software Corporation. VERITAS, the
VERITAS Logo Reg. U.S. Pat. &
Tm. Off. Other product names and/or
slogans mentioned herein may be
trademarks or registered trademarks
of their respective companies. Specifications and product offerings subject
to change without notice.
Project2
3/30/05
3:11 PM
Page 1
Finally, A Clear “Right” Choice in Enterprise E-mail Security
SurfControl E-mail Filter 5.0 has broken through, setting a new standard for protection
against spam and e-mail borne malicious attacks. Only SurfControl E-mail Filter gives you
the world's most continuously updated database of harmful URLs, so links to spyware
sites can be blocked at the gateway. And, with automated, customized reports, it's easier
than ever to gain precise visibility into your business operations and ensure legal and
regulatory compliance.
Download a FREE trial today, www.surfcontrol.com
Or call us at 1 800.368.3366
© 2005 SurfControl plc.
Filters
Web, E-mail, IM/P2P, Mobile
Threat Prevention Leadership
Over 20,000 Customers
Largest Content Database
Day-Zero Protection Technology
Global Threat Command Centers
0505red_TOC_3.v9
4/15/05
4:56 PM
Page 1
Redmond
M AY 2 0 0 5
W W W. R E D M O N D M A G . C O M
THE INDEPENDENT VOICE OF THE MICROSOFT IT COMMUNITY
COVER STORY
Content Cops
Should IT be the bad guy?
Many businesses expect IT to use
the equivalent of a radar
gun and monitor employees for
infractions. But laying
down the law can have serious
repurcussions, both for employees
and and the IT departments
doing the watching.
REDMOND REPORT
11 News Analysis
Eight-way Takes a Body Blow
12 Event Log
Windows SBS 2003 SP1, how
WinHEC is shaping up and more.
14 Redmond Roadmap
Microsoft Looks to Yukon for Data
Mining Gold
16 Finding a Collaboration Groove
Page 42
PHOTO BY SIMON WILSON
F E AT U R E S
51 6 Steps to a Simpler Network
There’s a saying in IT that “complexity is the enemy of security.” It’s also the
enemy of efficiency, troubleshooting and other critical network functions.
Here are six ways to untangle that crowded web you’ve woven.
Page 11
Page 56
56 Managing in Isolation
Remote management has never been a Microsoft
strong suit, but Windows Server 2003 is helping
users manage servers that no IT staff can touch.
COLUMNS
6
Chief Concerns: Doug Barney
Police the ’Net
28 Beta Man: Don Jones
When I’m 64
63 7 Tips for MOM
Advice from an in-the-trenches expert for getting the most out of
Microsoft Operations Manager.
Asset Navigator helps you keep
tabs on what you have and how it’s
being used.
21 Many Files Through
a Single View
StorageX takes a
global approach to
streamlining file
management.
23 Restore Those
Lost E-Mails
Recovery Manager lets you do
large-scale, store-level Exchange
backups while still helping to locate
and restore individual messages.
Extend the Limits of Group Policy
71 Mr. Script: Chris Brooke
REVIEWS
19 What You Got?
67 Windows Insider: Bill Boswell
Auto-confirm with PopUp
25 No Scripting Required
ADtoolkit enables anyone to perform
Active Directory group edits.
33 Your Turn
The Good and the
Bad of MBSA
Microsoft’s free vulnerability
scanner works well—as long as you
don’t have to stretch it too far.
36 Redmond Roundup
Keep an Eye on
Those Servers
The right server management tool
closely monitors your network and
offers proactive responses to most
common problems.
73 Security Advisor:
Joern Wettern
Picking the Right Firewall
80 Ten: Paul Desmond
Names for Windows XP sans
Media Player
ALSO IN THIS ISSUE
4
Redmond magazine online
8
Letters to Redmond
79 Ad and Editorial Indexes
0505red_OnlineTOC_4.v5
4/15/05
4:47 PM
Page 4
redmondmag.com
M AY 2 0 0 5
M AY O N L I N E
REDMOND COMMUNITY
REDMONDMAG.COM
Redmond Newsletters
New Online-only Column: Redmond Negotiator
• Redmond Report: Our weekly e-mail
newsletter featuring news analysis, context
and laughs. By Redmond’s Editor in Chief
Doug Barney and Editor Paul Desmond.
FindIT code: Newsletters
Redmondmag.com is proud to announce a new, exclusive column that will be
appearing on our site every month: Redmond Negotiator.
Written by self-described “licensing geek” and negotiating guru Scott Braden,
this column offers you practical, inside tips for understanding Microsoft’s various
licensing agreements and getting your
company the very best deal possible.
To launch the column, Scott’s written a
multi-part series packed with tips
and tricks for those with Enterprise
Licensing 6.0 contracts.
FindIT code: Braden
• Security Watch: Keep current on the
latest Windows network security topics.
This newsletter features exclusive,
online columns by Contributing Editor
Russ Cooper of NTBugTraq fame and
news from ENT.
FindIT code: Newsletters
Discussion and Forums
Post your thoughts and opinions under
our articles, or stop by the forums for
more in-depth discussions.
FindIT code: Forum
Your Turn
The interactivity center of the
Redmond universe, where you get to
express your views.
FindIT code: YourTurn
OTHER 101COMMUNICATIONS SITES
ENTMag.com
Special Report: “Server Hardware Trends”
It’s not just blades and SMP anymore:
Scott Bekker on what to watch in 2005
and beyond.
http://entmag.com/reports
CertCities.com
News: “Microsoft Announces Architect Cert”
High-level board certification is in
development; Microsoft says it wants
to rival Cisco’s CCIE.
http://certcities.com/editorial/news/
story.asp?EditorialsID=823
TCPMag.com
Exam Review: “Cisco’s Remote Access Exam”
Andy Barkl offers an inside look at
this Cisco Certified Network
Professional exam.
http://tcpmag.com/exams
Scott Braden offers his best Microsoft
deal-making tips in Redmondmag.com’s
new monthly column, Redmond
Negotiator. FindIT Code: Braden
MCPMAG.COM
A Mike Gunderloy May two-fer: First, he
cuts through the fabric that shrouds the
four pillars of Longhorn and then picks at
the warts of XML coding practices.
Join Andy Goodman, Microsoft MVP
and Small Business Server expert, for an
online chat for SBS lovers and haters.
The event takes place Tuesday, May 17,
7-8 p.m. ET.
On MCPmag.com weekly: Bill
Boswell’s Q&A, Windows performance
and scripting tips from Don Jones.
MCP Radio
Hear a new audiocast every Monday in
streaming Windows Media Player or
download the MP3 format for portable
listening. Archived shows include
interviews with Windows third-party
movers and shakers from jProductivity,
Raxco Software and ScriptLogic.
Scheduled for May: Sybari and Verisign.
http://mcpmag.com/mcpradio
4 | May 2005 | Redmond | redmondmag.com |
Redmond Radio Now Weekly
Start your week listening to the news that
makes headlines on Redmondmag.com
and ENTmag.com. New Redmond Radio
broadcasts are posted every Monday.
Archived episodes include interviews with
Network Engines’ John Curtis and
Microsoft TechNet’s Scott Stout.
FindIT Code: Radio
FindITCodes
Throughout Redmond, you’ll
discover some stories contain FindIT
codes. Key in those codes at
Redmondmag.com to quickly access
expanded content for the articles
containing those codes.
Some of the FindIT codes for this
month include:
• Goldmine: Check out additional
resources about SQL Server and data
mining (Redmond Roadmap, p. 14).
• ContentCops: More information
covering legal concerns, employee
monitoring policy creation advice
and technical solutions (May’s cover
story starts on p. 42).
• PickFirewall: Follow links
to the vendors mentioned in this
month’s Security Advisor column
(begins on p. 73).
Enter the code in the box at the topright corner of any Redmondmag.com
page. (Note that all FindIT codes are
one word, and are NOT case sensitive.)
Project6
4/1/05
2:50 PM
Page 1
YOUR INFRASTRUCTURE MAY PROTECT EMPLOYEES INSIDE.
What protects employees outside?
She works from home. She works from the road. And she endangers
the network everywhere she goes. That’s why you need Websense
software—to provide security protection at the desktop and beyond.
Close the security gap. Download your free evaluation today.
www.websense.com/mobile3
© 2005 Websense, Inc. All rights reserved. Websense is a registered trademark of Websense, Inc. in the United States and certain international markets.
0505red_Chief_6.v4
4/15/05
4:36 PM
Page 6
ChiefConcerns
Doug Barney
Police the ’Net
S
ometimes when you’re right, you’re right. I have been
right about one thing for the past 10 years, and no it’s
not my view that TV psychic John Edwards and
psycho-babble blowhard Dr. Phil are both snakes. It’s my
long-held belief that a strong, relentlessly applied public
policy is the only way to put a dent in the
number of jerks attacking our computers.
Why am I so irritated? It’s because of
Lauren, my 16-year-old daughter. I’m
used to her ignoring me or rolling her
eyes like I don’t have a clue about anything. But I’m steamed that her laptop
for which I paid good money is totally
unusable, overrun with viruses, spyware
and who knows what else.
I know some of you might blame me
for not loading up her Dell lapper with
protective software, but you’d be wrong.
She has anti-virus and anti-spyware software and the XP firewall is turned on.
Maybe it’s her near-constant use of
IM, but somehow this garbage sneaks
through all those defenses.
I’m also tired of Microsoft taking all
the blame for this. Microsoft didn’t
write these viruses. It’s impossible to
protect PCs that are so liberally connected and incessantly attacked. It’s
time for a major national debate on how
government and law enforcement
should intervene. Of course, trying to
get Fox News and CNN to talk about
hackers is like getting Bill O’Reilly to
admit to sexual harassment. For TV
news, there’s simply no time, what with
the Congressional steroid hearings, the
Michael Jackson trial, Terri Schiavo, the
confirmation of Britney being pregnant
and Ashley Simpson’s horrible singing.
Experts tell me how powerless the
government is against this problem, and
that even if the United States did something to lock down, the Internet is so
universal that attacks would shift to
other countries. Great, so we should just
give up and let software do all the work
it’s failing to do already? Wrong answer.
Can government intervention solve the
problem? Probably not. Can it help
reduce the problem? It’s worth a shot.
We need stronger laws, better enforcement and vastly better forensics. We also
need to look at the informal structure of
the Internet and decide if it’s in the best
interest of our national and personal
security. Is anonymity a good thing if
the bad guys can use it as a hiding place?
What about building an identificationbased subset of the Internet that is far
more secure? You could connect from
your company or home, and based on
your credentials, you could access a limited range of safer sites. Beyond that
horizon—you surf at your own risk.
Busting the Content Cops
If you haven’t already, don’t miss Becky
Nagel’s cover story, “Content Cops,” on
p. 42. In 2001, when I was the editor in
chief of Network Computing magazine, I
met with a Web filtering vendor who
couldn’t stop bragging about his product. The first morning one customer
installed it, the IT folks got an eyeful.
One of their own was looking at Web
sites of a certain orientation. This IT
pro, who was at work earlier than I’ve
ever been, was outed by his peers. To
the vendor, this was a success.
Those IT folks had no business
invading this poor fellow’s privacy,
ruining his reputation and laughing
behind his back. If content must be
tracked to enforce written corporate
policies, HR and management need
to handle these delicate issues, and
they should be well trained. Do
you agree? Disagree? Let me know at
[email protected].—
6 | May 2005 | Redmond | redmondmag.com |
Redmond
THE INDEPENDENT VOICE OF THE MICROSOFT IT COMMUNITY
MAY 2005
■
VOL. 11
■
NO. 5
Editor in Chief Doug Barney
[email protected]
Editor Paul Desmond
[email protected]
Executive Editor, Reviews Lafe Low
[email protected]
Managing Editor Keith Ward
[email protected]
News Editor Scott Bekker
[email protected]
Assistant Managing Editor, Wendy Gonchar
Web Editor [email protected]
Editor, Redmondmag.com, Becky Nagel
CertCities.com [email protected]
Editor, MCPmag.com Michael Domingo
[email protected]
Editor, ENTmag.com Scott Bekker
[email protected]
Associate Editor, Web Dan Hong
[email protected]
Contributing Editors Bill Boswell, MCSE
Chris Brooke, MCSE
Don Jones, MCSE
Joern Wettern, Ph.D., MCSE
Art Director Brad Zerbel
Graphic Designer Graye Smith
Publisher
Associate Publisher
Director of Print Production
Manufacturing &
Distribution Director
Audience Development Manager
Marketing Manager
Senior Web Developer
Conference Sales Director
Marketing Programs Associate
Henry Allain
Matt N. Morollo
Mary Ann Paniccia
Carlos Gonzalez
Janice Martin
Michele Imgrund
Rita Zurcher
Al Tiano
Videssa Djucich
Enabling Technology Professionals to Succeed
President & CEO
Executive VP & CFO
Executive VP
Senior VP &
General Counsel
Senior VP, Human
Resources
Jeffrey S. Klein
Stuart K. Coppens
Gordon Haight
Sheryl L. Katz
Michael J. Valenti
Redmondmag.com
The opinions expressed within the articles and other contents
herein do not necessarily express those of the publisher.
Postmaster: Send address changes to
Redmond, 2104 Harvell Circle, Bellevue, NE 68005
Project5
4/5/05
11:06 AM
Page 1
ADVERTISEMENT
Slow systems?
Breakthrough technology keeps them running at top speed
One of the most common questions that
comes up when talking about Diskeeper® is
“Why pay for a defragmenter when Windows
has one for free?”
To answer this question, let’s compare
defragmentation
to
housecleaning.
Everyone’s house gets dirty, and there are
basically three ways to handle it:
1. Do nothing. The house gets dirtier and
dirtier, stuff starts to pile up, the smell
gets worse and neighbors start calling
the health department. Eventually the
house gets so dirty that it’s
uninhabitable, so you move out and find
another place to live. (This scenario is
similar to never defragmenting.)
2. Clean it yourself. This usually requires
carving at least an hour or so per day out
of your free time. (This scenario is like
defragmenting your systems with a
manual defragmenter.)
3. Hire a housecleaning service to come in
and clean on a regular basis. (Automatic
defragmentation.)
Do it yourself?
#2 seems like a reasonable solution.
After all, plenty of people clean their own
houses, right? In theory, yes. In reality, things
come up—weekend plans, long work hours,
etc. You might only have a few minutes to
straighten up, or you might skip a couple of
day's worth of cleaning altogether. End
result: the house is rarely as clean as it could
be, and when you do clean, it takes much
longer than it should. Likewise, the process
of manual defragmentation takes so long and
involves so much IT staff time that it rarely
gets done.
The most effective way to keep your
house clean is to have it done automatically,
on a regular basis. And the most effective
way to keep your systems running at top
speed with maximum reliability is to have
them defragmented automatically.
Keep your systems running fast — automatically.
into the evening. And while you like having
a clean house, it’s annoying to have to wait to
eat dinner because someone is polishing the
chrome on your oven door. Or to have to park
on the street because someone was midway
through straightening up the garage just as
you got home from work. The same is true of
defragmentation. A defragmentation run that
kicks off at the wrong time can turn into a
major headache and seriously disrupt your
organization’s workflow.
Automation with convenience
The perfect cleaning service is one that
works around you. You can tell them when
you want them to clean, or they can decide
how often to clean based on how quickly
your house gets dirty. They take care of the
big stuff first—counters, floors, bathroom—
so that you have a clean house as quickly as
possible. Minor chores, like polishing the
chrome in the kitchen or cleaning the garage,
are done at times when they won’t
inconvenience you. And if they do happen to
be cleaning a room you need to use, they get
out of your way immediately.
That’s how Diskeeper 9, The Number One
Automatic Defragmenter™, works.
Diskeeper 9:
The Number One Automatic Defragmenter
Diskeeper is a software system that
completely eliminates the problems caused
by fragmentation. Diskeeper 9 uses unique
adaptive technology that works around your
organization’s workflow. You can implement
Diskeeper 9 on every server and workstation
right from your own desktop. Once
Diskeeper is deployed, the problem of
fragmentation simply goes away. Operation
of Diskeeper 9 is almost completely
transparent, which is why we call it the “Set
It and Forget It”® defragmenter!
See the difference for yourself.
Download the FREE 30-day trial edition of
Diskeeper 9 now!
TRY DISKEEPER FREE FOR 30 DAYS
www.diskeeper.com/redmond2
For volume license pricing and government
or educational discounts, call
800-829-6468 reference number 4319
Find the right solution
Let’s say you hire a cleaning service to
come to your house once a week and scrub
the daylights out of it. They vacuum carpets,
clean windows, polish furniture, organize the
attic, etc., etc. It takes them all day and well
The Number One Automatic Defragmenter
© 2005 Executive Software International. All Rights Reserved. Diskeeper, The Number One Automatic Defragmenter, Set It and Forget It, Executive Software and the Executive Software logo are registered
trademarks or trademarks of Executive Software International, Inc. in the United States and/or other countries. Microsoft and Windows are either registered trademarks or trademarks owned by Microsoft
Corporation in the United States and/or other countries. Executive Software International, Inc. • 7590 N. Glenoaks Blvd. Burbank, CA 91504 • 800-829-6468 • www.executive.com
0505red_Letters.v9
4/15/05
4:44 PM
Page 8
ILLUSTRATION BY JASON SCHNEIDER
Letters to Redmond
Slapstick Security
I’ve just read Mr. Winkler’s article, “Dumb and Dumber,”
in the March 2005 edition of Redmond magazine. It was a
very humorous and thought-provoking read. I currently
work for a small computer-consulting firm in Louisville,
Ky., and we’ve been concerned about some of our clients’
security practices, which were included in this article. I
look forward to reading Ira’s book!
—Michael Morgan
Louisville, Ky.
Excellent article [Ira Winkler’s “Dumb
and Dumber”] in this month’s issue. I’ve
got a similar background and work
on many projects as the information
assurance manager of a large company
(40,000+).
Earlier, during a time when I had my
own business, I did penetration tests
and found very similar results.
—Timothy Hoffman, C++, Security+
Colorado Springs, Co.
I read with great interest Ira Winkler’s
article. The day I heard the term
“social engineering,” my interest in
securing the workplace network/
Internet environment significantly
increased. I don’t have the experience
he and his team have, but I do employ
some of the techniques he uses. I’ve
done security walkthroughs for a few
companies and I’m surprised by the
confidence
that
some
network
admin/security people have regarding
the well-being of their systems. And
the ease with which some people give
up their passwords is totally amazing.
His article provides good lessons for
all of us. Oh yes, I get calls from people stating they’ve been hired to check
out our system, but I know better. I
wasn’t trained in espionage when I was
in the Army, but I’ve picked up a few
tricks from those who have been.
Night and Day
Scott McNealy’s comments (“Think
Sun,” March 2005) make him and his
company seem more pathetic than ever (a
thousand pardons to my Sun peeps out
there). Sun has always had trouble listening to its customers and nothing has
changed. If it wasn’t for the Microsoft
handouts, where would he be? Sun’s
hardware is too expensive. Java may be
developer-friendly, but for end users it’s
still too slow and clunky. Has Scott ever
used his own Sun Java admin tools? And
heaven help the user who has multiple
Java applications that require different
versions of Java Run-time Environments.
As for his comment that he doesn’t
need to run Windows apps because,
“there are no applications inside of Sun
that need Windows,” wake up and smell
the real world outside your office, Scott.
Most of us (i.e., your customers) do have
apps that require Windows. Perhaps it’s
time for Sun to fade into obscurity and
make more room for fresher, faster
competition like Linux and Mac OS X.
—Christopher Vera, GCFA, CISSP,
SCSA, CCNA, MCSE
San Diego, Calif.
Factor of Zero
I very much agree with Doug Barney’s
assessment of how Microsoft’s commitment to announcing realistic delivery
dates for its products and releases cause
much uncertainty [Chief Concerns column, “Blind (Ship) Dates,” March 2005].
Not only does this impact the
planning process for new systems,
upgrades, deployments and budgeting,
but it creates confusion and uncertainty
about current and future licensing costs.
For many products, the value of
purchasing Software Assurance (SA)
along with the license has diminished to
zero, as the SA agreement expires without a new version or upgrade being
delivered. Maybe it’s time for Microsoft
to review its SA policy, and agree to
have the SA coverage date be x number
of years, or when the next version is
delivered, whichever is longer.
Whaddya Think
?!
Send your rants and raves
about stories in this issue to
[email protected].
Please include your first and last
name, city and state.
I think Scott McNealy’s point comes
down to: “If you don’t need all of the
[Microsoft] Office bells and whistles,
why buy them?” And he’s right!
This would add substantial value to the
SA investment, and guarantee the
purchaser some value for their dollar.
—Claude Moore
Colorado
—David Finkelstein
New York, N.Y.
—Thomas M. Hansen
Kansas City, Mo.
8 | May 2005 | Redmond | redmondmag.com |
Project1
3/21/05
2:21 PM
Page 1
Exchange Server stores & PSTs driving you crazy?
Archive all mail to SQL and save 80% storage space!
Only
$3a9i9lboxes;
m
for 50
$1499ited
lim
for unboxes*!
mail
And ease Exchange back-up & restoration too!
Email archiving solution for internal and external email
GFI MailArchiver for Exchange is an easy-to-use email archiving solution that enables you to archive all internal
and external mail into a single SQL database. Now you can provide users with easy, centralized access to past email
via a web-based search interface and easily fulfill regulatory requirements (such as the Sarbanes-Oxley Act).
GFI MailArchiver leverages the journaling feature of Exchange Server 2000/2003, providing unparalleled scalability
and reliability at a competitive cost. Use it to:
• Provide end-users with a single web-based location in which to search all their
past email
• Increase Exchange performance and ease backup and restoration
• End PST hell by storing email in SQL format
• Significantly reduce storage requirements for email by up to 80%
• Comply with Sarbanes-Oxley, SEC and other regulations.
Searching for an email
Download your FREE trial version from www.gfi.com/mr
*per Exchange Server
tel: +1 888 243 4329 / +1 919 388 3402 | email: [email protected] | url: www.gfi.com/mr
Project4
3/8/05
2:08 PM
Page 1
:PVSXFBQPO $PVOUFS4QZ&OUFSQSJTF
$FOUSBMJ[FETQZXBSFFSBEJDBUJPO
4QZXBSF UIF OFX OVNCFS POF FOFNZ GPS *5
2ECENT SURVEYS OF )4 SPECIALISTS SHOW THAT SPYWARE
INFECTIONS HAVE REACHED EPIDEMIC PROPORTIONS
1PXFSGVM DPNQSFIFOTJWF TQZXBSF
TDBOOJOH #OUNTER3PYS SCANNING ENGINE USES
THREAT SIGNATURES FROM MULTIPLE SOURCES TO HUNT
3PYWARE IS ONE OF THE MOST SERIOUS SECURITY THREATS AND PRODUCTIVITY KILLERS
DOWN AND DELETE MORE THAN CATEGORIES OF SPYWARE ADWARE AND OTHER
TODAY )TS INSIDIOUS )TS CREATORS ARE WELLlNANCED RELENTLESS AND REMORSE
MALWARE 3PYWARE DOESNT STAND A CHANCE 8FWF SFDSVJUFE BO BSNZ
LESS &OR THE ENTERPRISE COM
UP DPNCBU TQZXBSF .EW SPYWARE COMES OUT ALL THE TIME 4HATS WHY
MON ANTISPYWARE CANT CUT IT
IN ADDITION TO OUR OWN RESEARCH TEAM WE HAVE #OUNTER3PY 4HREAT.ET˜
$PVOUFS4QZ &OUFSQSJTF
#USTOMERS OF OUR CONSUMER VERSION REPORT NEW POTENTIAL THREATS TO
,OPDL PVU TQZXBSF
4HREAT.ET FOR ANALYSIS 4HEN WE PROPAGATE NEW THREAT SIGNATURES TO ALL
GSPN POF DFOUSBMJ[FE
USERSˆCONSUMER AND ENTERPRISE 3UNBELT COMBINES FORCES TO HIT SPYWARE
MPDBUJPO #OMPANYWIDE
(ARD 'SFF USJBM 'JOE PVU IPX NBOZ NBDIJOFT JO ZPVS
SPYWARE MANAGEMENT REQUIRES A REAL ENTERPRISE PRODUCT WITH CENTRALIZED
PSHBOJ[BUJPO BSF JOGFDUFE /08 3CAN YOUR MACHINES FOR FREE
MANAGEMENT #OUNTER3PY %NTERPRISE IS JUST THAT A SCALABLE POLICYBASED
$OWNLOAD THE TRIAL AT WWWSUNBELTSOFTWARECOMCSERED
SECONDGENERATION ANTISPYWARE TOOL BUILT FROM THE GROUND UP BY AND FOR
SYSTEM AND NETWORK ADMINISTRATORS TO KILL SPYWARE QUICKLY AND EASILY
-՘LiÌ -œvÌÜ>Ài /i\ £‡nnn‡ /1/- ­Ènn‡n{xÇ® œÀ £‡ÇÓLJxÈӇä£ä£ >Ý\ £‡ÇÓLJxÈӇx£™™ ÜÜÜ°Ã՘LiÌ‡ÃœvÌÜ>Ài°Vœ“ Ã>iÃJÃ՘LiÌ‡ÃœvÌÜ>Ài°Vœ“
^ÊÓääxÊ-՘LiÌÊ-œvÌÜ>Ài°ÊÊÀˆ}…ÌÃÊÀiÃiÀÛi`°Ê
œÕ˜ÌiÀ-«Þ >˜`Ê/…Ài>Ì iÌ >ÀiÊÌÀ>`i“>ÀŽÃʜvÊ-՘LiÌÊ-œvÌÜ>Ài°ÊÊÌÀ>`i“>ÀŽÃÊÕÃi`Ê>Àiʜܘi`ÊLÞÊ̅iˆÀÊÀiëiV̈ÛiÊVœ“«>˜ˆiðÊ
0505red_Report_11-16.v6
4/15/05
4:50 PM
Page 11
RedmondReport
May 2005
INSIDE:
Microsoft tries to find its
collaboration groove.
Page 16
Eight-way Takes a Body Blow
Beefed-up four-ways and “Truland” take center stage.
BY SCOTT BEKKER AND STUART J. JOHNSTON
After a swift rise and successful reign,
it’s the end of an era for eight-way
x86-architecture servers.
Not long ago the eight-processor
server represented the pinnacle of
Windows scalability. The eight-way
ushered Windows NT 4.0 into the
rarified top 10 of the closely watched
OLTP benchmark, the TPC-C. Later, a
cluster of
eight-ways
running
Windows 2000 and SQL Server 2000
held the top spot on the same
benchmark for months.
In the real world, the eight-way
anchored some of the biggest
Microsoft-based databases. Microsoft
cracked the most recent Winter Corp.
survey of the 10 largest production
databases in late 2003. The servers
running the 5.3TB, 33-billion-row
Verizon Communications database
weren’t on some behemoth like the
32-processor Unisys ES7000. The
database ran on a cluster of Compaq
ProLiant eight-ways.
The eight-way
server took what
is probably its
death blow in
March when
Hewlett-Packard
disclosed plans to
discontinue the
With dual-core processors coming, HP expects four-way servers
line in mid-2006. like the new HP ProLiant DL580 G3 to fill the niche currently
occupied by eight-ways.
Dell bowed out
of the eight-way market in July 2003.
way up to 32. When HP stops selling
HP’s move is especially telling,
its eight-ways, this era of distinct
as the Compaq ProLiant brand it
eight-way x86 units will be over.
inherited was the flagship of the
But it’s out with the old, in with the
eight-way market.
new. HP announced the shutdown of
Dell’s decision came as the costthe ProLiant eight-way line as it
conscious company shifted away from
brought up two new servers based on
the engineering-intensive design of
Intel’s “Truland” platform.
SMP chipsets toward smaller, comTruland includes a chipset and
modity servers. Dell favors two-way
processors that will support 64-bit
servers that function well as nodes in
extensions and dual-core processors
scale-out computing environments.
for the Xeon Processor MP line of
The other x86 server industry giant,
chips designed for four-way and
IBM, continues to sell eight-processor
larger systems. The 64-bit extension
machines. Like Unisys, which also
technology is available in current chips.
offers eight-ways, IBM’s eight-ways are
The first dual-core chip for Truland,
a step in a modular server system that
dubbed “Paxville,” will be available in
can scale from four processors all the
the first quarter of 2006.
“With the emergence of dual-core
processors in the four-processor
x86 market … HP will satisfy the
vast majority of current eight-way
performance requirements with
Microsoft, the 41st-largest U.S.-based corporation on the Fortune 500 list,
four-processor, eight-core ProLiant
maintains a massive internal server infrastructure for its own operations. A
servers,” says Colin Lacey, director of
recent Microsoft white paper describing the internal rollout of Windows Server
platform marketing for Industry
2003 SP1 provides some details.
Standard Servers at HP.
The eight-way could mount a
Forest
Domains
Domain
Total
Users
Controllers
Servers
comeback someday if the scale of
Corporate
9
203
~6,500
65,000
64-bit applications somehow explodes
Pre-production
3
8
38
3,000
or if multi-core technology flops.
Extranet
3
40
~3,400
26,000
Most likely, though, the need for these
TOTAL
15
251
~9,938
~94,000
SMP systems will fade as the number
of cores per processor multiplies.
NewsAnalysis
BytheNumbers
Belly of the Beast
| redmondmag.com | Redmond | May 2005 | 11
0505red_Report_11-16.v6
4/18/05
11:13 AM
Page 12
RedmondReport
EventLog
A roundup of Windowsrelated happenings
Windows SBS 2003 SP1
Cool your heels for one more month, and Microsoft
should have Service Pack 1 ported to Windows Small
Business Server 2003.
The monumental Service Pack 1
for Windows Server 2003 hit the
Web in late March, five quarters
behind Microsoft’s original schedule of Q4 2003. In addition to bug
fixes, performance enhancements
and security fixes, SP1 also includes
major new features, especially for
server security. The special version
for Small Business Server, like the
small-business product itself, will
be designed to install seamlessly
for organizations with few or no
full-time IT staff. For more information, visit: http://snipurl.com/dvl9.
Windows for Grids SDK
The version of Windows for smallto-medium supercomputing grids
is rescheduled. The public beta of
Windows Server 2003 Compute
Cluster Edition planned for the first
half of this year is now a secondhalf event. General availability is
pushed out into 2006.
Some code is out there for
beavers eager to try the new
code. Microsoft pushed out a
Software Development Kit late
last year and will refresh it this
summer ahead of the beta.
Microsoft executives believe
they see an underserved market
BlogoMSphere
for the Compute Cluster Edition.
While lots of development is
poured into high-end Linux clusters that populate the Top 500
supercomputing list, Microsoft
thinks smaller clusters in the
neighborhood of 16 or fewer
nodes have promise for enterprise
applications. Massive scale-out
clusters will surely figure as proof
points for the technology, but
Microsoft characteristically sees
its best opportunity in a mass
market of modest deployments.
Class of 2006
The year 2006 could shape up
to be a busy one for shops
committed to keeping current on a
Microsoft infrastructure. At the
recent launch of Intel’s “Truland”
computing platform for Intel Xeon
MP-based servers, Microsoft
Corporate Vice President for
Server and Tools Andy Lees listed
a host of products to be delivered
in 2006 that will support the x64
chips and eventual dual-core
architecture of the platform. They
include Exchange Server 12
(previously discussed as coming in
2006 or 2007), Host Integration
Server 2006, Commerce Server
2006, BizTalk Server 2006, icrosoft
Operations Manager and Virtual
Server v2. Stay tuned. This schedule is extremely likely to change.
WinHEC Shapes up To Be a
Major Show
Lees and other Microsoft executives confirmed the Windows
Hardware Engineering Conference
(WinHEC) in Seattle in late April
was to mark the formal launch of
the Windows x64 Editions, which
were released to manufacturing in
late March. They include Windows
XP Professional x64 Edition and
Windows Server 2003 x64
Standard Edition, Enterprise
Edition and Datacenter Edition.
The operating systems are
Microsoft’s stamp of approval on a
wave of 64-bit extension hardware
that is expected to rapidly replace
32-bit x86 systems in the new
shipment category over the next
few months. But helping to usher
in a sea change in computing
won’t be the only reason
WinHEC is important this year.
Pre-conference agendas showed
Microsoft was ready to reveal
extensive details on the Windows
“Longhorn” operating system for
the first time since the Professional
Developers Conference in 2003.
Check Redmondmag.com for
extensive coverage of WinHEC,
and look to next month’s issue for
several in-depth articles on
Microsoft’s next major OS.
— SCOTT BEKKER
Interesting quotes pulled from blogs by current or former
Microsoft employees or about Microsoft technologies.
“I met with Brian Valentine, our Sr. VP in charge of Windows, who asked that I take on running the x64 project. He
points over to [original Windows NT architect] Dave Cutler’s office nearby and says my job will be to make sure Dave is
happy. [Then] Brian lets out a good laugh.”
— One of many tidbits from a lengthy April 5 post aptly named, “Windows Server 2003 SP1 and X64 Editions – A Historical Perspective,” by Clyde Rodriguez,
a group program manager in the Windows Server Division. (http://blogs.technet.com/windowsserver/archive/2005/04/05/403360.aspx)
12 | May 2005 | Redmond | redmondmag.com |
Project1
3/31/05
12:48 PM
Page 1
Are You Preventing
Exchange Server
Failure, or Just
Preparing for It?
Reactive measures won’t prevent a disaster, repair problems or accelerate performance.
As an administrator, you understand the mission-critical nature of the collaborative information
that flows through your Exchange servers. In today's dynamic business environment, your servers
are strained to the limit, and failure is not an option.
Prepared for the Worst?
To protect the information flow and minimize the cost of unplanned Exchange server downtime and
data loss, organizations devote enormous resources to reactive solutions such as continuous
back-up, monitoring, and high-availability systems. Many organizations also implement Exchange
archive solutions to comply with legal and other regulations such as HIPAA and Sarbanes – Oxley.
Exchange Database Before
• Degraded performance
• Questionable stability
• Bloated message store
• Erratic and strange behavior
• Multiple errors and warnings
• Deleted items still intact
Exchange Database After
• Optimized message stores
• Reduced store size by 38%
• 1557 errors removed
• 232 warnings corrected
• Increased performance & stability
• Deleted items completely removed
Go to www.Lucid8.com/GOexchange
– review the Whitepapers and Case
Studies, then evaluate GOexchange,
and get a FREE t-shirt.*
*see website for details
Reactive vs. Proactive Solutions
Reactive and archive solutions only protect you if your Exchange
databases are healthy. But the Exchange database is the Achilles
heel of the entire operation. Therefore, the key to preventing
server failure is to implement a proactive solution that ensures
the health, stability, and optimization of the Exchange databases.
Protect Yourself with GOexchange
GOexchange, from Lucid8, is the only automated preventative
maintenance solution for Microsoft Exchange 5.5, 2000, and
2003 that prevents disasters, repairs problems and improves
performance. GOexchange minimizes unplanned downtime, checks
and corrects errors, and increases performance and stability
by rebuilding indices and reducing the size of your Exchange
information stores by 30 to 55%.
See for yourself why organizations worldwide are implementing
GOexchange. Download your FREE demo now at www.Lucid8.com,
or call 425.451.2595.
0505red_Report_11-16.v6
4/15/05
4:50 PM
Page 14
RedmondReport
Microsoft Looks to Yukon for Data Mining Gold
Latest attempt to bring data mining to the masses with SQL Server 2005
hinges on new features, ease-of-use and low cost.
BY SCOTT BEKKER
Of the dozens of feature sets that
Microsoft added or improved since its
last SQL Server release, one area that
received a particularly significant overhaul is data mining. So much so that
Microsoft execuRedmond
tives contend data
mining could go
mainstream when
SQL Server 2005 (“Yukon”) ships in the
second half of this year.
Jamie MacLennan, Microsoft’s data
mining development lead for SQL
Server, describes three pieces of a puzzle
that will make Yukon an “accelerating
factor” for data mining:
• The bundling of new business intelligence, data warehousing and other
database technologies into the core
database at no extra cost will lead to
broad deployment of the technology,
although it won’t guarantee use.
• Microsoft’s focus on ease of use and
integration with developer tools
(Visual Studio 2005 is to ship simultaneously with SQL Server 2005)
should spur usage.
• The low cost compared to traditional
data mining tools will leave customers with money to invest in thirdparty tools or services to get their
data mining projects off the ground.
“A huge number of customers will have
data mining functionality licensed
in their enterprises,” MacLennan
says. “Before, people had to do a
million-plus dollar investment in data
mining tools.” That left little money
for customers to spend on third-party
consulting firms to help with
their implementations.
Microsoft points to the OLAP database world as an example of what
could happen.
Roadmap
“Before SQL Server 7.0, OLAP was a
niche technology with high-end consultants and expensive tools. Now there
are actually more consultants, but you
also have more IT shops doing it themselves. One major leg of the cost is
taken away,” he explains.
If some of this sounds familiar, it is.
Five years ago, Microsoft had similar
hopes of spurring mainstream adoption
of data mining. It included mining capabilities with the OLAP engine in SQL
Server 2000 as part of a business intelligence package called Analysis Services.
A major difference with Yukon, according to MacLennan, is time. With SQL
Server 2000, Microsoft decided to add
data mining functionality late in the
product cycle. “In Yukon, now we’ve had
a long product cycle to develop a robust
feature set.”
Data mining has been around for a long
time, but it’s still a somewhat mysterious
and little-used art. The idea is to take a
huge set of data and run mathematical
algorithms against it to
find hidden patterns
and relationships.
The root of data
mining
involves
statisticians working with existing
data sets to create
data models that
can then be used
within
real
applications to
find correlations or predict
events.
Examples of
applications
14 | May 2005 | Redmond | redmondmag.com |
that benefit from data mining algorithms
are credit checks, airplane engine failure
predictions and oil/gas exploration.
One of the limits on data mining in
SQL Server 2000 was that it had only two
algorithms—a small number relative to
other data mining tools. Microsoft added
seven more algorithms in Yukon, including regression trees, sequence clustering,
association rules and time series. It also
included a capability called text mining, a
tool for finding trends in unstructured
data such as e-mails and documents.
Microsoft isn’t playing up the new
algorithms much. Data mining users get
the most benefit from decision trees
and clustering algorithms that already
existed in SQL Server 2000, MacLennan says: “I would say the algorithms
are the smallest part of it.”
Instead, Microsoft focused its efforts
on areas where the company often succeeded in the past: ease of development
integration, ease of use for end users
and partner opportunities.
The database and developer teams
worked closely to make it easy for developers to deploy a data mining model. “I
can build a model, and I can put it into
production with four lines of code. It’s
trivial,” MacLennan says. “Or you can
take [SQL Server] Reporting Services,
and put that on top of your models, or
Continued on page 16
GetMoreOnline
Learn more about SQL Server and data
mining. Follow links to resources
including a Microsoft Research paper,
“Finding Trends in Customer Feedback”
and Jamie MacLennan’s Weblog on data
mining. FindIT code: Goldmine
redmondmag.com
Project2
4/19/05
2:55 PM
Page 1
0505red_Report_11-16.v6
4/18/05
11:13 AM
Page 16
RedmondReport
Continued from page 14
[SQL Server] Integration Services. You
can take this high level work and start
realizing ROI much quicker.”
Starting in Yukon, third-party algorithms will be able to plug in to the database at the same low level as Microsoft’s
own algorithms. That’s a change from
SQL Server 2000, when vendors
attached their algorithms to the database
through an abstraction layer. The new
approach should result in faster performance and better scalability.
Still, Wayne Eckerson, director of
research with The Data Warehousing
Institute (a sister organization to
Redmond magazine), sees stumbling
blocks to data mining becoming widely
used. “The bottom line with data mining is that creating models and scoring
records is not for the masses. It’s for
very specialized people with statistical
skills. However, the output of what
those folks do can be generally
applied,” Eckerson says.
Other vendors, like NCR with
its Teradata database, are also investing
in making the data-modeling process
more seamless and with more
massive scalability, Eckerson says.
But Microsoft does have strength
in its ability to integrate with developer
tools to make it fast and easy
to port data models into real
applications. “That’s probably where
Microsoft is spending more of its
time,” Eckerson says. —
Trying to Find a Collaboration Groove
M
icrosoft’s $120 million acquisition of Groove Networks adds to Microsoft’s growing stack of collaboration technologies.
Integrating the technologies into a cohesive set of products with a coherent storyline that convinces customers to pay
to use them will be the next challenge.
Microsoft has yet to see a runaway success in this category, other than the Outlook-attachment method the company
seems desperate to move users away from, so a complete shake up is entirely possible.
Here’s the current stack of Microsoft collaboration technologies, and where Groove’s Virtual Office currently fits in:
Microsoft SharePoint Portal Server
Microsoft Office Suite
Microsoft’s high-end collaboration solution retails for
$5,619 on top of your server OS price. It is a servercentric, administrator-intensive approach to collaboration
with extensive focus on internal search capabilities.
Microsoft’s offerings already confuse the market somewhat
because this product’s name is so similar to …
Office has two identities. There’s the
Feeling behind the times?
way most people currently use it for
collaboration—sending Word and Excel
documents as Outlook attachments. And
there’s the way Microsoft positions it for
collaboration—a mix of Office suite
hooks into servers like SharePoint Portal
Server. The Outlook-attachment model is
the entrenched collaboration behavior
that Microsoft is trying to combat in order
to raise revenues, streamline work processes and reduce
security exposure. For evidence of Microsoft’s campaign
against the old way of collaborating, look no further than the
Office ads featuring the people with dinosaur heads.
Windows SharePoint Services
This is an add-on available at no additional
charge with Windows Server 2003.
Windows SharePoint Services is still serverbased, like the portal by the same name, but
takes a more decentralized approach.
Administrators enable the capability and
authenticated users can set up and maintain
their own collaboration workspaces.
Groove Virtual Office
Virtual Office differs from the Microsoft
SharePoint technologies in its peer-to-peer, as
opposed to server-centric, orientation. Developed with the special needs of road warriors
in mind, Groove’s technologies facilitate
online and offline work with a lot of thought to
synchronization. It is Microsoft Office-centric,
but duplicates many Microsoft capabilities.
16 | May 2005 | Redmond | redmondmag.com |
Istanbul
Microsoft’s Istanbul client for Live
Communications Server 2005 is
one of Microsoft’s most visible
attempts to move its collaboration
infrastructure forward. The technology
enables peer-to-peer communication
and collaboration with server oversight. It also drags lots of hooks to tie in the rest of the
Microsoft infrastructure.
— SCOTT BEKKER
Project2
4/4/05
12:31 PM
WORK A
Page 1
drag
LATELY?
Patch Management
and Anti-Spyware
Now Available!
Set yourself FREE with
Desktop Authority 6.5
®
NOW WITH NEW OPTIONS:
PATCH MANAGEMENT
& ANTI-SPYWARE!
FREE! Fully functional, 30-day
trial version and a T-shirt at:
www.scriptlogic.com/6point5
1.800.424.9411
©2005 ScriptLogic Corporation. All rights reserved. ScriptLogic, Desktop Authority, and the ScriptLogic logo are trademarks or registered trademarks
of ScriptLogic Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the
trademarks of their respective owners. While supplies last. Allow 4 to 6 weeks for delivery.
Protect enterprises against security threats
with Desktop Authority, the award-winning
desktop management solution.
• Configure desktops without visiting client machines
• Eliminate time spent writing logon scripts
• Remotely manage and control individual desktops
Project6
2/10/05
2:07 PM
Page 1
3YBARI?!$?(ULAMANREDMONDPDF 0-
iœÀ}iʈÃÊÃiVÕÀiʈ˜Ê…ˆÃʈ˜vœÀ“>̈œ˜ÊܜÀŽ«>Vi
­>˜`ʅi½ÃʘœÌÊ>vÀ>ˆ`Ê̜ÊŜÜʈ̰®
7œÀÀވ˜}Ê>LœÕÌÊۈÀÕÃiÃÊ>˜`Ê՘Ü>˜Ìi`ÊVœ˜Ìi˜ÌÊV>˜Ê…œ`ÊޜÕÊL>VŽ°Ê/…>̽ÃÊ܅ÞÊ
̅œÕÃ>˜`ÃʜvÊVœ“«>˜ˆiÃÊ>VÀœÃÃÊ̅iÊ}œLiÊqÊvÀœ“ÊœÀÌ՘iÊ£ääʜÀ}>˜ˆâ>̈œ˜ÃÊ̜Ê
Ó>Ê LÕȘiÃÃiÃÊ qÊ ÀiÞÊ œ˜Ê -ÞL>ÀˆÊ ÌœÊ ÃiVÕÀiÊ Ì…iˆÀÊ ˆ˜vœÀ“>̈œ˜Ê ܜÀŽ«>ViÃ]Ê
ˆ˜VÕ`ˆ˜}Êi‡“>ˆ]ʈ˜ÃÌ>˜ÌʓiÃÃ>}ˆ˜}]Ê>˜`Ê`œVՓi˜ÌÊÅ>Àˆ˜}°
"ÕÀÊ՘ˆµÕiÊ܏Ṏœ˜ÃÊÕÃiʓՏ̈«iÊۈÀÕÃÊÃV>˜˜ˆ˜}Êi˜}ˆ˜iÃÊ>˜`ʈ˜`ÕÃÌÀއi>`ˆ˜}Ê
>˜ÌˆÃ«>“Ê >˜`Ê Vœ˜Ìi˜Ì‡vˆÌiÀˆ˜}Ê ÌiV…˜œœ}ˆiÃÊ ÌœÊ Ã̜«Ê ̅Ài>ÌÃÊ LivœÀiÊ Ì…iÞÊ Ã̜«Ê
ޜÕÀÊ LÕȘiÃÃ°Ê >ŽiÊ Ì…iÊ “œÛiÊ ÌœÊ -ÞL>ÀˆoÊ >˜`Ê iÝ«iÀˆi˜ViÊ Ì…iÊ vÀii`œ“Ê œvÊ
ÃiVÕÀˆÌÞÊ>˜`Ê«Àœ`ÕV̈ۈÌÞ°Ê
-
1, Ê/Ê ",/" Ê7",*
/œÊi>À˜Ê“œÀi]
ÛˆÃˆÌ ÜÜÜ°ÃÞL>Àˆ°Vœ“ÉÀi`äx
0505red_ProdRev.v14
4/15/05
4:48 PM
Page 19
ProductReview
INSIDE:
Check out six server
management solutions in
this month’s Redmond
Roundup. Page 36
What You Got?
Asset Navigator helps you keep tabs on what you have and how
it’s being used.
Asset Navigator
Pricing starts at $395 for Standard Edition; $595 for
Professional Edition; $895 for Enterprise Edition
Alloy Software Inc.
973-338-0744
www.alloy-software.com
BY ERIC JOHNSON
It’s essential to keep track of
your technology assets. It’s
also a colossal task. Using
loosely organized spreadsheets to track all the computers, hardware, software
licenses and IP addresses in
your organization is marginally effective at best. Something invariably slips through
the cracks, which is a waste of
time, money and resources.
If you find you have to
plow through piles of purchase orders to figure out
who’s using all the new
equipment you just received,
that should tell you that you
need a better process. Asset
Navigator is an asset tracking
and management system that
REDMONDRATING
Documentation: 10% ____ 7
Installation 10% _________ 9
Feature Set: 40% ________ 9
Performance: 30% _______ 9
Management: 10% ______ 8
Overall Rating: 8.7
__________________________
Key:
1: Virtually inoperable or nonexistent
5: Average, performs adequately
10: Exceptional
can help you get a better
handle on your technology
assets. Then you can throw
away the spreadsheets and
the old manual processes.
Installing Asset Navigator
is a breeze. A familiar
Windows wizard walks
you through the whole
installation procedure. Asset
Navigator also simplifies the
process of getting your asset
data into the system. If you
have your license file handy,
you can import this into
Asset Navigator during
installation. You’ll see a
second wizard the first time
you launch Asset Navigator
that walks you through the
process of getting your data
repository online.
Depending on which
version you’ve installed,
you’ll use a different database engine. The Enterprise
Edition uses a SQL Server
back-end. The Professional
and Standard editions use
Microsoft Access. You can
choose to use an existing
database, create a new one or
import one from Microsoft
Access (if you have previously
Figure 1. Asset Navigator’s main interface resembles Microsoft
Outlook, so there’s a familiar look and feel with folders on the left
and details on the right.
used the Standard or Professional edition and are now
upgrading to Enterprise).
When creating a new
database, you’ll also decide
whether you want to build it
with or without sample data.
Using sample data is helpful
for evaluations or if this is
your first installation of
Asset Navigator and you
need to familiarize yourself
with its functions. Once
you’re finished with the
installation and configuring
the database, you’re ready to
start tracking.
Looks Familiar
When you first launch the
Asset Navigator client, you
should feel right at home. It
looks and acts like Microsoft
Outlook. Everything is
organized into folders with
detailed information listed
on the right side of the
screen (see Figure 1).
Asset Navigator can
store a great deal of data
about the computers in
your environment. It can
tell you the manufacturer,
the user to whom the
equipment is assigned,
peripherals that are
attached, hardware specifics,
software installed, support
contracts and so on.
Manually entering this
mountain of information on
your systems would be a
daunting task. Fortunately,
Asset Navigator also
includes an auditing function. By working through
the deployment wizard (see
Figure 2, p. 20), you can
| redmondmag.com | Redmond | May 2005 | 19
0505red_ProdRev.v14
4/15/05
4:48 PM
Page 20
ProductReview
configure a package and a
repository that the systems
will use to self inventory and
report back all pertinent
information. At the end of
the deployment wizard,
you’ll have an executable
that you’ll run on the systems you want to inventory.
When you run the
inventory routine, the
system writes a file into the
repository and you later
pick up that information
with Asset Navigator.
You can also automate
this whole process using
logon scripts and Asset
Navigator’s import
scheduling capabilities. You
can track support contracts
on your systems as well, so
you can easily tell if a
system is covered under a
contract or warranty.
Track Everything
In addition to tracking
systems, Asset Navigator
can track peripherals,
software and network
configurations. You can enter
all the peripherals that you
have in the organization
into the Asset Navigator
database. All peripherals,
including keyboards, mice,
monitors, printers and so
on, are tied to the systems on
which they’re installed.
You manage your software
assets in much the same way
with Asset Navigator. You
can even track licenses and
product keys. Say your company purchased five copies
of Adobe Acrobat. You can
record the five license keys
in Asset Navigator and
when you install the software on a particular system,
you can track which key
that system used. This will
help you keep a better
record of software usage.
Network tracking with
Asset Navigator is set up in
a similar fashion. You can
configure all the subnets
you use and keep a complete
picture of which IP addresses
your organization is using.
This is great if there’s a
pool of reserved static IP
addresses for servers or
other special systems that
aren’t managed by DHCP
or some other system. You
can assign the IP and track it
in Asset Navigator.
Asset Navigator also helps
you manage your vendors,
purchase orders and personnel. You can easily enter POs
when you order equipment.
When the equipment
arrives, you can add it to the
Asset Navigator database as
Asset Navigator will track just about anything
you need it to.
new assets. You can also
track people and departments. Overlay your organizational structure and
personnel and tie this information to each individual
asset. Done correctly, you
can see exactly how many
systems a department has or
how many printers an individual is using.
With all this hardware
comes the need to fix it.
Besides its tracking
functionality, Asset Navigator
also contains a help desk
and knowledge base. Users
Figure 2. The Deployment Wizard walks you through the process of configuring the data repository to
pull pertinent data from all your managed systems.
20 | May 2005 | Redmond | redmondmag.com |
submit trouble tickets that
tie back to the asset with
which they’re having
problems. Technicians can
log short knowledge base
entries that explain how to fix
common issues.
If Murphy’s Law prevails
and you can’t repair the
hardware, you can use
Asset Navigator to assign
a new piece of equipment
from your spare inventory
or cut a new PO to order
a replacement. The help
desk includes Web interfaces
for users and technicians
so tickets and updates can
come from anywhere.
Asset Navigator isn’t a
replacement for a full-blown
help desk suite, but it’s great
for a small shop, or as an
integration point to a larger
help desk platform.
Asset Navigator is truly
an enterprise solution.
It’s easy to use and makes
a great addition to any
administrator’s toolset.
In short, Asset Navigator
will track just about anything
you need it to. If you’re
tired of chasing endless
piles of spreadsheets and
wasting all your free time
trying to keep things straight,
then Asset Navigator can be
a big help.—
Eric Johnson, MCSE2K,
MCDBA, MCSD, MTA,
works for Premiere Global
Services in Colorado Springs,
Colo., where he can indulge his
personal passions for fishing,
woodworking and dogs. He’ll
welcome his first child in June.
0505red_ProdRev.v14
4/15/05
4:48 PM
Page 21
ProductReview
Many Files Through a Single View
StorageX takes a global approach to streamlining file management.
StorageX
Pricing starts at $2,000 per managed server
NuView Inc.
281-497-0620
www.nuview.com
BY CHRIS WOLF
When I first checked out
StorageX, it looked like a
branded version of Microsoft’s
Distributed File System.
“Why use the free product,
when I can spend thousands
of dollars on something else?”
I sarcastically thought to
myself. After getting to know
StorageX a little better,
though, I realized that initial
impression was way off base.
With Windows Distributed
File System (DFS), you configure a single starting point
for all network file access—
the DFS root. You can
also associate this with a
single mapped drive for
your users. The DFS root
REDMONDRATING
Documentation: 10% ___ 10
Installation 10% ________ 10
Feature Set: 40% _______ 9
Performance: 20% _______ 9
Management: 20% ______ 9
Overall Rating: 9.2
________________________
Key:
1: Virtually inoperable or nonexistent
5: Average, performs adequately
10: Exceptional
Receiving a rating
of 9.0 or above, this
product earns the
Redmond Most Valuable
Product award.
includes links to all
other shared network
resources, giving users
and applications a single
starting point. With a
single, logical access point
for network resources,
you’re free to move data to
different physical locations
on the network without
impacting users.
All you need to modify is
the link at the DFS root
that points to the physical
location on the network.
With DFS, you can also
set up replicas for each
DFS link, which lets you
automatically provide for
fault tolerance by having
one logical link point to
replicated data stored in
two or more physical
locations. Using redundant
links also offers the
following advantages:
• You can take down file
servers for maintenance
without affecting users.
• Run backups on a standby
server that’s a replication
target in the DFS hierarchy,
giving you greater flexibility
with your backup window.
• The network infrastructure is more resilient to
system failure.
Figure 1. The StorageX Logical View outlines your shared storage
in an easily understandable format.
Much More Than DFS
The core operation of
StorageX functions just like
DFS, but StorageX offers
much more. StorageX’s
adaptation of DFS starts
with what’s called the Global
Namespace. The Global
Namespace uses Microsoft’s
existing DFS technology
and provides the same
transparent access to shared
files. Clients connecting
to a network share are transparently redirected to an
actual physical server.
Besides the file access,
StorageX’s management and
reporting features are what
really sold me. For starters, in
the StorageX management
user interface (UI), you can
view your storage resources
from a physical or logical
perspective. The Logical
View (see Figure 1) shows
shared storage resources in
the same tree format that
connecting clients would.
Physical View (Figure 2, p.22)
lets you view and manage the
physical storage topography.
Get It Started
Deploying StorageX was
simple. I popped in the
setup CD and installed the
product on my designated
DFS root server—that was
it. Had I chosen to go with
a second root server for
fault tolerance, I would
simply have to repeat the
installation process.
StorageX supports both
stand-alone and domainbased DFS roots, as well as
Network Appliance Filer
hosted roots. StorageX lets
you logically organize all
roots under a single Global
Namespace. It supports
configuring the DFS root
on a server cluster as well,
which was helpful.
My next task was to configure the DFS root. What especially impressed me here was
| redmondmag.com | Redmond | May 2005 | 21
0505red_ProdRev.v14
4/15/05
4:48 PM
Page 22
ProductReview
that StorageX includes a
“Namespace Creation Policy”
feature. This automatically
searches the network for
shares and populates the
namespace based on the
shares it finds. If you have an
existing DFS structure in
place, there’s no need to
reinvent the wheel because
StorageX can detect that, too.
With StorageX finding so
much on my test network, I
was considering the possibility
of using it in my garage to
search for a few missing tools.
After running the relatively
simple New DFS Root
Wizard and a Namespace
Creation Policy, I had my
entire logical file system
online and configured within
a few minutes. Had I started
from scratch and created
brand-new file shares and a
DFS hierarchy, I would’ve
set up a folder tree under the
Logical View portion of the
UI. With the logical view in
place, I would’ve added links
to the physical servers on my
network. The StorageX UI
works just like Windows
Explorer, making it easy to
add folders and links to the
Global Namespace.
I also liked the fact that my
only software installation was
on the root server. There
were no agents to install on
any other server on the
network. The root server
supports both CIFS and NFS
shares, making it easy to link
to both Windows and
Unix/Linux file servers.
From Skeptic
to Believer
StorageX’s Administrative
View (Figure 3) was a
revelation. From here you
can schedule replication
jobs to run between replica
links (folders with the
same logical target, but
with multiple physical
locations), all without
having to install any agents
on the target systems.
With the disaster recovery
policies, you can have
StorageX monitor a primary
server and automatically fail
over to a standby server
when it detects failure. The
product’s Migration Policies
let you physically move data
from a server that’s running
out of space to another
server. Once it completes
the move, all links are
automatically updated to
reflect the new physical
storage location. StorageX
has an Archival Migration
Policy that lets you archive
files to alternate storage
Figure 3. The Administrative View lets you schedule storage
replication tasks.
22 | May 2005 | Redmond | redmondmag.com |
Figure 2. The Physical View gives you a look at your storage
topography, and provides management tools.
based on criteria such as last
time accessed, size and age.
StorageX also has several
reports you can schedule on
a nightly, weekly or monthly
basis. These reports provide
details on functions like the
status of nightly replication
jobs, so you can quickly see if
your replicated links were
synchronized. The fact that
software installed on one box
lets you do all this while
managing your file system
storage across your network
is quite impressive.
With such a positive
experience managing file
shares, I decided to see if
StorageX could manage all of
my data, in addition to shared
CIFS and NFS file systems.
To provide the end-toend protection I’m looking
for, StorageX would need to
work with both file systems
and databases; unfortunately, it
doesn’t. NuView representatives said database support was
in the company’s future plans.
The First Step to
Recovery
The first step on the road to
recovery is to admit that you
have a problem in the first
place. If your organization has
an unmanageable assortment
of file shares scattered about,
you have a problem.
With that in mind, the
logical file management view
that StorageX presents can be
just the therapy you need.
Your users will no longer
need to remember where a
file is in order to access it. All
they’ll need to know is the
location of the StorageX
global namespace root, which
you can automate by giving
them a mapped drive, just like
any other network share.
With some thoughtfully
considered management tools
to back up a product that you
can fully deploy within hours,
StorageX helps you take
steps toward simplicity.
This is a breath of fresh air in
a storage market that has
become progressively more
complex in recent years.
Now, if StorageX could only
find those missing tools in
my garage …—
Chris Wolf, MCSE, MCT,
CCNA, is an instructor with
ECPI Technical College and a
leading industry consultant. He’s
the author of Troubleshooting
Microsoft Technologies
(Addison Wesley), co-author of
Windows 2000 Enterprise
Storage Solutions (Sybex) and
a contributor to the Windows
Server 2003 Deployment Kit
(Microsoft Press). You can reach
him at [email protected].
0505red_ProdRev.v14
4/15/05
4:48 PM
Page 23
ProductReview
Restore Those Lost E-Mails
Recovery Manager lets you do large-scale, store-level Exchange backups, while still
helping locate and restore individual messages.
Quest Recovery Manager for Exchange
$8 per mailbox
Quest Software Inc.
949-754-8000
www.quest.com
BY CHAD TODD
In a perfect world, your
Exchange databases would
remain forever small and
cause you no problems,
and users would never
delete mail by mistake, only
to ask you to restore it. But
that’s not reality. Databases
quickly grow larger than
we’d like and we frequently
have to decide which is
more important—quicker
backups or quicker restores.
Indeed, backup and recovery
are a fact of life for the
Exchange administrator.
There are two types of
Exchange backups, storelevel and message-level
(a.k.a. brick-level), each with
their benefits and drawbacks.
Store-level backups back
up the database and
REDMONDRATING
Documentation: 10% ____ 8
Installation 10% _________ 8
Feature Set: 40% _______ 9
Performance: 30% _______ 9
Management: 10% ______ 8
Overall Rating: 8.7
________________________
Key:
1: Virtually inoperable or nonexistent
5: Average, performs adequately
10: Exceptional
message logs while bricklevel backups back up each
individual message.
Quest Recovery Manager
(QRM) gives you the best
of both worlds. It works
with your backup software
to give you quicker storelevel backups, while still
being able to easily restore
individual messages. QRM
can recover selected
messages, files attached to
selected messages or a
folder and all the messages
it contains. It supports full,
differential and incremental
backups. The software
you use to back up your
Exchange Server will
dictate which method you
should choose.
Recovery in Store
Store-level backups are much
quicker than brick-level
backups. They’re great for
recovering a failed Exchange
Server, but not so great for
individual messages. To
recover an individual message
in Exchange 5.5 or Exchange
2000, you have to build a
recovery server to mimic
your production server.
This means installing
Figure 1. Quest Recovery Manager walks you through the process
of restoring messages on your Exchange Server.
Exchange and its service
packs, restoring the database
and logs to the recovery
server, then using a tool like
Exmerge or Outlook to
connect to the recovery
server to export the mail to
personal storage (PST) files.
This is a time-consuming
process to say the least.
Thankfully, recovery is
greatly improved in
Exchange 2003. You can use
a Recovery Storage Group
on your production server
instead of building a recovery server. However, you still
have to use a tool like
Exmerge to retrieve the
missing mail. Exchange 2003
Service Pack 1 lets you
restore an entire mailbox
without Exmerge, but not an
individual message.
Brick-level backups avoid
all of this. Open your backup
software, choose the message
to restore and voila—the
message is back. Brick-level
backups use the Messaging
API (MAPI) interface to log
on to each mailbox, so each
message is enumerated, read
and backed up. The downside is, by independently
backing up each message,
brick-level backups lose
the single instant storage
that Exchange provides.
Consequently, the backup
takes a lot longer and
uses a lot more disk space
than just backing up the
store itself.
You can also use QRM to
work from an off-line copy of
your database. The program
can access backup media from
Windows Backup (NT 4.0,
2000 or 2003) or Veritas
Backup Exec (7.3, 8.6, 9.0 or
9.1). QRM catalogs the tape
and restores the database to a
specified folder. This method
doesn’t require that you use
backup software for recovery.
| redmondmag.com | Redmond | May 2005 | 23
0505red_ProdRev.v14
4/15/05
4:49 PM
Page 24
ProductReview
I used QRM to restore
mail from an Exchange
2003 server using Windows
Backup. It took about 20
minutes to extract the 3GB
perform a hard recovery on
the .edb file if the log files or
.stm files are missing.
If you’re using a backup
utility other than Windows
Quest provides great documentation, but
you won’t need it ... I found QRM to be easy
and intuitive.
database and restore the
mail. I also used QRM
against a copy of my
database restored to an
Exchange 2003 Recovery
Group. In both cases, QRM
performed flawlessly on
the first try.
Another approach is to
copy the Exchange message
files from your production
server. You would do this
when using QRM to restore
messages from a failed server.
Then you would have QRM
Backup or Veritas Backup
Exec, this is the preferred
recovery method. Have QRM
access a database restored to
an Exchange 2003 Recovery
Storage Group, add the
database to the recovery
group and then restore it
with your backup software.
If you’re not using
Windows Backup or Veritas
Backup Exec and you don’t
have Exchange 2003, then
you’ll have to use a recovery
server to restore your mail.
This is because Exchange
5.5 and Exchange 2000 don’t
provide Recovery Storage
Groups. To account for this,
QRM provides a feature
called Exchange Server
emulation. It makes a server
other than your real
Exchange Server appear to
be your Exchange Server.
You can then restore your
Exchange backups to this
server and use QRM
to retrieve your mail.
However, you can’t use
Exchange Server emulation
on a machine that already
has Exchange installed.
The QRM Exchange
Server emulation supports
backup products from
Veritas, HP, Legato, IBM,
CommVault and CA.
I highly recommend
QRM as a replacement for
brick-level backups and as
a disaster recovery tool.
Quest provides great
documentation, but you
probably won’t need it.
I found QRM to be easy
and intuitive.
QRM makes it easy to
search for missing mail
without having to know
its precise location. All
in all, QRM is a helpful
addition to any Exchange
administrator’s toolbox.—
Chad Todd, MCSE: Security,
MCSE: Messaging, MCSA,
MCT, CNE, is the author of
Hack Proofing Windows
2000 Server (Syngress Publishing). He’s co-owner of
Training Concepts, a company
that specializes in Windows
2000 and Cisco training. Reach
him at [email protected].
0505red_ProdRev.v14
4/15/05
4:49 PM
Page 25
ProductReview
No Scripting Required
ADtoolkit enables anyone to perform Active Directory group edits.
Javelina ADtoolkit 3.0 (formerly ADvantage)
$995 for one or two licenses; $796 for three or four
licenses; $746.25 for five to nine licenses; Other
pricing available for 10 or more licenses
Javelina Software
302-422-0230
www.javelinasoftware.com
BY JEREMY MOSKOWITZ
I’m not a scripter. If I was, I’d
be performing feats of magic
on a regular basis, like adding
and deleting users, changing
parameters and modifying
Active Directory. But I’m not
a scripter, which is a bit of a
problem, because I really
want and need to be able to
do those things.
Enter Javelina’s ADtoolkit
3.0 (formerly called Javelina
ADvantage). As I see it,
ADtoolkit 3.0 does what a
savvy AD scripting guru
would do. It also packs a
bunch of useful bulk AD
operation features into one
powerful utility.
Group Therapy
ADtoolkit is easy to navigate
and use. It provides a list of
available directory objects—
Users, Groups, Contacts,
Computers, Files and Shares
and Directory Tools—from
which you can choose a group
to bulk edit.
After you’ve chosen a group
to edit (I’ve selected Users in
Figure 1), choose the action
you wish to perform—Add,
Modify, Delete, Reports,
Reset Passwords and Search
and Replace. Once you’ve
selected the action, you can
then import only those users
you need to update or edit.
You can do this with the
Select Users option (that will
let you select an entire
domain or any specific AD
organizational unit) or with
the Import Users button.
Once you’ve imported a
group of users, you’ll see the
users who will be affected by
your global edits laid out in
a grid. This can get a bit
confusing if you don’t have
any previous experience
working with AD groups.
Note the tabs going horizontally across the screen in
Figure 1. Choose the list or lists of users you need to modify, then
the action you need to perform.
Figure 1. Each of those tabs
represents a category of
features you can modify.
Modifying information inside
any tab affects all users in the
grid. You can also change a
specific property for a specific
user in the grid, thereby
affecting only that user.
Options entered in the grid
overwrite options in the tabs.
For example, you can grant a
certain level of access to all
users in a grid, but provide
greater access to those within
the group who are managers.
You would apply the group’s
access using the tabs, then
increase the manager’s access
within the grid.
Once you have your edits
ready to go, run a simulation
to determine precisely what
will happen when you hit the
“go” button. ADtoolkit
generates a clear report to
describe which users (or
whatever the target of your
group edits is) will be affected
and what will happen. This
simulation report is a nice
touch, considering that, if you
made one false move at this
point having already made a
series of global changes, you
could bulk-change your way
right out of a job.
ADtoolkit also lets you call
out exceptions on access control lists stored on file servers
and/or in AD. Under normal
circumstances, for example,
after you delete a user from
AD, you can still see “Account
Unknown” signifiers all over
AD and the file system to
REDMONDRATING
Documentation 10% _____ 8
Installation 10% ________ 10
Feature Set 40% ________ 8
Performance 20% _______ 8
Management 20% _______ 7
Overall Rating: 8
________________________
Key:
1: Virtually inoperable or nonexistent
5: Average, performs adequately
10: Exceptional
which that user previously
had access. ADtoolkit lets you
quickly detect and clean up
those stale entries. Look
under the Files & Shares
menu to clean up the file
system, and Directory Tools
to clean up AD.
Knowledge Is Power
The user interface design
is good if you know what
you’re doing. A step-by-step,
Wizard-driven interface
would be welcome, in addition to its current “free-form”
approach. It does help to have
a bit of AD background or
experience to navigate the
interface, but it’s not essential.
If you need a way to
bulk-edit your AD groups, it
would be well worth your
while to take ADtoolkit out
for a test drive.—
Jeremy Moskowitz, MCSE,
MCSA, is founder of
Moskowitz Inc. His latest
book is Group Policy, Profiles,
and IntelliMirror for
Windows 2003, Windows
XP, and Windows 2000
(Sybex). You can reach him at
[email protected].
| redmondmag.com | Redmond | May 2005 | 25
Project1
3/30/05
11:23 AM
Page 1
Project1
3/30/05
11:24 AM
Page 2
0505red_BetaMan.v8
4/15/05
4:35 PM
Page 28
BetaMan
Don Jones
When I’m 64
T
o say “64-bit computing is here” is a bit misleading.
Windows Server 2003 x64
Actually, 64-bit computing has been with us for some
Version reviewed: RC2
time. Perhaps the most visible proof of this is Intel’s
Current status: RC2
Itanium family of 64-bit processors, which introduced a
whole new computing architecture and required a special
version of Windows (available in the
Win2000 family).
However, the Itanium never became
as popular as even the DEC Alpha
processor, which wasn’t exactly a
bestseller, despite its technological
merits. HP recently dropped out of
Itanium development, leaving the
processor’s future (or at least its
market viability) in question.
Then AMD snuck in from the
sidelines with its AMD64 architecture.
Many computers are now running
Athlon64 processors in 32-bit mode
that are completely compatible with
existing 32-bit applications. Users and
administrators may not even realize they
have a 64-bit processor lurking under the
hood and waiting to be unleashed.
either platform. The 64-bit processor
simply packs a bigger punch, paving the
way for 64-bit applications and the
eventual demise of the 32-bit platform.
(While Microsoft has committed to
shipping Longhorn for both 32- and
64-bit platforms, the market may only
be interested in a 64-bit version of
whatever follows Longhorn.)
Technically Speaking
Naturally, Win2003 x64 requires an
x64 processor. It supports the AMD
Opteron, Intel Xeon EM64T and
Intel Pentium EM64T processors.
You need at least 512MB of RAM and
4GB of disk space. The Enterprise
Edition of Win2003 x64 supports up
to eight processors while the Standard
The 64-bit processor simply packs a bigger punch, paving
the way for 64-bit applications and the eventual demise of
the 32-bit platform.
The marketability of the AMD64
architecture got a big boost when
Intel jumped on board with its own
compatible version, the EM64T.
Generically referred to as x64, this
platform will see its first full-fledged
64-bit version of the Windows server
operating system this year when
Windows Server 2003 x64 ships.
Cosmetically, Win2003 x64 is
identical to its 32-bit cousin. In fact, if
you weren’t paying attention, you might
not realize you’re running a 64-bit OS at
all, which is exactly the point. Your
Windows experience will be identical on
Edition supports four. You’ll also
need your processor running at
1.4GHz for the Opteron, 2.8GHz
for the Xeon or 3.2GHz for the
Pentium. If you’re using Intel
processors, Microsoft recommends a
3.6GHz Xeon or Pentium.
Memory-wise, you can plug in up to a
whopping 32GB on Standard Edition.
The Enterprise Edition supports an
unbelievable 1TB of RAM. (Remember
when Bill Gates told us 640KB was
enough memory for anyone?)
The real power of the x64 architecture
is that it runs 32-bit applications
28 | May 2005 | Redmond | redmondmag.com |
Expected release: Sometime in 2005
seamlessly. The Itanium runs 32-bit
apps in a WOW64 subsystem, which
provided fairly lackluster performance
in most situations. Therefore, x64
makes a more compelling argument for
phased migration to 64-bit computing.
The 64-bit version of Windows does
pretty much everything 32-bit does—
Active Directory stores can exceed 2GB
in size, Terminal Services are present and
so on. It’s pretty much indistinguishable
from 32-bit Windows, except in one
critical area—performance.
While you can never judge the
performance of an operating system
from beta or even release candidate
code, 64-bit Windows is already
remarkably faster than 32-bit
Windows. My testing shows that a
64-bit application running on 64-bit
Windows is several times faster than
the same application’s 32-bit version
running on 32-bit Windows. All of
this software was in beta, so I’m not
revealing specific numbers (in fact,
the beta licensing agreement forbids
it), but suffice it to say, the difference
is profound.
Application compatibility was seamless.
I installed several 32-bit applications,
including Exchange Server, SQL Server
and Internet Security and Acceleration
Server, and they all ran without a hitch.
That’s an important feature, because
many application vendors are not
likely to release 64-bit versions in the
BETAMAN’S ROUTINE DISCLAIMER
The software described here is incomplete
and still under development; expect it to
change before its final release—and hope it
changes for the better.
Project6
2/28/05
11:22 AM
Page 1
Middleware is Everywhere.
Can you see it?
5
2
4
3
1
Key
MIDDLEWARE IS IBM SOFTWARE. The powerful DB2
Information Management Software Family. With industry
1.Takes virtual tour of vacation spot.
2. Books flight with partner airline.
3. Dispatches service automatically.
4. Analyzes schedule data dynamically.
5. Business results reach new heights.
leading DB2 and Informix®databases, it’s the most complete
information management solution available. Built on open
standards, it lets you access content from various sources.
Integrate information, boost productivity, stay compliant. Plus
gain insight to make better business decisions. On demand.
Middleware for the on demand world. Learn more at ibm.com/information
IBM, the IBM logo, DB2, Informix and the On Demand logo are registered trademarks or trademarks of International Business Machines Corporation in the
United States and/or other countries. ©2005 IBM Corporation. All rights reserved.
0505red_BetaMan.v8
4/15/05
4:35 PM
Page 30
BetaMan
near future. For its part, Microsoft
will probably ship 64-bit versions
of its major server products, especially
SQL Server, in fairly short order.
The open source world isn’t
sitting still on the 64-bit issue. There
have been stable x64-compatible
builds of Linux available for some
time now. At http://snipurl.com/dl82,
you’ll find a comparison of Intel and
AMD x64 processors running the
Gentoo x64 build of Linux. Red Hat
also has x64-compatible and Itaniumcompatible builds (lest you think that
platform was Windows-specific).
choice for new purchases starting even
now. Even if you don’t plan to install an
x64-specific operating system, x64
systems can continue to run what you
already have in place.
Once Win2003 x64 ships, however,
there will be little reason (other than
perhaps price, which has yet to be
announced) not to upgrade. Your
applications will continue to run, the
look and feel of the operating system
won’t change, and you won’t need
additional training. You’ll get improved
performance and the ability to immediately upgrade applications to 64-bit as
Choosing the x64 platform is pretty much a no-brainer. It’s where
computing is headed.
I’m not going to get into the whole
Windows/Linux debate. I’m simply
making the point that Microsoft is
neither the only x64 OS on the planet
nor is it leading the charge. The
existence of competition from Linux
on x64 processors is further evidence
of the platform’s market viability.
It’s a pretty safe bet for any
business to go ahead and purchase
x64-based systems. In fact, I’d go
so far as to say that any future
purchases should always be
Don’t Forget XP
Microsoft is also releasing Windows
XP x64, which will support the
Athlon64 processor in addition to
Opteron and Intel EM64T processors.
x64-based systems. With the end
of the 32-bit computing platform
so clearly in sight, purchasing
32-bit systems doesn’t seem like a
sound financial investment.
64-bit Is Here to Stay
Choosing the x64 platform is pretty
much a no-brainer. It’s where computing is headed. Its compatibility with
existing applications makes it an easy
versions become available. Given how
touch-and-go past computing revolutions have been (remember the awkwardness involved in moving from
Windows 3.x to Windows 95?), the x64
move feels stress-free and simple.
Microsoft has committed to the
32-bit platform through Longhorn at
least, so your existing investments are
already protected. Assuming every
32-bit server you have today is
capable of running Longhorn (which
remains to be seen—minimum
system requirements haven’t been
announced, but they’re certain to be
steep), you can continue to mix 32-bit
and x64 systems in your environment
while running a consistent operating
system across the board. Since the
next version of Windows after
Longhorn is probably six years or
more down the line, it’s a safe bet that
your existing 32-bit hardware
resources will be fully depreciated
and ready for replacement by then,
meaning 32-bit computing will die of
natural causes and be replaced by x64.
I’ll make it simple—64-bit is here
to stay and it looks like x64 is going
to be the platform to which we all
gradually migrate over the next few
years. Microsoft’s introduction of an
x64 version of Windows was all but
30 | May 2005 | Redmond | redmondmag.com |
inevitable, and future versions
of Windows (including Longhorn
and beyond) will be available for
this new platform.
The migration is painless. Just
install Win2003 x64 and you’re up
and running with no additional
learning curve, no application
compatibility issues that I saw and
noticeably enhanced performance.
Microsoft is betting the bank
on x64. The recently announced
Windows Compute Cluster Edition
will only support x64 processors,
not 32-bit and not Itanium. Part
of Microsoft’s High Performance
Computing (HPC) for Windows
Server 2003 initiative, Windows
Compute Cluster Edition will
cluster relatively inexpensive servers
in parallel-processing configurations
designed for massively better
performance than single machines
achieve today. Look for a formal
beta of the HPC edition sometime
in late 2005 (it’s based on the
Win2003 SP1 codebase).
Start inventorying your servers
to find out which ones already have
x64 processors hiding in them, and
get ready to upgrade to Win2003
x64. You’ll be glad you did.—
Don Jones is a contributing editor for
Redmond magazine and the founder
of ScriptingAnswers.com, a Web site for
automating Windows administration.
His most recent book is Managing
Windows with VBScript and WMI
(Addison-Wesley). You can e-mail him
at [email protected].
GetMoreOnline
You can learn more about the
Opteron processor and Intel’s EM64T
architecture at Redmondmag.com.
FindIT code: BetaMan64
redmondmag.com
Project7
1/7/05
3:56 PM
Page 1
VOTED #1
BY
DON’T
REDMOND READERS
TELL
MOM!
CALL 1-860-674-1700 NOW
AND HAVE
ARGENT
MONITORING YOUR ENTIRE INFRASTRUCTURE
BEFORE YOU GO HOME.
WWW.ARGENT.COM
Project10
1/17/05
2:21 PM
Page 1
0505red_YourTurn.v8
4/15/05
5:00 PM
Page 33
YourTurn
Redmond’s readers test
drive the latest products.
The Good and the Bad of MBSA
Microsoft’s free vulnerability scanner works well—as long as you
don’t have to stretch it too far.
BY JOANNE CUMMINGS
Those who are charged with managing
just a handful of machines sing the
praises of Microsoft’s Baseline Security
Analyzer (MBSA) fairly readily. Those
who need more of an enterprise-level
tool to lock down hundreds or
thousands of machines, however, find
that MBSA’s shortcomings quickly
become apparent.
MBSA does have a lot going for it. In
addition to being free, it’s a simple
vulnerability scanner that’s easy to use
and configure, most users say. The latest
version (1.2.1) checks for configuration
errors and security holes not only in
Windows 2000, XP and Windows
Server 2003, but also key Microsoft
applications like Office, IIS, SQL
Server and Internet Explorer.
“At first, I used MBSA quite a bit,”
says Ben Hearn, systems administrator
at Cincinnati, Ohio-based financial
services firm GAFRI. Hearn is responMicrosoft Baseline Security
Analyzer (MBSA)
Free
Microsoft Corp.
800-426-9400
www.microsoft.com
sible for managing more than 1,200
Windows XP servers. “I’ve really gotten
away from using it at all now because it
just proves to be too cumbersome when
you’re dealing with lots of machines.”
Hearn’s primary complaint is the lack of
flexible reporting capabilities or any
sort of standard report formatting.
“MBSA can scan an entire domain of
1,200 computers, but then it generates
one giant list of results,” he says.
“There’s no good built-in way to see the
percentage of my machines that are
missing patches.”
through MBSA’s XML-based results to
better understand the most critical issues.
He takes the newest scan results and the
results he has saved from the last time he
ran an MBSA scan. “I take both XML
files and flatten them,” he says. “Then, I
[MBSA] is good in security issues, like making
sure IE or the IIS server is set properly.
Justin Clutter, CIO, Appserve Technologies
MBSA scans every computer within
an organization and returns a full list of
items. Those items designated with a
green check are checked out as secure.
Others are flagged for remediation.
That’s about as deep as MBSA’s reporting goes, and it’s not deep enough for
most users. “It just takes too long to try
and decipher the list,” says Justin Clutter, CIO of Appserve Technologies
LLC, a small hosting services provider
based in Dallas, Texas. “Most of the
time, you’ll get the little green check
back, but what I really want to see are
the critical issues that need fixing.”
Clutter says he wishes the MBSA
reports were integrated with something
like SQL, so he could import the scan
results into a database and make it easier for users to run exception reports.
“Integration with SQL would be great,”
agrees Jeff Hinrichs, technical lead at
Dermatological Lab and Supply Co., in
Council Bluffs, Iowa. He also agrees that
MBSA’s reporting is its weakest feature.
“What I want it to do is throw flags to
show me what’s different. Right now, it
can’t do that for me.” Hinrichs has built
his own workaround so he can sort
run a standard DIFF tool on it to find the
differences between the two files.”
Without this extra step, Hinrichs says
it’s difficult to see what has changed and
what needs his immediate attention.
“Maybe 90 percent of my machines are
updated for this patch, but that means
there are 10 percent that didn’t take it
and that’s what I need to know about.”
Questionable Results
Another thing users have noticed is that
MBSA’s reported vulnerabilities don’t
always match those reported by other
tools, like Windows Update and
Windows Software Update Services
(WSUS). “When I use MBSA to scan
one of my servers, it comes back saying
that four critical updates could not be
verified or need to be updated,” Clutter
says. “But when I go to the WSUS site, it
says the server is completely up-to-date.”
In most cases, this is because Windows
Update focuses on OS updates, whereas
MBSA also checks for application-level
vulnerabilities like those found in Office
and IIS. “They work off different databases at Microsoft, so that’s why you get
the conflicting results,” Clutter explains.
| redmondmag.com | Redmond | May 2005 | 33
0505red_YourTurn.v8
4/15/05
5:00 PM
Page 34
YourTurn
However, some cases aren’t quite
as clear-cut. Stephen Olson, owner
of SJO Computer Services in
Millerstown, Pa., says he often
receives MBSA scan results that are
less than definitive. “I just ran a scan
and it told me that it couldn’t verify
whether I needed a certain update,” he
says. “It turned out that it was an
update for Windows Media Player 9,
Although Microsoft says you can use
MBSA across a network and multiple
domains, most users say its network
support is not a strong suit. For example, MBSA can scan Office for vulnerabilities, but you need to do the scans
from a local machine, not via a network.
“That’s really annoying,” says GAFRI’s
Hearn. “I’m not about to physically go
to each machine. It’s almost a tease.”
Wish List for MBSA
F
or a free tool, Microsoft’s Baseline Security Analyzer does quite a bit. Still,
most users would like to see some features added in future releases. Here
are a few things for Microsoft to ponder:
Better reporting. Make it easier to slice and dice reports, perhaps by
providing back-end integration with SQL Server.
Clearer results. Sync up the databases for the various vulnerability
scanners—Windows Update, WSUS, MBSA—so each tool provides the same
information and downloads.
Better network support. Make it easier to schedule scans across a large
network, and provide a way to scan across domains with different admin passwords.
Mitigate the false positives. Provide a way to customize scans for each
computer, obviating the problem of receiving reports for applications and versions that may not be loaded.
Update the patch certainty. Change the way patches are named and implemented so this tool and others like it can detect patches more accurately. — J.C.
but we had already upgraded to Windows Media Player 10. MBSA couldn’t
tell that and so it was flagged as a
possible vulnerability.”
The problem, Olson says, is that
there’s no way to configure MBSA so it
doesn’t flag those types of issues. “It just
keeps reporting it every time I do a
scan, which can be a pain,” he says.
In other cases, MBSA will report that
it is unsure whether or not a patch has
been installed on a scanned machine,
an event that Hinrichs attributes to
Microsoft’s less-than-linear patchnaming policy. “MBSA should be able
to look at the version number of a
DLL and tell you whether the patch is
installed or not,” Hinrichs says. “If you
install a patch from Microsoft, but
Microsoft can’t detect that it’s
installed, well that’s a problem.”
Similarly, users needing to scan multiple
servers across domains can run into password issues. “If you try to run an MBSA
scan across two domains where the admin
username and password aren’t the same—
which technically, they shouldn’t be—it
doesn’t work,” Clutter says. “There’s no
way to designate that the two domains use
different passwords, so you end up having
to scan them separately.”
Smaller Is Better
There is good news for MBSA. Those
who use MBSA to scan single computers or smaller environments give the
tool high marks for its comprehensive
scanning and ease of use.
SJO’s Olson uses it to support his
clients, which are primarily one-person,
small or home office environments. “It’s
a great tool,” he says. “It doesn’t do any-
34 | May 2005 | Redmond | redmondmag.com |
thing that I couldn’t do manually, but
it’s very easy to run and it’s nice to have
this little report come out.”
Olson says he uses the MBSA reports to
give his customers peace of mind. “They
can look and see that their computer has
strong security, according to Microsoft,
and it gives them a good feeling.”
Because Olson runs MBSA on single
computers, the tool’s reporting capabilities are more than adequate for his needs.
Plus, he says, MBSA is reliable. “The
thing has run flawless every time,” he
says. “It’s definitely a comprehensive
and easy way to keep your Microsoft
computer updated.”
Going Beyond the OS
Others say MBSA’s biggest asset is its
ability to go beyond the OS to ferret out
holes in various applications. “It’s good in
security issues, like making sure IE or the
IIS server is set properly,” Clutter says. “I
use it to make sure that I have everything
locked down.”
This helps Clutter ensure his servers
won’t be easily hacked. “If somebody
hacks into one of my machines and
decides to install the FTP service on my
domain controller, I can run this utility
and see that right away,” he says. “It lets
you spot application-level things like
that quickly.”
Brendan O’Connor agrees. As the
network and systems administrator for
the William Floyd School District in
Mastic Beach, N.Y., he uses MBSA to
lock down every machine before it
enters the school network. “It’s one of
the steps we take when we create an
image now,” he explains. “We put on
Windows, all the Service Pack updates
and all the Office applications before
it goes out the door, but then we
run MBSA to make sure we haven’t
missed anything,” he explains. “It’s a
good baseline tool, and it’s free, so you
really can’t complain too much.”—
Joanne Cummings is a freelance technology
journalist. You can reach her via e-mail at
[email protected].
Project6
3/29/05
10:47 AM
Page 1
Fr:
barely managing your e-mail system
To:
managing it while you check your voicemail
EMC EMAILXTENDER® SAVES YOU TIME AND MONEY WITH A SMARTER WAY
TO MANAGE E-MAIL. Now you can handle everything from mailbox management to policy
administration and corporate records with one solution. A solution built to lower your storage
costs, streamline operations, and enable compliance. It’s what you need to gain control, minimize
risk, reduce cost, and go home on time. Finally. To learn more, visit www.EMC.com/legato.
EMC, EMC2, Legato, and where information lives are registered trademarks of EMC Corporation. © 2005 EMC Corporation. All rights reserved.
0505red_Roundup_35-41.v13
4/19/05
10:33 AM
Page 36
RedmondRoundup
Keep an Eye on Those Servers
The right server management tool closely monitors your network
and offers proactive responses to most common problems.
BY NELSON AND DANIELLE RUEST
You can’t let your guard down when it
comes to server management. It can be
too costly to just let your servers sit
there and hope they’re functioning at
full capacity.
Whether or not your company has
consolidated servers, closely managing
those servers is critical. Consolidation
reduces the total number of servers and
makes each one that much more important (see “You’re Fired,” p. 28, December 2004). On the other hand, if you
still have servers deployed everywhere
fulfilling all sorts of functions, you need
to keep a close eye on them to ensure
that they’re carrying their weight and
not draining corporate resources.
You need the right server management
tool to keep watch—one that will not
only monitor, but proactively correct
problems as they occur. It’s much better
to be told that a server was running out of
disk space and that the problem has been
fixed than to watch that server come to a
screeching halt because its drives are full.
We stress tested six server management tools for this roundup: Microsoft
Operations Manager 2005, Altiris
GetMoreOnline
Follow links to more information about
role-based server administration,
MOM 2005 solution accelerators and
the MOM 2000 Resource Kit. Plus,
access a sample operations schedule for
managing Windows 2003 servers.
FindIT code: EyeOnServers
redmondmag.com
Server
Provisioning
Suite
6.0,
LANDesk Server Manager 8.5, Argent
Guardian 8.0, Fidelia NetVigil 3.6.3
and up.time 3.0.9. While products
like the two highest-scoring tools
from Altiris and LANDesk provide
complete server provisioning, others
focus specifically on server monitoring
and service level maintenance.
We put each product through its paces
on multiple servers running Windows
• Capacity for integration to specific
server roles
• Support for industry standard
operational
models
such
as
the Information Technology Infrastructure Library (ITIL)
• Support for integration of standard
operating procedures in heterogeneous or homogeneous environments
• Script programming and extensibility
of the system
You need the right server management tool to keep
watch—one that will not only monitor, but proactively
correct problems as they occur.
Server 2003, all configured for various
roles. This way we knew what to manage
at the individual server level and what to
manage on all servers. We could then
concentrate on managing the specific
aspects of each particular server role.
For example, on Active Directory
Domain Controllers, you must manage
the size of the NTDS.DIT file that
stores Active Directory. You also need
to make sure replication is working
properly and doesn’t hog all your bandwidth. That’s why server management
tools need specific role-based management packs—detailed feature sets that
tell you what to manage and monitor
for servers fulfilling specific roles like
Domain Controller, SQL Server and
Exchange server.
You should keep these characteristics
in mind when considering a server
management package:
• Ease of installation and deployment
• Ability to monitor servers and
provide scripted responses to
common problems
36 | May 2005 | Redmond | redmondmag.com |
• Support for Web-based Enterprise
Management (WBEM)
You also need to know what you should
do and when. How often should you perform each activity? What should you do
daily, weekly or monthly? Are there any
ad hoc management or monitoring tasks
you should perform? See “Get More
Online” to access a sample management
schedule to help with these decisions.
Evolving Gracefully:
MOM 2005
Microsoft Operations Manager (MOM)
2005 is another step in the evolution of
Microsoft’s grand plans for systems
management and server monitoring.
While it stands on its own as a powerful
server management and monitoring
tool, Microsoft plans to combine MOM
and Systems Management Server into
a single provisioning package called
Microsoft System Center, but that won’t
happen for a while.
Improvements to MOM 2005 include
the new administrator and operator
0505red_Roundup_35-41.v13
4/19/05
10:34 AM
Page 37
In this Roundup
$40,000 for the first 100 managed
devices
Fidelia Technology Inc.
www.fidelia.com
609-452-2225
TING
L RA
RAL
OVE
Fidelia NetVigil 3.6.3
0%
ty 1
ibili
tens
d Ex
0%
1
g an
ion
ptin
ntat
Scri
ume
0%
Doc
M1
WBE
for
20%
port
les
Sup
r Ro
erve
%
for S
s 10
port
dard
Sup
Stan
for
0%
et 2
port
S
e
r
Sup
u
t
Fea
20%
ent
loym
/Dep
tion
alla
Inst
consoles (see Figure 1, p. 38). The new
look is similar to Outlook and offers
quick access to remote control, IP
configuration, the management console, Event Log and other tools. You’ll
use the administrator’s console for
deployment and configuration, as it
includes detailed information on
deployment procedures.
MOM’s agents now work with the
local system account on Windows 2000
servers or the network service account
on Windows Server 2003. The latter
grants agents only the required access,
so Windows Server 2003 deployments
are now more secure. MOM 2005 also
has a new agentless management mode,
which monitors systems through
Microsoft remote procedure calls
(RPC). This mode is for monitoring
servers where you can’t install an agent
for performance reasons.
MOM 2005 is more manageable
and scalable than earlier versions.
For example, MOM management
groups can now include up to 3,500
agent-managed servers and 60 agentless
systems. A management server can
support 1,200 agent-managed systems
and a management group can have up to
10 management servers. A management
group can also process up to 120,000
alerts per day, a considerable improvement over the previous version.
MOM 2005 uses management packs
for role-based server management that
cover Active Directory, Exchange, SQL
Server, Terminal Services and even the
Microsoft Baseline Security Analyzer
servers. Microsoft releases new
management packs every time it
updates a product in the Windows
Server System (WSS) group.
MOM 2005 also includes the MOM
Connector Framework, which lets you
integrate third-party tools with MOM,
offering a broader view of the network.
Smaller enterprises can opt for the
MOM 2005 Workgroup Edition (WE),
designed to simplify managing smaller
environments. MOM WE is a good
addition to a small business manage-
REDMONDRATING
1: Virtually inoperable
or nonexistent
5: Average, performs
adequately
10: Exceptional
7
5
3
8 10 6
8
7
7
6
7
8
6
8
7.1
8
5
5
8 10 7
8
7.2
8
5
8 10 5
8
8
7.5
8 8.5 8
9 10 7
7
8.3
9
9 10 8
7
8.7
Argent Guardian 8.0
$15,000 for every 10 managed
Windows servers; $3,000 for each
Unix server license
Argent Software
www.argent.com
860-674-1700
8
up.time 3.0.9
$695 per server, $95 per network
node, 20 percent annual support fee
uptime software inc.
www.uptimesoftware.com
416-868-0152
Microsoft Operations
Manager 2005
$729: MOM 2005 Server License;
$2,689: MOM 2005 Operations
Management License five-pack;
$499: Workgroup Edition (manages up
to 10 devices)
Microsoft Corp.
www.microsoft.com
800-426-9400
LANDesk Server Manager 8.5
$299 per server
LANDesk Software
www.landesk.com
800-982-2130
Altiris Server Management
Suite 6.0
$253 per node (no additional cost for
management server components)
Altiris Corp.
www.altiris.com
888-252-5551
9
8
| redmondmag.com | Redmond | May 2005 | 37
0505red_Roundup_35-41.v13
4/19/05
10:34 AM
Page 38
RedmondRoundup
ment toolkit, even though it’s limited to
monitoring 10 servers.
The Complete Package:
Altiris Server Management Suite 6.0
Altiris Server Management Suite (SMS)
supports every phase of a server’s
lifecycle—managing server deployment;
inventory; desired state management;
software and patch delivery; recovery
and problem resolution; and health
monitoring. SMS does more than MOM
2005, which is focused on monitoring
and problem resolution. Altiris SMS
provides complete server management
and provisioning for a lower cost than the
full version of MOM.
Altiris SMS has a nicely designed
step-by-step process for connecting the
notification server to a database server
and creating the Altiris database. For
server management, SMS provides
availability and performance monitoring, uptime reporting, trend analysis,
service restarting, automated system
snapshots before configuration changes
and so on. Because it starts with a complete inventory of a system’s settings
and resources (see Figure 2), the Altiris
SMS can provide details about a server
from the moment it’s deployed to its
ultimate retirement. Historical reports
Figure 1. The MOM 2005 operator console
has the same look and feel as Outlook
2003, and gives you immediate access to
information about managed systems.
Figure 2. The Altiris Console provides
comprehensive information about any
server in your network from any location.
show what happened to a system
throughout its service cycle.
Altiris also offers a comprehensive
client management suite that works off
the same console. If you’re looking for a
complete systems management suite,
this may well be the one.
Deployment Choices:
LANDesk Server Manager 8.5
Like Altiris, LANDesk offers a complete server lifecycle management tool
in LANDesk Server Manager (LSM).
Version 8.5 lets you inventory servers,
deploy software and patches, perform
real-time monitoring, restart services
and servers, and ensure that servers are
up and running on a constant basis.
LANDesk redesigned this new version
from the ground up. One interesting
aspect of the new LSM is the on-demand
agent, with its small, event-related footprint. When the agent needs to do something, it loads itself into memory. Once
it’s done, it automatically unloads itself.
This is pretty cool because it makes the
most of available resources.
LANDesk uses an interface during
installation that automatically checks for
prerequisites. If any prerequisite is missing, you can’t install the software. You can
also install LSM separately from the full
LANDesk Management Suite. Like
MOM and Altiris SMS, LSM can run
38 | May 2005 | Redmond | redmondmag.com |
with MSDE, but also supports SQL
Server and Oracle databases. We prefer
SQL Server because it’s fully relational
and considerably cheaper than Oracle.
After installing the LSM core server,
activate it to collect system information.
To deploy agents, you first must discover
devices, using any of several methods.
The easiest is using an IP range. It’s surprising the Windows edition doesn’t
include an Active Directory-based discovery method. This would greatly simplify discovery because all servers have an
AD account. When items are discovered,
select the ones to target (see Figure 3).
After this, they’re fully managed devices.
From this point, you can manage security patches and software deployments;
use real-time monitoring to view both
hardware- and software-related events
and predict potential failures; recover
crashed servers; and control performance
and availability on your servers. LSM is
easy to use once it’s configured and the
Web interface lets you access services
from anywhere in your organization.
One tip though—on Windows Server
2003, add the LSM Web site to the Local
Intranet zone to enable single sign-on.
Like Altiris SMS, LSM is a good
choice for complete server management.
A Unique Agentless Approach:
Argent Guardian 8.0
Argent takes an agentless approach to
server management, which has less
Figure 3. The LANDesk console is
completely Web-based.
Project5
4/11/05
4:43 PM
Page 1
ADVERTISEMENT
Security Event Management for
the Rest of Us
Monitoring your servers isn’t supposed to be a challenge. That’s why
ServerVision is different. It makes
server and event log monitoring fast
and easy, so you can manage your
Windows servers without frustration.
ServerVision gives you powerful monitoring with automated actions and
alerts based on criteria you set, and
you can use it as a low-cost intrusion
detection tool.
You can view services running, event
logs, disk space, memory and performance, without having to sift
through a mountain of details. The
GUI is simple and wizards help to get
things done fast. ServerVision allows
you to centrally monitor the health,
security, performance, and availability
of all your Windows machines (servers
or workstations). Like MOM
(Microsoft Operations Manager), you
get access to all aspects via an MMC
snap-in, or remotely via a web-based
interface. The MMC snap-in can be
used when working locally on the
machine and can monitor a remote
system over the network.
To monitor remote systems, use the
deployment wizard within the MMC
snap-in to deploy ServerVision onto
another system. You can create automated actions such as running a program, restarting a service, or rebooting
a system—as well as sending you
alerts—based on events or thresholds
you define. You can also set up custom
responses that can be active permanently, or only for set times on set
days, and a response can be built from
multiple response actions.
ServerVision monitors all logs,
including the additional logs supported
by Windows 2003/.NET. If a response
includes sending e-mail, complete event
details are included in the e-mail. To
minimize security threats to a server,
the server should be current with any
patches that are released. Once an
update is available, it should be installed
Increase server
uptime without
wasting YOUR
time. Server
Monitor Software
DONE RIGHT!
Easy, powerful server and
event log monitoring: Get a
quick view of server status, prioritized event logs, disk space,
memory, CPU performance,
and more—all without having
to sift through a mountain of
details. And setting it all up is a
snap with our straightforward
user interface and wizards.
Automated responses and
alerts:
Create
automated
actions such as running a program, rebooting a system, or
restarting a service—as well as
sending you alerts—based on
events or thresholds you define.
Detailed analysis reporting:
Create detailed reports on
event logs, performance, services, and more.
Configurable trend analysis:
Create and view performance
trends, in intervals from minutes to months.
Easy on your budget: Pricing
starts at $50 per server. Free
trial: Download a copy at
www.sunbelt-software.com
/redsv1.
as soon as is practical, in order to minimize the “attack surface” on a computer. Integrating with the free version of
HFNetChk (it must be installed on any
monitored system for this functionality
to work), ServerVision monitors the
security profile of your Windows computers. It automatically checks for relevant updates at set intervals, so you
don’t have to remember to manually
scan computers.
ServerVision’s performance monitoring can capture performance data at
any interval, and can cover days, weeks
or even months. Sophisticated
smoothing lets you see the underlying
trends, and you can change the time
values on particular areas of interest
for more granularity. For example, you
might collect CPU utilization, network traffic and web server usage data
for a week, at 10 second intervals, and
then display a chart of the information
for the whole week.
The security event log is the thing
you want to pay specific attention to.
It allows you to collect, analyze, correlate, and respond to security threats in
a fast friendly way. Many admins do
not even crack open the manual for
ServerVision, and as a matter of fact, it
was built with that in mind. Who
reads manuals these days anyway?
Sunbelt Software Tel: 1-888-NTUTILS
(688-8457) or 1-727-562-0101
Fax: 1-727-562-5199
www.sunbelt-software.com
[email protected]
© 2004 Sunbelt Software. All rights reserved. ServerVision is a
trademark of Sunbelt Software. All trademarks used are owned by
their respective companies.
0505red_Roundup_35-41.v13
4/19/05
10:34 AM
Page 40
RedmondRoundup
overall impact on the server and its
operation than products with agents.
Argent Guardian uses special application programming calls to collect data on
Windows machines. For Unix, it relies on
telnet or the Secured Shell (SSH). You do
need enterprise credentials for this
because the system actually logs on to the
target machines to collect data. It supports server roles through data collection
rules including Active Directory, Terminal Services, Event Log, performance
and even several machine-specific collections like HP, Dell, Cisco, Compaq and
so on. These rules are designed to support service level agreements (SLA), a
key aspect of server management.
Installation is easy, and Argent
Guardian performs item discovery right
up front. This way you know you’ll be
managing all your systems. Another nice
touch is that AD is the default discovery
method when installing on Windows,
making discovery very effective. Argent
also supports several other discovery
methods, mostly based on TCP/IP.
Argent supports several databases. In
fact, it offers the widest database support
of the products included here. By default,
Argent targets a Codebase (or dBase IV
format), but it also supports SQL Server
7 and 2000, Microsoft Access and Oracle
8 and above. Codebase turned out to be
just fine and was completely automated
by the setup process.
Figure 4. Argent Guardian’s interface reflects a more traditional service management
approach. It also offers a separate Web-based interface.
your entire WAN at a glance on the startup screen. Larger networks have to subdivide monitored servers into regions
with about 100 servers per region, which
is the recommended sizing from Argent.
Argent covers a lot of monitoring
ground and supports more than just
servers. So if you want a solid networkmonitoring tool, Argent Guardian could
be the tool for you.
On with Open Source:
Fidelia NetVigil 3.6.3
Fidelia NetVigil also takes a different
approach to server management. First of
all, the software runs on top of open
source components—the database is
If you’ve already covered your server provisioning and only want to
monitor your servers, look to products like MOM, Argent or up.time.
Argent has specific rule sets for SQL
Server, Exchange, AD and so on. There
are also several canned reports for network traffic, system uptime, monitoring
trends and performance data. The
console is simple and easy to use (see
Figure 4). It is not Web-based by default,
but Argent provides a downloadable Web
console. The default interface is the closest to a traditional monitoring tool interface with maps built right in. This is cool
for large organizations, because you have
MySQL and the Web server is Apache.
This means you can’t have Internet
Information Services (IIS) running on
the destination server running NetVigil.
The NetVigil package is complete—it
puts all the required components into a
single installation file.
Fidelia NetVigil is installed as the
default Web site, so you’re brought to the
console automatically. Sign in is very
“Unix-like.” You need to sign in as the
“superuser” to administer the system.
40 | May 2005 | Redmond | redmondmag.com |
Default passwords and login information are displayed right on the login
screen, so it’s hard to miss.
To begin the discovery process, log in
as localuser and create devices to
be used in your discovery process.
NetVigil can manage several different
device types (see Figure 5, opposite
page), so it’s really up to you as to what
you want to manage. Once you’ve
created the managed devices list, log off
as a user and log in as a “superuser” or
administrator, as only administrators
can perform discovery.
Perhaps because of this, the actual
discovery screen is buried under the
“superuser” menu. You can set up discovery jobs to run immediately or run them
on a schedule. As a “superuser,” you can
set up different departments and create
additional users that play varying roles in
the server management process.
NetVigil is based on the concept of
tests. When you’ve discovered and identified the devices to manage, NetVigil
runs regularly scheduled tests against
them. In the event of a test failure, it
runs a set of actions against the machine
that failed the test. Those “Action Profiles” can include sending e-mails or
pager messages, or running scripts to
restart a service or even a server.
There are two classes of profiles for
users and administrators. If you have a
0505red_Roundup_35-41.v13
4/19/05
10:34 AM
Page 41
RedmondRoundup
Figure 5. Fidelia NetVigil uses a Web interface driven by an Apache Web server. As you
can see, it supports several different types of devices.
machine that supports a key group of
users in your network, you can warn
them when a test fails on the server.
Administrative profiles relate to complex
operations like rebooting a server or
restarting a service. These profiles support service level agreements.
You manage much of NetVigil through
scripts and XML file modifications. It is
quite powerful in that regard. If you don’t
mind programming and digging into
XML data to modify settings and system
operations, this could be the program for
you. It requires a lot of technical background to get this product running properly, so it’s not as well suited for the
average admin. To its credit, Fidelia offers
a lower cost version called Helix. We
haven’t tried it out, but hopefully it’s
easier to use than NetVigil.
screen. One nice touch is that this screen
tells you right away what you need to do.
Move to the Config screen to add systems individually. This can be time consuming if you have hundreds of servers.
There are two ways to manage systems.
Systems with up.time installed are added
as a managed system and provide
performance data. If there’s no agent
present, up.time can still monitor, but
can’t collect performance data. You’ll
eventually have to deploy up.time to each
server. Because it’s a Windows Installer
file, it should be pretty easy to do, but
you’ll need a separate deployment tool. If
you’re running AD, you can deploy
up.time with a Group Policy object.
Once you’ve added systems, move to
the Radar Scan tab to see the status of
Web-based Monitoring:
up.time 3.0.9
up.time is a service and application monitoring tool that generates event-based
alerts. It works completely through a
Web interface, so you need to have IIS
installed on the server to run up.time.
You get to the up.time console by
opening a Web browser to http://localhost:9999, the default installation port.
Log in as admin with a default password
of admin. Like Fidelia, the up.time
screen tells you the username and the
password, so it’s hard to miss.
The first thing it asks for is the license
file. Cut and paste this into the license
dialog box. Then you’ll get the welcome
Figure 6. up.time provides extensive
information on the status of each managed
system by clicking on the links along the left
side of the up.time window.
your systems. To view information on an
individual system, click on it (see Figure
6). Once a system’s detailed view is open,
you can explore an extensive range of
information about that server. up.time
also provides detailed reports on
monitored systems and can group both
systems and users into discreet containers
for delegation. up.time’s ease of use is
most impressive. Everything is simple
and straightforward with elements where
they should be in the menus.
For monitoring, up.time supports root
cause analysis, workload analysis, disk
and file system monitors, performance
monitors and even user access to systems. Its canned reports include a lot of
information out of the box, and you can
easily modify them to meet your own
needs. This is a good, straightforward,
simple-to-use monitoring tool.
Powerful Choices
Altiris and LANDesk have a much
broader feature set than the others.
They really do more than straight
server monitoring. The Altiris suite is
a complete server-provisioning tool
for bare metal to retirement. It also
has the lowest cost. LANDesk is also
highly recommended, but it lacks
some of what Altiris offers.
We especially liked the MOM 2005
operator’s console interface because it is
so much like Outlook 2003. Argent and
Fidelia also have strong offerings with
powerful features, but seem better
suited in a heterogeneous environment
than a Windows-centric world. If
you’ve already covered server provisioning and only want to monitor your
servers, look to products like MOM,
Argent or up.time.—
Danielle Ruest and Nelson Ruest (MCSE,
MCT) are authors of multiple books
focusing on systems design, administration
and management. They run a consulting
company that concentrates on IT
infrastructure architecture and change and
configuration management. You can reach
them at [email protected].
| redmondmag.com | Redmond | May 2005 | 41
0505red_F1Cops42-49.v13
4/15/05
4:39 PM
Page 42
Mick Montgomery reached
a happy medium with his HR
department on monitoring
responsibilities and found
some tools to make the job
less onerous.
42 | May 2005 | Redmond | redmondmag.com |
0505red_F1Cops42-49.v13
4/15/05
4:39 PM
Page 43
CON TENT
COPS
BY BECKY NAGEL
Many businesses
expect IT to use
the equivalent of a
radar gun and
monitor employees
for infractions. But
laying down
the law can
have serious repercussions, both for
employees and the
IT departments
doing the watching.
PHOTO BY SIMON WILSON
hen Mick Montgomery was hired as an Internet/
intranet technologist by Ontario, Canada-based
Wescast Technologies five years ago, he knew
that part of the job would be wearing the “Content Cop” badge,
enforcing the company’s Web and e-mail usage policies.
It quickly became the most despised part of his day.
“I’d literally have to go through logs … line by line and look
for abuse,” he recalls of the manual process then used to investigate complaints. “It was painful, extremely painful.”
That pain is felt everywhere in organizations that conduct
employee monitoring. Employees may feel like Big Brother is
checking up on them, the IT department is usually tasked with
slogging through logs and records and reporting findings, the
human resources unit has to take action to discipline a wayward
worker, and the legal department must decide what employee
behavior crosses the line.
IT normally finds itself in the uncomfortable middle. Even
with the policy and technology advances of the past few years,
ever-present conflicts over the who, how and why of employee
monitoring remain.
If you haven’t yet found yourself caught up in this issue—poring
over logs to determine if a .jpg was purposely downloaded, dealing with HR issues you’d rather not know about, struggling
through the many ethical and legal quandaries that can arise—
chances are you soon will.
W
Legal Liability
One of the main reasons companies implement employee monitoring and filtering tools is to protect themselves from legal
liabilities like sexual harassment, discrimination and insider
trading. Due to recent regulations like Sarbanes-Oxley and
HIPAA (the Health Insurance Portability and Accountability
Act) in the United States, these concerns are only growing.
Those laws are a big factor in the push for monitoring,
according to Doug Towns, a labor and employment lawyer
| redmondmag.com | Redmond | May 2005 | 43
0505red_F1Cops42-49.v13
4/15/05
4:39 PM
Page 44
CONTENT COPS
with Atlanta-based Jones, Day, Reavis
& Pogue, who counsels corporations
on employee monitoring and privacy.
Employers that don’t monitor could
one day face a lawsuit for a possible
(and arguable) “affirmative obligation”
to do so. “We all know … the employer
has to keep the workplace free of sexual
harassment, which includes making
sure that inappropriate comments or
conduct are not occurring in the
workplace,” Towns explains. “Well,
does that extend so far to say that the
company does not just have the right
to—but has the duty to—go out there
and filter something?”
While all company departments—IT,
HR, legal and corporate—can usually
agree on at least the legal benefit of
such monitoring, it’s the other uses, as
well as IT’s role and responsibility
in maintaining and enforcing such
policies, that have turned this chore into
one of the most dreaded in all of IT.
Crimes and Misdemeanors
B
supposed to be monitoring is probably not opening up the
company to a privacy lawsuit because of the aforementioned
“all-or-nothing” nature of privacy laws. However, he can be
individually sued for harassment, stalking and/or other liabilities if he acts on the information gleaned.
The biggest issue—and one that the experts we talked with
say can arise more often than you might think—is child pornography. Because possessing child pornography is a crime, IT
employees must be extremely careful when they run across
suspicious images. “If you ever see [child pornography], push
away from the computer and do not touch anything again,
until [police] are on the scene,” says SANS Institute Director
Stephen Northcutt. “That [rule] must not ever be violated.”
A similar inviolable rule is reporting any evidence of child
pornography you find—even if your employer discourages
or forbids it. Not reporting it will leave you personally liable.
Michael Haisley, an incident handler for the SANS Internet
Storm Center, found himself in such a situation when
setting up a system for a district attorney’s office a few
years back.
If you ever see [child pornography], push away from the computer For one job, his team found
and do not touch anything again, until [police] are on the scene.
that an assistant district attorney
was viewing child pornography.
Stephen Northcutt, Director, SANS Institute
The attorney was fired, but the
of monitoring and whether it’s applied unevenly—are usually office told his team not to report it. “This was an election
not grounds for bringing lawsuits against a company under year—the prosecutor didn’t want it to be pursued as far as
privacy statues. However, other liabilities could be applied; law enforcement goes, because you don’t want that type
for example, there could be a discrimination suit if repercus- of scandal when you’re facing an election,” Haisley recalls.
While his team didn’t report it to local law enforcement,
sions for violating usage policies were stronger against
they did report it to U.S. Customs, the federal agency in
women or minorities.
Misusing information gleaned from monitoring can also get an charge of investigating child pornography. Customs “handled
IT employee in hot water. For example, if an IT staffer shares it directly with virtually no assistance from the local district
information learned via monitoring with someone who doesn’t attorney’s office,” he says.
According to Haisley, the pressure to hide child pornog“need to know,” he can be sued under defamation statutes, if
the information is untrue, or “public disclosure of private facts,” raphy or other violations, such as fraud, isn’t uncommon,
as it’s called in many states, if the information is true. According and it’s one reason he likes to design employee monitoring
to Towns, IT employees have been sued under such “gossiper” systems to instantly report violations to multiple people in
statutes, making it imperative that IT managers ensure that various departments across the company. “If the informathose handling employee monitoring duties are experienced tion is disseminated quickly to several sources,” he says, “it
gets a lot harder to silence that information, whether it be
enough to do so.
Another issue is employee misuse of such systems. An IT for a political motive or for a profit motive.”
— B.N.
employee who reads every e-mail of an employee they’re not
efore you pin on that content cop badge, make
sure you’re aware of the many legal issues
surrounding the responsibilities you’re about to
take on; if not to better protect your company, at
least to protect yourself.
The most common legal issue surrounding employee monitoring is privacy. According to labor and employment lawyer
Doug Towns, however, this issue has pretty much been
decided in favor of employers by U.S. courts, including a
case where it was determined an employer had the right to
monitor, even though the company in question told its
employees it wasn’t monitoring (Smyth v. Pillsbury Co.).
In fact, U.S. case law is so favorable to employers that only
one state—Connecticut—requires employees to sign a policy
acknowledging that they’re being monitored. Still, it’s a good
idea to do so, no matter where your company is located,
Towns says.
Because privacy is an “all-or-nothing” right, he explains,
issues of how companies implement monitoring—the extent
44 | May 2005 | Redmond | redmondmag.com |
Project5
4/12/05
5:27 PM
Page 1
Visit us at Tech Ed 2005 and play in our
TEXAS HOLD’EM POKER TOURNAMENT
0505red_F1Cops42-49.v13
4/15/05
4:39 PM
Page 46
CONTENT COPS
Not in Your Job Description
Projects that start for legal liability reasons often expand to include monitoring
employee productivity, which is when
conflicts arise in the role IT should play.
While some don’t have a problem
monitoring employee usage—as one
reader puts it, “The network belongs to
the company, and they set the rules.
What’s the problem?”—others say they
resent the chore because it places an
undue burden on their shoulders.
Laans Hokanson, a network administrator in Petersburg, Va., says for
years he’s fought “tooth and nail”
monitoring parameters. For example,
Pratt says that although “it’s outside the
scope of IT’s day-to-day job to provide
carte blanche monitoring,” he has no
problem monitoring for evidence
collection after a problem is identified.
Craig Reeds, manager of technology
development for Western Construction Group, says he’s much more
comfortable conducting employee
monitoring at his current job, where
it’s only performed on request, compared to the constant monitoring
expected by his former employer.
“You monitor people if you have a
The way a lot of [monitoring] systems have
been developed in the past, we’ve had IT
making policy decisions, and that’s something
IT’s not really trained to do—they’re just
being stuck into that position.
Michael Haisley, Incident Handler, SANS Internet Storm Center
against
implementing
employee
monitoring at his government agency,
in part because he doesn’t feel it’s his
job as a network administrator. “It’s
not that I have a moral problem with
it, just that I don’t want it to be part of
my job description—it’s not what I
signed up to do,” he says. “I like
problem solving, I don’t like running
around and busting people. If I wanted
to do that I’d have become a cop.
“I don’t go to people’s cubicles and
see what magazines they read; why
should the content of their Internet
access be my responsibility?”
Dave Pratt, a network administrator
in Diamond Springs, Calif., also
believes
that
monitoring
for
productivity isn’t his responsibility:
“Would the facilities department be
responsible for supervising an employee
whose job included the use of a hammer
or screwdriver on the production line?”
he asks. “Are computers any different?”
Protector or Spy?
One way to minimize the conflict and
gain IT buy-in is by changing the
problem; you don’t monitor people
just to find a problem,” he says.
Eric, a systems administrator from
Maine who asked that his last name
not be used, never quite felt comfortable with the chore, especially when
he felt the monitoring was being used
unfairly. Once he became suspicious
that a manager was looking for any
reason to fire an employee, so instead
of sending his standard report (that
would have detailed this particular
employee’s searching of job sites during his lunch hour), he sent over the
raw, unedited logs, which were virtually indecipherable.
“I gave them exactly what they
asked for,” he says. “I was trying not
to get too personally involved … but
trying to make sure everyone had a
fair chance.”
Reducing the chance of unfair
requests is one reason Reeds likes the
way the system works at his 40-person
headquarters, where all monitoring
requests must be approved by the
CEO, instead of being submitted to
Reeds directly. “The dangers of having
46 | May 2005 | Redmond | redmondmag.com |
one person being able to request monitoring is that they may not have all
the information or they may not have
the [monitored subject’s] best interests
at heart,” he explains.
Michael Haisley, an incident handler
for the SANS Internet Storm Center,
says he often designs his monitoring
systems to alert more than one person
to policy violations—preferably one
in HR and one in IT. “It gives the
information a balance,” he says. “The
way a lot of these systems have been
developed in the past, we’ve had
IT making policy decisions, and
that’s something IT’s not really
trained to do—they’re just being
stuck into that position.”
Dealing with the Fallout
It’s an uncomfortable position to be in,
especially when the results of that
monitoring start to bear bitter fruit.
Many sources express dismay that
their findings may be used to fire
someone, especially when the system
is being used unfairly.
For example, some employees are
treated differently from others for the
same infractions, usually based on rank.
One reader who asked to remain
anonymous says that when his company
implemented Web filtering, “lowerlevel employees had the book thrown at
GetMoreOnline
Delve deeper into the monitoring issue:
Check out additional resources on legal
concerns, employee monitoring policy
creation advice and technical solutions
mentioned in this article.
FindIT Code: ContentCops
redmondmag.com
them, while higher-level employees
whose habits sometimes bordered on
the illegal, got away scot-free. It was a
terrible thing to be involved in.”
The inequality in reprimands is so
widespread that Stephen Northcutt,
director of the SANS Institute, a security training company, says most IT
Project13
2/10/05
3:40 PM
Page 1
0505red_F1Cops42-49.v13
4/15/05
4:39 PM
Page 48
CONTENT COPS
11 Questions to Drive Your
Employee Monitoring Policy
1. Why Are You Implementing
Monitoring? Are you implementing it solely
to protect the company from various liabilities,
or will the company also monitor employee
productivity? If liability only, how will you ensure
that the system is used only for that goal?
2. What Violates Policy? What liability
does the company want to protect itself from,
and therefore what behavior is unacceptable? If
you’re also monitoring for productivity, you need
benchmarks to determine what is considered
acceptable personal usage, in terms of both time
and actions (unacceptable sites, inappropriate
language or jokes in e-mail and so on).
3. What Will You Be Monitoring?
Question No. 2 will determine whether monitoring
Internet usage will be enough, or if you’ll also need
to implement e-mail and desktop monitoring.
4. Will You Be Monitoring,
Filtering or Both? Does the company have
a “trust the employees” philosophy, or is it important
to implement filtering to stop violations before they
happen? What combination of technologies best fits
the project’s goals (as well as network security), yet
preserves company culture?
5. How Will You Monitor? Will
monitoring be constant, random, upon request or
some combination? If constant, does human
resources/IT have the manpower to take on the
challenge? If random, what system will you have in
place to ensure that it’s truly random? If upon
request, what checks and balances will be in place
to ensure that the system isn’t abused? If it’s a
combination, what will be used when?
6. Are Different Levels of
Monitoring Needed? Some companies
will have separate levels of monitoring depending on
the employee group: Heavier monitoring for lowerlevel employees, less for higher-level and/or “creative” employees, to virtually non-existent monitoring
for the highest levels. Does your company need such
levels, and if so, what’s appropriate for each?
7. Who Will Be Notified of
Violations? Who should receive notifications
of violations? Will they be kept within HR, or will IT
be notified as well? Will several people be notified in
order to ensure the information is fair and acted
upon, without expanding beyond the “need to
know” boundary?
8. How Quickly Should Violations
Be Reported? Some companies need to
know about possible violations immediately due to
union contracts. Does your company have any such
restrictions? What type of report schedule (daily,
weekly, monthly) makes the most sense for all
involved in the project (e.g., daily for HR to act upon,
weekly or monthly for IT to check against false
positives and fine-tune the system)?
9. What Software or Other Solutions Can Make the Chore Easier?
What software options are available that can meet
the exact monitoring and reporting needs of your
project? Will these software solutions allow (or can
they be customized to allow) the IT department
minimum involvement in the process? If not, who
will be responsible for the analysis of any reports:
IT, or a properly trained HR resources employee, for
example? Is outsourcing an option?
10. How Will You Handle
Violations? What will the repercussions of
any violations be? How do those repercussions
grow as the number of violations grows? In what
situations is a simple warning appropriate? Will
the type of discipline vary depending on the level
of the employee who violated the policy?
11. How Can the System’s
Fairness Be Communicated?
According to Dr. Theresa Wellbourne, whose
company monitors employee satisfaction and
productivity, morale from a firing that employees
don’t see as fair—even if it’s justified—can kill
productivity for three to five weeks. “It ends up
being a justice issue,” she explains. “When you
take action, people need to understand why.”
— B.N.
48 | May 2005 | Redmond | redmondmag.com |
pros in his classes simply don’t bother
to monitor vice presidents and above.
While he understands the reasons
behind such a policy, Towns says most
of his law firm’s clients instead appoint
more senior IT people to monitor
the highest-level executives. “Most
companies would be reluctant to say
there are certain individuals who do
have privacy and who we would never
review,” he explains. “That’s clearly not
what most companies would want to
argue if there was ever an allegation
either of harassment, discrimination or
some type of fraudulent misconduct by
individuals at a certain level.”
Reeds says what he dislikes most
about being his company’s content
cop is “the knowledge that I’m stuck
with afterward. Sometimes, it totally
changes your perception of a person,
and it’s difficult to deal with them
knowing what you know.”
Given
those
concerns,
it’s
important to choose your employee
monitoring staff carefully. “There’s a
lot of research that shows certain
personality types end up doing better
in certain types of jobs,” says Dr.
Theresa Wellbourne, founder and
CEO of the employee relationship
consulting firm eePulse Inc. and a
former human resources professor.
Look for someone “who doesn’t
identify on an emotional level with
people’s problems, so they can just be
very fact driven. They’re probably
going to be better at doing it.”
Getting Help
While the human issues side can be
significant, so can the monitoring
burden, especially if you’re still manually combing through e-mails and
Internet logs, as Montgomery once
did. “I’d get one or two [monitoring
requests] a week, and as soon as I’d
get them it didn’t matter what I was
doing—it was top priority,” he comments. “I knew immediately that two
to three hours of my day were going
to be spent extracting this data.”
Then, a few years ago, an HR representative asked whether Montgomery
could automate the process such that
4/15/05
4:39 PM
HR could have direct control, running
and analyzing the reports. “I had a
small party in my office,” he laughed.
“I was right on board with it.”
If your company makes the same
choice, one possible starting point is
reducing access to inappropriate material. “Rather than busting somebody
for having 20 gigs of porn, just don’t let
them get there,” Northcutt says.
But filtering alone won’t work for
many corporations. To further reduce
the burden, Haisley recommends
designing your system to limit what it
tells you: “Configure the alerts
and rules so that you [only] get a
notification on something that
obviously violates your policy, so
you’re not wading through literally
everything everyone does.”
Haisley is particularly fond of new
reporting tools that allow an HR
department direct access to reports and
alerts, thus reducing both the time IT
spends on this chore as well as its exposure to the information. He’s found
features in Microsoft’s ISA Server 2004
particularly useful, citing its ability to
filter based on user groups and its
customized rule sets for e-mail alerts.
He also likes Snort, saying the open
source tool is an excellent option for
cash-strapped IT departments. Snort
allows you to create the same kinds of
reporting rules as ISA Server, he says,
albeit with more work.
When developing custom reporting,
Haisley strongly recommends building in context on either side of any
alert—for example, all Web pages visited before and after a suspicious
download—to make it easy to track
back the history of reported violation.
But you don’t have to rely on custom
solutions. Some companies choose to
outsource the chore, while others turn
to off-the-shelf monitoring packages.
These include PixAlert Suite, which
scans employee desktops for pornographic images, and Wavecrest’s Cyfin
Reporter, a Web monitoring product
that runs a number of custom reports.
Cyphin Reporter has allowed
Wescast’s Montgomery to step away
from the day-to-day beat. Now, his
Page 49
main employee monitoring responsibility is watching the back end of the
system—making sure the software and
the reports are running correctly—
while only occasionally delving deeper
into reports.
And that’s exactly the way it should
be, according to Haisley. “By staying a
little bit involved, [IT makes] sure the
system is working, and they also make
sure if there’s a false positive or a
problem with the system, they’re
dealing with it,” he says. “They’re
going to have the technical knowledge
to recognize things that HR will not
be able to recognize.”
Make Policy a Priority
Before you decide on a monitoring
solution, though, you need to establish
a policy. It’s essential that the policy
cover all aspects of not only why the
company is monitoring, but what
exactly it will monitor, how it will monitor and the steps for both reporting
and dealing with violations (see “11
Questions to Drive Your Employee
Monitoring Policy,” opposite page).
It’s so important that employeemonitoring software vendors often
consult for free with customers. “It is a
way for IT and the business sponsors,
whether it’s HR, internal monitoring,
compliance or even CEOs, to really
work together to make sure they’ve
looked at the issue from all angles,”
says Jack Managan, director of marketing for PixAlert.
“You have to have a policy that’s
signed off on,” says Montgomery.
“Without a policy, you don’t have anything to stand on, nothing behind you
to say ‘This is why we’re doing this,
this is corporate policy, the executives
have signed off, the board has signed
off, you have signed a document
saying you agree to this.’ If you don’t
have that, you can’t do anything.”
Montgomery worked with his company’s HR department to develop a
policy and implement a technical solution that has all but eliminated his role
in the process, making him more commissioner than beat cop. “The only
time I get involved now is if HR gets
into a situation where there’s going to
be a serious reprimand, up to and
including termination of an employee,”
he says. “They’ll ask me to go through
the report and validate that what they
see is correct.”
A fair, detailed policy can also
make all the difference for the
individual IT employees charged with
monitoring. Hokanson, who’s fought
against IT monitoring for years in his
workplace, says he might be more open
to the idea if a solid policy were in place.
Until then, he says, “I don’t want to get
PHOTO BY SIMON WILSON
0505red_F1Cops42-49.v13
Mick Montgomery worked with his
company’s HR department to craft a
monitoring policy that makes him more
commissioner than beat cop.
into the situation where IT is enforcing
HR policies that are ambiguous.”
While many argue that enforcing
this policy shouldn’t fall on the IT
department’s shoulders, Montgomery
counters that it’s the only way to
create a livable employee-monitoring
solution. “You’re going to start dealing
with Internet issues because [IT is the
one] giving employees Internet access.
That’s the reality.”
But monitoring doesn’t have to be
overly burdensome. As Montgomery
points out, he and his crew have found a
happy medium, a solution every IT
department should explore. “If IT doesn’t have a dialog with HR, then IT ends
up bearing the entire brunt of it.”—
Becky Nagel is the editor of
Redmondmag.com, as well as sister sites
CertCities.com and TCPmag.com. You can
reach her at [email protected].
| redmondmag.com | Redmond | May 2005 | 49
Project6
4/14/05
3:36 PM
Page 1
0505red_F2Simplify_51-54.v8
4/15/05
4:43 PM
Page 51
There’s a saying in IT that
“complexity is the enemy of security.”
It’s also the enemy of efficiency, troubleshooting
and other critical network functions.
Here are six ways to
untangle that crowded web
you’ve weaved.
BY BILL HELDMAN
ILLUSTRATION BY RYAN ETTER
H
as your single LAN of the ’90s evolved into a
gargantuan enterprise? If your shop is like
most, it started out with a handful of
Windows NT, Unix and Novell servers on a little
network. Now you’re awash in a sea of servers (for which
you might have little solid software and hardware inventory
information); you’re reasonably certain some percentage
of your equipment has little to no fault-tolerance or
redundancy protection associated with it; bandwidth usage
is out of control; you’re nowhere near level-set in terms
of your end-user computers’ OSes, Office and miscellaneous
application installations, not to mention BIOS versions; and
you’re vulnerable to the virus du jour. On top of it all, your
mobile and wireless users are increasing at an astronomical rate.
Sound familiar? If so, you’re probably wondering how to
make sense of it all—or if that’s even possible at this point.
Well, here are some practical steps you can take to simplify
your network.
Start with the Subnets
First, take a look at your subnet structure, because
nowhere can things get more kludged than a poorly
engineered subnet plan. It can start with a wonderful idea
like the 10-dot private addressing scheme. Then you add a
bizarre subnet mask to it, assign a subnet to each little
handful of users in various corners of the building, and
wind up with a rat’s nest. To top it off, you associate the
whole thing with switched VLANs. Poorly engineered
TCP/IP subnet plans are difficult to understand (especially
at 3:00 a.m. when you’re trying to figure out the problem
with your network), and might needlessly stress network
switch and routing gear. If this is you, re-invent your subnet plan. Use standard subnet masks, and break things out
into logical divisions. The subnets will fall right out at you.
| redmondmag.com | Redmond | May 2005 | 51
0505red_F2Simplify_51-54.v8
VLAN
1-4
Switch,
Floor 3
4/15/05
4:43 PM
Page 52
VLAN
1-4
10.17.10.x – 255.255.128.0
10.18.10.x – 255.255.128.0
10.19.10.x – 255.255.128.0
10.20.10.x – 255.255.128.0
10.21.10.x – 255.255.128.0
10.22.10.x – 255.255.128.0
10.23.10.x – 255.255.128.0
10.24.10.x – 255.255.128.0
10.25.10.x – 255.255.128.0
Switch,
Floor 3
Switch,
Floor 2
Switch,
Floor 2
Switch,
Floor 1
VLAN
1-4
10.3.1.x – 255.255.255.0
10.3.3.x – 255.255.255.0
10.3.4.x – 255.255.255.0
10.3.5.x – 255.255.255.0
10.3.6.x – 255.255.255.0
10.3.7.x – 255.255.255.0
10.3.8.x – 255.255.255.0
10.1.10.x – 255.255.128.0
10.2.10.x – 255.255.128.0
10.3.10.x – 255.255.128.0
10.4.10.x – 255.255.128.0
10.5.10.x – 255.255.128.0
10.6.10.x – 255.255.128.0
10.7.10.x – 255.255.128.0
10.8.10.x – 255.255.128.0
Switch,
Floor 1
VLAN
1-4
10.1.1.x – 255.255.255.0
10.1.2.x – 255.255.255.0
10.1.3.x – 255.255.255.0
10.1.4.x – 255.255.255.0
10.1.5.x – 255.255.255.0
10.1.6.x – 255.255.255.0
10.1.7.x – 255.255.255.0
10.1.8.x – 255.255.255.0
Figure 1. This building has an unwieldy
and overly complex subnet structure, with
multiple subnets per floor and limited IP
addresses per subnet. This will eventually
lead to problems.
Figure 2. The re-engineered subnet plan is
less confusing, more logical and simpler. As
you can see, there is one subnet per floor, and
double the number of IP addresses available
per subnet.
Take a look at Figure 1, and note that
Floors 1 and 3 (we can presume the other
floors as well) have a 255.255.128.0
subnet mask, meaning that each subnet
has half the available IP addresses that
it normally would. (For simplification
and clarity, avoid using anything other
than a straight Class A, B or C mask.)
Further, the second octet is incremented,
and the third octet is the same in all
subnets. While this works, it’s messy and
confusing because there are eight subnets
per floor. As you go up the floors, you
have to remember which grouping of
subnets belongs to which floor.
Now look at the revamped subnet
structure in Figure 2, in which the first
floor’s eight subnets are isolated with a
normal Class C subnet mask. It’s much
easier to tell at a glance which floor you’re
dealing with now, and you don’t run the
risk of running out of IP addresses for a
given subnet. Whether you keep the
VLANs is a networking decision, but in
either case you’ll have to go in and tweak
the closet switches on each floor to
reflect the new addressing scheme.
the database, preventing Windows from
automatically discovering and creating
records for the device (which happened
to me in one of my jobs). Also, you
increase the chance of errors due to
replication latency, and the complexity
of the installation confuses people that
have to follow your lead. Besides all
that, you simply don’t need a bunch of
name servers on your network.
A well-architected name server implementation requires only a handful of
servers for even the largest of enterprises.
In the case of name server quantities, less
equals more. Here are some of the most
important considerations:
• If you have to maintain WINS, no
more than three WINS servers is a
pretty good rule of thumb, regardless
of the size of the organization.
• If you can avoid it, do not use the
LMHOSTS file on the local client
computer or on servers, as this
creates even more complexity and
difficulty in troubleshooting.
• If you use an image to install clients,
disable LMHOSTS lookup in your
client network configuration. In cases
like this, LMHOSTS is blank. If a
computer tries to find a host and
resorts
to
LMHOSTS,
the
LMHOSTS lookup will fail, of
course, but the computer wasted time
performing a useless exercise.
• If you can get by without WINS, do
so, sticking strictly with DNS for
name resolution. However, realize that
Simplify Your
Name Resolution
A big offender in adding
unnecessary complexity to
the network is the proliferation of
WINS and DNS boxes. By keeping a
multitude of name servers in your environment, you run the risk of an amateur
administrator keying a static record into
52 | May 2005 | Redmond | redmondmag.com |
unless everything is up-to-date—all
applications, servers and users—it may
be tough to dispense with WINS, at
least for the next several years.
• Try to keep your internal DNS
environment to three servers.
I’m not a fan of forest administrators
keeping a secondary DNS server, as
this, too, adds complexity. However, I
understand why an admin would want
to maintain his own DNS server. The
trick here is to have one or two top
people (keepers of the root) architect
and manage the DNS deployment, and
communicate on a routine basis what’s
happening, so that it’s understood how
DNS will roll out. Otherwise, the
servers will procreate like rabbits and
no one will be able to resolve a name.
It is vital that someone own the DNS
implementation, lock, stock and barrel.
Simplification Through
“Stream”-lining
Applications
Suppose you were told you
could package all of your users’ apps with
a simple, wizard-driven product, store
them on a server as a file and send the
resulting application icons to a designated
set of users. When a user clicks on one, a
small percentage of the app streams to the
user’s computer, then launches.
This is the idea behind “streaming
applications.” The app acts like it’s running locally, but in fact nothing is
installed on the user’s desktop—no Registry entries, no files. That certainly simplifies your network, but it goes even
further than that: the program isn’t even
installed on the server. The idea revolves
around the packaging software watching
an app install itself, then creating a file
that represents the app to the server and
to the user. The app thinks it’s running in
the regular framework for which it was
written, but in reality, the user is simply
utilizing a cache file on his computer.
In this scenario, the user clicks an application and part or all of it—depending on
whether it’s a desktop or mobile user—is
streamed to his computer, as opposed to
running directly from the server, as in the
Citrix/Terminal Services model. The
program instead runs from the app-
Project1
4/4/05
10:45 AM
Page 1
7…i˜ ÃÞÃÌi“à }œ `œÜ˜]
µÕˆVŽÞ LœÕ˜Vi L>VŽt
,iVœÛiÀ Õ« ̜ £ää¯ œv ޜÕÀ VÀˆÌˆV>
`>Ì> Õ« ̜ ™ä¯ v>ÃÌiÀ ܈̅ 7
,iVœÛiÀÞ >˜>}iÀ Ó°ä°
7ˆÌ… ˜iÜ ,iVœÛiÀÞ >˜>}iÀÁ Ó°ä] }iÌ̈˜} ޜÕÀ ÃÞÃÌi“à >˜`
`>Ì> L>VŽ ˆÃ v>ÃÌiÀ >˜` i>ÈiÀ ̅>˜ iÛiÀt ,iVœÛiÀÞ >˜>}iÀ
Ó°ä iÝÌi˜`à «œÜiÀvՏ ,iVœÛiÀÞ *œˆ˜ÌÒ «ÀœÌiV̈œ˜ Liޜ˜` ̅i
œ«iÀ>̈˜} ÃÞÃÌi“ ̜ «ÀœÌiVÌ «ÀiVˆÃiÞ ̅i wiÃ ÞœÕ V…œœÃi œ˜ ޜÕÀ
“ˆÃȜ˜‡VÀˆÌˆV> ÃiÀÛiÀÃ] `iÎ̜«Ã] >˜` ˜œÌiLœœŽÃ° 7…i˜ > ÃÞÃÌi“
LiVœ“ià ՘LœœÌ>Li œÀ ՘ÃÌ>Li] ȓ«Þ Àœ ˆÌ L>VŽ ̜ > Ž˜œÜ˜ }œœ`
ÃÌ>Ìi° 9œÕ½ ÀiÃ̜Ài ̅i ÃÞÃÌi“ ̜ «iÀviVÌ …i>Ì… Õ« ̜ ™ä¯ v>ÃÌiÀ
̅>˜ ܈̅ Vœ˜Ûi˜Ìˆœ˜> “i̅œ`Ã] ܈̅œÕÌ œÃˆ˜} œÀ œÛiÀ‡ÜÀˆÌˆ˜} >˜Þ
Û>Õ>Li `>Ì>° 9œÕ V>˜ ÀiÃ̜Ài œ˜i ÃÞÃÌi“ >Ì > ̈“i] œÀ ̅œÕÃ>˜`à œv
ÃÞÃÌi“à ȓՏÌ>˜iœÕÏÞ] vÀœ“ > Vi˜ÌÀ>] Ài“œÌi œV>̈œ˜° /…>Ì «ÀœÌiV̈œ˜
iÝÌi˜`à ̜ “œLˆi Vœ“«ÕÌiÀà iÛi˜ ܅i˜ ̅iÞ >Ài `ˆÃVœ˜˜iVÌi` vÀœ“
̅i ˜iÌܜÀŽ] LiV>ÕÃi ̅i ˜iÜ -“>ÀÌˆÝ 7ˆâ>À`Ò >œÜà “œLˆi ÕÃiÀà ̜
µÕˆVŽÞ >˜` i>ÈÞ ÀiVœÛiÀ ̅iˆÀ œÜ˜ ÃÞÃÌi“à ˆ˜ ̅i wi`° 7…i˜ ÃÞÃÌi“Ã
v>ˆ] LÀˆ˜} ̅i“ L>VŽ ˆ˜ ÀiVœÀ` ̈“i ܈̅ ,iVœÛiÀÞ >˜>}iÀ Ó°ä°
,i«>ˆÀ°
,iVœÛiÀ°
VViiÀ>Ìi°
7HATS .EW IN 7INTERNALS 2ECOVERY -ANAGER "ROADER RECOVERY CAPABILITIES
s
s
0ROTECTION FOR MORE THAN THE /3
2ECOVERY 3ETS NOW FOR SYSTEM FILES PROGRAM FILES USER SETTINGS AND USER DATA
&LEXIBILITY IN PROTECTION WITH CUSTOM 2ECOVERY 3ETS
s
5SING THE NEW 2ECOVERY 3ET %DITOR ADMINISTRATORS CAN DEFINE CUSTOM 2ECOVERY 3ETS TO INCLUDE
OR EXCLUDE FILES DIRECTORIES FILE EXTENSIONS REGISTRY KEYS AND VALUES
4RUE NETWORK FLEXIBILITY
s
2ECOVERY -ANAGER PROVIDES COVERAGE FOR ANY SYSTEM THAT CAN BE REACHED BY 4#0)0
2ECOVERY PROTECTION AND SELFSERVICE FOR MOBILE 0#S
s
s
2ECOVERY 0OINTS CREATED EVEN WHEN NOT CONNECTED TO THE NETWORK AND STORED LOCALLY ON THE MOBILE 0#
3YSTEM ADMINISTRATOR CAN ENABLE SELFSERVICE RECOVERY FOR MOBILE 0# USERS FROM THEIR LOCAL 2ECOVERY 0OINT
AND SELFHELP FOR LOST FILES
!DVANCED MANAGEABILITY
s 3MART"IND © PROVIDES THE ABILITY TO BIND AN !CTIVE $IRECTORY š NODE TO A 2ECOVERY 0OINT SCHEDULE
s 2ECOVERY -ANAGER NOTIFIES SYSTEM ADMINISTRATORS BY EMAIL OF KEY EVENTS IMPACTING COMPLETION OF 2ECOVERY 0OINTS
%NHANCED SECURITY
s
2ECOVERY -ANAGER ENCRYPTS DATA MOVED ACROSS THE NETWORK BETWEEN 2ECOVERY -ANAGER HOSTS AGENTS
AND BOOT CLIENTS
-IGRATION 7IZARD TO FACILITATE MIGRATING FROM 2ECOVERY -ANAGER TO 2ECOVERY -ANAGER i>À˜ œÀit
£‡nää‡{än‡n{£x
ÜÜܰ܈˜ÌiÀ˜>Ã°Vœ“
¥7INTERNALS3OFTWARE,07INTERNALSAND7INTERNALS2ECOVERY-ANAGERAREREGISTEREDTRADEMARKSOF7INTERNALS3OFTWARE,0 2ECOVERY0OINT3MART&IX7IZARDAND3MART"INDARETRADEMARKSOF7INTERNALS3OFTWARE,0 !CTIVE$IRECTORYISAREGISTERED
TRADEMARKOF-ICROSOFT#ORPORATIONINTHE53ANDOROTHERCOUNTRIES
0505red_F2Simplify_51-54.v8
4/15/05
4:43 PM
streaming server. The
app-streaming servers represent the apps to your Citrix
or Terminal Services servers and
they, in turn, represent them to the
user. You don’t even have to have a Citrix
or Terminal Services box to use streaming app server software. Two major players in this space, AppStream and
Softricity, both allow you to host the
apps without Citrix or Terminal Services.
Simplify by
Standardizing
When it comes to Total Cost
of Ownership (TCO), one of
the worst things you can do is maintain
an installed base of every version of
Windows and Office under the sun. By
level-setting your users’ OSes and
application versions, you gain some
important simplification benefits:
• You avoid having to carry around a
bevy of CDs
• Support costs are greatly reduced
• Upgrades are easier (“Let’s see, is it
SP4 for Win2K and SP1 for XP or
vice-versa?”)
• Training is easier
• You don’t have to cope with software
glitches spread across four or five
version levels.
I’ve seen shops with Windows 3.11, 95,
98, ME, NT, 2000 and XP—even a couple of old DOS machines. There are
shops where a small percentage of the
user-base insists on staying with WordPerfect instead of joining the rest of the
Office crowd (or vice-versa). One time,
my CFO was adamant that he would not
migrate to Outlook calendar from his
“Act!” program—never mind that the rest
of the enterprise was scheduling meetings in Outlook he wouldn’t show up for
because he didn’t know he was invited.
The same thing goes for servers—keep
them level-set for greater efficiencies.
One trend starting to take hold in the
server world is the idea of “automatic
provisioning.” You have a rack of “bare
metal” servers sitting in your data center,
just waiting for loads to increase. When
they do, your management software is
smart enough to provision (some call it
“inflate”) a new server for the need,
Page 54
regardless of where the need is. This
sort of provisioning technology might
require standardization, at least in terms
of the OS and associated service packs
and security updates.
Simplify Automatically
Savvy administrators know
how important automation is
to making, or keeping, a network simple. And they get help from
today’s
management
tools
like
SMS/MOM, Altiris, NetIQ, LANDesk
and others, which have come a long way
from the days of SMS 1.0. One overlooked area of automation, though, is in
configuration management. If you’ve
ever had to go through and change the
subnet mask on a couple hundred closet
switches all over your company, you’ll
love this class of software.
Suppose, in the example above, that
you have 250 network switches sitting in
25 different closets around your company and decide to re-engineer your subnets, as advised in Step 1. Without
automated configuration management,
you’ll have to either Telnet, or HTTP,
into each switch to make the configuration change, or visit each switch with a
laptop and null modem cable to make
the change on a per switch basis.
Configuration management software
discovers the managed devices. Once it
does, you set up the subnet change and
issue the command to all 250 switches at
once. Cool, huh?
Simplify Your Printing
Question: What procreates
faster than warm, moist yeast?
Answer: Printers!
In a 12-story building of about 900
users, guess how many printers my
shop supported? 900! The printer
insanity has to stop.
To simplify this grotesque situation,
consider leased, networked, enterpriseclass Multi-Function Devices (MFDs)
that can print in color and black and
white, fax, scan and copy. (Some of them
make espresso and heat up your morning
bagels, too.) Several strong vendors play
in this space including Ricoh, Canon and
Xerox. These devices can be centrally
54 | May 2005 | Redmond | redmondmag.com |
managed, they’re rugged and aren’t
subject to breakdowns like the little
ink- and laser-jet units are. Users can
send a variety of jobs to them—whether
it’s scanning a document on the platen
to send to the desktop or sending a
500-page report from the desktop to hit
the three-hole paper bin.
Because of the tremendous duty-cycle
these MFDs can handle, you can design
an implementation that strategically
locates them around the building—
instead of in every nook and cranny in
your office. Best of all, with the right
leasing plan, support is handled by the
leasing company, freeing you up for
more important duties.
Don’t Put It Off
Many of these tips take time to implement. Some, like the subnet, require a
great deal of preparation and testing. You
may feel like you don’t have the time and
resources to undertake some of these
changes, but consider the alternative: having an inefficient, needlessly complex network that slows you down every day. In
the end, the extra effort you spend now
will save you much effort in the future, not
to mention money that you can spend on
something other than aspirin.—
Bill Heldman is an analyst with Enterprise
Management Associates (EMA) in Boulder,
Colo., a leading market research firm focusing on all aspects of enterprise management
software and services. Bill has more than 14
years experience working with distributed
systems, applications and networks. His current focuses at EMA include desktop, applications, systems and services management,
configuration change management and
enterprise application integration. Contact
him at [email protected].
GetMoreOnline
Find more ways to simplify your network:
Storage, Backups, Phone via VoIP and
Server through virtualization. Plus, follow
links to the vendors mentioned here.
FindIT code: 6Simplify
redmondmag.com
Project5
4/1/05
2:42 PM
Page 1
0505red_F2LightsOut56-60.v8
4/19/05
2:30 PM
Page 56
Remote management has never been a Microsoft
strong suit, but Windows Server 2003 is helping
S
users manage servers that no IT staff can touch.
ystems administrators stuck with the job of
managing Windows servers tucked into
buildings that have no IT presence
have long complained about their
plight, but Windows Server 2003 is
giving them cause for hope.
Windows NT Server and Windows 2000
Server were difficult to maintain, monitor and customize,
with little of the sophisticated scripting capabilities that
Unix and mainframe system administrators use routinely.
Neither made it easy to perform everyday maintenance
or emergency response without third-party tools to automate common functions or apply changes to a group of
servers at once.
“When Microsoft talked about Windows in the data
center three or four years ago, it was really kind of laughable,” according to Jean-Pierre Garbani, vice president of
computing systems research at Forrester Inc.
Windows Server 2003 was intended to change that perception, and make Microsoft a contender in the market for
56 | May 2005 | Redmond | redmondmag.com |
servers that can be maintained without an IT person on site
to baby-sit them—and thus a contender in the enterprise data
center. To a large extent, Garbani says, it has done just that.
Microsoft has been trying to improve remote
administration and management of its servers since the
first version of NT shipped. The goal is to match or
exceed the remote-management functions of data-center
managers like Unix machines and mainframes, according
to Ward Ralston, senior technical product manager in the
Windows Server Division. “With Windows Server 2003,
you can choose to remotely perform server management
tasks that previously could be done only locally,” he says.
Tools within Windows 2003 fall into four categories:
• Remote administration with Terminal Services, which is
built into the OS and allows two simultaneous remote
connections with no additional license costs. It’s designed
to allow server administration and configuration functions
on servers located anywhere on the network. The Remote
Desktop MMC snap-in allows support for additional
machines, and can remotely administer Win2K servers.
0505red_F2LightsOut56-60.v8
4/19/05
2:30 PM
Page 57
Managing
in Isolation
BY KEVIN FOGARTY
• Branch office/remote (BO/R) servers allow administrators
to remotely control servers that don’t have a monitor,
keyboard or mouse, as might be the case in either a
cluster arrangement or in a branch office, to discourage
users from tinkering with their local server. BO/R also
includes Emergency Management Services, which lets
administrators re-start or remotely install software on a
server whose OS isn’t responding.
• The command-line interface in Windows 2003 is
much more capable than in previous versions because of
enhancements to the Windows Management Instrumentation (WMI) API. WMI gives administrators
access to all shells and utilities in Windows 2003, and
enables them to write extensive scripts to automate
functions across one or many servers.
• The Windows Server 2003 administration tool pack,
included in Windows Server 2003 CDs, includes simplified interfaces for remote-management functions to
make it easier to administer servers, networks, directories
and storage.
“When you add up all those things, [Microsoft’s] story is
pretty good, especially for the money you spend,” according
to Peter Pawlak, a senior analyst at Directions on Microsoft,
a research company in Kirkland, Wash. “You spend a fraction of what you would in the Unix world and get 80 percent of the functionality; and it’s not just limited to
Windows Server 2003. Some of those functions were there
in Windows 2000 and can be used on NT and XP as well.”
Easier Living Through Scripting
For many users, it’s the base functions rather than the addon products that they find particularly useful—especially
given they come with no additional cost.
David Chacon, technical services manager for the IS
department at PING Golf in Phoenix, Ariz., is particularly fond of the enhancements to WMI, an application
programming language that first appeared in Windows
2000. WMI makes for simplified, richer scripting by
providing access to operating system services that are
otherwise inaccessible.
| redmondmag.com | Redmond | May 2005 | 57
0505red_F2LightsOut56-60.v8
4/19/05
2:30 PM
Page 58
Managing in Isolation
“Before WMI existed, if you wanted
to kick off automated processes to
migrate something, or handle login
scripting, or monitor the status of a
machine or an application, there was
no way to do it in the OS itself,” says
Chacon. You could do it with DOS
batch files, or you’d have to get some
third-party application.”
In Windows 2003, Microsoft
enhanced WMI’s automation capabilities, making it much easier to work
with. For example, the SMTP Event
Consumer function that enables
WMI to e-mail an administrator
when it notices a problem event
wasn’t available in Win2K.
Versions in XP and Windows 2003
also include more functional utilities
and a simpler command set. Rather
than having to write a script for every
event and server you want to track,
WMI now includes viewers or shorthand commands to let administrators
view logs, query specific nodes and
handle other functions with pointand-click or single-line commands.
The scripts Chacon’s group wrote to
manage 30 physical servers on the
1,000-person company’s main campus
aren’t nearly as complex as the functions available in some of Microsoft’s
higher-end products. “But if you can
automate status monitoring that keeps
you from having to go to 500 worksta-
that Microsoft is featuring PING in a
series of case studies and ads.
“My picture’s been up in so many
places they’ve hung it up on our office
bulletin board and are calling me ‘Mr.
40 percent,’” Chacon jokes. The automated scripting has saved 800 hours
worth of work, while making it possible to share data with customers
securely and maintain the uptime of
critical order-processing applications.
Assessing the Add-ons
In addition to base functions that come
with Windows Server 2003, Microsoft
touts add-on utilities such as Microsoft
Operations Manager (MOM) as important components of its management
When Microsoft talked about Windows in the data center three
or four years ago, it was really kind of laughable.
Jean-Pierre Garbani, Vice President, Computing Systems Research, Forrester Inc.
It also made it much easier to configure and maintain the “very complex”
configurations on PING’s 500 workstations, many of which run several
applications and few of which can be
down at any one time without dire
consequences.
Shadowy Changes
It’s Windows 2003’s ability to shield
users from changes on the network
that’s particularly valuable to Bruce
Haff, director of IT at K2 Sports on
Vashon Island, Wash.
The Volume Shadow Copy function
in 2003 lets Haff and his crew
temporarily map users in a remote
office to a data volume on any server in
[Today] you spend a fraction of what you would in the Unix world
and get 80 percent of the [management] functionality; and it’s
not just limited to Windows Server 2003.
Peter Pawlak, Senior Analyst, Directions on Microsoft
tions individually and spend 20
minutes on each, that time adds up
quick,” Chacon says. “That’s versus a
couple of days setting up and testing a
script, then letting it take over.”
PING has one full-time staffer who
uses Terminal Services and other
command-line-interface tools to
monitor system status and keep
the applications running. The new
WMI scripts saved 40 percent of
his time, a significant savings in a 15person IT department—so much so
lives any more. So we can move
volumes around, or move data to
completely different servers and the
users would never know.”
the network, rather than the one that is
closest to them. Haff’s crew can then
remotely update, reboot or make any
other changes to the server without the
users even knowing they’d been moved
off the server in their own office.
“It used to be if we wanted to
expand a volume or something, we had to let everyone know and re-map the
drives,” he says. “This
way, the users don’t have
to know where the data
58 | May 2005 | Redmond | redmondmag.com |
lineup. But users warn that MOM
comes with a fairly steep learning curve
for the more powerful functions, which
have to be scripted carefully.
It’s fairly easy to tell it to trap critical
events from all the server logs and
present them to a server admin first
thing in the morning, however. “That
saves us about a half hour every day,”
Haff says. “It used to be that we’d have
to check the log on each individual
server. This consolidates things.”
MOM 2005 is designed to monitor
the status of every machine in the network, the health of the applications
running on them and to automate
many required maintenance tasks. It
brings Windows systems-management
capabilities up to par with mainstream
Unix products from IBM and HP, Garbani says. MOM still trails those of
BMC and Computer Associates, he
says, which are both well ahead of IBM
and HP in the feature/function race.
“The last version of MOM (2000),
for example, would have been good in
1995. With MOM 2005, it’s still a
good product, but it is more like a
2002 version of the best systems
management,” Garbani says.
Project2
4/8/05
1:30 PM
Page 1
0505red_F2LightsOut56-60.v8
4/19/05
2:30 PM
Page 60
Managing in Isolation
The major thing missing is the ability to map applications to specific
servers, databases and network services so that you can get a picture not
only of what server’s running what
applications, but the condition of the
various components on which a single
application depends, Garbani says
redmondmag.com
which tracks performance data and
extrapolates trends to identify problems as they’re developing. CHOA
has servers in geographically dispersed areas of the hospital complex,
which makes it difficult for a technician to go work on them in person
when there’s a problem.
“With AppManager, we can configure
it to see the trend and jump in before it
becomes a problem. So it will notice if
the database is slowing down, or
you’re running low on disk space,
rather than waiting until the problem
happens and then thinking what
you’re going to do about it,” Brummer
explains. “We want to be able to head
it off at the pass.”
MOM is also reactive, not proactive,
so by the time it notices a server is
down or the Internet’s inaccessible,
“it’s already become a problem,” says
Steven Brummer, client/server design
supervisor for Children’s Healthcare
in Atlanta (CHOA).
CHOA does its systems monitoring
with NetIQ’s AppManager product,
On the Horizon
Microsoft is also working on a host of
usability and manageability functions
that it will release with an update
to Windows 2003 due out later this
year, code-named R2. It will deliver
Windows Server Update Services
(WSUS), a new, twice-renamed
version of the free Software Update
GetMoreOnline
Go to Redmondmag.com to read
about Microsoft’s plans for improving
its systems management utilities.
FindIT code: LightsOut
Services. WSUS is a more advanced
application that can help administrators
define by administrative group, server
classification or end-user role what
machines should get automatic
updates. It can also direct users to
internal servers rather than Microsoft’s
site for patches and OS updates.
It’s those kinds of internal support
functions that seem attractive to most
users, despite Microsoft’s efforts to sell
add-on products like MOM 2005.
Scripting and remote access to functions
enabled by WMI let administrators do
what they need to do, while excess bells
and whistles cost more and deliver
fewer critical functions.
As Brummer says, “If I had a big
budget to go buy something, I’d go
out and get another person, not a
piece of software.”—
Kevin Fogarty is a freelance writer who
has been covering the IT world since
1991 at publications including Network
World, Computerworld, Bio-ITWorld,
Baseline and Ziff Davis Internet. Reach
him at [email protected].
Project6
1/6/05
5:17 PM
Page 1
By day three,
Jack was finally
enjoying his
IT training.
Unfortunately, you can’t dream
your way to certification.
• Microsoft
• Cisco
Our accelerated programs, featuring our exclusive 3 1/2 step method,
• Oracle
makes learning fast and effective. In less than two weeks, you’ll
• Sun
return to your job empowered with the knowledge, confidence
• Linux
and certification you need to advance your career…and your life.
• CISSP
TM
To find out more about our all-inclusive certification programs,
• C EH
call 800-698-5501 or visit www.trainingcamp.com.
• CompTIA
Enter the special promotion code “HELP” and receive a 20%
• UNIX
discount on select courses.
• Forensics
Project2
4/8/05
1:07 PM
Page 1
2EDMOND-AY%CORA?RPDF 0-
0505red_F2MOM63-65.v10
4/18/05
10:56 AM
Page 63
7 Tips for
MOM
Advice from an in-the-trenches expert for
getting the most out of Microsoft
Operations Manager.
BY TIM CORNETT
erver management is critical
in nearly any shop, but even
more so in larger environments. The larger the environment, the more critical it becomes.
Here at the Kentucky Department
of Education Office of Education
Technology (OET), we provide
technical standards and services to
all 1,400 K-12 public schools, for
nearly 700,000 student and staff users
throughout the Commonwealth.
Our infrastructure consists
of 180 fully managed and
monitored domains
ranging in size from 200
to 110,000 users.
For the past two years,
our three-member OET
Directory Services Team
has had great success
using Microsoft Operations Manager (MOM) to
monitor this infrastructure.
Since implementing MOM, we’ve
reduced the number of break/fix help
desk tickets by more than 90 percent
for monitored machines and related
services. Just the fact that we can
monitor and maintain an environment
of about 400 servers and nearly three-
S
quarters of a million users with three
people speaks to MOM’s abilities in
massive enterprise settings. During
that time, we’ve learned a thing or
two about using MOM. We hope you
can benefit from these tips for getting
the most out of MOM.
Tip #1: Take Advantage of the
Management Packs
Microsoft currently lists 132 management packs and 13 product connectors
at http://snipurl.com/dlcl.
Management packs contain
scripts, performancegathering tools and
Knowledge Base
information for
components MOM
can monitor (more
about the Knowledge
Base later). Product
connectors allow MOM
information to be forwarded
to other management products such
as HP OpenView or Tivoli TEC for
consolidated alerting.
The Active Directory management
pack has been worth its weight in gold
to the OET Directory Services Team.
On several occasions MOM has alert-
ed the team to replication problems
that were quickly resolved using its
Knowledge Base.
And it goes beyond software monitoring. The Dell Hardware management pack (we use identically
configured Dell PowerEdge 2600
servers) alerts the team to potential
hardware
You’ll
need to
determine which management packs fit into your
environment, but be
careful to install only the
minimum number of packs
necessary to fulfill your
monitoring requirements.
Every management pack
adds work to your management servers and adds size
to the agents deployed on
your managed machines.
failures from our domain controllers.
It provides information about memory errors, predicts hard drive failures,
chassis intrusion and many other
hardware-related items.
| redmondmag.com | Redmond | May 2005 | 63
0505red_F2MOM63-65.v10
4/18/05
10:56 AM
Page 64
7 Tips for MOM
Tip #2: Know Your Ports to
Head off the Storm
Firewalls are an integral part of
any organization’s security
infrastructure, but they can also
wreak havoc on a MOM deployment.
OET found this out the hard way
when a rogue firewall rule produced
a communications failure between
the MOM management servers
and a number of their managed
servers. Alerts destined for the
management servers were dropped
by the firewall due to port restrictions, so the MOM operators never
knew the alerts were happening.
In the meantime, those same firewall
rules were blocking replication.
The result was an ugly mess of
replication failures that took several
days to reconcile once the rogue rule
was discovered and corrected.
The MOM 2005 Security Guide
(http://snipurl. com/dldi) details
all the ports needed for MOM to
function properly.
Tip #3: Play by the Rules
Once you’ve established communication between the individual
MOM components and successfully
deployed the agents, you can begin
tweaking the MOM rules and
scripts. Depending on the size
of your environment, this
can take 10 minutes or
10 months.
The directory services
team at OET added nearly
20 new rules and turned
off several noisy rules while
running MOM 2000 SP1. Noisy
rules are those that spit
out events or alerts en masse or
unnecessarily. Examples in MOM
2000 SP1 include rules that send
successful Netlogon events to
the management servers. In an
environment with a large number
of users, this can grow your MOM
database tremendously. We also
significantly tuned performance
monitoring rules to reduce the size
of the database.
MOM
2005 is
a more pleasant experience right out of the box
than the pervious version,
as many of the noisiest
rules have been eliminated. Before you make any
rule changes, document
and test each individually.
If you find yourself making
several new rules, create a
folder specifically for your
rules so that other administrators can easily find
them. We’ve found that
creating a folder for each
MOM administrator is
helpful. An example is
shown in Figure 1.
Tip #4: Increase Your
Knowledge Base
As you create new rules and groups
of rules, MOM lets you add them to
its database. When the Operator
Console raises alerts, you can add
your problem resolution steps into
MOM 2005 by selecting the alert,
right-clicking on the Company
Knowledge Base tab, clicking
Edit and entering the properly
formatted information.
This has proven very beneficial
for OET. It reduces the number of
Tier 3 support calls, which translates
into lower support costs. Adding the
Figure 2. The Office of Educational
Technology formats Knowledge Base
information so it can recall that data
for troubleshooting.
64 | May 2005 | Redmond | redmondmag.com |
Figure 1. Creating a Rule Group Folder
makes it easier for other administrators to
find and use rules.
name of the person entering the
information (Figure 2) and the date to
the Knowledge Base gives the MOM
operator a person to contact if there
are questions about the solution.
Tip #5: Keep MOM Secure
MOM agents stored on domain
controllers require special permissions to run vast suites of scripts.
To help keep the security folks
happy, MOM 2005 agents can run
under a reduced security context
on domain controllers without
impacting their effectiveness. This
is accomplished using a “MOM
Action Account.”
That account—which you can
use to install agents, run scripts
and gather data from managed
machines—must be part of the Local
Administrators (not Domain Admins)
and Performance Monitor users
groups. It must also have the “Log
on Locally” and “Manage Auditing
and Security Log” rights made active
in the Default Domain Controller
Security Policy, which the local
Administrators group does by default
in Windows 2003. All of the security
settings and permissions required
for properly operating MOM are
detailed in the MOM 2005
Security Guide.
0505red_F2MOM63-65.v10
4/18/05
10:57 AM
Page 65
tool regardless of the size of your computing environment. With all the
changes and new features MOM 2005
has to offer, an upgrade from MOM
2000 SP1 is a must. —
Figure 3. If you see this alert, KB article 889054 is where you need to look for answers.
Tim Cornett, MCSE, MVP, is a
Principal Consultant at Keane Inc.
and is currently assigned to the Kentucky
Department of Education as an
infrastructure architect. He appreciates
the finer things in life, like a loving family
and detailed technical discussions. You can
reach him at [email protected].
Tip #6: Eliminate
Replication Headaches
MOM 2005 suffers from some of
its predecessor’s ailments. The
Microsoft Knowledge Base article
889054 references a problem that
occurs when the replprov.dll tries to
access an invalid pointer. It generates
error messages when the file can’t
determine the replication status of the
domain controller.
This alert can cause major
headaches if you’re monitoring
anywhere from a handful to
hundreds of domain controllers, but
fortunately the hotfix is available and
works well. If you see the alert (as
presented in Figure 3), you’re a
prime candidate for this hotfix,
which is applicable to both MOM
2000 and 2005.
Tip #7: Consider Trading Up
If your business only requires
“best effort” uptime, then don’t worry
about purchasing a monitoring product. However, if your customers are as
finicky as mine, MOM is a solid
GetMoreOnline
Log on to Redmondmag.com to read
our MOM 2005 Your Turn and product
review, plus this month’s Redmond
Roundup on server management tools.
FindIT code: 7MOMTips
redmondmag.com
| redmondmag.com | Redmond | May 2005 | 65
Project8
2/15/05
12:31 PM
Page 1
0505red_Winsider.v8
4/27/05
10:38 AM
Page 67
WindowsInsider
Bill Boswell
Extend the Limits of Group Policy
Y
ou’ve certainly worked with Group Policies if you have
Windows 2000 or Windows Server 2003 deployed
anywhere in your organization (and the clock is ticking
on NT4, by the way, in case you haven’t yet completed your
migration). You’ve probably customized password policies,
locked down a few security settings, instituted a login script and possibly redirected
the My Documents folder. However,
quite a few of you stop short of getting
the full value out of Group Policies
because of their perceived limitations.
Scavenger Hunt
Let’s review a few terms and processes
before we talk about how to overcome
some of those limitations—perceived or
otherwise. Group Policies control
member servers and desktops in
much the same way that a host directs
participants in a scavenger hunt. You
give the players clues for finding certain
items in certain locations. Some of those
items are themselves clues for finding
other locations with even more clues, all
of which eventually lead to a prize—or
the edge of an unfinished freeway overpass
if the player incorrectly interprets any
of the clues.
Group policy “clues”—by which I
mean the configuration information—
come in the form of Group Policy
Template (GPT) files stored in the
Sysvol folder on each domain controller.
Each type of Group Policy uses a unique
GPT file format. For example, security
policies are stored in Gptmpl.inf files,
folder redirection policies are stored in
Fdeploy.ini files, and the Logon/logoffStartup/shutdown scripts use Script.ini
files as well as the scripts themselves.
The Group Policy Editor (GPE) is
the tool for creating and modifying
the GPT files. Figure 1 shows the
GPE display you’ll see when setting a
policy to prohibit creating new jobs in
Task Scheduler.
Enabling this Prohibit New Task
Creation policy makes an entry in a
file called Registry.pol. The entry
looks something like this:
[Software\Policies\Microsoft\
Windows\TaskScheduler5.0;
TaskCreation;^A;^D;^D]
Group Policies rely on a set of
client/server transactions to deliver GPT
files to computers within the domain for
processing. A service called the Client
Side Extension (CSE), running on each
member computer, manages the client
side of the transaction. A CSE downloads and processes only the type of
GPT files it needs from Sysvol.
Targeting Group Policy
For Group Policies to work effectively,
each CSE needs a way to distinguish
between “GPT files I need to download,” and “GPT files that don’t concern
me.” To help clarify this distinction,
Microsoft uses a term called Group Policy
Object, or GPO.
A GPO is not a “thing.” You can’t point
your finger at a certain data structure and
say, “That’s a GPO.” Instead, GPOs
distinguish one set of GPT files from
another in Sysvol and in Active Directory.
In Sysvol, GPT files are stored in
separate folders with names that correspond to each GPO’s Globally Unique
Identifier (GUID). You can see these
GPO folders from any member
computer within a domain by opening an
Explorer window and entering this path:
\\<domain_FQDN>\sysvol\<domain_
FQDN>\Policies
Figure 1. The Group Policy Editor console, showing a modification to an Administrative
Template setting.
Each GPO is represented in AD by a
Group Policy Container (GPC) object.
You can see these objects in Active
Directory Users and Computers. Select
View | Advanced Features from the
main menu then drill down to System |
Policies. See Figure 2 on p. 68 for an
example of this view.
You can link GPC objects to the
domain object, as well as OUs and site
objects. CSEs use these links to
determine which GPOs contain GPT
files that should be processed. You can
| redmondmag.com | Redmond | May 2005 | 67
0505red_Winsider.v8
4/27/05
10:38 AM
Page 68
WindowsInsider
Figure 2. The Active Directory Users and Computers console, showing the Group Policy
Container objects.
also filter access to GPC objects based
on GPC access permissions and by
Windows Management Instrumentation
(WMI) selection criteria.
So here’s a quick synopsis of the Group
Policy delivery mechanism: CSEs at
member servers and desktops download
GPT files from GPO folders in Sysvol
based on links and filters associated with
GPC objects in AD. Whew.
Policy Extension Limitations
By default, Windows 2003 has 11
CSEs that appear to encompass most
operations required for centralized
management, but the stock CSEs have
some distinct limitations. For example,
Administrative (ADM) Template
policies manipulate the Registry by
placing entries in four special Policy
keys, two in HKEY_CURRENT_USER
and two in HKEY_LOCAL_MACHINE.
The Administrative Template CSE
updates the entries in these volatile
policy areas so the entries don’t “tattoo”
(or make changes to) the Registry.
This trick only works if an application
developer writes the code so the app
looks for Registry settings in both the
volatile Policies keys and keys in the
normal Registry location for that
application. For example, the Prohibit
New Task Creation policy only works
because the developer of Task Scheduler
coded the application to look for a
TaskCreation entry under:
Some Microsoft applications include
support for ADM template Group Policy
settings. For example, Microsoft Office
components, including Visio, have ADM
template files available for download
at http://snipurl.com/dm10.
You can also create custom ADM template files using Microsoft’s ADM files as
a guide. I often do this when a Microsoft
application recognizes a policy entry in
the Registry, but the canned ADM file
doesn’t include the setting. For example,
Outlook 2003 has a Registry setting that
forces Outlook (running in Cached
Mode) to query a Global Catalog server
to view the Global Address List, rather
than caching a copy of the Offline
Address Book. This lets desktop users
see address list changes immediately,
rather than waiting for the daily update
to the Offline Address Book. The Outlook 2003 ADM file does not have a setting for this Registry entry. Here is a
custom ADM file that makes the
required entry:
CLASS USER
CATEGORY "Microsoft Office
Outlook 2003 Custom Settings"
POLICY "NoOABDownload"
KEYNAME
Software\Policies\Microsoft\Office\11.
0\Outlook\Cached Mode
PART "Use local cache for address
lists" CHECKBOX
VALUENAME DownloadOAB
VALUEON NUMERIC 1
VALUEOFF NUMERIC 0
END PART
END POLICY
END CATEGORY
END CLASS
Third-Party Options
Most third-party applications aren’t
coded to take advantage of volatile
Policy entries in the Registry. If you
want to use Group Policies to control
Registry entries for these applications,
you can create custom ADM templates
that change the Registry values directly. This makes a permanent change that
has to be reversed before removing the
policy setting. It’s similar to the way
classic NT system policies behaved.
However, trying to manage dozens
or hundreds of applications using
relatively permanent Registry hacks
isn’t necessarily a passport to stable and
happy professional employment. Also,
you might be frustrated by other
\Software\Policies\Microsoft\
Windows\TaskScheduler5.0.
Customize Those Group Policies
Figure 3. Group Policy Editor showing a few of the additional extensions installed by
DesktopStandard’s Policy Maker.
68 | May 2005 | Redmond | redmondmag.com |
0505red_Winsider.v8
4/27/05
10:38 AM
Page 69
WindowsInsider
built-in group policy limitations, like
the inability to use Software Restriction
Policies as a general purpose desktop
lockdown tool and the complexity of
provisioning and de-provisioning users
as they move from one department to
another within a large organization.
Given these drawbacks, it’s not
surprising that most third-party vendors
have published Group Policy add-ons
to fill the gap in Microsoft’s offerings.
For example, DesktopStandard (formerly
AutoProf) has a utility called Policy
Maker that is essentially a suite of
Client-Side Extensions that enhance
and expand the functionality of group
policies. You can find that at
www.desktopstandard.com. Full Armor
Software also has many useful group
policy extensions at www.fullarmor.com.
One of the DesktopStandard
extensions is available for free. It lets
you manage Registry entries without
the need to create custom ADM files.
It’s available at http://snipurl.com/dm19.
This Registry extension, along with the
remaining 20 or so DesktopStandard
extensions, uses the existing plumbing in
Group Policies so it doesn’t require a
special database, Schema modifications
or other support infrastructure. It does
make additions to the Group Policy
Editor (shown in Figure 3, opposite
page) and requires additional CSEs on
each client. These CSEs come in an MSI
package that can be deployed with—you
guessed it—Group Policies.
Both Microsoft’s and Policy Maker’s
group policy extensions use text files to
communicate setting changes to CSEs.
Each extension stores configuration
settings in an xml file in Sysvol.
If you use Microsoft’s Group Policy
Management Console (GPMC)—
available as a free download from
http://snipurl.com/8s8i—you’ll notice the
GPMC doesn’t display third-party extension settings like those used by DesktopStandard and Full Armor. The GPMC
can’t interpret the GPT files used by
those extensions. Individual vendors supply their own tools, but if you just want to
see Resultant Set of Policy (RSoP)
information, you can use Microsoft’s
GPInventory tool. This is also a free
download from http://snipurl.com/2ks6.
Flex Those Group Policy Muscles
Don’t let either the real or perceived
limitations in Microsoft’s default
Group Policies prevent you from taking full advantage of this technology.
For just a few dollars per node, you can
get highly granular control of your
users, desktops and servers—with very
little effort in the initial configuration.
If you have your own favorite Group
Policy management tool or custom
ADM file, feel free to send it along.
We’ll publish them on
Redmondmag.com.—
Contributing Editor Bill Boswell, MCSE,
is the principal of Bill Boswell Consulting
Inc. He’s the author of Inside Windows
Wish to access your data from anywhere?
With RADMIN,®it’s easy.
RADMIN is reliable and secure remote control software
designed to work on and monitor the remote computers just if
they were right there in front of you. RADMIN proved itself as
incredibly fast and easy to learn and use. RADMIN is a
complete remote control solution with such features as file
transfer, NT security, Telnet-access and multiple connections
support built in.
RADMIN is the most cost-effective solution which
may be deployed over a corporate network at an
affordable price.
Download the free 30-day trial version
And see for yourself!
See details at:
www.radmin.com
Project5
3/29/05
10:38 AM
Page 1
0505red_Mr.Script.v7
4/19/05
11:24 AM
Page 71
Mr.Script
Chris Brooke
Auto-confirm with PopUp
S
cripting is all about automating repetitive tasks that
would otherwise take hours or even days. By its very
nature, an automated task should be one that requires
no intervention. In the real world, however, this is rarely the
case. Some automated tasks require lots of intervention
while others require at least occasional
verification, along the lines of “Hit
<Enter> to proceed” or “Do you want
to overwrite this file?”
Whenever I need this type of occasional confirmation in a script, I tend to
use the “messagebox” (MsgBox) function. It stops script execution and waits
for a response, such as clicking <OK>.
The problem is that it will wait forever
for a response that 99 times out of 100
is going to be simply clicking <OK>.
Meanwhile, your script just sits there.
Other times a script may not require
interaction, but you do want to display
status information. For this, I tend to use
WScript.Echo. This works fine as long as
you know your scripts are going to be
run using CScript.exe. All “echoed” data
is displayed in the command window and
script execution proceeds. However, if
WScript.exe is used to run the script, or
someone runs it by double-clicking on it
in Explorer, all those “echoed” messages
will be displayed in a messagebox
window—each time forcing a mouseclick before the script will continue.
Now, if you’re the only person who ever
runs your scripts, it’s easy to remember to
always use CScript. However, if you ever
send out scripts for other admins or even
users to run, you can never be certain
they’ll run the script as expected.
Thankfully, there’s an alternative for
either of these cases: the PopUp function
of the WScript.Shell object. This little
gem works almost exactly like a messagebox, except that it allows you to enter a
timeout value in seconds. If the user
doesn’t respond to the PopUp, the script
will continue after the timeout expires.
You can then code the script to respond
appropriately. Here we instruct the script
to take different actions on its own,
rather than relying on the user to click
<OK> or <Cancel>.
<package>
<comment>
PopUpTimeout.wsf
Display notifications with default
timeout so that script continues
</comment>
<job>
<runtime>
<description>
This script demonstrates the
PopUp function
</description>
<example>
C:\cscript PopUpTimeout.wsf
/File:c:\logfile.txt
</example>
<named
name="File"
helpstring="The name of the file to
save data"
type="string"
required="true"
/>
</runtime>
<object
id="objShell"
progid="WScript.Shell"
/>
<object
id="objFSO"
progid="Scripting.FileSystemObject"
/>
<script language="VBScript">
Option Explicit
Dim objFile
Dim strFilename
Dim iReturn
strFilename=Wscript.Arguments.
Named.Item("File")
If objFSO.FileExists(strFilename) Then
iReturn=objShell.PopUp _
("Adding Entry to File." & vbCrLf
& "Click Cancel to abort", _
10, "Creating Entry",
vbInformation+vbOKCancel)
If iReturn=vbCancel Then
objShell.PopUp _
"The Entry was not added!", 5, _
"Update Failed!",
vbExclamation+vbOKOnly
WScript.Quit
End If
'Open the file for appending
Set objFile=objFSO.OpenTextFile
(strFilename, 8)
objFile.WriteLine "File updated: " &
Now
objFile.Close
Else
'Create the file
iReturn=objShell.PopUp _
("Do you want to create the file: " &
strFilename, _
10, "Create File?",
vbQuestion+vbYesNo)
If iReturn<>vbYes Then
objShell.PopUp _
"The File was NOT Created!",
5, _
"File Creation Failed!",
vbExclamation+vbOKOnly
WScript.Quit
End If
Set objFile=objFSO.CreateTextFile
(strFilename, 1)
objFile.WriteLine "Log file:"
objFile.WriteBlankLines 1
| redmondmag.com | Redmond | May 2005 | 71
0505red_Mr.Script.v7
4/19/05
11:24 AM
Page 72
Mr.Script
objFile.WriteLine "File updated: " &
Now
objFile.Close
End If
check for each possible entry and process
accordingly. For the record, allowing the
PopUp to timeout returns a value of -1,
which means the script will time out.
</script>
</job>
</package>
Adding the Entries
The logic for this section is very
similar to creating the file, except that
doing nothing results in the script
proceeding, rather than stopping. The
only action that will cause the script to
stop is clicking <Cancel>.
Just a Mouse Click Away
This script starts by taking a file name as
a command-line argument. The script
then checks to see if the file exists. If it
does, it will add the data—in this case,
simply a date/time stamp—to the file. If
the file doesn’t exist, the user is asked if
the file should be created.
Creating the File
We use a simple If/Then statement to
verify the user selected <OK> to create
the file. Any other input (including
waiting until the PopUp times out)
causes the script to exit without the file
being created. If you wanted to, you could
Not Waiting for an Answer
We used PopUps for the “failure” messages in each section, as well. The difference here is that we didn’t wait for a
result. Indeed, we aren’t even checking
for a returned value. That’s why the only
button in these Windows was <OK>,
because at this point it doesn’t matter
what you do; the script is going to quit.
Each of these methods has its place.
The first method is useful when you
need to verify entry before proceeding. If
no one is sitting at the computer to provide that verification, you would prefer
the script exit gracefully, rather than wait
for an answer in perpetuity. On the other
hand, sometimes you just want to provide the opportunity to change a setting
or file location from the default. If no
answer is given in the required time, the
default values are used and execution
continues. Finally, there are times when
you simply want to provide a notification
to the user, but not risk inadvertently
halting the script with a messagebox.
PopUp isn’t a perfect replacement
for WScript.Echo and won’t substitute
for every MsgBox. Used appropriately,
however, it’s a powerful addition to your
scripting toolbox. —
Chris Brooke, MCSE, is a contributing editor
for Redmond magazine and director of
enterprise technology for ComponentSource.
He specializes in development, integration
services and network/Internet administration.
E-mail Chris at [email protected].
THIS TEST RESULT
BROUGHT TO YOU
BY TRANSCENDER
®
L O O K S L I K E S O M E B O D Y J U S T A C E D T H E I R C E R T I F I C A T I O N E X A M.
With Transcender test preparation software, you will, too. No other software prepares you better. In fact,
we back it up with an industry-best, 100% guarantee. How’s that for confidence? As for dance moves,
you’re on your own. Visit http://www.transcender.com/studyguides or call 1-866-639-8765.
© 2005 Kaplan IT, Inc. All rights reserved. TRANSCENDER® Kaplan IT, Inc. All rights reserved.
0505red_SecAdvisor.v6
4/15/05
4:54 PM
Page 73
SecurityAdvisor
Joern Wettern
Picking the Right Firewall
W
elcome to my inaugural Security Advisor column.
Like many of you I’ve read this feature since its
inception and developed a lot of respect and
admiration for Roberta Bragg, who has been this magazine’s
Security Advisor from the beginning. I’ll try to uphold
Roberta’s standard of delivering
meaningful, timely and interesting
discussion of security-related
topics, and know you’ll join me in
wishing Roberta all the best in her
future endeavors.
Much of my work over the last few
years has revolved around firewalls,
coinciding with a period in which the
firewall industry has changed in significant ways, moving beyond low-level
functionality and into the higher-level
application realm. Let’s take a look at
what’s been happening, and what it can
mean for your environment.
Hardware vs. Software
Smackdown!
Let me start with one of the most persistent myths in the firewall world. I
often hear the statement, “Hardware
firewalls are more secure than software
firewalls.” According to this theory, a
firewall with a single-purpose operating
system, such as ScreenOS, used by
Juniper Networks’ NetScreen appli-
ances, has a very small attack surface.
Running a firewall on a multi-purpose
operating system, like Microsoft Internet Security and Acceleration (ISA)
Server 2004 on Windows Server 2003,
creates a larger attack surface; the more
complex operating system requires
additional services, thus creating additional targets for attackers and reducing
system stability.
In theory this is true; but in reality,
hardware-based firewalls aren’t neces-
No serious firewall
today relies on packet
filtering alone.
sarily more secure. It’s been my experience that many of these firewalls
don’t have required security patches
installed because re-imaging the ASIC
chip that contains the firewall’s OS is
A Brief History of Firewalls
T
raditional firewalls operate at Layers 3 and 4 of the
Open System Interconnect (OSI) model. The earliest
firewalls were Layer 3 devices, operating at the Network Layer. Such firewalls perform simple packet filtering, examining each packet passing through and making a
decision about whether to forward or drop the packet. For
example, a firewall that only allows outgoing Web traffic would
contain a rule that allows packets with destination port 80 from
any internal IP address to any IP address on the Internet. To
allow the return packets from Internet-based Web servers a
second rule is required: Allow packets with source port 80
from any IP address on the Internet to any internal IP address.
It didn’t take hackers long to figure out that such rules allow
them to send any traffic they choose into someone’s internal
network as long as the attack tools use port 80 as the source
port. Because of such vulnerabilities, no serious firewall today
relies on packet filtering alone.
Stateful, or circuit-level, inspection was developed to
address the limitations of packet filtering. This type of protection operates at Layer 4, the Transport layer. Stateful firewalls
examine entire connections between computers, instead of
just single IP packets. In the example of outgoing Internet traf-
fic, a stateful firewall allows incoming packets from port 80 on
an external computer only if they belong to a connection that
was initiated to that port from an internal computer. Other
incoming packets are dropped, even if their TCP source port is
80. In addition, stateful inspection also tries to ensure the
integrity of the connection itself, guarding against attacks such
as TCP session hijacking, which is an attempt to take control
of an existing, legitimate connection.
The problem with relying on packet filtering and stateful
inspection alone is that most attacks today use legitimate
ports and allowed connections. If you’re not providing access
to a Web server, you can easily protect your network by configuring your firewall to drop all traffic addressed to port 80 on
your computers. If you have a public Web server, though, you
have to allow inbound traffic to the server on port 80. Packet
filtering and stateful inspection allow all such traffic to reach
the server. Hackers know this and most of today’s attacks use
allowed connections. This means that most of today’s attacks
aren’t based on bypassing packet filters or playing tricks with
TCP connections. Instead, they attack applications, such as a
Web server, mail server, or even a client program like a browser over valid connections and allowed ports.
— J.W.
| redmondmag.com | Redmond | May 2005 | 73
Project3
4/11/05
4:19 PM
Page 1
REAL SECURITY
¨
REAL CROSS-PLATFORM
REAL SUPPORT OPTIONS
0505red_SecAdvisor.v6
4/15/05
4:54 PM
Page 75
SecurityAdvisor
too daunting a task for many network
administrators. On the other hand, I
generally find that administrators regularly apply security patches to multipurpose operating systems and
firewall software. In addition, welldesigned firewall software, such as
ISA 2004, blocks disallowed network
traffic before the OS and its network
stack can process it, removing the OS
as an attack vector altogether.
The line between hardware and software firewalls continues to blur. Con-
sider that Network Engines sells a firewall appliance that runs ISA 2004,
combining elements of both hardware
and software firewalls. The distinction
is becoming less clear all the time.
Protecting Layer 7
Traditional firewalls operating at Layers 3 and 4 of the Open System Interconnect (OSI) model are unable to
protect against newer attacks because
they don’t inspect traffic at the application layer, or Layer 7 (see “A Brief His-
The Windows Firewall
Windows XP and Windows Server 2003, Service Pack 1 include the same built-in firewall. How does the Windows Firewall compare to the other firewalls covered here?
First, the Windows Firewall is a personal firewall designed to protect a single
computer; as such, it’s no replacement for network firewalls that inspect all
incoming and outgoing traffic. But that doesn’t mean you should neglect the
Windows firewall if your network is already protected by a firewall.
One primary use of the Windows Firewall is for laptop computers, for which it
should be mandatory. Enabling it ensures that nobody can establish an incoming
connection to your computer. When traveling I often connect my laptop directly
to the Internet without the protection of a corporate firewall. In such a situation I
want to be sure that my computer blocks all incoming connections. Sure, the
Windows Firewall has limited alerting capabilities and doesn’t check outgoing
traffic, but sometimes a simple solution that can accomplish a limited goal without
confusing users is a good thing.
Things are different for computers connected to your corporate network. You
may think the Windows Firewall provides no benefits if your network is already
protected by a firewall, but think again. A firewall at the edge of your network
protects against attacks from the Internet, but the Windows Firewall can also
protect your servers and client computers against attacks from internal users or
internal computers infected by malicious programs.
Before enabling the Windows Firewall on all computers, though, do some
research. Do you have remote management tasks, such as centralized software, patch
or anti-virus management? They can require remote access to computers, which
means ensuring that the Windows Firewall is configured to allow such connections.
Fortunately, you can configure many aspects of the Windows Firewall centrally via
Group Policy, using separate policies based on whether a computer is connected to
your corporate network or not. This means you can remotely manage a laptop while
it’s connected to your network, and enable it to block incoming connections on its
own when it’s used on the road.
Until you’ve investigated the right configuration for your network, consider
disabling the Windows Firewall via Group Policy to ensure that your management
programs continue to work. For laptop computers, disable the Windows Firewall
only while connected to the corporate network, and enable it while connected to any
other network.
— J.W.
tory of Firewalls,” p. 73). Most firewall
manufacturers responded to this by
adding application-layer filtering to
their products. When performing this
inspection, a firewall takes a single
packet, or assembles several packets
that make up application traffic, and
makes forwarding decisions based on
that traffic. An application-layer firewall can also help secure traffic that
uses secondary connections, such as
FTP. FTP uses a control connection
between the client and the server to
negotiate a secondary connection for
the actual data transfer. Application
support lets a firewall monitor the control connection and then allow the secondary connection using the port that
the client and server agree on.
Some vendors have come up with colorful marketing terms for Layer 7 filtering; Check Point Software
Technologies, for instance, calls it
Application Intelligence. No matter the
term used, application-layer filtering is
crucial to protect today’s networks.
Application-layer capabilities are what
most differentiate firewalls today, and
finding the right firewall for your exact
needs can be a complicated task.
This is because vendors vary greatly
on what they consider applicationlayer filtering to be. One vendor’s fine
print reveals its “strong” applicationlayer capabilities are limited to blocking ActiveX and Java programs.
Others have more capable solutions,
but suffer a significant performance
hit because their firewalls weren’t
designed to do Layer 7 filtering. But
several products give you detailed
control over a large range of application-layer protocols without impacting network performance too much,
so do your homework.
Firewall Decision Points
In addition to Layer 7 filtering, you’ll
also want to consider these criteria in
your firewall buying decision:
• Protocol support. Does it support
the protocols you use in your network,
| redmondmag.com | Redmond | May 2005 | 75
0505red_SecAdvisor.v6
4/15/05
4:54 PM
Page 76
SecurityAdvisor
and does it perform the filtering you
need? How detailed is the inspection
for the protocols it supports? For
example, ISA 2004 supports most protocols typically used in a Microsoft networking environment. If you need
application-layer protection for protocols more prevalent in a Unix environment, ISA Server may not be the right
firewall for you.
one of the market leaders. You may find
a better and cheaper solution for your
network, but before making a purchasing decision, make sure management
backs your decision.
• Performance. Firewall vendors
try to dazzle you with numbers about
how much network traffic their
firewalls can handle. Often these
numbers aren’t important, because
Sometimes a simple solution that can accomplish a limited goal
without complicating things for users is a good thing.
• Ease of use. This isn’t just an issue of your Internet connection turns into a
convenience. If configuring the firewall
bottleneck before the firewall does.
is difficult, you’re likely to create an inse- Instead, look for numbers that show
cure configuration, which can allow
typical application-layer filtering
hackers to break through even the best
network throughput.
firewalls on the market.
• Support. The quality of customer
• Certifications. Many firewall vensupport varies widely among firewall
dors have chosen to obtain Common
vendors. Consult with your colleagues
Criteria or ICSA Labs certification for
and search the Internet to find out
their firewalls. These certifications
whether a firewall vendor can provide
assure that the firewall has passed rigthe quality of technical support
orous independent testing.
you need.
• Features. Most firewalls can do
• Expertise. Review whether
more than filter network traffic.
your staff can adequately support
You can find firewalls that are also
the firewall. If your company is
VPN servers, caching servers,
Windows-focused, avoid a Unix-based
anti-virus gateways or intrusion
firewall, and vice versa.
detection systems (IDSes). If you need
any of these features, ensure that
Recommendations
they’re integrated well and that the
Of all the criteria, application-layer
integration provides value over standprotection is the most important
alone solutions.
feature of firewalls today.
Go to Redmondmag.com
• Price. In the
For most buyers it should
and follow links to the
firewall industry,
be the first item evaluated.
vendors mentioned here.
FindIT Code: PickFirewall
more expensive
Two of the most advanced
doesn’t necessarily
application-layer firewalls
equate to better performance. Prices
today are Check Point’s FireWall-1
for firewalls with similar features can
and Microsoft’s ISA Server. Take a
vary by thousands of dollars. When
good look at one or both of them
comparing prices, make sure you
(evaluation versions of both are
account for the price of optional
available). Cisco’s PIX firewall, the
features, client licenses, maintenance
most popular hardware firewall, is very
fees and additional license costs
good at packet filtering. But if you add
due to future network growth (see
application-layer filtering capabilities
“Firewall Pricing,” this page, for
via add-ons, you may see performance
more information).
degradation. WatchGuard Technologies
• Reputation. Management somehas recently added new features to its
times mandates buying a firewall from
line of firewalls, and provides some of
76 | May 2005 | Redmond | redmondmag.com |
Firewall Pricing
Firewall prices range from hundreds of
dollars to hundreds of thousands of
dollars. Assessing costs should
always be the last step in deciding on
a firewall product, because when
you’re comparing firewall prices,
you’re comparing apples with
oranges—with a few lemons thrown
in. For example, some firewalls are
licensed based on seats, others on
concurrent connections. Still others
require a per-processor license. If
client licenses are required, will your
calculation be the same when your
company grows?
Additional features are another issue:
Do the built-in reporting capabilities of
one firewall match those that have to
be purchased separately with another
product? Does installing software on a
Linux platform instead of a Windows
platform really save you money? Is
centralized management something you
really need?
Because one organization’s firewall
requirements aren’t the same as those
of another, I recommend evaluating
pricing as the last item. First, make a
list of all firewall products that meet
your minimum requirements and try to
assign a value to the additional features each has. If you start comparing
prices at this point you’ll get much
more meaningful results.
— J.W.
the best application-layer protection
among hardware firewalls.—
Joern Wettern, Ph.D., MCSE, MCT,
Security+, is the owner of Wettern Network
Solutions, a consulting and training firm.
He has written books and developed training
courses on a number of networking and
security topics. In addition to helping
companies implement network security
solutions, he regularly teaches seminars and
speaks at conferences worldwide. Reach him
at [email protected].
Project12
1/13/05
12:09 PM
Page 1
0505RED_MCP TechLib v1
4/14/05
9:32 AM
Page 1
SPECIAL
FREE Reports
in our
Tech
Library
REPORT
Featured eBook of the Month,
Sponsored by Quest
Visit the MCPmag.com Tech Library for in-depth,
technology specific reports for IT managers and
professionals. These free reports are available in PDF
format and cover topics ranging from Group Policies to
Exchange Server 2003. You can also download free white
papers and view webcasts from top industry vendors.
Check it out today! MCPmag.com/techlibrary
0505red_AdIndex_79.v2
4/18/05
11:16 AM
Page 79
RedmondResources
ADVERTISING SALES
Henry Allain
Publisher
949-265-1556 phone
949-265-1528 fax
[email protected]
West
AD INDEX
Matt Morollo
Associate Publisher
508-532-1418 phone
508-875-6622 fax
[email protected]
East
HI, AZ, UT, TX, NV, CO, NM, OK, CA,
NE, KS, ND, SD, WY, MT, ID, OR,
WA, AK, BC, Alberta, Saskatchewan,
Manitoba, Pacific Rim, Australia, New
Zealand, India, Pakistan
MN, IA, MO, AK, LA, WI, IL, MS, MI,
IN, OH, KY, TN, AL, GA, ME, NH, VT,
MA, RI, CT, NY, PA, NJ, DE, MD, WV,
VA, NC, SC, FL, Quebec, Ontario,
Europe
Dan La Bianca
Western Regional Sales Manager
818-674-3416 phone
818-734-1528 fax
[email protected]
JD Holzgrefe
Eastern Regional Sales Manager
804-752-7800 phone
253-595-1976 fax
[email protected]
IT Certification &
Training—USA, Europe
Al Tiano
Advertising Sales Manager, IT
Certification & Training
818-734-1520 ext.190 phone
818-734-1529 fax
[email protected]
Production
Kelly Smith,
Associate Production
Coordinator
818-734-1520 ext.164 phone
818-734-1528 fax
redmondadproduction@
101com.com
Online Sales—ENTmag.com
and TCPmag.com
Tanya Egenolf
Adverstising Sales Manager
760-722-5494 phone
760-722-5495 fax
[email protected]
Advertiser
Page
URL
Alloy Software
Altiris
Argent Software
CrossTec
DesktopStandard
Dorian Software
Ecora Corporation
EMC Legato
Executive Software
Famatech
Geeks on Call
GFI Software
GOexchange
IBM Corporation
ipMonitor
Lightspeed Systems
MCPmag.com Tech Library
NetSupport
Network Instruments
PrepLogic
Quest Software
Scriptlogic
Shavlik Technologies
Sunbelt Software
SurfControl
Sybari Software
The Neverfail Group
The Training Camp
TNT Software
Transcender
32
15
31
74
47
77
62
35
7
69
70
9
13
26,27,29
59
65
78
60
24
55
C4
17
C3
10,39,66
2
18
50
61
45
72
www.alloy-software.com
www.altiris.com
www.argent.com
www.crossteccorp.com
www.DesktopStandard.com
www.doriansoft.com
www.ecora.com
www.legato.com
www.executive.com
www.famatech.com
www.geeksoncall.com
www.gfi.com
www.goexchange.com
www.ibm.com
www.ipmonitor.com
www.lightspeedsystems.com
www.techlibrary.com
www.netsupport-inc.com
www.networkinstruments.com
www.preplogic.com
www.quest.com
www.scriptlogic.com
www.shavlik.com
www.sunbelt-software.com
www.surfcontrol.com
www.sybari.com
www.neverfailgroup.com
www.trainingcamp.com
www.tntsoftware.com
www.transcender.com
Veritas
C2,C2a,
C2b,1
5
53
www.veritas.com
Websense
Winternals
www.websense.com
www.winternals.com
EDITORIAL INDEX
Corporate Headquarters: 9121 Oakdale
Ave., Ste. 101Chatsworth, CA 91311,
www.101com.com
Media Kits: Direct your Media Kit requests
to Matt Morollo, Associate Publisher,
508-532-1418 (phone), 508-875-6622 (fax),
[email protected].
Reprints: For all editorial and advertising
reprints, contact Valeo IP at 888-VALEOIP or
e-mail: [email protected].
List Rentals: To rent REDMOND’s or other
101communications’ publications postal,
telemarketing or e-mail lists, please contact
our list manager: Worldata, 3000 N.
Military Trail, Boca Raton, FL 33431-6375,
1-800-331-8102, www.worldata.com
CONFERENCES
TechMentor Conferences: contact Al Tiano,
Sales Manager, 818-734-1520 ext. 190,
[email protected].
The Data Warehousing Institute: contact
Diane Smith, Exhibit Sales, 206-246-5059
ext.108, Denelle Hanlon, Publication and
Sponsorship Sales, 206-246-5059 ext.102,
[email protected]. FCW Events
and Conferences: contact Lucy Cooley,
Events Director, 703-876-5081, lcooley@
101com.com. Syllabus Conference and
Exhibition: contact Anne Morris, Exhibit
Space or Sponsorship, 818-734-1520
ext.219, [email protected].
© 2005 by 101communications. All rights
reserved. Reproductions in whole or part
prohibited except by written permission.
Mail requests to “Permissions Editor,”
c/o REDMOND magazine, 16261 Laguna
Canyon Road, Ste. 130, Irvine, CA 92618.
The information in this magazine has
not undergone any formal testing by
101communications and is distributed
without any warranty expressed or implied.
Implementation or use of any information
contained herein is the reader’s sole
responsibility. While the information has
been reviewed for accuracy, there is no
guarantee that the same or similar results
may be achieved in all environments.
Technical inaccuracies may result from
printing errors, new developments in the
industry and/or changes or enhancements to
either hardware or software components.
REDMOND magazine (ISSN: 1081-3497,
USPS: 0015-657) is published monthly by
101communications LLC, 9121 Oakdale
Avenue, Ste. 101, Chatsworth, CA 91311.
Periodicals postage paid at Canoga Park, CA
91304-9998, and at additional mailing
offices. Annual subscription rates for U.S.
$39.95 (U.S. funds). Postage for
Canada/Mexico $15 (U.S. funds); and
International $25 (U.S. funds). Subscription
inquiries, back issue requests, and address
changes: Mail to: REDMOND magazine,
2104 Harvell Circle, Bellevue, NE 68005,
e-mail [email protected] or call
866- 293-3194 for U.S. & Canada; 402-2936851 for International, fax 402-293-0741.
POSTMASTER: Send address changes to
REDMOND magazine, 2104 Harvell Circle,
Bellevue, NE 68005. Canada Publications
Mail Agreement No: 40039410. Return
Undeliverable Canadian Addresses to
Circulation Dept. or DPGM 4960-2 Walker
Road, Windsor, ON N9A 6J3. Copyright
2005 by 101communications LLC. All rights
reserved. Printed in U.S.A.
Company
Page
URL
Advanced Micro Devices Inc.
Alloy Software Inc.
Altiris Corp.
Argent Software
BMC Software
Check Point Software
Technologies Ltd.
Cisco Systems Inc.
Computer Associates
International Inc.
Dell Inc.
DesktopStandard Corp.
Fidelia Technology Inc.
Hewlett-Packard Co.
IBM Corp.
Intel Corp.
Javelina Software
LANDesk Software
28, 30
19, 20
36-38, 41, 54
36-38, 40, 41
58
www.amd.com
www.alloy-software.com
www.altiris.com
www.argent.com
www.bmc.com
75, 76
76
www.checkpoint.com
www.cisco.com
58
11, 63
65
36, 37, 40, 41
11, 28, 58, 63
11, 58, 63
28, 30
25
36-38, 41, 54
www.ca.com
www.dell.com
www.desktopstandard.com
www.fidelia.com
www.hp.com
www.ibm.com
www.intel.com
www.javelinasoftware.com
www.landesk.com
Microsoft Corp.
11, 12, 14, 16, 19, www.microsoft.com
21, 23-25, 28, 30, 33, 34, 36-38, 40, 41, 49, 51, 52,
54, 56-58, 60, 63-65, 67-69, 71-73, 80
NCR Corp.
16
www.ncr.com
NetIQ Corp.
54, 58
www.netiq.com
Novell Inc.
51
www.novell.com
NuView Inc.
21, 22
www.nuview.com
Quest Software Inc.
23, 24
www.quest.com
Unisys
11
www.unisys.com
uptime software inc.
36, 37, 40, 41
www.uptimesoftware.com
WatchGuard Technologies Inc. 76
www.watchguard.com
This index is provided as a service. The publisher assumes no liability for errors or omissions.
| redmondmag.com | Redmond | May 2005 | 79
0505red_Ten_80.v5
4/15/05
TEN
4:55 PM
Page 80
Names for Windows XP sans Media Player
By Paul Desmond
T
his column requires a bit of
introduction, in part because the
meat of the column, the actual 10
items, won’t take up much space, and
I’ve got to fill the page somehow.
First the European Commission (EC)
found Microsoft guilty of antitrust
violations and forced it to sell in
Europe a version of Windows XP
without the Windows Media Player, to
level the playing field for other media
players. As if that and a fine of more
than $600 million weren’t harsh
enough, the EC also demanded (free)
naming rights for the new version.
Including its initial proposal, Microsoft
submitted 10 names for consideration, all
of which the EC rejected. But not without
good reason. The EC, it turned out, came
up with a name of its own: Windows XP
Home Edition N and Windows XP
Professional Edition N. The N, of course,
refers to the Windows Media Player—as
in, “no,” “nay,” “never,” “nein,” “non,”
“nej.” I can hear the Brits now: “Brilliant!”
When this news broke, our News Editor, Scott Bekker, was without Internet
access, left alone in his office with nothing to do but think—a volatile situation.
Sure enough, Scott called me up and
said, “This is a natural Ten column.”
I readily agreed and immediately sent
e-mail to Microsoft’s PR folks, asking for
the list of rejected names, and explaining
why I wanted them. “It’s Bekker’s fault,”
I said. “It was all his idea. Don’t blame
me.” Not that it mattered. “We are
not able to participate in this particular
opportunity,” a spokesman replied.
GetMoreOnline
Read more about the naming
debacle, and the rest of the saga
on Microsoft’s problems with the EC,
on Redmondmag.com.
FindIT code: ECNames
redmondmag.com
Not one to let a good column idea die
for a small matter like a near-complete
lack of facts, I have decided to instead simply guess what the rejected names were.
Windows XP Reduced
Media Edition.
I say “near-complete” lack of facts
because we do know that this name was
rejected. And I can see why. “Reduced
Media” just doesn’t have the same
marketing panache as “N.” I’m sure the
EC was simply trying to save Microsoft
from making a horrible, costly mistake.
Windows XP Stick in
Your Eye Edition.
This was Bekker’s contribution to
the madness that he, after all, started.
It is much appreciated, but I have
to believe that, had his Internet
connection gone out again, I would’ve
gotten a couple more ideas out of him.
Windows XP King
Solomon Edition.
This one got some consideration
from the European Union countries
that still have a monarchy, which
thought Microsoft was throwing them
a bone. Then the collective, “Hey, wait
a minute, wise-guy” hit, at which
point Britain threatened to revoke
Bill Gates’ honorary knighthood.
Windows XP Pepé
Edition.
The EC saw right through this attempt
at subliminal messaging on Microsoft’s
part. “Pepé,” of course, refers to Pepé
Le Pew, the amorous skunk with the
French accent. Pepé was lovable and
certainly tried hard, but let’s face it—he
stunk, mon ami.
Don’t Buy This
Edition of Windows
XP Edition.
Subtle, yes?
80 | May 2005 | Redmond | redmondmag.com |
Windows XP Happy?
Happy Now? Edition.
Inspired by the scene from “High
Anxiety” when the bellboy that Mel
Brooks had been bugging for a
newspaper brings it to him while he’s
in the shower and whacks him with it,
a la the shower scene from “Pyscho.”
“Here, here’s your paper! Happy?
Happy now?” If you haven’t seen the
movie, do yourself a favor and go get it
right this minute. (Cloris Leachman as
Nurse Diesel is priceless.)
Windows XP CEE.
EC regulators almost went for this
one, figuring it was somehow related
to the Windows CE handheld OS.
Then they found the secret Microsoft
memo that spelled out the real
meaning: Crappy European Edition.
Windows XP EuroTrash Edition (with
Pop-Ups!).
This edition comes with a free copy
of the Cracker song, “Euro-Trash
Girl,” which of course plays only
on the Microsoft Media Player.
Windows XP Less Is
Less Edition.
In the era of low-carb, low-fat, loweverything diet plans, Microsoft figured
a “low-app” approach might fly. But the
whole weight thing is largely a U.S.
problem, and the EC wasn’t biting.
Windows XP
YDWNSMPYAGNSMP
Edition.
Give up? C’mon, it’s obvious.
This is the You Don’t Want No
Stinkin’ Media Player, You Ain’t Got
No Stinkin’ Media Player Edition.
Desmond is editor of Redmond magazine.
Reach him at [email protected].
Project4
4/11/05
4:33 PM
Page 1
To d a y,
the world.
To m o r r o w, t h e
Tw i n C i t i e s .
Up to your neck in patches?
Introducing Shavlik HFNetChkPro™5. With 50 awesome new features,
it helps you cut a mountain of patch management tasks down to size.
Keeping your workstations and servers updated with the latest patches can be
overwhelming, particularly when you’ve got better things to do. That’s why new
Shavlik HFNetChkPro™5 is available with a variety of time-saving capabilities such
The newest release of the
industry standard security
patch management solution!
as distribution servers, SafeReboot™, email notification, and enhanced graphical
reporting. Plus, it integrates seamlessly with our upcoming anti-spyware product,
Shavlik NetChk™ Spyware. To download our trial version, visit www.shavlik.com,
call (800) 690-6911 or email us at [email protected].
Secure Your V i sion.™
Shavlik drives patch management solutions for these industry leaders:
SHV HF5 ad Redmond031005.indd 1
4/11/05 10:09:27 AM
©2005 Quest Software, Inc. All rights reserved. Quest and Quest Software are trademarks or registered trademarks of Quest Software.
All other brand or product names are trademarks or registered trademarks of their respective holders. 4/2005/IRedmond
Project4
4/1/05
2:36 PM
Page 1
Full compliance.
Without penalties.
Now you can report, enforce and
comply with Quest.
Finally, you can comply with the many internal policies and external
requirements. Reduce administrative overhead, IT expense and day-to-day
management time. Streamline IT operations, improve compliance and ROI at
the same time. Quest provides a solution with comprehensive reporting and
enforcement products for your Active Directory, Exchange, and Windows
infrastructures.
Quest—Microsoft’s 2004 Global ISV Partner of the Year—helps you leverage
your existing infrastructure, allowing you to get more from your Windows
environment.
Find out more. Learn how to report, enforce and comply. Get your free
white paper titled: IT Compliance Strategies for Improved ROI today.
———————————————————————————————————
Visit www.quest.com/Comply to get your free white paper.
———————————————————————————————————
Application Management | Database Management | Windows Management