Vista
Transcription
Vista
0507red_Cover.v14 4/17/07 10:23 AM Page 1 Deciphering Microsoft’s Software+Services M AY 2 0 0 7 REDMONDMAG.COM Vista Game Plan $5.95 1 25274 867 27 7 MAY • 05 > Is early migration the right play? 32 + IT vs. IM: How You Can Win the War 44 Laying the Groundwork for Exchange 49 Find the Right Mix of Citrix & VMware 41 64 © 2007 Brocade Communications Systems, Inc. All Rights Reserved. Brocade is a registered trademark and the B-wing symbol is a trademark of Brocade Communications Systems, Inc. Project1 4/10/07 9:41 AM Page 1 Brocade is the leading provider of data center infrastructure solutions. With Brocade, you have the tools, control, and knowledge to manage your information and create a competitive edge for your business. It’s time to make your data soar. www.brocade.com 0507red_TOC1.v6 4/17/07 11:03 AM Page 1 Redmond The Independent Voice of the Microsoft IT Community Contents M AY 2 007 COV E R STO RY REDMOND REPORT Your Vista Game Plan 9 Reinventing Windows Security Page 9 An early, well-planned move to Microsoft’s new OS could be the answer to enterprise security challenges. Page 32 Microsoft’s Toulouse thinks Windows Vista’s new security walls will prove thick enough. F E AT U R E S 41 10 Vista’s Jackrabbit Start Citrix and VMware: Oil and Water? Some analysts say, ‘Whoa, not so fast!’ Two technologies. One chemistry experiment. Can they mix? Page 44 44 IT vs. IM Instant Messaging (IM) makes tactical communication a snap, but too often IM serves as a doorway for hackers. Here’s how IT can wrestle with the problem. 12 The Low Down Making Things Better Page 41 COLUMNS 49 Laying the Groundwork: Exchange 2007 4 Moving to Exchange 2007 is a complex process with stringent requirements. Make sure you have the tools and infrastructure in place before you begin. I’m All Ears Page 49 REVIEWS 17 Product Reviews Right Gun … Wrong Ammo Web filtering is problematic at best, but iPrism puts up a solid defense. 23 Reader Review MOSS Gathers Momentum Readers rave about the new and improved Microsoft Office SharePoint Server 2007. Barney’s Rubble: Doug Barney 27 Redmond Roundup Manage and Manage Alike In today’s inherently disparate networks, you need a management tool that can take control of all your Windows and open source systems. 14 Mr. Roboto: Jeffery Hicks Stay on Schedule 57 Windows Insider: Greg Shields Isolation Automation Exploration: Part I 59 Security Advisor: Joern Wettern Patch It Up 64 Foley on Microsoft: Mary Jo Foley Software+Services Madness A L S O I N T H I S I S S U E 2 Redmond Magazine Online | 7 [email protected] | 63 Ad and Editorial Indexes COVER ILLUSTRATION BY ROBERT KAYGANICH 0507red_OnlineTOC_2.v5 4/17/07 11:39 AM Page 2 Redmondmag.com M AY 2 0 0 7 ENT Special Report The Future of Systems Center and DSI V ista and Office dominate the Microsoft technology picture at the moment, but progress on the Dynamic Systems Initiative (DSI)—which, so far, is four years in the making—continues by leaps and bounds with delivery of key products in the Systems Center suite of systems management tools. Eric Berg, Microsoft’s director of product management for Systems Center, took some time at the Microsoft Management Summit in San Diego to give ENTmag.com a DSI progress report. Find out what’s happening now. FindIT code: ENTDSI Redmondmag.com Licensing 101: Back to the Basics W hen it comes to getting a good deal on Microsoft licenses, the best practices haven’t changed much over the years. According to Scott Braden, licensing guru and author of Redmondmag.com’s Redmond Negotiator column, the key issue is still time. “You should begin reviewing and planning for your next agreement at least six months before the current one expires,” he advises. Realizing the limitations of your Microsoft licensing rep’s knowledge is also key: “Don’t take an answer at face value; demand to see where it says that in the terms.” Get more tips from Scott and read his latest column. FindIT code: RedNeg REDMONDMAG.COM RESOURCES Resources Enter FindIT Code >> Daily News >> E-Mail Newsletters >> Free PDFs and Webcasts >> Subscribe/Renew >> Your Turn Editor Queries News Newsletters TechLibrary Subscribe YourTurn Questions with ... Peter Harvey Editor Michael Domingo talks with Peter Harvey, CEO of data management company Moonwalk Inc., on recurring disaster recovery (DR) issues at Redmond Radio this month. FindIT code: RRadio Peter Harvey Some admins think of DR as a passive task. Why flirt with disaster? A fundamental condition of the human psyche is that disaster is something that happens to someone else—DR is no different. What’s a common DR “worst practice”? There’s an approach that can be summarized as, “We’ll just Google the SAN.” You’d be surprised where we come across this being seriously considered. What one big DR issue should companies pay attention to? Very few organizations can function without being online all the time—the majority don’t appear to be doing much to manage a catastrophic event right now. Quotable [ ] LINQ promises to bring about the most profound change in the way database queries are built ... RDN Executive Editor Jeffrey Schwartz and Founding Editor Michael Desmond in their article “Looking to LINQ,” April 1, 2007. FindIT code: RDLINQ Redmondmag.com • RCPmag.com • RedDevNews.com • VisualStudioMagazine.com MCPmag.com • CertCities.com • TCPmag.com • ENTmag.com • TechMentorEvents.com • ADTmag.com • ESJ.com 2 | May 2007 | Redmond | Redmondmag.com | Project1 4/16/07 10:26 AM Page 1 0507red_Rubble4.v5 4/17/07 10:55 AM Page 4 Barney’sRubble by Doug Barney Redmond THE INDEPENDENT VOICE OF THE MICROSOFT IT COMMUNITY R E D M O N D M AG .CO M M AY 2 0 0 7 I’m All Ears ■ VO L . 1 3 ■ N O. 5 Editor in Chief Doug Barney Editor Ed Scannell Executive Editor, Reviews Peter Varhol Executive Editor, Features Lafe Low Managing Editor Wendy Gonchar I love it when people bring me back down to earth: when my kids nail me with a one-liner, my copy editor points out 12 typos and eight atrocious grammatical mistakes Editor, Redmondmag.com Becky Nagel Associate Editor, Web Gladys Rama Contributing Editors Mary Jo Foley Jeffery Hicks Greg Shields Joern Wettern Art Director Brad Zerbel (most of which never make it to the printed page), or when my best girl beats me in every single bet we make (I’ve paid for every dinner since 1998 because of this). And you, the Redmond reader, can bring me back down to the earth faster than a 5-year-old’s kite. It’s easy to think that after 23 years of IT writing and high-tech journalism you know everything. Most of us don’t. We aren’t in IT like you— we just cover IT. Here’s the difference. As an observer, my strong sense is that Windows Vista is far more secure than Windows XP. As such, I reckoned shops would switch over as they brought in new machines, rather than trying to cram a big new operating system onto underpowered old boxes. Boy was I wrong. While some may migrate piecemeal, most of you are far more systematic. Apparently, you actually test new OSes prior to deployment, and you wait for the first service pack so the big bugs can be fixed. In fact, more than a dozen readers set me straighter on this issue than a $10 ruler. Software compatibility is the No. 1 concern. George, an IT Pro, found that many of his corporate apps don’t yet run on Vista, and his users could be just as productive with XP. For Alex, who’s waiting at least a year and a half before starting to switch, it’s not just plowing through compatibility issues, but dealing with management, training and productivity. Associate Managing Editor Katrina Carrasco As for my notion that new PCs with Vista should “work right out of the box,” Dennis begs to differ. He bought a new Dell laptop with Windows Vista Home Premium for his son, only to find that a driver that Dell itself installed wouldn’t work with the OS. Barr believes Vista shipped before it was done. “It should have baked for another six months so it would be truly golden brown and delicious,” Barr argues. Chuck, who “works for a large trash company,” expects to move to Vista “around 2015.” Before you assume that Chuck is joking, you should know that his shop still runs Windows 2000 on the desktop. Stephen from the United Kingdom sees Vista as so disruptive and different that it opens the door for Linux. I’ve found this to be a pretty rare response, and believe the Windows hegemony is unthreatened (and if it is threatened, we’ll just start a Linux magazine, eh what?). Fortunately, a couple of enlightened IT pros see things my way. Kurt advises using Vista on new machines as you phase out the old, rather than bringing in new XP boxes you’ll be stuck with for three or more years. Finally, Rob loaded Vista onto his OptiPlex GX270 and loves it! All of his old apps run, they just run better. And the upgrade was easier than Paris Hilton on a second date. Got something to say? Write to me at [email protected].— 4 | May 2007 | Redmond | Redmondmag.com | Senior Graphic Designer Alan Tao President Henry Allain VP, Publishing Matt N. Morollo VP, Editorial Director Doug Barney VP, Conferences Tim G. Smith Director, Marketing Michele Imgrund Creative Director Scott Shultz Executive Editor, Michael Domingo New Media Executive Editor, Becky Nagel Web Initiatives Director, Rita Zurcher Web Development Senior Marketing Tracy S. Cook Manager Marketing Programs Videssa Djucich Manager President & CEO Neal Vitale CFO Richard Vitale Sr. VP, Michael J. Valenti Human Resources VP, Financial William H. Burgin Planning & Analysis VP, Finance & Christopher M. Coates Administration VP, Audience Marketing Abraham M. Langer & Web Operations VP, Erik Lindgren Information Technology VP, Print & Mary Ann Paniccia Online Production Chairman of the Board Jeffrey S. Klein Reaching the Staff Editors can be reached via e-mail, fax, telephone or mail. A list of editors and contact information is available at Redmondmag.com. E-mail: E-mail is routed to individuals’ desktops. Please use the following form: [email protected]. Do not include a middle name or middle initials. Telephone: The switchboard is open weekdays 8:30 a.m. to 5:30 p.m. Pacific Time. After 5:30 p.m. you’ll be directed to individual extensions. Irvine Office 949-265-1520; Fax 949-265-1528 Framingham Office 508-875-6644; Fax 508-875-6633 Corporate Office 818-734-1520; Fax 818-734-1528 The opinions expressed within the articles and other contents herein do not necessarily express those of the publisher. PHOTO ILLUSTRATION BY ALAN TAO Project1 4/10/07 9:30 AM Page 1 ® NOD32. Swift. Nimble. Relentless. Can you describe your antivirus software with the same certainty? Just set it and forget it. That’s the beauty and the power of NOD32’s ThreatSense® technology. NOD32 proactively protects against viruses, spyware, rootkits and other malware. And, its high-performance engine won’t slow your system down. Take a free NOD32 30-day test drive. Call 866.499-ESET or download at ESET.com. “Best Antivirus Product of 2006” – AV Comparatives © 2007 ESET. All rights reserved. Trademarks used herein are trademarks or registered trademarks of ESET. Ad code: RM07 Project4 3/12/07 2:11 PM Page 1 A D V E RT I S E M E N T Maximum System Performance Getting to the Bottom of Common Reliability Problems As an IT Professional, you know the importance of maintaining system performance and reliability. If the desktops or servers crash, slow down or freeze, who gets called? That’s right… you or your IT staff. This “break-fix” cycle leaves you little time to be proactive. And yet, many of these issues stem from a single, hidden source. Top 5 reasons customers use Diskeeper Performance and Reliability 83% Automatic operation 83% Much superior to built-in defragmenter 44% Longer systems life with less maintenance Reliability issues commonly traced to disk fragmentation. The most common problems caused by file fragmentation are: • Crashes and system hangs/freezes • Slow boot times and boot failures • Slow backup times and aborted backup • File corruption and data loss • Errors in programs • RAM use and cache issues • Hard drive failures Having files stored contiguously on the hard drive is a key factor in keeping a system stable and performing at peak efficiency. The moment a file is broken into pieces and scattered across a drive, it opens the door to a host of reliability issues. Even a small amount of fragmentation in your most used files can lead to crashes, conflicts and errors. 44% Fast backups and antivirus and/or spyware scans 35% From Diskeeper Customer Survey—Read the full survey at: www.diskeeper.com/survey Is real-time, automatic defragmentation needed in today’s environment? More than ever! Large disks, multimedia files, applications, operating systems, system up-dates, virus signatures—all dramatically increase the rate of fragmentation. Fragmentation increases the time to access files for all common system activities including opening and closing Microsoft® Word documents, searching for emails, opening web pages and performing virus scans.To keep performance at peak, fragmentation must be eliminated instantly. Advanced, automated defragmentation (GET THE PROOF HERE: www.diskeeper.com/paper2) The weak link in today’s computers The disk drive is by far the slowest of the three main components of your computer: CPU, memory and disk. The fastest CPU in the world won’t improve your system’s performance if the drive is fragmented, because data from the disk simply can’t be accessed quickly enough. Maintaining systems can be a daunting task—maintenance, including regular defragmentation, must take place regularly to keep them running at peak levels. However, with constant uptime required, scheduling such processes to run at the right times can be tricky, since while running they pose a considerable drain on system resources. Diskeeper 2007 marks the end of scheduling, and the beginning of REAL TIME, on-the-fly maintenance of systems. Never again worry about dips in performance or straining valuable system resources —even when demand is at its absolute highest! Customers agree Diskeeper maintains the performance and reliability of their desktops and servers, reducing maintenance and increasing hardware life. “We run [Diskeeper] on our client PCs as well as our servers… with Diskeeper running daily, we can keep file performance at peak efficiency.” Tom Hill, CDR Global, Inc. Every system you manage needs Diskeeper for enhanced file system performance—automatically! ® Enhancing File System Performance —Automatically! ™ Special Offer Try Diskeeper 2007 FREE for 45 days! Download: www.diskeeper.com/red7 (Note: Special 45-day trialware is only available at the above link) Volume licensing and Government / Education discounts are available from your favorite reseller or call 800-829-6468 code 4410 © 2007 Diskeeper Corporation. All Rights Reserved. Diskeeper, Enhancing File System Performance—Automatically, and the Diskeeper Corporation logo are registered trademarks or trademarks of Diskeeper Corporation in the United States and/or other countries. Microsoft is a registered trademark of Microsoft Corporation in the United States and other countries. Diskeeper Corporation • 7590 N. Glenoaks Blvd., Burbank, CA 91504 • 800-829-6468 • www.diskeeper.com 0507red_Letters7.v5 4/17/07 10:39 AM Page 7 [email protected] Old Habits Die Hard [Regarding the March 2007 cover story, “Open Source Enlightenment,”] a couple of decades of experience have shown that Microsoft is an extremely developer-friendly company. Anyone willing to port software to a Microsoft platform and therefore make the platform more valuable is greeted sincerely with open arms. But what history has also shown is that Microsoft has a habit of letting a niche develop right until it takes off, at which point Microsoft comes in and crushes all opposition by means of subsidies, sheer commercial weight and probably one of the most vicious distortions of standardization and interoperability efforts. With that track record, Microsoft will have an extremely hard time convincing anyone that it intends to cooperate. The company belatedly begins to use open source, but only to strengthen its grip on its customers. Jean-Marc Liotier Paris, France Microsoft has gotten itself into a few comfortable niche markets—the office desktop and the home computer appliance—and is trying for some other equally comfortable niches—the “enterprise” back office and the cell phone, for example. Microsoft’s major problem is that its traditional method—allow the pioneers to innovate and develop a market, then step in and take it off them—doesn’t work any longer. There are two reasons for this: Redmond goes to sleep once it gains a monopoly, and the Free and Open Source Software [FOSS] devel- Whaddya Think ?! Send your rants and raves to [email protected]. Please include your first and last name, city and state. If we use it, you’ll be entered into a drawing for a Redmond t-shirt! opment process and people do better work than Microsoft does and are eating its lunch slowly but surely. Microsoft’s actions are perfectly understandable—even to a certain degree In short, it is possible for software companies to make money without treating their customers like criminals. reasonable. But IBM for one has found that the only way to gain respectability in the FOSS circles is to become an active contributor—and Ballmer’s rumblings indicate that Microsoft’s head honchos aren’t comfortable with that. How it will all pan out, I don’t know—but I have thought that SQL Server could be a real market leader if it dropped the religious “Microsoftonly” stance and got ported to Linux and Solaris. But Microsoft would need a management buy-out to do that— Ballmer doesn’t have the guts to do it, Wesley Parish that’s for certain. Christchurch, New Zealand I run a software company and our goal, too, is to make money. However, we don’t illegally abuse a monopoly (as Microsoft was convicted of doing). We don’t try to shove Digital Rights Management down our customers’ throats. We don’t impose onerous end user license agreements on our customers. (Our proprietary software ships with source, and customers are permitted to modify it.) We don’t send nastygrams from the Business Software Alliance shaking down people to prove license compliance. In short, it is possible for software companies to make money without treating their customers David Skoll like criminals. Ottawa, Ontario, Canada Not Buying the Hype The UI—as discussed in Barney’s Rubble, February 2007—is like a work of art that has been touted as a masterful work of color and grace when all it is, is three squares of different sizes, painted imperfectly and stuck in a gallery to be sold for $12,000. Why is this humble effort at being remarkable so admired? Who decided to call it a ribbon anyway? I’ll cease my attempts at wit and get to the point. I don’t care who owns it because I can’t afford it. I’m going to install Linux on the three PCs I have at home (with GNUCash and OpenOffice) and when (and if) I get Vista and Office 2007 at work I’ll dance and sing songs Randall Frye of joy. Cleveland, Ohio | Redmondmag.com | Redmond | May 2007 | 7 Project3 4/16/07 1:38 PM Page 1 Consolidate Windows Servers Now! Proven Server Virtualization • Blazing Fast Bare Metal Performance for Windows Guests • Multi-Server Management • Seamless Upgrade Path • Powerful Administrator Console • Easy Installation and Deployment • Fully Supported Download XenExpress for free! Plus, get a free t-Shirt when you refer three friends! Purchase the Server Consolidation Solution Bundle! Pre-Installed XenEnterprise with IBM System x servers Learn more at www.xensource.com/ibm www.xensource.com/redmond 0507red_RedReport9-12.v11 4/17/07 11:37 AM Page 9 RedmondReport Reinventing Windows Security Microsoft’s Toulouse thinks Windows Vista’s new security walls will prove thick enough. W Redmond: How did you determine what security features were going into Vista? What sort of feedback did you get from enterprise customers about that? Toulouse: By the end of 2004 Vista underwent a fundamental reset in terms of what it was going to be. Part of that reset was what we learned from the development of [Windows XP] tion to alleviate that problem. But the problem with encryption systems is they aren’t full volume, so [hackers] can just pull the drive out of the machine and try to brute-force decrypt it. But BitLocker helps prevent that. That was driven more as a privacy feature and really intended mainly for corporate laptop users. “So when a developer is sitting down in his office, he’s no longer thinking just cool feature, cool feature, cool feature. He’s thinking as much about the misuse of the feature as he is the use of it.” Stephen Toulouse, Senior Product Manager for Microsoft’s Trustworthy Computing Group Service Pack 2 [SP2]. In fact, the first steps toward understanding the larger security picture of Vista were with SP2. In SP2 we did things like the Internet Explorer lock-down for the local machine zone. Feedback from users [on SP2] was really around a couple of things. First, they wanted the code to be fundamentally more resistant to attack. Making sure the operating system was resistant gave us time to evaluate whether or not we should apply the update. Second, better security features in the product helped us tune it to different environments that would help it protect itself. When in the development cycle did you incorporate new technologies like BitLocker? Did that come out of SP2 research or independently of it? That was separate. It was done as part of what we could do to take advantage of some cool technology coming out on the Trusted Platform Modules. At that time, we were seeing this rash of laptops left in taxicabs with databases of 1 million customers’ personal information on [them]. One of the things we thought we could do was full volume drive encryp- PHOTO BY DANIEL SHEEHAN By Ed Scannell and Peter Varhol ith the world’s most talented hackers all laying in wait for its arrival, clearly the most critical improvements Microsoft had to make to Windows Vista centered around its security capabilities. After several vicious viruses successfully attacked Vista’s Windows predecessors over the last few years, Microsoft— particularly its Trustworthy Computing Group—was under enormous pressure to build bulletproof walls around the product. Stephen Toulouse, senior product manager for the Trustworthy Computing Group, is one of Microsoft’s key people thrust into the middle of this perpetual war against hackers. During Vista’s development process he worked on a number of security features including kernel patch protection, the Windows Security Center and Windows Defender, as well as working with partners to ensure their products would work smoothly with the new security technologies. Toulouse sat down with Redmond Editor Ed Scannell and Peter Varhol, executive editor, reviews, to talk about some of the processes Microsoft went through in deciding what technologies to incorporate, and the new testing procedures those new technologies went through in order to make it into the final product. As you collected and incorporated feedback from SP2 users plus your own ideas, how did you determine what security features would work for millions of users? It’s all about hitting a confidence level, striving to define that confidence level and employing the metrics that determine where you are relative to that confidence level. With Windows Vista there were three things going on in reaching that confidence level. Number one, how do we evaluate what we are putting in. Number two, when do we get to the point where we can share that and trust that sharing gives us the feedback we need. Number three, what is our safety net that helps us understand that [feedback] even if we miss something—are there still things within the product that can help. So how did you evaluate what you decided to put in? How [we] evaluate what goes into a product is what I call the security engineering part. That’s where we use our Security Development Lifecycle [SDL]. Vista is unique in that it’s our first client OS that went through the SDL from beginning to end. The SDL is now the process under which Microsoft develops all software. So when a developer is sitting down in his office, he’s no longer thinking just cool feature, cool feature, cool feature. He’s thinking as much about the misuse of the feature as he is the use of it. This | Redmondmag.com | Redmond | May 2007 | 9 0507red_RedReport9-12.v11 4/17/07 11:37 AM Page 10 RedmondReport Vista’s Jackrabbit Start Some analysts say, ‘Whoa, not so fast!’ By Ed Scannell hile Microsoft proudly proclaimed in late March that Windows Vista was off to a fast start, selling 20 million licenses of the product in just its first month of availability (3 million more than Windows XP sold in its first two months), some analysts took a bit of shine off those numbers. In a report to clients, Citigroup analyst Brent Thill states the numbers are “only slightly ahead of expectations,” adding that Microsoft CEO Steve Ballmer has recently made more cautious statements around what sort of revenues the operating system would bring in for the current fiscal year. Thill says Vista’s role is not so much to bring in high numbers but to serve as a stimulant for customers to buy other Microsoft products. Al Gillen, research vice president of System Software at IDC, says he expects Microsoft to ship just under 90 million copies of Vista by the end of 2007, with 52 million going to home users and almost 38 million going to businesses. “We think they should average about 8 million copies a month [over the last 11 months of 2007]. So if they’re saying 20 million in one month—wow, that’s a lot of copies. Their fourth W Continued from page 9 is an important mindset change. Before people were just rushing to make a great feature work well and be stable. Now they have to think about what an attacker can do with it. It’s called Threat Modeling. If we can’t go through this process successfully, then features get cut. Was this hard to develop as a discipline for longtime developers? Well, we started back with SP2 and I think people learned some very hard lessons thanks to [the] Slammer, Blaster and Sasser [viruses]. Thankfully, the quarter client-side numbers were not so good ... so it might be reasonable to assume there was a strong bounce-back in the first quarter,” Gillen says. Gillen adds that in 2001, the year Windows XP shipped, Microsoft sold 103 million Windows client OSes. In 2007 the company is currently on a run rate of 162 million for the year. With all things being equal—and of course they are not all equal ... the numbers ought to be a little bigger. Al Gillen, Research Vice President of System Software, IDC “Rolling out a product in 2007, you might expect there’d be a 60 percent pickup for the first couple of months for that product. With all things being equal—and of course they are not all equal—in theory the numbers ought to be a little bigger,” Gillen says. Microsoft’s numbers include both boxed copies and copies bundled on new PCs, as well as those people who have registered for free Vista upgrades. However, company officials claim that the free upgrade requests were not the main reason for the fast start. — mindset change had already occurred. But a second piece of all this is BlueHat, which is independent of the SDL, where we bring in security researchers to poke holes in functionality right there in front of the same people who developed it. It’s also a good punch in the stomach, as opposed to getting feedback on an intellectual level. Were any other fundamental changes made to the development process since Windows XP? Another change from Windows XP is when a developer now needs to check in 10 | May 2007 | Redmond | Redmondmag.com | code by merging it with the main source tree, that code is run against a variety of tools that scan it. This scanning is looking for banned APIs and unsafe coding practices. It’s not meant to be a catchall, but more of a safety check. If any code contains these things it gets kicked back out and is not allowed to merge. Another big change from Windows XP is the sheer, unprecedented number of security researchers and security companies that we brought into Microsoft to do code review and penetration testing on the product. Looking back, do you feel there’s anything you missed? After all the reviews and security testing, it was clear to us and the public [that] we missed the usability of things like User Account Control. There was just a wave of criticisms after beta 2. I don’t think that feature has fully recovered from the initial criticism. Even though we spent the next two beta releases addressing it, it still carried a bad rep in the final product. You have to assume there are some things you’re not going to see. It’s a constant battle between usability and security. It is a tradeoff. The most secure OS is one running on a computer with no I/O connectivity inside a vault. I’ll go you one better: The most secure OS is the one still on the DVD and that hasn’t been installed anywhere. Let’s be clear—this is the most secure version of Windows we’ve done but that does not mean it’s hackproof. We have great faith in this product and it’s only going to get better from here, but delivering the finished version of Vista doesn’t mean we’re all taking vacations now. — Ed Scannell ([email protected]) is Redmond’s editor; Peter Varhol ([email protected]) is executive editor of reviews. Project3 4/16/07 2:56 PM Page 1 0507red_RedReport9-12.v11 4/17/07 11:38 AM Page 12 RedmondReport The LOW DOWN By Lafe Low Making Things Better T he world is not a perfect place. That’s true whether speaking globally of the conflict in Iraq, tsunamis in the Pacific and the nightmares unfolding in Africa, or speaking of the world in which we work—the Microsoft world. They may not have solutions for world peace, but fortunately, there’s no shortage of vendors scurrying to fix imperfections in the Redmond world. Redmond’s heavy hitters like MOM (soon to be renamed SCOM) and Exchange are both getting help from a veritable army of third-party peacekeepers. Lil’ Help from My Friends Systems Center Operations Manager (SCOM) 2007 fans will soon be able to beef up their troubleshooting capabilities. The Zenprise Connector for Operations Manager (ZCOM) 2007 promises to reduce the volume of alerts and the time it takes to troubleshoot problems. The ZCOM (not the official Zenprise acronym) provides context-sensitive, step-by-step instructions for problem resolution; management pack extensions with more than 5,000 diagnostic routines for Exchange, Active Directory, DNS, IIS and Windows Server Operations Manager; advanced troubleshooting routines for BlackBerry and Exchange environments; and event correlation group alerts for your e-mail system. Exchange admins may also sleep easier if they’re running DigiVault. Lucid8’s continuous data protection solution can help recover all your Exchange Server files. Its SingleTouch recovery feature lets you quickly restore an entire Exchange database after an outage. The new version 1.6 boasts faster backups, a simplified setup process, expanded support for Recovery Storage Groups, and Exchange 2007 and 64-bit support. For the AD crowd, NetPro Computing Inc. just announced a new version of RestoreAdmin. This tool gives you control over online AD restores and scheduled backups. RestoreAdmin 3.0 lets you restore or roll back any objects without having to waste time taking your domain controllers offline. It also lets you choose the objects you want to back up, or recreate deleted objects when you can’t run a restore. Car Troubles The next time your car dies in the middle of nowhere and you have to use one of those 800 numbers to call for help, you may have AVIcode Inc. to thank. No, the Baltimore-based .NET developer isn’t getting into the business of changing flat tires or replacing dropped transmissions. It is, however, supplying Cross Country Automotive Services with its Intercept Studio .NET application performance monitoring tool. Cross Country is a major player in the roadside assistance market, through its own auto clubs and contracts with auto manufacturers. Its call centers handle more than 1 million calls per month, and manage a network of 20,000 towing services and other roadside service vendors. Nice to know there’s a safety 12 | May 2007 | Redmond | Redmondmag.com | .NET like that the next time you have a flat in Fryeburg, a dead battery in Boise or lose your keys in Klamath. Sleepless Nights Add this to the list of things to ponder: the current state of Internet security. Trust me, it won’t make you sleep any easier. Webroot Software Inc. just released a report on the increasing sophistication and damage caused by malware. In Webroot’s State of Internet Security report, 43 percent of the companies it surveyed suffered some sort of disruption of business operations due to a malware attack. Here are some other disturbing findings: • 26 percent of those companies reported compromised confidential corporate data due to spyware; • 39 percent reported Trojan horse attacks; • 24 percent reported system monitor attacks; • 20 percent reported pharming and keylogger attacks. Pretty grim statistics, especially when you consider the findings of a report from the Small Business Technology Institute: 20 percent of the companies it surveyed lack adequate virus protection, more than two-thirds don’t even have an information security plan, and most only put security measures in place following an incident. What’s that saying about closing the barn door after the horses are out? Webroot issues its State of Internet Security report on a quarterly basis. You can get a copy of the latest report at www.webroot.com.— Lafe Low ([email protected]) is Redmond’s executive editor, features. EventSentry_Redmond.ai 175.00 lpi 45.00° 15.00° 1/5/2007 75.00° 0.00° 1/5/2007 12:40:42 12:40:42PM PM Process CyanProcess MagentaProcess Black Project2 1/16/07 11:16 YellowProcess AM Page 1 0507red_Roboto14.v6 4/17/07 10:49 AM Page 14 Mr. Roboto Automation for the Harried Administrator | by Jeffery Hicks Stay on Schedule O ne of the most incredible things—or one of the scariest, depending on your point of view—is that there’s always something happening on your network. Even in the middle of the night, while you’re dreaming of 64-bit servers and four-way clusters, your servers are quietly churning away doing something. The question is: Do you know what’s going on? If your network is like most that I’ve seen, you’ve set up some scheduled tasks on a number of servers over the years, but never really got around to documenting what they do or when they run. You may even have applications that set up scheduled tasks and don’t tell you about it. I’ve put together an HTML application (HTA) that will generate a report of all scheduled tasks running on your servers and/or desktops. Mr. Roboto’s Scheduled Task Reporter serves as a GUI front-end for the Schtasks.exe command-line utility that ships with Windows XP and Windows 2003. As such, you’ll have to run it from an XP desktop or Windows 2003 server. Microsoft has indeed improved scheduled task support in Vista, but unfortunately this tool won’t detect scheduled tasks on a Vista desktop. You might be able to scan your servers from a Vista desktop, but you shouldn’t count on it. Keep your eyes out for something similar for Vista in the future. For now, you’re probably most interested in what your servers are doing and when they’re doing it. The Scheduled Task Reporter should work fine for that task. After you copy all the files to a directory, launch the HTA file. You’ll have to run this tool with administrator credentials. You can specify alternate credentials for any managed systems you’re polling for task data, but not for the system on which you’re running the tool. To run Scheduled Task Reporter, simply select “computername,” “text file” or “Active Directory” from the drop-down box. Selecting “computername” defaults you to the local computer, but you can type in any computer name you want. All you need is the NETBios name. You can also enter several computer names separated by commas. If you choose the text file option, you can use a text file that contains a columnar list of computer names that might look like this: Server01 Server02 Desk03 If the file isn’t in the same directory as the HTA, enter the full filename and path. I’ve included an option to search Roboto on Demand You can download Mr. Roboto’s Scheduled Task Reporter at: www.jdhitsolutions.com/scripts What Windows admin task would you like Mr. Roboto to automate next? Send your suggestions to [email protected]. 14 | May 2007 | Redmond | Redmondmag.com | Active Directory for computer accounts. If your computer belongs to a domain, the root distinguished name will be pre-populated. All you have to do is add the organizational unit path. If you’re going to query AD, then you should do so with caution. If you have a lot of obsolete computer accounts or systems that aren’t available, you’ll get incomplete results and it will take a long time to generate the report. I strongly recommend that you use the Ping option to verify that any computer is up and running before you try to poll it for any scheduled task information. Once you have your source, click “Report” and the tool will check each computer for scheduled tasks. If all goes well, you should get an entry for each scheduled task that shows the task name, command, its schedule, credentials, last run and next run times. You can hover your mouse pointer over the last run entry in order to see the last result. If your task has an attached comment, it will show it if you hover your mouse over the task description. It will also report any errors and any systems with no assigned tasks. Finally, use the Print button and file the report away with your network documentation. I also like to print a copy to PDF for fast digital retrieval. Now there’s no reason for you to not know what your servers are doing in the middle of the night, and you’ll sleep much better. Pleasant dreams.— Jeffery Hicks ([email protected]), MCSE, MCSA, MCT, is the co-author of “Advanced VBScript for Microsoft Windows Administrators” (Microsoft Press 2006), “Windows PowerShell:TFM” (Sapien Press 2006) and several training videos on administrative scripting. Project3 11/10/06 11:45 AM Page 1 Project3 4/16/07 1:21 PM Page 1 FREE DOWNLOAD available for evaluation AvePoint, the AvePoint logo are registered trademarks of AvePoint, Inc. in the United States and/or othountries. © 2007 AvePoint, Inc. All rights reserved www.AvePoint.com Caught with your pants down? AvePoint’s got you covered. Call 18006616588 to schedule a demo SharePoint® ItemLevel Backup, Recovery & Archiving Solutions. 0507red_ProdRev17-20.v8 4/17/07 1:50 PM Page 17 ProductReviews Right Gun … Wrong Ammo Web filtering is problematic at best, but iPrism puts up a solid defense. By Bill Heldman Who can forget the giddy heyday of Napster? You could download almost any song or video you wanted. The magic wasn’t in the Napster servers, though. It was in the notion of peer-topeer (P2P) workstations spread across the globe, sharing content without any payment changing hands. Napster was the arbiter of a large group of people rallying against the idea of paying someone for songs or videos. Great idea, until the music industry stepped in to shut them down. Smarting from a solid drubbing by big-city lawyers, Napster is now a toned-down, obedient, pay-for-play music service. That same P2P notion—only this time, I fear, one with teeth—is embodied in those who seek to banish any form of Web censorship. They don’t like to be blocked from the myriad questionable sites such as pornography, dating/mating, racial supremacy and other oddities. The anti-censorship crowd has weapons in its arsenal against which those in the security business have no practical offense or defense. You could say that Web filtering is akin to the U.S. military fighting insurgents. We iPrism $3,490 for 150 seats St. Bernard Software | 800-782-3762 | www.stbernard.com don’t understand the mentality behind their efforts and have no solid offensive or defensive mechanisms apart from brute force—which doesn’t always work well. They just keep coming. Hope Springs Eternal All is not lost. Lest I sound like a complete downer, it’s important to state this up front: St. Bernard Software has developed a wonderful product in its iPrism Web-filtering appliance. I really like this box—never mind that it runs Java or that it has a gaping back door. The iPrism is easy to install, configure and put into production, and the price is moderate (the iPrism M1200 costs $3,490 for 150 seats—23 bucks and change per seat). The unit actually goes out and updates its URL filtering list on a routine basis without having to be told to do so. You can configure the iPrism to work as an edge device or as a proxy (which is how I used it) that communicates with your edge firewall. There’s nothing complicated about setting it up for either topology. The customer service department is top notch and the documentation is comprehensive and easy to understand. You can also configure the iPrism to work with other iPrisms—a feature I especially like because of the multiple locations inherent in today’s enterprises. The device is Active Directory-aware and supports Windows authentication. When the software said it was going to go out and create a machine account for the iPrism to use, it actually did that with no hassles or disappointments. I had the device up and running in less than an hour. No sweat. The iPrism appliance and its accompanying software RedmondRating Installation/Ease of Use 10% 10.0 Documentation 10% 10.0 Management Interface 20% 10.0 Hack Resistance 10% 2.0 Value 10% 7.0 Performance 20% 8.0 Feature Set 20% 9.0 Overall Rating 8.3 Key: 1: Virtually inoperable or nonexistent 5: Average, performs adequately 10: Exceptional Figure 1. You can configure multiple iPrism systems to coexist and cooperate. | Redmondmag.com | Redmond | May 2007 | 17 0507red_ProdRev17-20.v8 4/17/07 1:50 PM Page 18 ProductReviews WhyJava? The iPrism runs Java and uses Java software for its management interface. My only question is: Why? Apart from the fact that it’s a pain to code, there are two reasons why I don’t much care for Java: • It’s a pig. Java has a tendency to dominate any CPU cycles it can get. In iPrism’s case, I found the box to be robust despite this tendency—no doubt because Windows wasn’t competing for cycles as well. (Java and Windows together reminds me of two obese people competing with one another at an all-you-can-eat buffet.) • It’s hard to create an elegant interface with Java. It ain’t Vista or the Mac. You can spot a Java interface a mile away because they’re always ugly. The font’s weird, the buttons have a half-baked shading element that only partially convinces you they’re 3-D and so on. The Java Web Start (JWS) software required for you to use your browser to manage your iPrism(s) is, at a minimum, an annoyance to have to download and install. It could conceivably be a security risk itself. That being said, the iPrism is the first Java-centric box I’ve messed around with that I really liked. —B.H. really work. When a user attempts to log onto an unauthorized URL, they’ll get a message stating that they were blocked. Setting up the iPrism in proxy mode could be more difficult for a lot of users, because each user has to have his or her browser’s LAN connection setting updated. You first have to create a rule that lets only your iPrism(s) hit the Web through port 80 or 443. You redirect your users’ browsers to the iPrism’s address, port 3128. The documentation helps you make adjustments for Internet Explorer and Mozilla. Redirection worked fine with Opera 9 as well. Using the iPrism as an edge device is even simpler. It has two ports—one for the Web and one for the internal network. Plug-and-play doesn’t get any easier. A quick DHCP configuration change (or some other IP magic trick) and your users are pointed at the iPrism and blocked (see Figure 3). Figure 2. iPrism routinely and automatically updates its Filter List page. You manage the iPrism in one of two ways. You can install the management software tool or run it within your browser—provided you have the Java Web Start (JWS) software installed. In either case, simply navigate your browser to the internal iPrism address and the initial entry page prompts you with the links needed to download and install the software—very slick. The left-hand side of the console has configuration element buttons (Users, Access and so on). Once you’ve clicked a configuration element, you’re presented with tabs and configuration settings screens for that particular element. Overall, the interface is intuitive and easy to use. So, here’s my issue with the iPrism and its Web-filtering cousins: Where there’s a will, there’s a way. My users—a group of technology students with a strong desire to get around any obstacle—were happily working around the iPrism within five or 10 minutes. They contacted PeaceFire and hooked up with Figure 3. Busted! This is the screen users will see when they try to access a blocked site. 18 | May 2007 | Redmond | Redmondmag.com | Project1 2/7/07 9:54 AM Page 1 0507red_ProdRev17-20.v8 4/17/07 10:42 AM Page 20 ProductReviews BackdoorMan During my review, I forgot the password to get into the iPrism management console. I wrote customer service and they quickly and politely wrote me back with a very simple workaround. The product ships with a serial cable. Just plug into the serial port on the back of the iPrism, set your laptop Hyperterminal session to 9600,N,8,1. You’ll contact a FreeBSD screen that lets you change the password in just a couple of steps. Here’s my problem with that: If the iPrism is sitting in an open environment where a technologically savvy and ethically lacking person has access, you may find the device compromised. Most rack-mounted devices like this live in secure data centers. Nevertheless, I was surprised with the ease with which I could backdoor in and update the administrator password. Better to have the iPrism be forced back to factory defaults on a hard reset than to have such a back door. Isn’t this how switches and routers work? In this case, I suspect St. Bernard went out of its way to make things easier for the admin. Bravo for that, but it may be a bit much. —B.H. an anti-censorship proxy avoidance site (called a “circumventer site”)—of which there are hundreds. Here’s how that works. Want to get to MySpace, but the iPrism won’t let you? Just navigate to www.peacefire.org, set yourself up for a regular e-mail blast of the latest circumventers and then use the circumventer site as your destination. The site retrieves any pages you want, disguising them as a URL that shouldn’t be blocked so the iPrism (and competing Web-filter software products) doesn’t bother trying to keep you from your illegal surfing. The circumventer sites come and go, so they’re very difficult to hunt down and eradicate. Web filters know about some of them, but there are always new ones. As we’ve learned from combat, an army of thousands of individuals operating alone is much harder to defeat than an army of millions working as a single organi20 | May 2007 | Redmond | Redmondmag.com | zation. You’re not going to win the circumventer site war by simply blocking URLs. Parting Shots If I were in the market for an enterprise-class Web-filtering product, I would give the iPrism strong consideration. I like the fact that it’s an appliance, as opposed to being software-only. I don’t have to dedicate a server to it, and I can easily get it up and running without a lot of hassles. Of course, the fact that it’s an appliance means that if it breaks the whole shooting gallery is down for the count. Nevertheless, I think appliances trump software in the Web-filtering game. The iPrism software is wellengineered. It’s clearly geared toward a Windows crowd (never mind that it’s Java-based). I especially like that it natively interfaces with AD and Windows user authentication. The iPrism is a well-crafted box from both the software and hardware perspective. The fact that you can have several iPrism boxes play together is very ISAlike and will go over well in those shops where administrators have a lot of outlying locations. Unlike an ISA box (which requires add-in Webfiltering software), the plug-and-play nature of the iPrism makes it an ideal fit for typically unmanned remote-server locations. Remote management is no big deal with the management console software or via the Web. If only I’d been able to plug in this box and not have any users, regardless of their technical prowess, find a workaround. Until the Web-filtering industry, including St. Bernard Software, is able to put down a hard foot, I’m afraid Web filtering as a technology is not everything it should be. — Bill Heldman ([email protected]) is an instructor at Warren Tech, a career and technical education high school in Lakewood, Colo. He’s a contributor to Redmond and MCPmag.com, plus several books for Sybex, including “CompTIA IT Project+ Study Guide.” Project2 4/12/07 11:16 AM Page 1 Are you sure your network is secure? With RecordTS you can confirm your network is secure & compliant. RecordTS acts as Your Terminal Services & Remote Desktop “Security Camera”. · First ever Citrix/ICA Session Recorder · Records ALL Terminal Server Sessions (RDP) · Monitors ALL User Activity on Your Servers · Produces More Information Than Event Logs · Eases Auditing & Compliancy Tasks · Prevents Corporate Data Loss · Assists in Detecting Unethical User Activity · Produces Compact, Digitally Signed Video Files Citrix Versio /ICA n Availa Now ble! Visit www.TSFactory.com for a FREE Trial. © 2006 TSFactory. All rights reserved. The names of actual products and companies mentioned herein may be the trademarks of their respective owners. Project3 4/16/07 1:25 PM Page 1 Windows Vista® Ready! Secure Network Monitoring Software you can rely on to proactively Monitor, Alert and Recover your critical applications and network infrastructure equipment. ADMIN DASHBOARD - centralizes status, reports, system information in a single convenient location. • Windows Monitoring • Resource Monitoring • QA Monitoring • Protocol Monitoring • SNMP Monitoring • Trouble Alerting • Detailed Reporting • Secure Web Interface WIZARDS - make it easy to add new monitors and perform complex configuration tasks. • Admin Dashboard • Agentless Architecture 2007 Winner of Network World Clear Choice Award for Management wares that fit the bill but don’t break the bank. See how we scored at www.ipMonitor.com/scorecard/ Just Released Download the Fully-Functional 21 Day Trial REPORTING - completely configurable Reports provide statistical and performance measurements for everything from critical applications to SNMP-enabled equipment. www.ipMonitor.com Sales: 819-772-4772 Copyright© 2007 ipMonitor Corporation. All rights reserved. ipMonitor® is a trademark or registered trademark of ipMonitor Corporation in Canada, the United States of America and other countries. All other trademarks are the property of their respective owners. ipMonitor Corporation, 15 Gamelin Blvd., Suite 500, Gatineau, Quebec, Canada, J8Y 1V4 0507red_ReaderRev23-25.v6 4/17/07 10:44 AM Page 23 ReaderReview Your turn to sound off on the latest Microsoft products MOSS Gathers Momentum Readers rave about the new and improved Microsoft Office SharePoint Server 2007. By Joanne Cummings When Microsoft updated SharePoint Portal Server, it dropped the “Portal” from its name but added a slew of collaboration capabilities that have made most readers quite happy. Now called Microsoft Office SharePoint Server (MOSS) 2007, Microsoft’s collaboration platform offers tighter Office integration, more powerful search, support for Web 2.0-style features like blogs and wikis, and improved workflows. Readers say MOSS 2007, together with Windows SharePoint Services (WSS) 3.0, is perfect for building a comprehensive collaborative platform. “With SharePoint, we’ve shown the management people that yes, you can really keep a project on track with team members dispersed all over the country and all over the world,” says TJ Doherty, Microsoft Office SharePoint Server 2007 MOSS Server license: $4,347 MOSS Standard CAL: $93; MOSS Enterprise CAL: $76 Microsoft Corp. | 800-426-9400 | www.microsoft.com going to build our sites, the sites below us and the linkages to them and the site above us,” he says. “We passed that around the department so everybody got an idea of the general template.” For Doherty’s group, all employees have their own personal MySite Web site. The next level up is the group site, and then the department site. Each time a document is created, it begins life in a personal MySite and moves up the levels for feedback, comments and approval. “With MySites, it’s a new paradigm that everybody in the company gets to have their own Web site that With SharePoint, we’ve shown the management people that yes, you can really keep a project on track with team members dispersed all over the country and all over the world. TJ Doherty, Owner, Chariot Enterprises owner of Chariot Enterprises, an information management consultancy in Navarre, Fla. Doherty implemented MOSS 2007 for a couple of his clients to improve collaboration for remote workers. “It has helped us prove the concept of dispersed collaboration throughout the company.” Frameworks Are Fundamental Doherty says organization is essential to succeeding with MOSS 2007. For his clients, he establishes a clear structure for how the SharePoint sites are built and connected. “I put out a conceptual paper describing how we were they tailor to their own features,” he says. Because the individual sites are linked to the team sites, the whole group is better able to work on and view the status of any projects they may have. “When you come to the main team page, whatever tasks or issues that belong to you are instantly displayed right there,” he says. “So you don’t have to go into a general task list, which may have 40 or 50 tasks on it. Instead, when a user signs in, out of those 50 tasks they only see the 10 that belong to them.” It also puts management at ease. “It’s great for the employee because it saves them time, but it’s also good for management,” Doherty says. “If the manager wants to get the overall picture, he can look at the full task list or issues list and know what’s going on right away.” Doherty says his group also uses MOSS 2007’s workflows to keep projects on track. Even the out-of-box workflows help with document approvals and feedback. “It gives you a nice process for getting coordination on documents,” he says. Doherty also uses SharePoint Designer 2007 and Visual Studio to create customized, extensive workflows. “For example, you can start a new project and have an automatic workflow that starts sequencing things and creating tasks, and then have those tasks automatically dispersed to the people working on it,” he says. Safe and Secure Since Doherty’s users are all remote, security was a concern. Users enter the MOSS site via a VPN. Once logged in, Doherty says the security in 2007 is phenomenal. “It’s very granular,” he says. “You can set privileges at the library level, at the folder level or at the document level, and you can also do it by individuals or groups.” Jonathan O’Brien, systems engineer and owner of Active IT Design LLC, a two-person consulting firm in Fort Mill, S.C., agrees that security has been improved in 2007. “One of the best features of WSS 3.0 and SharePoint 2007 is the new ‘security trimmed’ interface, where users only see what they have permissions to see,” O’Brien says. “For example, in the past, with WSS 2.0 and SharePoint 2003, if a Web page | Redmondmag.com | Redmond | May 2007 | 23 Project3 2/14/06 11:31 AM Page 1 0507red_ReaderRev23-25.v6 4/17/07 10:44 AM Page 25 ReaderReview had edit buttons on it for certain items, all users would see these buttons,” O’Brien says. “Even if the user had read-only access, they could still click these edit buttons and were then taken to an error page stating they didn’t have security clearance.” With WSS 3.0 and SharePoint 2007, he says, that doesn’t happen. “On that same Web page, users with read-only permissions wouldn’t even see the edit buttons. Only users with modify access would see them. It makes for a much cleaner interface and removes confusion for the end user.” The search functions in MOSS 2007 are greatly improved, says Doherty. “With SharePoint, when you check the document in, it forces you to fill out all the metadata information or it won’t let you check the document in,” he says. “Once you have all this metadata associated with every document, you’re able to search through and find things easily.” The search functions are helpful for finding sites and documents—and people with certain skills as well, he says. Since each employee lists his or her skill sets on their personal Web page, SharePoint makes finding and collaborating with people much easier. “If you search on ‘SharePoint,’ it goes through the company directory and comes back and tells you who knows about SharePoint,” he says. “It’s a way to find out quickly who the experts are in a particular area. You do a search and boom—you get the list and find out the guy sitting next to you knows more than he’s been letting on.” Office Integration MOSS 2007 is also far more integrated with Office and other Microsoft applications. For example, Doherty says the integration with SQL Server 2005 is vastly improved. “With WSS 2.0, you used to have to use the report viewer to view SQL Server-based reports,” he says. “Now with MOSS 2007, there’s a report section that lets you tap directly into SQL Server. So instead of just using a viewer, you have a dashboard that lets you bring various elements into a more customized report.” MOSS 2007 also sports far greater integration with the Office 2007 applications, especially Outlook. “You can integrate directly with your calendar and your address book now—you have total integration,” he says. A key feature here is integration with Office’s new presence indications. “With MOSS 2007, you can add a Web part where you assign people on your team to the Web site and then you can see a little dot there that shows whether they’re online or not,” he says. “Then you can IM them or whatever. It’s great for productivity.” Web 2.0 Compatibility Another big change for MOSS 2007 is its Web 2.0 support for things like blogs and wikis. “Blogs and wikis in WSS 3.0—I love them,” Doherty says. “I think it’s going to be a while for these things to catch on in the corporate environment, but I think they’re an excellent way to disseminate information. If it’s done correctly, it can really reduce the number of meetings.” For Mike Swofford, systems administrator at RelayHealth Corp. in Tulsa, Okla., the improved recycle bin is the “I like the recovery bin best,” he says. “Recovering files and sites that have been deleted is big.” On the Other Hand Readers cite very few downsides to MOSS 2007. Perhaps the biggest shortcoming is the lack of an easy upgrade path from earlier versions of SharePoint. “Upgrading from the previous version stinks,” Swofford says, noting that there’s no good way to do it right now. “You can’t install and just upgrade the old SharePoint 2003. Moving sites over one by one is a hassle.” Doherty says his firm did a clean install of MOSS 2007 and built it up from scratch. “It would’ve been nice to have an upgrade option,” he says. Doherty also bemoans the lack of intermediate-level tutorials for MOSS 2007. “Training is either very basic or at the developer level—there’s nothing in between,” he says. That has been a struggle for him, especially when it comes to using the variety of Web Parts that come with MOSS 2007. “It comes with 30 or 40 Web Parts, but I have yet to go somewhere One of the best features of WSS 3.0 and SharePoint 2007 is the new ‘security trimmed’ interface, where users only see what they have permissions to see. Jonathan O’Brien, Systems Engineer and Owner, Active IT Design LLC best feature in MOSS 2007. In the past, it was difficult for SharePoint users to recover deleted sites or files. Now, in the 2007 version, there’s a two-stage recycle bin, so when a user deletes a page from their personal site it’s automatically put in the group site’s recycle bin. Similarly, when a group document or site is deleted, it goes to the overall recycle bin, where an administrator can recover it later if need be. Although Swofford says his firm is just testing the latest version of SharePoint, the recycle bin is the feature he’s most looking forward to implementing. that shows me what each of them can do and how I can use them,” he says. “In the Web Part Gallery they have little descriptions for each one, but it’s hard to tell exactly what each will do. That’s the biggest shortfall I’ve seen.” Still, the complaints about MOSS 2007 are few and far between and readers say that overall, they’re pleased with its new features and capabilities. “I’m a real SharePoint believer,” Doherty says. “It’s a great collaboration tool.” — Joanne Cummings (jcummings@ redmondmag.com) is a freelance technology journalist. | Redmondmag.com | Redmond | May 2007 | 25 Project2 4/12/07 10:39 AM Page 1 Get Your Kicks scripting simplified™ Learn PowerShell Scripts! Kick your scripting skills into high gear with ScriptingAnswers.com LIVE! training in Windows PowerShell™ and VBScript! Scripting industry hotshots Don Jones and Jeffrey Hicks are hitting the road and bringing their training classes to a city near you! Line up NOW for fast-paced, intensive training sessions that will get you from zero to scripting in just a few days! Whether you’re a rookie or a pro, you’ll become a lean, mean scripting machine when you train with the people who have made scripting simple... Live! Guru-Led Training For more info and registration: www.scriptingtraining.com/pc.asp Visit our family of websites, products and services at: www.sapien.com (use referral code: REDMOND) Register by April 30, 2007, and receive, upon completion of class, a free copy of Windows PowerShell 101, a self-paced follow-up “Class on Disc” by Don Jones. © 2007 SAPIEN Technologies, Inc. All Rights Reserved. -XPSLQ:H·OOWDNH\RXIURP]HURWRVFULSWLQJLQQRWLPHÁDW • Supports Windows PowerShell™, VBScript and over 30 other languages • 2RSV5HVLOLHQFH,QÀQLWH8QGR)LOH+LVWRU\DQG5HF\FOH%LQ • Supports SourceSafe, Perforce, CVS/Subversion • Advanced Database Tools • Visual XML Editor Take a test drive at http://redmond.primalscript.com 0507red_Roundup27-30.v7 4/17/07 10:51 AM Page 27 RedmondRoundup Manage and Manage Alike In today’s inherently disparate networks, you need a management tool that can take control of all your Windows and open source systems. By Ben Brady Like many of us, I find a certain amount of comfort in Active Directory and the familiar surroundings of Windows. I’ve resisted—often kicking and screaming—when my peers have suggested using a Linux- or Unix-based system within our domain. Much to my consternation, I have to admit that several of these open source systems have found their way into the networks that I have to manage either directly or indirectly. So even though I’ve been exposed to FreeBSD, Red Hat, CentOS, Fedora, SCO and several other Linux- and Unix-based systems, I’ve always shied away from really sinking in my teeth and learning how they work. Out of pure necessity, I’ve learned how to dub around in these operating systems, do some basic maintenance and troubleshooting, and lend “hands and eyes” support to my users. Some of my Linux friends have told me I’ve learned just enough to be dangerous. With acquisitions, mergers, buyouts, downsizing and reengineering, sometimes even the most carefully planned and meticulously managed networks can become a confusing mess. I’ve always been told that networks are living, breathing entities that continue to grow throughout the lifecycle of an organization. It’s no longer a rarity to see Windows, Unix, Linux and Macintosh systems all sharing the same wire in a network environment. This is especially true in a company that has grown through acquisitions or mergers. Even simple churn within the IT staff can result in disparate OSes and different flavors of Unix/Linux as each administrator leaves behind his or her preferred systems. There’s a certain comfort in managing your Windowsbased AD infrastructure, but what InThisRoundup Centeris Likewise Management Suite $349 per server; $69 per workstation Centeris Corp. | 800-378-1330 | www.centeris.com Vintela Authentication Services Pricing begins at $325 per server and $37 per user Quest Software Inc. | 800-306-9329 | www.quest.com Centrify DirectControl $350 per server; $60 per user; Management Console $1,000 per admin Centrify Corp. | 650-961-1100 | www.centrify.com RedmondRating Centeris Likewise Vintela Authentication Services Centrify DirectControl Manageability: 25% 9.0 8.0 8.0 Performance: 25% 9.0 9.0 8.0 Documentation: 25% 8.0 7.0 8.0 User Interface: 25% 9.0 8.0 9.0 Overall Rating 8.7 8.0 8.2 Key: 1: Virtually inoperable or nonexistent | 5: Average, performs adequately | 10: Exceptional about all those Linux servers? This is where Centeris Likewise, Vintela Authentication Services and Centrify DirectControl may be able to help. The Big Easy: Centeris Likewise As I was getting ready to evaluate the Centeris Likewise package, I was reading through the documentation on their Web site. In several places in the documentation, they boasted the product could be up and running in 30 minutes—this I had to see. My lab setup consists of a Microsoft 2003 Server, four Windows XP Professional computers and two Fedora Core 5 servers. All these boxes are fully updated, and the Fedora boxes have no configuration beyond the initial install. Indeed, installing the Centeris package on the Windows server was completely painless. Once I’d finished, I was presented with a GUI management console (see Figure 2, p. 28). The look and feel is not exactly like a Windows Management Console, but any Windows admin should be able to navigate it effectively and defeat the learning curve within a few minutes. From there, all you need to do is add your first Linux box to your domain with the hostname of the Linux server (provided that you have it set up in your DNS listings) or the IP address and the root password. Centeris Likewise then creates a Secure Shell (SSH) session to the box and installs all the components necessary to administer it from your Windows GUI. The total | Redmondmag.com | Redmond | May 2007 | 27 0507red_Roundup27-30.v7 4/17/07 10:51 AM Page 28 RedmondRoundup time for the installation, plus a few extra minutes to review the documentation and set up my first Linux box on my AD domain, was about 25 minutes. Once adding that first Linux server was complete I moved on to the second. All of the benefits conferred by Centeris Likewise could certainly be accomplished with a fair amount of scripting and manual setup on any Unix and Linux machines spread throughout your network. For many with limited experience in this arena, however, Centeris Likewise is a good package to have available. Sign Once: Quest Software Vintela Authentication Services Figure 1. Admins can register the VAS Administrative Tools on their servers. At this point, I noticed there isn’t any apparent method of scripting or creating a batch for this process. In the lab environment I only had to add two servers, but that number could certainly be much higher in a large-scale production environment. Also, after installing the second server, I noticed you can only manage one server at a time. Still, setting up a mixed network was easy. Over the next 30 minutes, I set up an Apache Web site with a DNS up and running, a file share and a network printer on the two servers. It was quickly apparent that seasoned Windows veterans would certainly benefit from this product when adding Linux and Unix boxes to their networks. On the downside, however, there are several popular services found on most Unix/Linux boxes that you can’t manage through the Centeris console. MySQL and PHP are examples of services you must configure and maintain manually. Quest Software’s Vintela Authentication Services (VAS) takes a much different approach to “integrating” Unix and Linux systems into an AD environment. Just about everyone in a mixed environment is familiar with the phrase “Single Sign-On,” or SSO. Many of us are accustomed to providing our frontline users with a single username and password for Windows environments. Administrators and power users often have more than one account, each set up for performing various network administration roles. The non-IT user, though, typically needs only one easilymanaged account. Those of us fortunate enough to have a mixed environment also understand what it’s like to have various flavors of Unix/Linux on our network that require different credentials for each user. It can quickly get cumbersome. Now imagine you’re supporting an enterprise-class organization that has typically been a Microsoft AD environ- ment. You acquire another company with 152 Unix/Linux-based servers. At the outset, this could be a nightmare. You can certainly see how the concept of SSO could be beneficial. Both VAS and Centrify’s DirectControl do require a bit more skill with Unix/Linux. I’d strongly recommend having a good plan in place before beginning an integration project on a production network. Both Quest and Centrify also offer integration services that will help you smooth the process. AD stores certain attributes for each user in its data store. Unix and Linux machines typically store several more attributes for each user. This makes it difficult to integrate your Unix/Linux users into AD. One way to do this is to extend the schema on your AD servers to store the additional attributes. Quest’s VAS takes this approach. I installed VAS on a new and fully updated Windows 2003 Server machine. VAS gives you a utility for extending your AD schema. This was a relatively quick and painless procedure on my new server. In a large production environment with many users and other objects, this process might be a bit more time consuming. I’d recommend a very recent full backup of your AD servers in a production environment on the slight chance that you encounter problems. After updating the schema, VAS completes the installation and installs the remaining VAS Administrative Tools. You can then register these tools on Figure 2. Centeris’ Likewise offers a GUI management console that most admins should be able to navigate. 28 | May 2007 | Redmond | Redmondmag.com | Project12 1/16/07 11:27 AM Page 1 Software to Simplify and Share SAN Storage Extend the Capability of Microsoft Windows Server System Sanbolic shared data SAN software for Microsoft based Data Centers extends the capability of Windows server applications. Scale out your Windows file serving and web serving architecture. Create a truly flexible datacenter using Virtual Server 2005. Take advantage of the full potential of Microsoft Clustering Services for application availability. Easily configure and assign a pool of storage on a heterogeneous SAN centrally with familiar Windows tools. Simple Information Lifecycle Manager Move your files automatically based on storage policy. Copy your data for availability. Take control of your data. Intuitive Software Designed for Windows Servers www.sanbolic.com. Or call us at 617-833-4249 0507red_Roundup27-30.v7 4/17/07 10:51 AM Page 30 RedmondRoundup your server (see Figure 1, p. 28). I created a Unix/Linux users group where you see the newly added ability to select the “Enable Unix Group” check box under the Properties menu. Then I selected a user, went to properties and selected “Enable Unix User.” Management setup on the client-side install was a bit more daunting. VAS supplies a tool called Vastool that lets you add your Unix/Linux machine to the AD domain. Vastool is a commandline tool, so you should be comfortable with the Unix/Linux command line before you start on this endeavor. I did my client installation on two Fedora Core 5 machines. VAS also supports AIX, Debian, VMware ESX Server, Red Hat, SuSE and Solaris Unix. It also supports a wide range of Unix/Linux-based applications such as DB2, Java, Oracle and SAP. Now that I’d configured my AD and client machines, my Fedora machines were full members of the AD domain. The machines’ Kerberos and LDAP implementation created a true single sign-on “trusted realm” in my AD. One of the major benefits of VAS is that it’s completely standards-based. It extends the capabilities of AD to your Unix/Linux environment. One of the nightmares network supervisors experience in a mixed environment is the issue of compliance and the associated management and reporting requirements. VAS will give you the same auditing and reporting capabilities in your Unix/ Linux environment that you’ve grown accustomed to in your AD world. VAS is very scalable. It can accommodate networks with 10 or 10,000 users. While the package doesn’t let you set up Web sites and DNS servers on your Unix/Linux servers, hopefully you can see how using VAS to create an SSO environment to integrate your Unix/Linux servers into your AD could potentially be a huge benefit. Easy Rider: Centrify DirectControl The second product in the single signon arena is Centrify DirectControl. DirectControl uses native AD capabilities to store multiple Unix and Linux identities. Like VAS, this also requires a bit more familiarity with Unix and Linux than Likewise. DirectControl doesn’t actually change or extend the schema of your existing AD—although the end result is still the SSO, DirectControl takes a different approach. Centrify DirectControl lets you store multiple Unix and Linux identities for one AD user and then maps those identities back to “zones” of systems. Figure 3. DirectControl’s Administrator Console presents a cleaner environment for adding users to zones and viewing reports. These “zones” are collections of systems that share similar attributes and let you provide access for users who have membership in the zone. Many seasoned Linux and Unix veterans are familiar with NIS maps: there’s a utility that lets you import these maps. Centrify DirectControl also lets you integrate Macs into your AD, in addition to Unix/Linux machines. For the purpose of my evaluation, I started with a fresh network consisting of a Windows 2003 server, four Windows XP Professional clients and two Fedora Core 4 machines. At the time of this review, Fedora Core 5 was not listed as a supported OS. Still, installing it on the server was quite simple. Once again, the client installation requires a bit of knowledge in the Unix/ Linux environment. That being said, the client installation is fairly well scripted and went off without any problems. 30 | May 2007 | Redmond | Redmondmag.com | One feature I do like about Centrify DirectControl is the DirectControl Administrator Console (see Figure 3). This is a clean and intuitive environment in which you can set up your Centrify DirectControl zones, add users to zones and view reports. In my opinion, the built-in reporting left a bit to be desired. I prefer add-on reporting and auditing tools that pull information directly from my AD. I also question the wisdom of mapping multiple user accounts to one AD account. Singularly Qualified If you have Unix and Linux machines on your network, or if you’re thinking about adding one for Web hosting, DNS, or file and printer sharing, Centeris Likewise would certainly be worth a look. Both Centrify DirectControl and Quest’s Vintela Authentication Services have thorough documentation. They also have “Resource Centers” on their Web sites with vast resources available. If you truly want to integrate your Unix and Linux systems into your AD environment and use single sign-on features like ease of administration and compliance, both VAS and DirectControl are worth a look. I’d recommend giving them serious consideration. There certainly are benefits to this type of choice, including the ease of directly mapping existing users. As I mentioned earlier, making a full backup prior to installation would give you absolute protection in the event of any critical problems. Although I didn’t really encounter any major problems in my tests, I’m a bit leery of manipulating my production AD environment. VAS does let you use traditional Windows applications for user and group management. DirectControl adds their management console. All this may come down to a matter of personal preference with how you’d rather manage your systems. — Ben Brady ([email protected]), MCSE, CCNP, is the operations manager for ISDN-Net Inc. in Nashville, Tenn. Raxco 4/13/07 8. 10:02 AM Page 1 4. Recognized as the world’s most powerful defrag- menter, PerfectDisk has always been the secret to No hidden surcharges. Unlike other defragmenters, PerfectDisk doesn’t charge you extra for super-sized faster, more reliable computers. Now, with a drives, or administrative console features. powerful new suite of enterprise tools, Microsoft-certified PerfectDisk simply PerfectDisk 8.0 takes disk defragmen- makes it easy to defrag every tation to the farthest reaches of the drive on the enterprise. Period. enterprise, while placing total control right at your fingertips. 7. 3. The Top 8 Are you sitting down? To ensure your drives are always in shape, new AutoPilot Scheduling™ Reasons lets you set your computers to Good, because the PerfectDisk Command Center™ lets you deploy, defrag automatically. What’s configure and manage the defrag- more, unlike the competition, new intelligent Screen Saver Mode auto- mentation of every system on the enterprise ... all from the comfort of your matically defragments idle computers if own desktop. a user-defined number of days has passed since the last defrag. 6. 2. Your Enterprise Can’t Wait For PerfectDisk PerfectDisk's new patent-pending Resource Saver™ technology finds all the fragments of a file without and CPU throttling features automatically detect when a system is “busy” and 8 first opening the file, efficiently defragmenting even the largest reduces its disk I/O or CPU usage accordingly, making the of drives with minimal system defragmentation of even the impact. 5. PerfectDisk's new I/O busiest drives practical. 1. PerfectDisk's Space Restoration Technology,™ with its Consolidate Free Space defragments, optimizes and consolidates even Defrag, lets you create the largest piece of contiguous free space available prior to creating large files or performing And best of all, PerfectDisk 8 the largest drives in a single pass. Done. And with our Competitive Trade-up Program, the time is great to migrate to partition resizing operations. So why wait? Download a FREE trial at Sowhy whywait? wait?Download 8.8.8.So www.perfectdisk8.com. 1-800-546-9728 www.perfectdisk8.com Visit themost mostpowerful powerfulenterprise enterprise defrag defrag solution. solution. See the come by booth 226 during Microsoft Tech Ed, June 5 – 8, 2007 2007 Orlando, Orlando, FL. FL. Come by booth 226 during Microsoft Tech Ed, June - 8, ® June 8, 2004 PerfectDisk 6.0 Microsoft, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. PerfectDisk is a registered trademark of Raxco Software. PC Magazine Editors’ Choice Award Logo is a registered trademark of Ziff Davis Publishing Holdings Inc. Used under license. All other product names mentioned herein are the trademarks of their respective owners. ¤ May 24, 2005 PerfectDisk 7.0 0507red_F1Security32-38.v11 4/17/07 10:30 AM Page 32 Your Vista Game Plan An early, well-planned move to Microsoft’s new OS could be the answer to enterprise security challenges. By Peter Varhol egardless of your personal or professional opinions of Windows Vista, you know you’ll be running it sooner or later. Uptake on new desktop operating systems tends to be slow, with just over 50 percent of enterprise desktops running them in the first five years, according to industry analyst firm Forrester Research Inc. Most may choose to upgrade gradually, in line with new client hardware, while some may wait until the next planned upgrade cycle. In Vista’s case, there may be good reasons to accelerate adoption, rather than waiting for the next scheduled upgrade cycle. Security and integrity are two of the most prominent reasons. Enterprises that are at a significant risk, given the value of their applications or data, may be attracted to its ability to provide better safeguards. Vista’s higher levels of integrity are also likely to make it more resistant to attack. Still, there are doubters. Forrester security analyst Natalie Lambert says that the security features are a boon for consumers. While helpful in the enterprise, they will still be supported by third-party products. “Enterprises will still use virus checkers and spam blockers to supplement Vista,” she explained. “The new security features have to be weighed against the cost of upgraded hardware. For many, it makes sense to move to Vista with the next hardware upgrade, not sooner.” R 32 | May 2007 | Redmond | Redmondmag.com | 0507red_F1Security32-38.v11 ILLUSTRATION BY ROBERT KAYGANICH 4/17/07 10:30 AM Page 33 | Redmondmag.com | Redmond | May 2007 | 33 0507red_F1Security32-38.v11 4/17/07 10:30 AM Page 34 Vista Game Plan So when does it make sense to upgrade? Vista will almost certainly be the mainstream OS within a few years. Is it worth the hardware and administrative costs to achieve higher levels of security or integrity, or should migration occur on the same schedule as previous OS upgrades? ing Group, the SDL consists of processes encompassing security engineering, reviews by security experts and protection within the OS itself. The first phase of this lifecycle involves designing features and implementing code more resistant to attack. Toulouse describes a process whereby each proposed feature was scruThe Keys to Lockdown tinized for its security implications prior to being included Microsoft has undertaken a formidable task trying to secure as a requirement. “If a feature required a port to always Vista. Security is not achievable in an absolute sense, and remain open, or for a high level of access to be maintained, you don’t achieve added security without cost. That cost is it would get a lot of pushback,” he explained. “It might have typically measured in the quality of the user experience. to be implemented in a different way, or not at all.” Microsoft’s ambitious—some would say unrealistic—goal is The second phase of the security lifecycle is review and to improve both security and user experience. testing by industry security experts. A part of this effort, Microsoft has also labored under legacy burdens that aren’t called BlueHat, involves turning over working code to easily swept aside. Those burdens include the sizeable experts for analysis and exploitation, as well as follow-on Windows code base itself. The company builds new meetings between those experts and Microsoft developers. Windows versions from the source of the current one. While In addition to providing a significant test for the OS code, large parts are modified or replaced entirely with every new it also provides an interaction between Microsoft OS engirelease, starting from scratch would mean throwing away a neers and security experts that almost invariably results in lot of perfectly good technology. better code in the future. Another legacy burden is applications, both those proLast, Microsoft incorporates security features that make duced by Microsoft and those from third-party developers. the OS more difficult to hack and exploit. Features like There are thousands of applications out there whose User Account Control (UAC) and user notifications of required permissions level is above that of users, or is unusual activities make Vista more resistant, but not unknown altogether. Prohibiting these applications from impenetrable. The goal is not to provide a fully hack-proof executing would greatly slow Vista adoption, because users system, but to buy time for other mechanisms to identify would stay with the OS and turn away an attack. where their applications ran. Windows Defender, That’s not the end of it. Windows Firewall and an We had the right idea [with User Account An unknown number of Security Center Control] but we failed to consider usability. Since overhauled custom enterprise applicamake a difference here. that early feedback we’ve made significant tions were written in the Windows Defender helps same fashion, requiring protect against and remove strides in usability, and believe we have a administrator rights to the spyware, adware, root kits, system that makes more sense to Vista users. local machine to execute. bots, keystroke loggers, conStephen Toulouse, Senior Product Manager, Some enterprises fixed trol utilities and some other Trustworthy Computing Group, Microsoft their applications when forms of malware. The they went to a locked-down Windows Firewall includes environment over the security issues of the past several both inbound and outbound filtering, protecting users by years. Others still have many applications that have to run, restricting OS resources if they behave in unexpected ways. at least some of the time, in a more privileged mode. While the Security Center has been around since With Vista, Microsoft attempted to build an OS that Windows XP SP2, Microsoft has made improvements, eases users, administrators and developers into thinking including showing the status of anti-spyware software, about security in a different way. No one at Microsoft Internet Explorer security settings and UAC. The Vista would declare that Vista is 100 percent bulletproof, but it’s Security Center can monitor security solutions from thirdno exaggeration to say that Vista is the most secure party vendors running on a PC and indicate which are Windows OS to date. But is it secure enough for you to enabled and up-to-date. deploy on hundreds or thousands of desktops? Before shipping, Vista also underwent final security reviews, peer reviews and testing via automated attacks. What Microsoft Does for Enterprises Automated attacks typically involve code written to emuWindows Vista is the first OS Microsoft has built under late actual attacks from the wild, to determine the ability the laws laid down by its Security Development Lifecycle of the OS to repulse them or at least slow them down. (SDL), which were defined several years ago during the Patches and Promises intense security training conducted after the release of One of the accepted practices in OSes in recent years has Windows XP. According to Stephen Toulouse, senior been the concept of the security patch. Hackers, researchers product manager for Microsoft’s Trustworthy Comput34 | May 2007 | Redmond | Redmondmag.com | Project3 4/9/07 4:42 PM Page 1 User Account Control for the Enterprise ™ Do you trust your users with Administrative Rights? Windows Vista’s User Account Control asks users for administrator passwords in order to run many critical applications. Distributing administrator passwords to end users is not a secure enterprise solution. Least Privilege Management. BeyondTrust enables enterprises to move beyond the need to trust users with excess privileges or administrator passwords. Apply the principle of Least Privilege to all users by securely elevating privileges for authorized applications without end user input, pop-ups or consent dialogues. Empower network administrators to set centralized security policy. Built for Windows 2000, XP, Server 2003, and Vista; integrated with Active Directory and applied through Group Policy. For a free pilot installation call 1.603.610.4250 or visit www.beyondtrust.com. Windows and Vista are trademarks of Microsoft Corporation. Other company, product and service names may be trademarks of their respective owners. © 2007 BeyondTrust Corporation. All rights reserved. 0507red_F1Security32-38.v11 4/17/07 10:30 AM Page 36 Vista Game Plan or even vendors themselves identify vulnerabilities. The OS Developers tend to be philosophical about security vendor, such as Microsoft, Apple or Red Hat, then analyzes issues. At a recent Visual Studio developer conference, the vulnerability and prepares one or more patches. Sam Restead, a senior software engineer for a large insurMuch has been made of the fact that Vista has had ance provider, shrugged and said, “I care about security fewer security patches in its first 90 days of availability and don’t intentionally write bad code. But the hackers than comparable OSes from Apple or Red Hat. While move so fast that no one can keep up with all the emerging this appears to be a reasonable standard for a new OS, techniques to break into systems.” Microsoft disingenuously included the time before genRestead’s colleague Richard Guest added: “It’s mostly an eral availability when the OS was only available to enterOS problem anyway.” prises and MSDN subscribers. Not surprisingly, both perception and bandwidth have Forrester analyst Jen Albornoz Mulligan notes that the led to the lack of motivation by developers in addressing ranking is very different when only critical flaws are consecurity more rigorously in their applications. That said, sidered. Her conclusion is that there are too many varidevelopers don’t intentionally write insecure code and are ables to consider. For those on the front lines, however, keenly interested in making sure that an application isn’t the question for now is: What does it take to keep the the cause of a security breach. The real problem is that machines up-to-date on patches? The jury is still out on there are just too many other things for developers to do at that question, but Windows Vista looks much more prom- the same time. ising than previous versions of Windows. Vista will help most developers write more secure code. Ironically, at press time there were news reports of a It does so, in part, through the use of UAC. The UAC Vista vulnerability surrounding .ANI files. According to separates standard user privileges and activities from those those reports, .ANI files are used to change the cursor into that require administrator access. It changes the definition an hourglass while a proof a standard user by includgram works, or into a curing many basic functions sor animation on Web that pose no security risk but The new security features have to be sites. The vulnerability was that previously required weighed against the cost of upgraded hardware. allowing hackers to break administrative privileges. For many, it makes sense to move to Vista with into computers and install Many applications require malicious software. Because local machine administrator the next hardware upgrade, not sooner. of a rapidly increasing privileges, so users can end Natalie Lambert, Security Analyst, Forrester Research Inc. number of reported up with administrative exploits, Microsoft released access, invoked only when the patch for this vulnerability early. installing software or executing an application that There is also security from a physical breach. Many of us requires admin rights. Vista displays a dialog box requesthave received notification of a lost or stolen computer con- ing the local administrator password, which the user must taining data on our identity, credit, or buying habits, and enter in order to complete the activity. were outraged that the data was not better protected. If the enterprise locks down desktop systems, UAC can also Here’s where BitLocker, Vista’s full volume encryption, help there. Admins have the option of configuring a policy comes into play. BitLocker uses hardware-enabled protecsetting that prevents users from encountering the access diation to prevent unauthorized users from accessing data by log, in order to prevent administrative actions entirely. breaking Windows file and system protections. Alternatively, UAC lets IT admins give desktop users BitLocker incorporates centralized storage and manageadministrative rights, but normal operations occur using ment of encryption keys in Active Directory, and lets IT lower privileges. If an application requires admin rights to administrators store encryption keys and restore passwords continue, it will prompt the user for an OK. onto a USB key or to a separate file for backup. The UAC helps users better understand how their system is encryption system also enables system recovery in the being used by applications. After an initial training period, field, providing a means for users to enter the restore pass- users will come to know the normal behavior patterns of word and restore their own systems. their applications, enabling them to question unusual or unexplained requests to upgrade system privileges. The Price of Privilege And over time, UAC will help developers. Because those There has been a dichotomy between application developoperations requiring admin privileges are right out there ers and their users that has become significant over the in the open, any inadvertent upgrade in privileges will past several years. Many enterprise developers have become apparent during unit and functional testing. absolute access to their systems, but they tend not to conMicrosoft’s Toulouse admits that UAC got a bad repusider whether or not their users do. In some cases, they tation during early community releases of Vista. “We had raise privileges because a given operation won’t work the right idea,” he explains, “but we failed to consider unless the process has a high set of privileges. usability. Since that early feedback we’ve made significant 36 | May 2007 | Redmond | Redmondmag.com | 32229_redmond5_ns.indd 1 4/9/07 5:05:00 PM 0507red_F1Security32-38.v11 4/17/07 10:30 AM Page 38 Vista Game Plan strides in usability, and believe we have a system that For enterprises, this means that “install and go” is no makes more sense to Vista users.” longer a reasonable strategy for running a Windows OS. One unyielding principle is that users are still informed System administrators, application developers and even whenever an application attempts to do something out of end users have to take increasing responsibility in an envithe ordinary. This means that many computer users will be ronment where known exploits are combined with valuable seeing more messages concerning application privileges data to provide ample opportunities for security violations. than they have in the past. To those who install software The tradeoff required for better security is greater on their own systems, the dialog will be a constant involvement by users, administrators and developers in the reminder of the Vista security strategy. security process. In deciding whether or not to accelerate a The upshot is that users will have to better understand migration to Vista for security purposes, managers have to the security implications of their activities. This may cause first perform a classic risk analysis. If your clients access confusion unless users are trained in their security respondata of significant value to the organization, or your infrasibilities. In many enterprises such training is problematic, structure has vulnerabilities that put clients at greater risk as users generally receive only the training they need to of intrusion, then the additional security features of Vista perform their job activities—and sometimes not even that. should be high on your priority list. According to BeyondTrust CEO John Moyer, this will But—and it’s a big but—that means both your staff and be a problem in enterprises. “Users are focused on their users have to get more involved in security. Users have to jobs, not on the security messages that pop up on their understand and take action based on security messages screens,” he claims. UAC sent by the OS. Vista will has the potential to cause tell them a great deal about System administrators, application developers confusion for users and the security state of their increased workload for desktop, but only if they and even end users have to take increasing administrators. It’s not speak the same language. responsibility in an environment where known going away, though, so Administrators have to exploits are combined with valuable data to sooner or later developers make sure that desktops are will have to make their provide ample opportunities for security violations. configured with the applicaapplications run in more tions, policies and security secure environments and settings required by users to users will have to understand what to do when the UAC perform their jobs. Blasting all desktops with a single dialog box appears. image and pushing blanket policies probably won’t cut it You can get your hands on most, if not all, of these and if you want to move to Vista today. Using features such other less significant security features from third parties to as UAC, policies and the Security Center, administrators use with Windows XP. BeyondTrust, for example, prohave to configure the OS to the precise security paramevides a way to manage user privileges in the IT shop, ters needed to ensure protection of data and systems. rather than on the user’s desktop. Adding third-party point Admins will be on the front lines of helping users undersolutions does mean a more complex configuration for stand their new security responsibilities. installed systems, the need for better management of softLast, developers can no longer assume that users are local ware licensing and upgrades, greater costs and perhaps a machine admins. Relying on Vista privilege elevation for greater potential for system conflicts. applications to work will be confusing to users and show a lack of OS understanding by developers. While it may not Building a More Secure Enterprise be possible to get rid of privilege elevation entirely, develAdvocates for one OS over another tend to get viscerally opers have to build and test with the same security settings involved in their opinions on security and usability. The as their users. debate among client OSes in enterprises tends to settle With a commitment from these three constituencies, around what version of Windows is best, rather than Windows Vista will help an enterprise at risk be measuranon-Windows alternatives. If an enterprise is at risk, bly more secure. But there’s also a word of caution: Witheither by making regular and common use of high-value out that commitment, along with training in security or highly sensitive data, or by losing significant business policies and implementation, the equation falls apart, likely if systems are taken offline by attacks, then Vista can resulting in greater confusion and lost productivity. help immediately. There’s no going back. All parts of the enterprise will There seems to be little question that security is have to have greater involvement in information security improved with Windows Vista. Toulouse calls Vista the in the future. Vista represents an important first step in “best possible baseline for the broadest set of users.” that direction. — While there’s nothing particularly revolutionary about its Peter Varhol ([email protected]) is Redmond’s features, it’s useful to have them aggregated into a single executive editor of reviews. product and used in consistent ways. 38 | May 2007 | Redmond | Redmondmag.com | Project2 4/12/07 10:51 AM Page 1 NORTHERN STORAGE SUITE SET LIMITS To collect and store is a natural instinct. A sys admin is guided by a different set of instincts: to maintain order and to set reasonable limits. Northern Storage Suite allows you to establish guidelines and boundaries to promote economical storage usage. It lets you set disk quotas, block file types and keep users informed. Sample the power of Northern Storage Suite – download Northern’s Free Analysis Tool: www.northern.net/redmond WWW.NORTHERN.NET / [email protected] / 1.800.881.4950 NORTHERN – MANAGING STORAGE SINCE 1995. TO US IT’S SECOND NATURE. Simplify Active Directory Management, Inventory Control, & Auditing. ® ® ® ® ® ® ® Provides Custom & Canned Reports Includes Ability to Schedule Reports Eases Software Inventory & Auditing Removes Unwanted Client Software Offers Hot Fix & Service Pack Viewer Advanced Export Features Bulk User Updating NG I L E D? FE E M L HE W R OVE FREE 30 Day Trial! Visit CNS-Software.com Tools by Administrators for Administrators 1-866-344-6267 www.CNS-Software.com TM ©2006 CNS Software, LLC. All rights reserved. The names of actual products mentioned herein may be the trademarks of their respective owners. Project4 3/12/07 12:13 PM Page 1 Maximum Control. Minimum Effort. Providing desktop support can be a headache with the large number of systems, servers and mobile devices located on today’s corporate network. With NetSupport Manager remote control software, you can provide seamless IT support centrally from one location, improving response times and reducing associated IT costs. Support, monitor and train your users securely over a LAN, WAN and the Internet. Manage and monitor multiple systems simultaneously with NSM’s multi-platform support including Windows, Linux, MAC, Solaris, and Windows Mobile. Troubleshoot help requests efficiently with NSM’s inventory and desktop management tools. Take control of your network before it controls you. For more information and to download a free trial copy - visit: www.netsupportmanager.com PC Remote Control [email protected] 770-205-4456 www.netsupport-inc.com 0507red_F2CitrixVM41-43.v8 4/17/07 10:32 AM Page 41 Citrix and VMware: Oil and Water? Two technologies. One chemistry experiment. Can they mix? By Greg Shields and Steve Kaplan ne of the components in our chemistry experiment is a billion-dollar company known worldwide for software that connects any user from any network connection to any data center. Citrix Systems Inc.’s Presentation Server software utilizes an optimized transport protocol called ICA to connect clients to servers over WAN links of virtually any speed. The other component is a subsidiary of another billion-dollar company. This one’s known for multiple years of triple-digit growth and a recent announcement of its first IPO. VMware Inc., EMC Corp.’s subsidiary, has been renowned for its Virtual Infrastructure product that’s capable of squishing together tens of data center servers onto a single hardware chassis. The return on investment (ROI) associated with both technologies is well-documented. Citrix moves your applications from the desktop to the data center, centralizing management and reducing administrator touch points. VMware centralizes your servers, reducing hardware footprint and heat signature, enabling an entire-server snapshot for rapid recovery and business continuity. But when you bring them together, do they mix? Or, like oil and water, do they separate? By running Citrix servers on top of VMware’s Virtual Infrastructure, do you improve their combined ROI, their performance and their survivability? Or do you end up with a big, unresponsive mess? O | Redmondmag.com | Redmond | May 2007 | 41 0507red_F2CitrixVM41-43.v9 4/17/07 2:10 PM Page 42 Hard Facts 7But What About Microsoft Virtual Server? e’ve focused hard on the Virtual Infrastructure virtualization technology created by VMware, but the elephant in the room is: “What about Microsoft Virtual Server?” While there are no equivalent studies detailing Citrix performance on Microsoft Virtual Server, a few connections can be made between the two products. Microsoft Virtual Server is intended to be a comparable product to VMware’s Virtual Infrastructure platform, but its architecture suffers problems stemming from two major issues. First, Microsoft Virtual Server is intended to be installed on top of an existing Windows Server 2003 installation. VMware’s Virtual Infrastructure 3 (VI3) product is its own operating system. As the VI3 OS is highly optimized with an eye toward performing a single function, its virtualization overhead is significantly reduced. This means that virtual machines hosted on VI3 will typically run with better performance. The second issue involves VI3’s capabilities for dynamic load balancing and on-the-fly restarting of failed machines on alternate hosts, enterprise-level features that are critical in high-availability environments. Microsoft Virtual Server has the capability of doing cold migrations of servers from one host to another, but the virtual machine must be powered down prior to the migration. VI3’s ability to move machines from host to host while the virtual machine continues to run makes this feature set a huge boon to downtime-sensitive environments. Microsoft Virtual Server is a good product in some environments. More importantly, it comes at a substantially lower price point than VMware’s enterprise-level product. If your network environment doesn’t have requirements for very high performance and reliability, then Microsoft Virtual Server’s lower price point may make it the product for you. —G.S. and S.K. W 42 | May 2007 | Redmond | Redmondmag.com | Virtualizing a Citrix server provides the same level of benefits at the server chassis as Presentation Server does for its applications. Virtualizing a server enhances that server’s capability for management and hardware mobility. Because of the file-based nature of virtualization, that server’s intrinsic availability and recoverability after a disaster event are improved. And because adding a new virtual server is little more than a copy-and-paste, virtualization provides an IT staff with more options in segmenting applications, as well as securing them against external attack. On the other hand, virtualizing any server involves added overhead to system resources. This overhead comes from the resources needed to run the virtualization layer plus all other virtual servers hosted on the chassis. You may have heard the horror stories about the poor performance Citrix servers experience when running on early versions of VMware’s ESX product. Many of those concerns have changed, however, with VMware’s release of Virtual Infrastructure 3 (VI3). VI3 includes automatic sizing of memory page table caches, and improved latencies on page fault and context switch operations that help reduce total system resource use. Citrix at a high load can be a demanding application due to high kernel-resource utilization and a high level of context switches associated with its underlying Terminal Server architecture. But in many environments this high utilization often doesn’t occur. Many times, application conflicts—or the need for security isolation among applications or users—force a horizontal scaling of Citrix servers. These kinds of applications or users that can’t cohabitate on a single server can result in an organization buying new Presentation Servers even though existing server utilization is low. In a virtualized environment, multiple server instances are enabled to run on the same physical server chassis. When application conflicts or security requirements force additional servers to be brought online, virtualization can enable it to be done with relative ease. You can copy and paste new servers to your heart’s content until the hardware resources of your physical chassis max out. VMware recently completed scalability tests that involved initiating a series of increasing user log-ons to a virtualized Citrix server, followed by a pre-recorded series of actions using Microsoft Word. The test simulated users logging in, opening a Word document and typing for up to 15 minutes. CPU resources were measured so as to identify the number of users capable of being supported by the hardware chassis when running at up to 80 percent of CPU utilization. A quad-socket, dual-core server was used to host the virtualization environment. This server was configured to run eight instances of Presentation Server with near-equivalent user experience to that of eight single-processor physical servers. For the test, a limited set of applications was used and each Presentation Server virtual machine was fixed to a specific processor. After running the test for 80 iterations, results showed that for the hardware chosen, Version 3.0 of ESX and a 0507red_F2CitrixVM41-43.v8 4/17/07 10:32 AM Page 43 Citrix & VMware single-hosted virtual machine could support close to 140 simultaneous sessions. Obviously, mileage will vary depending on the type and number of hosted applications, as well as the number of simultaneously hosted virtual machines on the hardware chassis. But this test did verify that a large number of concurrent users living in a virtualization environment could be supported. Two design decisions on the part of the ESX host combined to reduce this virtualization overhead. Virtualization environments that run on quad-processor rather than dual-processor servers, as well as those running 64-bit processor architectures, can increase the number of concurrent sessions in the virtualization environment. When making the decision to move to virtualized Presentation Server, this combination of host specifications diminishes the negative impact of virtualization overhead. ported for a much lower hardware cost when it comes to concerns over security or application conflicts. Snapshots and Backup Presentation Servers are application servers. Unlike most of the servers in your data center, users have direct access to that server’s desktop and installed applications. This means Presentation Servers have a greater chance of being exploited. A virtual Citrix deployment eliminates the necessity of having one or more Citrix servers set aside as dedicated test machines. Because of VI3’s ability to “snapshot” the server, the process for patching and testing becomes much less painful. To test a virtual server, just snap an existing server instance, apply the desired patches, upgrades or other modifications, and validate their functionality. If anything goes wrong, you can rollback the server to its snapshot. If the testing or patching completes successfully, the modificaSofter Side tions can be applied to the other Citrix Other factors also help to reduce virtual machines with confidence. hardware requirements in a virtualBacking up a virtual Citrix infraized Citrix environment. VI3’s structure is simplified by the ability to Interested in learning more about Distributed Resource Scheduling can store snapshots of the entire virtual VMware’s performance study be configured to automatically machine at any time. Snapshots can be involving Citrix Presentation Server? relocate running instances of virtual replicated off-site, which helps faciliCheck out its white paper at Presentation Servers to other physitate disaster recovery (DR). Because www.vmware.com/pdf/esx_citrix_ scalability.pdf. cal chassis with more available the Citrix virtual machines can be kept resources. This relocation capability running at the DR site, access becomes means that a stack of servers can be treated less like a stack very easy and rapid in the event of a catastrophic failure. of servers and more like a stack of processor and memory Performance vs. Reliability resources. Organizations can pool these server resources As with our question of oil and water, the laws of physics and load balance virtual machines across them, thereby still hold true with virtualized environments. Do Citrix enabling a higher overall utilization without overburdenand VMware mix? For performance—maybe. Using ESX ing any individual machine. with just the right set of hardware, applications and users, This way the server environment is similar to that of an testing shows that you can squeeze a large number of conarray of disks. We no longer have to know or even care current users onto multiple Citrix virtual servers. about where our virtual machines are running. We can set For other reasons—definitely. As you can see, virtualizapolicies to reserve minimum and maximum resources for individual virtual machines. We can also create affinity and tion provides benefits to reliability that help offset that loss in total performance. The gains from centralized adminisanti-affinity rules to ensure servers that should reside tration, higher availability, disaster recovery and server together on the same physical hardware actually do. In a physical environment, a failed server can mean a loss of provisioning make it an option worth considering. that server’s resources until that server is repaired or a new Greg Shields ([email protected]), MCSE: machine is procured. Disparate hardware between the failed Security, CCEA, is a principal consultant for 3t Systems machine and the new one can force a complete rebuild—a (www.3tsystems.com) in Denver, Colo. A contributing editor lengthy process. Because of this, organizations often procure and maintain an inventory of costly identical server hardware to Redmond magazine and a popular speaker at TechMentor events, Greg also hosts a Windows Server blog and regular that sits unused and waiting for a failure to occur. A dead VI3 host server, on the other hand, can quickly be podcast at www.realtime-windowsserver.com. replaced by a new server regardless of brand, CPU or Steve Kaplan ([email protected]), MVP, is president of model. Further improving system uptime, VI3’s High AccessFlow, a VMware Premier Partner headquartered in Availability feature will automatically restart systems elseSacramento, Calif. In addition to co-authoring the where that were homed on the dead host. Osborne/McGraw-Hill series of Citrix Official Guides and Also, the ability to spread out users among a greater Advanced Concepts Guide books, Steve has had dozens of number of virtual Presentation Servers means a smaller impact on that user base when one Presentation Server has articles published on various IT topics ranging from security to disaster recovery to regulatory compliance. an issue. It also means users and applications can be sup- VMware’s Citrix Performance Study | Redmondmag.com | Redmond | May 2007 | 43 0507red_F2ITvIM44-47.v11 4/17/07 10:34 AM Page 44 44 | May 2007 | Redmond | Redmondmag.com | 0507red_F2ITvIM44-47.v11 4/17/07 10:34 AM Page 45 IT IM vs Instant Messaging (IM) makes tactical communication a snap, but too often IM serves as a doorway for hackers. Here’s how IT can wrestle with the problem. By Doug Barney I n October 2006 Instant Messaging reached an ignominious milestone. Security vendor Akonix Systems Inc. reported a record-high 88 IM-based attacks, a mark that still stands almost six months later. While it hasn’t gotten any worse, IM threats have hardly gone away. Most are in the form of worms usually spread as attachments. They have wacky names such as Geezo, NotYou and Tellsky. IT staffers have to clean up these messes, and they’re not laughing. Besides worms and other viruses, IM is also a conduit for phishing, spyware and social engineering attacks. “I fight daily with pesky spam, malware, viruses and backdoors. Every computer I clean has some type of IM client or a residual,” complains one IT professional. While IM is often seen as stripped-down messaging, the viruses it carries are no lightweights. Take the W32/Sohana-C worm. This nasty little germ first shuts down your anti-virus protections, then modifies the registry and can install software from the Internet. It can also change the user’s start page and duplicate itself via IM. It’s no wonder that many in IT aren’t fans of IM. “I’m not an IMer and I don’t see the business case for it. Employees can state their cases all day long but in the end, everyone knows what they use it for most of the time—[and] it’s not work related,” says Dave Zeininger, a network engineer and administrator for The Computer Merchant Ltd, a computer consultancy. Just Say No One solution that may please IT—but not end users—is to ban IM completely. “We just say no [to IM],” explains John Montgomery, MCSE, president and CEO for IMC Studios Inc. IMAGE BY GETTY IMAGES Blocking can be a fairly simple procedure. “In our enterprise, IM protocols are blocked by filtering software at the Internet gateway, and all known IM client software is prevented from running by a combination of group policy—blocked by path and hash—and our AV software,” explains Marc Cote, a network manager in Lenexa, Kan. “So far, I have the CIO onboard with these actions in the name of security,” he says. Others in IT are taking a similar tack. Charlie Jarman, a system administrator and Microsoft Certified Professional with Loris Healthcare System Inc., says he simply uninstalls MS Messenger on all Windows XP Pro-based PCs when they come in the door. He then uses Websense to block all IM clients and all ports, as well as using Group Policy to disallow running the popular IM clients. “This strategy works pretty well for our small hospital system with about 1,000 employees,” he says. Blocking isn’t always enough, however. The fear of God (or at least HR) can also help, argues Dwayne Sudduth, network administrator for Bulova Technologies LLC in Lancaster, Pa. Sudduth says he blocks all the ports for the major IM clients at the firewall. “All of about three users would know how to circumvent that anyway, and we’re all in the same department [IT],” Sudduth says. “It’s a well-known policy that the use of IM is forbidden and is a disciplinary offense, [with penalties] up to and including immediate termination.” If IM is essential to your business, there are two main choices. One is to install a private IM network based on tools from Microsoft, IBM Corp. or Jabber Inc., among others. These private networks tie users to a directory, or let you create a directory that ensures users are who they say they are and have proper password protection. | Redmondmag.com | Redmond | May 2007 | 45 0507red_F2ITvIM44-47.v11 4/17/07 10:35 AM Page 46 IM Solutions Vendors: Akonix, Blue Coat, CypherTrust, FaceTime, IBM, IM Einstein, IMLogic, MessageLabs, Microsoft, NFR Security, PortAuthority, SurfControl, Symantec, Trend Micro, Vericept, Websense, WiredRed Software, Zone Labs. These tools can also archive IM messages that fall under compliance regulations, giving IM the same status as traditional e-mail. These systems also generally include virus blocking, attachment control, the ability to manage and block users, and filters to safeguard confidential data. Another option is to install a gateway that works with existing public IM services like Yahoo! and AIM. These types of tools filter content, detect and block viruses and control what users can do with IM. They can also help with compliance by reporting on IM use and archiving traffic. Gateway tools can also discover just what kind of IM is installed and where. The Trillian Advantage One problem with most IM clients is that they don’t know how to talk to other clients. For Timothy Carroll and many others, Trillian is the answer. “We use Trillian for all IM: It operates with all the popular networks including AOL, MSN and Yahoo!,” says Carroll, who is a network engineer for XS Inc., an IT-based application development shop. Carroll says he first created a default installation, configured it so it looks for profiles in “Documents and Settings,” and then created his own MSI installer with Visual Studio, which duplicates the default installation. The product, however, is not without its shortcomings. “Sadly, Trillian does not respect Windows’ limited-user security out of the box. By default it stores all profiles under Program Files. Its default installer is not an MSI and cannot be deployed. To me both reasons are grounds for immediately uninstalling the product,” Carroll says. But since the company gave him a way around the problem, as well as promising in the next release to permanently fix it by automatically storing everything in documents and settings, Carroll has decided to stick with it. Others are looking to Microsoft for business-oriented solutions. “We’re looking for ways to facilitate the use of IM for business, but in a secure manner. IM will continue to cause issues unless businesses, decision makers, managers and users identify the security risks and address them,” says Michael Esquia, an IT pro with the Floridabased law firm Fowler and White. Esquia says he sees the issue as two-sided. On one side there are the users and their lack of education. On the other side are the IM software companies and the lack of It’s a well-known policy that the use of IM is forbidden and is a disciplinary offense, [with penalties] up to and including immediate termination. Dwayne Sudduth, Network Administrator, Bulova Technologies LLC 46 | May 2007 | Redmond | Redmondmag.com | 0507red_F2ITvIM44-47.v12 4/17/07 2:04 PM Page 47 IT IM vs Batten Down the IM Hatches Understand what you have and do an inventory to see what IM clients are in use and by whom. ■ Create an enforceable IM policy. Users should not open attachments or click links. Get legal involved in approving the policy so it’s in line with compliance standards. ■ Think about creating a standard IM solution, or blocking IM. ■ Patch your IM software, if you have it, regularly. ■ Protect your network with a good Intrusion Protection System. ■ Users should not use names that appear to be someone else, such as GeorgeBush, and IT should not allow false names on the network. ■ Consider encrypting IM messages. ■ manageability they offer in their products. He says it’s not as if he’s asking vendors to develop complete management consoles, but simply to make it easier to manage features using the registry. “Microsoft is leading the way with Live Communications Server [LCS], but it’s still expensive for something that most people view as free to use. If we go with LCS, we’ll keep other IM software from running on workstations,” he says. The Microsoft Way One public radio station, which asked not to be identified, faced an internal IM battle. The station’s former IT director says its news department, radio shows, Web team and key executives all used IM personally and expected the IT department to offer it with no regard for security risks, or for how the existing business logic would support the increased demand. “After initially demonstrating the dangers of unlimited open IMing involving AIM and Yahoo! IM, we were able to get the critical users and execs to understand the problem of security breaches. The AIM virus disaster was the clincher,” he says. The station’s IT department then proposed a secure solution. They were able to convince the powers that were that IT wasn’t refusing to help, but only wanted to comply with the demand in a secure fashion, according to the source. Once they proved the risks and dangers to the corporate network and resources, they made a pitch for the special funding of the project. The CFO then approved the purchase of a small, dedicated server for internal messaging, he says. The specific solution came in the form of the Windows Message Server, which supported all the departments and their users that required the service. According to the former IT director, the productivity improvements were immediate because different departments could communicate significantly faster when, for instance, news was breaking. Despite the Microsoft solution, other clients are sometimes tolerated. “External IM was approved for select individuals or departments but was screened against hitting the main network. This was a very rare permission and had to wait for us to move to Windows 2000 Server, [which had] tighter and more discrete control over user account security,” says the station’s former IT manager. The DBabble Alternative Years ago end users at The Computer Merchant Ltd. had free rein and could install any IM client that came down the pike. That all changed when the company moved to Windows XP Pro and took away end user admin rights. “Because of their demand for IM, stating that their clients required it for quick communication, we deployed DBabble on our network and clients, totaling about 125 users,” The Computer Merchant’s Zeininger says. Because Zeininger’s IT manager was a “real nerd,” he was able to download the manual for the product, read the entire manual, deploy the server and test it out on selected users—all in one day. This allowed the company to deploy the product companywide the following week. The only problem—and it was no small one—was network access, according to Zeininger. He says the major issue for the next couple of years will crop up when the IM companies block communication with the public jabber servers his firm would normally connect through. Most of the time, he notes, it takes several attempts to get connected through a valid jabber server in order to communicate with the IM Servers. “It’s got to the point where, when we lose the communication Check out Redmond’s roundup of for AIM or Yahoo! private IM tools at Redmondmag.com. FindIT code: ITvsIM due to their blocking the jabber server, we may be a week or more before we bother to reconfigure another public jabber server for DBabble,” he says. With such inconsistency, users are starting to give in on IM, and Zeininger says he couldn’t be happier. There are alternatives to DBabble, he says, but he has yet to see a real business case that justifies the cost associated with these options—nor does he have the resources to manage such a system properly. IM doesn’t have to be a minefield. Through blocking or a more secure IM solution, your network can be protected from the likes of Geezo and Sohana. — GetMoreOnline Doug Barney is the editor in chief of Redmond and the VP, editorial director of Redmond Media Group. Reach him at [email protected]. | Redmondmag.com | Redmond | May 2007 | 47 Project1 4/9/07 4:11 PM UB_Firewall_Redmond.ai Page 1 4/6/07 11:37:57 AM ™ Open door policy? Does Your Backup Software Create a Big Hole in Your Firewall? With UltraBac Software’s advanced backup technology this issue is practically eliminated. Previously there wasn’t a way to securely back up your network through a firewall without excessive risk, or having to place your entire backup infrastructure in the DMZ. The new version of UltraBac will allow you to quickly and easily back up your servers and workstations without having to compromise security by opening many ports in your system. This innovative solution allows you great flexibility by uniquely regulating exactly which ports are used for communication. A one way connection is initiated from inside your firewall so that the outside communications are initiated using a defined range. This means that networks remain more secure by eliminating unnecessary port usage, and you can easily configure your firewall for this defined range to include only your expected backup clients. If you need to better lock down your environment then you need UltraBac’s backup and disaster recovery protection. Your organization’s data is an extremely valuable asset. Keep your data safe and secure inside your firewall, no open door policy allowed. B AC K U P A N D D I S A S T E R R E C OV E RY S O F T WA R E F O R P E O P LE W H O M E A N B U S I N E S S WWW.ULTRABAC.COM © 2007 UltraBac Software. All rights reserved. UltraBac Software, UltraBac, UltraBac Software logo, UBDR Gold, UBDR Pro, and Backup and Disaster Recovery Software for People Who Mean Business are trademarks of UltraBac Software. Other product names mentioned herein may be trademarked and are property of their respective companies. 0507red_F2Exchange49-55.v8 4/17/07 2:24 PM Page 49 Laying the Groundwork: Exchange Server 2007 Moving to Exchange Server 2007 is a complex process with stringent requirements. Make sure you have the tools and infrastructure in place before you begin. By J. Peter Bruzzese T The Leaning Tower of Pisa, although built to stand up straight, began leaning to one side shortly after construction began in 1173. A poorly laid foundation and loose substrate caused the foundation to shift and sink. That’s proof positive that a firm foundation is the key to any structure—be it a monument or a messaging infrastructure like Exchange Sever 2007 (Exchange 2007). A solid foundation is more critical than ever with Exchange 2007, as there is no in-place server upgrade path from an existing Exchange server to the new version. You have to install Exchange 2007 fresh, and there are only three possible paths: • You can create a new Exchange environment for a new company or one without an existing messaging infrastructure. • If you have an existing Exchange environment, you can transition by installing Exchange 2007 servers, co-existing briefly and then phasing out the previous versions. • You could also install Exchange 2007 in a new organization, migrate all your mailboxes over to 2007 and then remove your old Exchange servers. There’s a good reason for the lack of an upgrade path. Basically, Exchange 2007 requires an x64 architecturebased system with an Intel processor that supports Intel Extended Memory 64 Technology (Intel EM64T) or an AMD processor that supports the AMD64 platform. Because earlier versions of Exchange didn’t support x64 architecture, there are no systems from which you can upgrade. | Redmondmag.com | Redmond | May 2007 | 49 0507red_F2Exchange49-55.v8 4/17/07 2:24 PM Page 50 Exchange Server 2007 It’s important to note that the Intel Itanium (IA64) processor will not work with Windows 2003 x64 Editions. Thus, it won’t work for Exchange 2007 deployments. Let’s look at the system and network requirements you’ll need to meet in order to successfully install Exchange 2007. Essential Elements Besides needing a 64-bit processor, Exchange 2007 also requires 2GB of RAM per server, a minimum of 1.2GB of hard disk space (on the drive you install Exchange Server Figure 1. The Best Practices Analyzer Tool helps ensure you have the optimal configuration. 2007), 500MB per language pack and disk partitions formatted as NTFS. Depending on the number of mailboxes and the amount of data you grant each person, you should build out your drive space. You can find more information regarding processor and memory requirements on Microsoft’s Web site. There are also software requirements for any server upon which you wish to install Exchange 2007. Your servers will have to be running Microsoft Windows Server 2003 x64 or Windows Server 2003 R2 x64 (Standard or Enterprise Edition), as well as .NET Framework Version 2.0, Microsoft Management Console (MMC) 3.0 and Windows PowerShell. Your system will also need Active Directory for all server roles, except Edge Transport Server. You’ll need Active Directory Application Mode (ADAM) Service Pack 1 (SP1) if you want to run your server as an Edge Transport. As with moving to Vista, upgrades to accommodate Exchange 2007 may be unavoidable. “Upgrade your key infrastructure server hardware to 64-bit, as well as your Exchange Server hardware. At least consider migrating DCs, especially in a large environment,” says Adam Field, a senior technologist at Content Master (www.contentmaster.com) who has 10 years of Exchange expertise. “Take some time to learn Windows PowerShell—you’ll need it,” he says. “PowerShell represents an entirely new way to manage key functions in your Exchange environment and practice makes perfect.” 50 | May 2007 | Redmond | Redmondmag.com | Take some time to learn Windows PowerShell—you’ll need it. PowerShell represents an entirely new way to manage key functions in your Exchange environment and practice makes perfect. Adam Field, Senior Technologist, Content Master Group Ltd. In terms of preparing AD for the move to Exchange 2007, the Schema Master has to have Microsoft Windows Server 2003 SP1 or Windows Server 2003 R2 installed. You’ll also need at least one domain controller in each AD site that contains Exchange 2007 running Windows Server 2003 SP1. The AD domain functional level must be Windows 2000 Server-native or higher for all domains in the AD forest where you’ll be installing Exchange 2007. You might be wondering if you’ll have to prepare the schema and AD before installing Exchange, as you did in previous versions. Well, that depends. Exchange 2007 has several different preparation switches you can run with the setup.com, including the following: • /preparelegacyexchangepermissions (to grant Exchange permissions where necessary); • /prepareschema (to update the schema for Exchange 2007); • /prepareAD (to configure global Exchange objects in AD). Figure 2. The Exchange Management Console is split into console (left), result (top), work (bottom) and action (right) panes. Besides preparing your AD, you’ll need to prepare the domains into which you plan on installing Exchange 2007. Use the /preparedomain and/or /preparealldomains command (which will provide permissions on the domain container for your Exchange servers, permission for Exchange Organization Administrators and a list of other necessary configuration and 0507red_F2Exchange49-55.v8 4/17/07 2:24 PM Page 51 permission changes) to prepare your domains for Exchange 2007. You don’t have to run these switches manually. They will run automatically when you install your first Exchange 2007 server in your organization. However, depending on the size of your organization, you may decide to prepare AD in advance. You may wonder how you would do this if your current network only uses 32-bit 2003 servers, since Exchange 2007 has a 64-bit requirement. However, you can use the 32-bit trial version of Exchange 2007 to begin deployment preparations throughout AD, and in your domains. Top 5 Tips for Exchange Server 2007 Planning Henrik Walther is an Exchange MVP, technical writer, messaging specialist at Interprise Consulting and author of the book “How to Cheat at Configuring Exchange Server 2007” by Syngress Publishing. He recently gave Redmond his top five deployment tips: Run an Exchange Server 2007 readiness check using the Exchange Best Practice Analyzer (ExBPA) tool. The ExBPA report will give you a clear picture of what you’ll need to change in your environment before you begin the transition process to Exchange Server 2007 (Exchange 2007). Use ExBPA version 2.7 so you can take advantage of the Exchange 2007 Readiness Check feature. To move over to Exchange 2007, your legacy Exchange organization must be running in native mode. In order to be able to switch the organization to native mode, any Exchange 5.5 Servers (and earlier) must be properly decommissioned and removed from the Exchange organization before you can deploy Exchange 2007. Make sure that the schema master Domain Controller in your Active Directory is running Windows Server 2003 with at least Service Pack 1 (SP1). This is also true for any Global Catalog servers (in each AD site) in which you plan on deploying Exchange 2007. Unlike Exchange 2003 and 2000, Exchange 2007 doesn’t use routing groups. Instead, it takes advantage of the existing AD site topology and the underlying net- 1 2 3 4 It’s a good idea to test the health of your Exchange environment with the Exchange Best Practice Analyzer Tool (ExBPA version 2.7), which was developed by the Microsoft Exchange Team. You’ll find it at www.exbpa.com (you’ll be re-routed to a Microsoft site that presents Microsoft Exchange Analyzers—once there, simply select ExBPA 2.7). The tool has a new feature called the Exchange 2007 Readiness Check. You can use this to scan your existing topology to ensure readiness. You can also perform a deep analysis of each Exchange 2000/2003 server to verify that it has all the necessary updates and configuration for an Exchange 2007 deployment. work to transport messages between Hub Transport Exchange 2007 servers. This means you should plan your AD site topology wisely, before transitioning to Exchange 2007. It also means you should suppress link state updates, as there’s a chance routing loops may occur when they’re enabled. If you only plan on creating one routing group connector between the legacy routing group and Exchange 2007, you won’t have to suppress the link state updates. Always deploy the Exchange 2007 Client Access server role first. Exchange 2003 and 2000 front-end servers don’t support proxy clients for Exchange 2007 Mailbox servers. Also, keep in mind that Exchange 2007 doesn’t support public folder access via the Outlook Web Access (OWA) 2007 interface. In fact, you won’t be able to access a public folder database stored on an Exchange 2007 Mailbox server. So if your end users require public folder access via a browser, keep an Exchange 2003 or 2000 server in the organization. Public folder access via the OWA 2007 interface will be included in Exchange 2007 SP1. Speaking of Outlook, many are wondering whether or not you can install Outlook 2007 on the same system running Exchange 2007. “With previous versions of Exchange, this was not possible due to an incompatibility with the Outlook MAPI binaries, and the versions that shipped with Exchange,” says Stephen Griffin, creator of MAPIEditor. “Microsoft Exchange Server 2007 no longer ships with the client-side binaries. Now [you can] install Outlook 2007 on the same server upon which you’ve installed Exchange 2007.” —J.P.B. 5 | Redmondmag.com | Redmond | May 2007 | 51 AMDAd_may07.final 4/17/07 10:29 AM Page 1 8 Reasons to Move to ® Microsoft Exchange Server 2007 on AMD EFFICIENCY X 64 POWER That is what you need in the datacenter. With Exchange now running on 64-bit servers, efficiency is what you’ll get, especially from AMD64 technology. The AMD OpteronTM processor is designed to enable 64-bit computing while remaining compatible with the vast x86 software infrastructure, and allows you to migrate seamlessly to 64-bit computing and multi-core technology. This means you can have access to improved system efficiency and application performance for both multi-tasking and multithreaded applications without changing the processor footprint. That is efficiency. As a native 64-bit application, Exchange Server 2007 provides higher performance because it breaks 32-bit memory and I/O barriers, increasing the capability of each server running Exchange. The Direct Connect Architecture of AMD OpteronTM processors, with HyperTransportTM technology and integrated memory controller, reduces traditional bottlenecks inherent in legacy frontside bus architectures, offering high-throughput responsiveness and scalability for your applications. That is power! CONFIDENCE Exchange’s new local and cluster continuous replication models for high availability of the mailbox data store also provide support for backups without impacting production environments. With normal server configurations now able to contain up to 1,000 mailboxes per processor core, this is an important feature. You can deploy AMD64 technology with confidence, knowing that AMD provides solutions that are compatible, reliable, stable, and supported by a world-class ecosystem. This level of confidence puts you in the driver’s seat. Configure your next AMD Exchange server at: www.dell.com/exchange About the authors Danielle Ruest and Nelson Ruest (MCSE, MCT, MVP) are multiple book authors focusing on systems design, administration, and management. They run a consulting company that concentrates on IT infrastructure architecture, change and configuration management. You can reach them at [email protected]. www.reso-net.com HIGH PERFORMANCE Exchange 2007 running on AMD OpteronTM processors provides great performance. Exchange Server 2007 enables new levels of operational efficiency through capabilities that optimize hardware and networking investments and features that help make administrators more productive. The AMD OpteronTM processor delivers stable, long-term solutions with exceptional performance and performanceper-watt that can help enhance your company's productivity. Now, that is performance! AMDAd_may07.final 4/17/07 10:30 AM Page 2 Exchange Server, Microsoft’s flagship e-mail management system, is undergoing a major facelift in version 2007. For the first time, Exchange will offer a platform for unified messaging, expanded access mechanisms, message control and hosted messaging service, that provides a secure, one-stop communications tool. Since email is now the mission critical application, organizations will be looking to a rapid migration to this powerful new version. But, Exchange 2007 now runs exclusively on x64 hardware giving it access to the performance gains 64-bit processing provides. As an IT professional, you need to look now at how you’ll make the migration, especially if you are currently running only 32-bit systems. Better yet, we think it is time to consider changing your server processor infrastructure. Here are eight reasons why you should consider moving to Exchange 2007 and 64-bit computing on AMD processors. We think they provide a compelling picture for changing the server infrastructure in your organization as you move to Exchange 2007. A RCHITECTURE Exchange 2007 now includes new server roles designed to drive deployment efficiency. Each role is responsive to the number of processors or processor cores the server includes. The AMD OpteronTM processor with Direct Connect Architecture provides the foundation for balanced, scalable servers that are easy to manage and operate in today’s thermally and electrically limited datacenters. The AMD64 common core architecture allows you to minimize the cost of transition and maximize past investments in hardware, software, and personnel. N IMBLE Email system usage grows with time; every administrator knows this. The AMD OpteronTM processor with Direct Connect Architecture enables you to easily transition to multi-core technology at your desired pace without sacrificing current performance and investments, and will provide an easy upgrade path to Quad-Core AMD Opteron processors in 2007. That’s nimble! G UARD Email security is the most important aspect of any Exchange architecture and Exchange 2007 is no slouch in this regard. The new Edge Transport server role provides a host of anti-spam and data protection features. AMD OpteronTM processors include Enhanced Virus Protection* (EVP), which can help protect against viruses, worms and malicious attacks, and improve the integrity of office networks. Are you ready to guard your email? E VALUATE Evaluate your options now! AMD Opteron processor-based systems offer great value. These systems are found in many Dell servers including PowerEdge 2970 and PowerEdge 6950. Both Dell servers offer leading performance/watt, and are designed to reduce complexity and simplify operations. Whether you’re planning your Exchange 2007 deployment or just buying new servers, find out which AMD Opteron processor-based Dell server is right for you. Are you ready for action? Then move to AMD on Dell. ©2006 Advanced Micro Devices, Inc. All rights reserved. AMD, the AMD Arrow logo, AMD Opteron, and combinations thereof are trademarks of Advanced Micro Devices, Inc. HyperTransport is a licensed trademark of the HyperTransport Technology Consortium. Microsoft and Windows are registered trademarks of Microsoft Corporation in the U.S. and/or other jurisdictions. Other names are for informational purposes only and may be trademarks of their respective owners. * Enhanced Virus Protection (EVP) is only enabled by certain operating systems, including the current versions of the Microsoft® Windows®, Linux®, Solaris, and BSD Unix operating systems. After properly installing the appropriate operating system release, users must enable the protection of their applications and associated files from buffer overrun attacks. Consult your OS documentation for information on enabling EVP. Contact your application software vendor for information regarding use of the application in conjunction with EVP. AMD strongly recommends that users continue to include third-party antivirus software as part of their security strategy. Trademark Attribution: AMD, the AMD Arrow logo, AMD Athlon, AMD Opteron, AMD Turion, AMD Sempron. AMD Geode, and combinations thereof are trademarks of Advanced Micro Devices, Inc. in the United States and/or other jurisdictions. Other names used in this presentation are for identification purposes only and may be trademarks of their respective owners. Windows Vista is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other countries. ©2006 Advanced Micro Devices, Inc. All rights reserved. 0507red_F2Exchange49-55.v8 4/17/07 2:24 PM Page 54 Exchange Server 2007 • Edge Transport (ET): This type of server is placed on the edge of your network as a standalone server. It’s not part of the AD domain, so it has to use ADAM and EdgeSync to handle recipient lookups and spam filtering. This role handles all incoming and outgoing Exchange mail. You can also use the ET server to perform anti-virus and antispam protection, and lock down your messaging security by applying ET rules that examine messages based on your criteria. Keep in mind that while you can combine other roles on a single system, the ET role must reside alone. Figure 3. The Troubleshooting Assistant lets you choose from a list of symptoms, then helps you determine the problem. Experts agree testing with this tool will help. “Administrators planning on migrating to Exchange 2007 should reference Microsoft’s best practices for Exchange 2007,” says Dave Goldman, Exchange escalation engineer and author of the Offline Address Book Integrity (OABInteg). “I would also suggest becoming very familiar with the Exchange Best Practice Analyzer Tool. With any planning, administrators should set up a sandbox for testing to ensure that when they’re ready to set up in production, they can avoid any unnecessary downtime.” Exchange Server Roles When deploying Exchange, it’s good to note that the setup process lets you choose the server role for your messaging environment. There are five different server roles from which to choose, each one designed to perform a specific function. The roles include the following: With any planning, administrators should set up a sandbox for testing to ensure that when they’re ready to set up in production, they can avoid any unnecessary downtime. Dave Goldman, Exchange Escalation Engineer, Microsoft • Hub Transport (HT): This role handles internal mail flow and routing, similar to a Bridgehead server in previous Exchange environments. When installed in an environment with an ET server, the HT server will work with it hand-in-hand. Messages coming in through the ET server will be passed to the HT and vice-versa. However, you can configure the HT role to perform most of the same features as the ET server. If you don’t need the added protection of an ET server, install the HT on a member server connected to your domain, so it doesn’t require ADAM and can still send/receive mail from the Internet. Part of your planning should include deciding whether or not you want an ET server and how you’ll configure your HT server. • Mailbox: This hosts both mailbox and public folder databases and provides calendar access and messaging-records management. You’ll have to specifically enable the public folders, as they’re not enabled by default in Exchange 2007. Figure 4. You can configure the alias, server and SMTP address of your e-mail list members. • Client Access (CA): This role is similar to the frontend server for an Exchange 2000/2003 infrastructure. Users connect to this server from their mail clients (e-mail clients that support MAPI, POP3 or IMAP4, mobile devices that use at least Windows Mobile 5.0, and/or a Web browser). 54 | May 2007 | Redmond | Redmondmag.com | Figure 5. Outlook Web Access now behaves much more like Outlook in native mode. 0507red_F2Exchange49-55.v8 4/17/07 2:24 PM Page 55 • Unified Messaging (UM): This merges VOIP with your Exchange mailbox. This means you’ll be able to access your voicemail, fax and e-mail from one location, using Figure 6. You can configure the security settings of an Exchange 2007 server in Edge Transport mode. multiple access interfaces (phone, e-mail or Web browser). For this to work properly, you’ll need an IP-PBX or VOIP gateway (if you have a legacy PBX). If you plan on using UM with Exchange 2007, you should seek out the assistance of a UM specialist. Properly configuring this role requires a significant amount of knowledge of PBXs and Exchange 2007. Migration Plan There’s quite a difference between installing Exchange into a new environment and transitioning or migrating from an existing Exchange organization. Every organization will be different, so there’s no single right way. It’s important to begin your transition by using the ExBPA tool with the Readiness Check as mentioned earlier, to ensure that you’re fully prepared. If you plan on transitioning, your first task is to install the Client Access Server role. Install this in each site that will contain a mailbox server. The next step is to install and configure your ET servers (if you plan on using them). Then set up an HT server (which can work with Exchange 2000/2003 bridgehead servers). You’ll need these to work with your Mailbox and UM servers. Figure 7. The meeting scheduler lets you check on the availability of all participants. Next, deploy your Mailbox servers. Then you can start to move mailboxes over using either the Move-Mailbox cmdlet or the Move Mailbox Wizard. Once you’ve finished moving all your mailboxes and other necessary resources (like public and system folders), you’ll be ready to decommission your Exchange 2000/2003 servers. Figure 8. You can also share calendars through Outlook Web Access. Keep in mind that both Exchange Server 2000 and 2003 support features that are no longer supported in 2007. If you plan on using those features, you’ll need to keep at least one Exchange 2000 server running. Exchange 5.5 isn’t supported at Learn more about upgrade all for transitioning requirements and best practices for purposes. To an Exchange 2007 migration at Redmondmag.com. migrate from 5.5, you’ll first have to FindIT code: Exchange0507 transition to Exchange 2000 or 2003 and then move towards 2007. GetMoreOnline To Read or Not To Read: There’s No Question Exchange 2007 will require a lot of preparation and reading. The good news is that there are plenty of sites already posting articles about how to plan, configure and troubleshoot your Exchange 2007 world. It would be wise to take advantage of all this free advice. Having a proper foundation and proper preparation are essential. Engineers in Italy recently propped up the Leaning Tower of Pisa to keep it from toppling to the ground. They say it will stand for another 300 years thanks to the efforts of the impressive technology that pulled it back to a safer position. That just goes to show you that besides properly laying the groundwork, you’ll need to be prepared for disaster recovery as well—but that’s a topic for another day. J. Peter Bruzzese ([email protected]), MCSE 2003/2000/NT, is a private training consultant and technical author. He just released his latest book, “Tricks of the Vista Masters.” He is the lead developer for cliptraining.com, which provides educational clips to teach users about Vista and Office 2007. | Redmondmag.com | Redmond | May 2007 | 55 3_07_Redmond_Dorian_WTB.ai 133.00 lpi 15.00° 1/31/2007 45.00° 0.00° 75.00° 1/31/2007 Yellow Process Black 12:20:16 12:20:16PM PM Cyan 10:44 Process AM Magenta Process Project2 Process 2/9/07 Page 1 57 0507red_WinInsider57.v7 4/17/07 11:36 AM Page 57 WindowsInsider by Greg Shields Isolation Automation Exploration: Part I E ntire books have been written on network security and IPSec. Full of three-letter acronyms for encryption technologies and concepts like “data integrity” versus “data authorization,” network security can make your head swim. Before Windows Vista, setting up IPSec for system-to-system authentication was complex, sometimes requiring hundreds of filters to secure traffic between domain controllers while at the same time not inhibiting log-ons for older operating systems. When a non-IPSec-aware client tried to connect to an IPSec-enabled server, it often resulted in no connection at all. Thankfully, with Windows Vista’s improvements to IPSec, it all gets a lot easier. It’s now possible to create isolation groups that mandate machine-tomachine authentication between sets of computers on your network. Additional Authentication So what’s an isolation group? It’s a way of using network rules to further protect potentially open spots on your network. Let’s say an administrator accidentally shares a sensitive folder on your file server with Full Control permissions to the Everyone group. Suddenly, all that sensitive data is immediately exposed to anyone. If the data is on a human resources or other highly sensitive server, you’re really in trouble. Isolation domains leverage IPSec to ensure that any machine attempting to connect to that share must authenticate via Kerberos before it can transfer data. Think of an isolation domain as an extra access control list (ACL)—like NTFS and share permissions—but way down at the net- work level. This extra computer-based ACL ensures that only the correct machines get access to sensitive data and can only transfer that data securely. Here’s how it works. When you log in to a computer, your user account goes through a Kerberos authentication process that ensures you are who you say you are. Adding in an isolation group with IPSec means that any time your computer tries to access another computer, the computer itself goes through an additional authentication. If your computer successfully authenticates, then you can access the data. This other computers. This group can be for all machines in the Active Directory Kerberos boundary, or can be an identified list of machines by IP address. Authentication can occur for either inbound or outbound traffic, or both. • Authentication Exemption: This will create a group of machines exempt from any authentication requirements. • Server to Server: This will create an authenticated connection between two specific groups of computers. Think of this as the “one-to-one” connection where the Isolation group would be the “many-to-many” connection. • Tunnel: Like Server to Server, but usually used for bridging traffic across the Internet, this will create an authenticated connection between two computers utilizing an Internet-facing gateway server. • Custom Connection: A connection that can be created using a combination of the four different rules. So what’s an isolation group? It’s a way of using network rules to further protect potentially open spots on your network. assumes of course that you then have the correct share and NTFS rights. If your computer can’t authenticate, the server either rejects the request or allows a fallback to clear text communication. All this was possible in Windows 2003, but IPSec was notoriously difficult to set up. In Windows Vista, IPSec configuration has been merged with the Windows Firewall and is now called Windows Firewall with Advanced Security. In setting up an isolation group, four types of canned rules are available or a custom rule can be created: • Isolation: This will create a group of machines that are isolated from Next month I’ll give step-by-step instructions for setting up an isolation group on your network and go over some other tips on how to protect your network from the inside out. Greg Shields ([email protected]), MCSE: Security, CCEA, is a principal consultant for 3t Systems (www.3tsystems.com) in Denver, Colo. A contributing editor to Redmond magazine and a popular speaker at TechMentor events, Greg is also the resident editor for Realtime Publishers’ Windows Server Community, www.realtimewindowsserver.com, providing daily commentary and expert advice for readers. | Redmondmag.com | Redmond | May 2007 | 57 Project1 4/10/07 10:01 AM Page 1 59 0507red_SecAdvisor59-60.v8 4/17/07 10:58 AM Page 59 SecurityAdvisor by Joern Wettern Patch It Up A pplying security patches to your desktops is The New WSUS necessary, but it’s often tedious and annoying. Microsoft is putting the finishing touches on version 3.0 of its WSUS. After some practice with the first two versions—which didn’t win any prizes for features or usability—Microsoft seems to be getting it right this time. Like the previous versions, WSUS 3.0 lets you set up either a simple patch management system for a smaller office or a hierarchical structure for a larger organization with multiple offices. You can choose which updates are installed on which computers and whether or not this should happen automatically or only after you’ve reviewed and approved the updates. You can use Group Policy to easily configure the update mechanism. This is especially true for administrators responsible for small- to medium-sized networks. Fortunately, there are some tools to help you out. Patching has come a long way since the days of Windows NT. Back then, it meant installing a Service Pack to Windows when you could find the time. Microsoft’s quality control wasn’t up to snuff on some of those service packs. After a few bad experiences, some IT professionals even decided to skip the odd-numbered service packs. Today, anyone who is responsible for securing a network knows that taking such a leisurely attitude can spell disaster. They need to install new hot fixes as soon as they’re available. The days following Patch Tuesday—the second Tuesday of every month when Microsoft releases most fixes for its products—tend to be the busiest in IT shops everywhere. By now, most organizations have adopted some type of patch management strategy. Larger organizations often have full-time staff tasked with rolling out updates and administering management software like Systems Management Server. At the same time, many smaller and medium-sized organizations struggle with finding the right solution. Luckily, there are some solutions available that can help you keep your systems up-todate without breaking the bank. Let’s look at the new version of Microsoft’s Windows Server Update Service (WSUS) and Shavlik Technologies LLC’s HfNetChkPro. Before using any patching solution, I evaluate it by several criteria. First and foremost, it has to quickly make newly released updates from Microsoft (and preferably other vendors) available to client computers. It must also reliably detect which updates are needed and which ones are not. After all, you don’t want your patch management solution to apply the wrong updates or roll back previous system states. Figure 1. Besides new reporting and management features, WSUS also sports a new interface that makes this tool easier to use. Most of the solutions available today generally meet these requirements. Where they differ is in usability, manageability, reporting and how much granular control they offer. A good patch management solution lets you control which updates can be applied and creates easy-to-use reports to let you know which updates have been successfully deployed so you can troubleshoot any problems. The biggest addition to version 3.0 is vastly improved reporting, which now uses the Microsoft Report Viewer (see Figure 1). These reports are useful for finding information about specific patches. You can also use the reports to assess how well your patch deployment is working. The administration tools for WSUS have also been completely revamped, making WSUS 3.0 a mature patch management product. | Redmondmag.com | Redmond | May 2007 | 59 0507red_SecAdvisor59-60.v8 4/17/07 10:58 AM Page 60 SecurityAdvisor One of the most appealing features of WSUS is its price. It’s free—sort of. It runs under Windows Server, so you’ll need to be running that. All but the smallest organizations typically run this on a dedicated server, so you’ll have to budget for the hardware and the operating system license. Patch Possibilities Many companies will indeed be happy with Microsoft’s tool, but there are good reasons to consider the other alternatives. Foremost among those reasons is that someone other than Microsoft will double-check the updates. Some other advantages to using thirdparty patch management tools are that they include patches for non-Microsoft products, they review any patch classifications and they add additional quality control tests for updates. Many patch management vendors also have mechanisms with which to recall problematic patches more quickly than WSUS. HfNetChkPro (short for Hotfix Network Check and pronounced H-FNetcheck Pro) from Shavlik is one of my preferred tools because of Shavlik’s quality control and support for some non-Microsoft software, such as Adobe Acrobat and Firefox. For example, HfNetChkPro found that one of my servers was missing 17 patches. WSUS showed that it was completely up-to-date. The reason for the discrepancy wasn’t a flaw in WSUS, but rather Shavlik’s decision to scan for more items, including fixes for isolated problems. Unlike WSUS, HfNetChkPro can run without agent software on the client computers. WSUS depends on the client computers to check in with the update server at regular intervals, download updates and install them. HfNetChkPro can work the same way, but you can also have it actively connect to computers, check their status and push out updates, instead of depending on them to check in with the server. This gives you real-time control over the patch process. You also can configure HfNetChkPro to work in an entirely hands-off manner. Whether you use WSUS, HfNetChkPro or another solution, the good news is that patch management tools have matured. There are excellent tools available to ensure that your computers are up-to-date without requiring you to go to each of them with a CD full of updates.This means there’s no excuse for having any computers in your network that aren’t up-to-date with any and all applicable security patches. — Joern Wettern ([email protected]), Ph.D., MCSE, MCT, Security+, is the owner of Wettern Network Solutions, a consulting and training firm. He has written books and developed training courses on a number of networking and security topics, in addition to regularly teaching seminars and speaking at conferences worldwide. Project3 4/16/07 1:29 PM Page 1 May 20-22, 2007 I Westin Mission Hills Resort, Rancho Mirage Build a Solid Foundation for the Agile Enterprise Enterprise Architecture Summit returns with more in-depth sessions and content designed to deliver the most essential and up-to-date information on best practices and strategic designs in the real world—to assure you that your organization is equipped to respond to the future IT challenges and opportunities. Learn about the latest advances in service-oriented architecture, legacy migration, business process re-engineering, outsourcing, and more from some of the top experts in the field. Event Highlights: Enterprise Architect Classic Golf Tournament I Walt Disney Studios on Meeting the Strategic Challenges of EA I The Open Group on the Evolving Role of the EA I IBM Corporation on Realizing Business Agility in SOA I Troux Technologies on Business Intelligence for IT I Burton Group on SOA: Evolving the Development Environment I And much more…. Score a Hole-in-One—Win a Porsche! Register today for Enterprise Architect Summit and you could be eligible to play in the Enterprise Architect Classic Golf Tournament. Network with your peers as you play the renowned Pete Dye eighteen-hole course. See Web site for full details. Secure your spot at this exclusive event today! Past sponsors and exhibitors include: Microsoft Sun BEA Metallect Compuware DataDirect Sonic Systems Sparx Systems Actional Above All Software Fiorano Troux Technologies Herzum Software Infravio Blue Titan Software Netegrit Westin Mission Hills Resort & Spa, Rancho Mirage, California Platinum Sponsor Call 1-800-280-6218 today or visit us online at www.enterprise-architect.net/summit Project3 4/16/07 3:40 PM Page 1 New York September 16-19, 2007 New York Marriott at the Brooklyn Bridge Bridge the Gap between Today’s Knowledge and Tomorrow’s Toolset at VSLive! New York Join us as VSLive! returns to the New York Marriott 63 at the Brooklyn Bridge, September 16-19, 2007. Over four action-packed days, VSLive! New York will provide a depth of resources and perspectives to help you be productive now and prepare for the near future. Attend SQL, .NET 3.0, and ASP sessions featuring practical techniques for writing software with today’s tools. From ASP.NET AJAX and data binding, to VB, C# and the .NET Framework, we have you covered. Our speakers have years of experience mastering the tools you need to get your job done. Learn cutting-edge techniques for today and tomorrow in sessions on VSTS, SharePoint 2007, Atlas, .NET 3.0 technologies including Windows Presentation Foundation (WPF), Windows Communication Foundation (WCF), and Windows Workflow Foundation (WF), and much more. VSLive!—The Best Independent Microsoft Conference Around Choose VSLive! for: • Top Speakers and Educators • Total Coverage of New and Existing Technologies • In-depth Workshops • Networking Opportunities • Great Locations • Membership to the Virtual VSLive! Online Community More talent, information, learning and networking under one roof at one time for the best value! » Register by the Super Early Bird Deadline of July 11, 2007 and save $300! Visit www.vslive.com/newyork for more details. • 1-800-280-6218 – www.redmondevents.com Sponsored & Presented by 0507red_Index_63.v1 4/17/07 1:28 PM Page 63 AdvertisingSales RedmondResources AD INDEX Matt Morollo VP, Publishing 508-532-1418 tel 508-875-6622 fax [email protected] West/MidWest East Advertiser Page URL Acronis, Inc. C3 www.acronis.com AppDev Training 20 www.appdev.com AMD 52,53 www.amd.com www.avepoint.com 16 www.avepoint.com Beyondtrust Brocade Communications Systems 35 C2 www.beyondtrust.com www.brocade.com CNS Software 39 www.cns-software.com Digiscope 11 www.lucid8.com Diskeeper Corporation 6 www.diskeeper.com Dorian Software Enterprise Architect Summit 56 61 www.doriansoft.com www.enterprisearchitect.net/summit ESET LLC 5 www.eset.com GOexchange 19 www.goexchange.com ipMonitor Corporation 22 www.ipMonitor.com iTripoli Inc. 15 www.itripoli.com www.netikus.com Dan LaBianca JD Holzgrefe Netikus 13 Director of Advertising, West 818-674-3417 tel 818-734-1528 fax [email protected] Director of Advertising, East 804-752-7800 tel 253-595-1976 fax [email protected] NetSupport Software 40 www.netsupport-inc.com NORTHERN Parklife, Inc. 39 www.northernlife.com Raxco Software 31 www.raxco.com Sanbolic, Inc. 29 www.sanbolic.com SAPIEN Technologies, Inc. 26 www.sapien.com IT CERTIFICATION & TRAINING: USA, EUROPE Special Operations Software 24 www.specopssoft.com St. Bernard Software C4 www.stbernard.com Western RegionalSales Manager CA, OR, WA 209-473-2202 tel 209-473-2212 fax [email protected] Al Tiano The Training Camp 58 www.trainingcamp.com Advertising Sales Manager 818-734-1520 ext. 190 tel 818-734-1529 fax [email protected] TS Factory 21 www.tsfactory.com UltraBac Software 48 www.ultrabac.om VMWare 3 www.vmware.com Western Governors University 21,60 www.wgu.edu Danna Vedder PRODUCTION Wiley Publishing 37 www.wiley.com VSLive New York 62 www.vslive.com XenSource, Inc. 8 www.xensource.com EDITORIAL INDEX Company Page URL Adobe Systems Inc. 60 www.adobe.com Kelly Ann Mundy Akonix Systems Inc. 46 www.akonix.com Production Coordinator 818-734-1520 ext. 164 tel 818-734-1528 fax [email protected] AOL LLC 45 www.aol.com AVIcode Inc. 12 www.avicode.com Blue Coat Systems 46 www.bluecoat.com Centeris Corp. 27 www.centeris.com Centrify Corp. 27 www.centrify.com Citrix Systems Inc. 41 www.citrix.com SALES Bruce Halldorson Microsoft Account Manager 253-514-8015 tel 775-514-0350 fax [email protected] Tanya Egenolf Advertising Sales Associate 760-722-5494 tel 760-722-5495 fax [email protected] CORPORATE ADDRESS 1105 Media, Inc. 9121 Oakdale Ave. Ste 101 Chatsworth, CA 91311 www.1105media.com MEDIA KITS: Direct your Media Kit requests to Matt Morollo, VP, Publishing, 508-532-1418 (phone), 508-875-6622 (fax), [email protected] REPRINTS: For all editorial and advertising reprints of 100 copies or more, and digital (web-based) reprints, contact PARS International, Phone (212) 221-9595, e-mail: [email protected], web: www.magreprints.com/QuickQuote.asp LIST RENTAL: To rent this publication’s email or postal mailing list, please contact our list manager Merit Direct: Jeff Moriarty 333 Westchester Ave., South Building White Plains, NY 10604 [email protected] (518) 608-5066 Redmond (ISSN 1553-7560) is published monthly by 1105 Media, Inc., 9121 Oakdale Avenue, Ste. 101, Chatsworth, CA 91311. Periodicals postage paid at Chatsworth, CA 91311-9998, and at additional mailing offices. Complimentary subscriptions are sent to qualifying subscribers. Annual subscription rates for non-qualified subscribers are: U.S. $39.95 (U.S. funds); Mary Ann Paniccia VP, Print & Online Production Julie Lombardi Production Manager Canada/Mexico $54.95; outside North America $64.95. Subscription inquiries, back issue requests, and address changes: Mail to: Redmond, P.O. Box 2063, Skokie, IL 60076-9699, email [email protected] or call (866) 2933194 for U.S. & Canada; (847) 763-9560 for International, fax (847) 763-9564. POSTMASTER: Send address changes to Redmond, P.O. Box 2063, Skokie, IL 60076-9699. Canada Publications Mail Agreement No: 40039410. Return Undeliverable Canadian Addresses to Circulation Dept. or DHL Global Mail, 7496 Bath Rd Unit 2, Mississauga, ON, L4T 1L2. © Copyright 2007 by 1105 Media, Inc. All rights reserved. Printed in the U.S.A. Reproductions in whole or part prohibited except by written permission. Mail requests to “Permissions Editor,” c/o REDMOND, 16261 Laguna Canyon Road, Ste. 130, Irvine, CA 92618. The information in this magazine has not undergone any formal testing by 1105 Media, Inc. and is distributed without any warranty expressed or implied. Implementation or use of any information contained herein is the reader’s sole responsibility. While the information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments. Technical inaccuracies may result from printing errors and/or new developments in the industry. eBay Inc. 64 www.ebay.com FaceTime Communications 46 www.facetime.com Google 64 www.google.com IBM Corp. 45 www.ibm.com Jabber Inc. 45 www.jabber.org Lucid8 12 www.lucid8.com MessageLabs Ltd. 46 www.messagelabs.com NetPro Computing Inc. 12 www.netpro.com Oracle Corp. 30 www.oracle.com Quest Software Inc. 27 www.quest.com Red Hat Inc. 27 www.redhat.com Salesforce.com Inc. 64 www.salesforce.com SAP AG 30 www.sap.com Shavlik Technologies LLC 59 www.shavlik.com St. Bernard Software 17 www.stbernard.com SurfControl plc 46 www.surfcontrol.com Symantec Corp. 46 www.symantec.com Trend Micro Inc. 46 http://us.trendmicro.com Vericept Corp. 46 www.vericept.com VMware Inc. 30, 41 www.vmware.com Webroot Software Inc. 12 www.webroot.com Websense Inc. 45 www.websense.com WiredRed Software 46 www.wiredred.com Yahoo! Inc. 45 www.yahoo.com Zenprise 12 www.zenprise.com This index is provided as a service. The publisher assumes no liability for errors or omissions. | Redmondmag.com | Redmond | May 2007 | 63 0507red_Foley64.v6 4/17/07 11:36 AM Page 64 FoleyOnMicrosoft by Mary Jo Foley Software+Services Madness M icrosoft has been desperately seeking ways to differentiate itself from the rest of the Software as a Service (SaaS) pack. Even though Microsoft is charging full steam ahead into the software services realm, the Microsofties don’t want to be seen as Johnny-come-lately to a world already dominated by Google, eBay and Salesforce.com. That’s where Microsoft’s “Software+ Services” (S+S) strategy comes into play. S+S, according to the Softies, is a superset of SaaS. It’s SaaS done right. There’s only one problem: No one at Microsoft or anyone who watches it seems to be able to succinctly explain S+S. Microsoft tried to get the message out to market researchers and analysts at the end of February, but no one with whom I spoke seemed to understand the subtleties of Redmond’s message. I’m going to give it a whirl. After chatting with Microsoft Director of Platform Strategy Tim O’Brien, I feel ready to try to decipher S+S for the masses. Microsoft’s competitors—like Adobe with Apollo and Salesforce.com with its Salesforce.com Offline Edition client app—are gradually acknowledging that an all-services approach leaves many business customers cold, says O’Brien. They want offline capabilities, even if they’re relying on SaaS applications. For business customers, “network dependency is a nonstarter when it comes to line-of-business applications,” says O’Brien. Consequently, everyone’s trying to figure out how best to move to the middle. O’Brien says Microsoft’s stance is “anyone can get reach.” “The real battle is on the client,” O’Brien posits, and desktop software has always been Microsoft’s strong suit. However, Microsoft is no slouch on the Internet-based services side either, O’Brien says. The company doesn’t get enough credit for its Internet savvy, which it has demonstrated by running highly scalable Hotmail, Xbox Live and other consumer-side services. O’Brien itemizes current and future Microsoft services into three buckets: Foundation services, like Microsoft’s long-rumored LiveDrive cloud-based Services companies like Google and Salesforce.com often underestimate the types of back-end infrastructure that are needed to properly field enterprise-ready software. storage; Attached services, such as disaster recovery, anti-spam and Windows Defender; and Finished services, like Windows Live and Office Live. Services companies like Google and Salesforce.com often underestimate the types of back-end infrastructure that are needed to properly field enterprise-ready software, he explains. What you need in order to do it all, O’Brien says, is “a platform.” That doesn’t mean .NET or some kind of development platform, which is what Microsoft usually means when it uses the “P” word. In the S+S case, “a platform” is synonymous with vision (I think). 64 | May 2007 | Redmond | Redmondmag.com | These are the elements of Microsoft’s S+S platform, according to O’Brien: • Experience: As in the interface. Depending on the access point (whether a PC, browser or mobile device), you get a different look/ feel/interaction. • Delivery vehicle: There are several, including hosted on premise, hosted in the cloud, 100 percent shrink-wrapped software, try-before-you-buy, pay-asyou-go and managed services, like Microsoft’s “Energizer” desktopmanagement offering. • Federation: How do users validate/ authenticate/manage when one vendor doesn’t own all the pieces? The pie-inthe-sky answer is the identity metasystem. S+S will provide some elements of this system (via Microsoft CardSpace, Active Directory and Live ID). • Composition: All of the bits aren’t located in one place in the S+S world. Composite applications and mashups are the new “it” apps. • Monetization: Online ads aren’t the only way to make software services pay for themselves. Subscriptions, pay as you go, traditional shrink-wrap plus maintenance and other to-be-determined mechanisms will also fuel S+S. As usual, Microsoft believes it can be all things to all people. The S+S arena is just another example of that belief. What do you believe? Is Microsoft well-positioned to take on Google, Salesforce.com and other services competitors? Or is Microsoft’s desktop legacy holding the company back from being able to move ahead in the brave new SaaS/S+S world?— Mary Jo Foley ([email protected]) is editor of the new ZDnet “All About Microsoft” blog and has been covering Microsoft for about two decades. Project5 2/12/07 11:14 AM Page 1 Project1 1/16/07 9:56 AM Page 1