Redmond - 1105 Media

Transcription

Redmond - 1105 Media
1006red_Cover.v6
9/15/06
2:10 PM
Page 1
Virtual Server: Good Enough to Topple VMware? 24
OCTOBER 2006
W W W. R E D M O N D M A G . C O M
$5.95
1
25274 867 27
7
OCTOBER
•
10 >
Would you
trust your IT
with This Guy? 32
+
Q&A: Live.com Tell All 11 • SharePoint Diaries 49
Back to Basics with Server Core 41
1006red_Sciptlogic_CoverTip
9/6/06
11:59 AM
Page 1
1006red_Sciptlogic_CoverTip
9/6/06
11:59 AM
Page 2
Project20
9/5/06
4:14 PM
Page 1
Project20
9/5/06
4:14 PM
Page 2
1006red_TOC_1.v3
9/15/06
2:19 PM
Page 2
Redmond
OCTOBER 2006
W W W. R E D M O N D M A G . C O M
Winner for Best
Computer/Software
Magazine 2005
THE INDEPENDENT VOICE OF THE MICROSOFT IT COMMUNITY
REDMOND REPORT
11 RSS Guru Goes Offline
A tell-all Q&A with Niall
Kennedy.
12 Will Microsoft or IBM Have
the License That Kills?
Each company’s licensing plan
figures to play a role in winning
the middleware battle.
12 CIOs in No Rush to Buy Vista
Merill Lynch survey results show
less IT folks intend to upgrade.
COVER STORY
16 Beta Man
IT Gone Bad
Windows PowerShell is almost
Spying, blackmailing and thievery—
are there criminals in your shop?
Page 32
FEATURES
41
Windows Without Windows
The new Server Core is a strippeddown, rock-solid version of Longhorn.
49
Page 60
C:/
ready for prime time.
COLUMNS
6
The SharePoint Diaries
Barney’s Rubble: Doug Barney
Bill for President
Itching to deploy Microsoft’s powerful, new SharePoint server
technology? Better know what you’re getting yourself into first.
31 Mr. Roboto: Don Jones
Intelligent Transfer
60 Never Again: Jim Desmond
SQL Slip Up
PolicyMaker Application
Security lets you apply specific,
application-level privileges.
24 Reader
Review:
Virtual
Server Has
Real Fans
D
ER
DR
EN
IV
19 Keep Power Users
Under Control
RE A
REVIEWS
63 Windows Insider: Greg Shields
Cut the Crap
66 Security Advisor: Joern Wettern
Risky Travels
Redmond
Now that it’s free and has
“official” Linux support, users
find Virtual Server 2005 R2 a
more compelling option.
72 Foley on Microsoft:
Mary Jo Foley
What’s Next for Microsoft’s IE?
ALSO IN THIS ISSUE
4
Redmond Magazine Online
8
[email protected]
71 Ad and Editorial Indexes
Project19
9/5/06
4:00 PM
Page 1
Will today be the
day your data
slips away?
Introducing the EMC® Insignia Solution for Data Protection
for Small and Medium Businesses.
Avoid meltdown with the data protection solution you can trust.
Every IT pro has had that sinking feeling when data goes missing. That’s why EMC Insignia
combined the power of the CLARiiON® AX150 disk array with Retrospect® backup and
recovery software to create the most reliable and easy-to-manage data protection solution
for small and medium businesses.
• Reliably protect your servers, desktops, and notebooks with automated, self-adjusting
operations
• Back up and recover fast with the most respected disk-to-disk-to-tape software solution
in the industry
• Increase productivity with user-initiated restores
• Maximize backup security with government-certified AES encryption
To learn more, visit www.emcinsignia.com.
EMC2, EMC, Retrospect, CLARiiON, and where information lives are registered trademarks of EMC Corporation. All other trademarks
are the property of their respective owners. © Copyright 2006 EMC Corporation. All rights reserved.
1006red_OnlineTOC4.v5
9/15/06
10:33 AM
Page 4
Redmondmag.com
OCTOBER 2006
Redmondmag.com
Top Tips for Better Integration
A
ccording to Emmett Dulaney, Redmondmag.com’s Integration Station
columnist, there’s no reason to do interop the old way anymore.
“The days of using this for a central server and distributed clients has passed,”
he writes. “LDAP has all but replaced it in every sense of the word. If you’re trying
to integrate and make NIS the common language for user authentication, you’re
doing yourself no favors.”
Dulaney also warns against telnet: “At one point in time, telnet could pass for a
definition of integration. Today it’s the poorest excuse for a network service that
one can find.”
Find out why and read the rest of Dulaney’s top 10 tips for integration projects.
FindIT code: ISTopTen
ENTmag.com
Microsoft’s Packed Business
Apps: Ready for Prime Time?
T
hat’s the question ENTMag.com’s Scott Bekker asks in the site’s recent
special report. And the outlook appears promising.
“Microsoft’s latest offerings are beginning to be worth a look, especially
within smaller enterprises,” Bekker writes.
“We are seeing increasingly enterprises, mid-market companies broadly asking about Dynamics and specifically asking about Dynamics AX,” says Tami
Reller, Microsoft corporate vice president, Business Solutions Marketing Group,
during the AX 4.0 launch last month.
Discover what Dynamics and the other products might hold in store for you.
FindIT code: ENTSRB. If you’re a Microsoft Partner, don’t miss RCPmag.com’s
coverage of Dynamics. FindIT code: RCPDynQuest
REDMONDMAG.COM RESOURCES
Resources
Enter FindIT Code
>> Daily News
>> E-Mail Newsletters
>> Free PDFs and Webcasts
>> Subscribe/Renew
>> Your Turn Editor Queries
News
Newsletters
TechLibrary
Subscribe
YourTurn
Questions with ...
Michael
Domingo
Editor Michael Domingo
has put together our
annual salary survey and
the extended PDF version (26 pages, FindIT
code: 2006SalPDF) for
the past three years. Here’s what he
told us about this year’s findings:
What surprised you most about this
year’s results?
It’s amazing that, despite lots of letters
over the past year complaining
about how tough IT admin work is,
this year’s job satisfaction ratings
contradict that attitude.
What factor makes the biggest
difference in IT salaries?
At least for IT folks, it seems the
more years you’re working, salary
increases can be exponential after
about five years.
Can I use your survey to ask for a raise?
Do so at your own risk, and never,
ever make any ultimatums.
FACTOID
74,000
Number of .EU domain
names frozen in registrar
hijacking investigation
Source: MCPmag.com
Sepember Security Watch
column FindIT code: SWEU
REDMOND MEDIA GROUP SITES: Redmondmag.com • RCPmag.com • ENTmag.com
MCPmag.com • CertCities.com • TCPmag.com • TechMentorEvents.com
4 | October 2006 | Redmond | redmondmag.com |
Project1
3/14/06
3:47 PM
Page 1
1006red_Rubble6.v6
9/15/06
3:45 PM
Page 6
Barney’sRubble
Doug Barney
Bill for President
E
very four years pundits, radio talk show hosts and U.S.
citizens beg for a presidential candidate who’s not a
career politician.
And every four years the two major
parties nominate—you guessed it—
career politicians!
No true, non-political alternatives
have the party backing, or, it seems, the
ability to connect and gain our trust. I
guess voters don’t mind career politicians after all.
Donald Trump is too full of himself
(but Letterman would have great material), Ross Perot was too preachy and
weird, and Arnold is too foreign (mean-
ing he legally can’t run; not that I’m
against Austrians).
Here’s a name that could overcome all
these obstacles—Bill Gates. Not the old
Bill Gates spouting technology, wearing
ill-fitting clothes and crushing competitors for sport (though his company is
doing this with relish and third parties
are paying the price). No. I’m talking
about the new Gates of the Bill &
Melinda Gates Foundation.
As far as I can tell, Gates has not
pledged allegiance to either party
(probably the only thing he and I have
in common). In 2004 Gates gave only
$22,500 to candidates with a slight edge
to Democrats. For someone with Gates’
pockets, this is as close to giving nothing as you can get!
I mentioned this idea to my mother
and her eyes opened wide (the way they
did every time my high school assistant
principal called) and she exclaimed
“Wow!” After a few seconds of thought
she said “Wow” again.
Bill has no major skeletons (I’m guessing) and has taken non-political, purely
rational stances on today’s major issues.
Who would you trust to develop a
policy on global warming?
Who is today’s best ambassador to the
third world, to India, to China?
But Bill has no experience in foreign
policy! True, but neither did the governor of Georgia, California, Arkansas
or Texas.
Imagine if our fundamental approach
to the world was based on logical
approaches to curing disease, spreading
opportunity, saving the environment
and teaching children.
A foreign policy flowing from this
river would be rich indeed.
Imagine offering our enemies all of
these benefits.
Would Iran rather have nukes or freedom from disease? Maybe they’ll go for
the A-bombs, but will all regimes react
the same? I doubt it.
And remember, Bill promised to retire
in two years, just in time for his new job
in 2008.
We’ll just have to live with a total gutting of U.S. anti-trust laws!
Who are you going to vote for? Let me
know at [email protected].
6 | October 2006 | Redmond | redmondmag.com |
Redmond
THE INDEPENDENT VOICE OF THE MICROSOFT IT COMMUNITY
REDMONDMAG.COM
OCTOBER 2006 ■ VOL. 12 ■ NO. 10
Editor in Chief Doug Barney
[email protected]
Editor Ed Scannell
[email protected]
Executive Editor, Reviews Lafe Low
[email protected]
Editor at Large Michael Desmond
[email protected]
Managing Editor Wendy Gonchar
[email protected]
Editor, Redmondmag.com Becky Nagel
[email protected]
Contributing Editors Mary Jo Foley
Don Jones
Greg Shields
Joern Wettern
Art Director Brad Zerbel
[email protected]
Senior Graphic Designer Alan Tao
[email protected]
Group Publisher Henry Allain
[email protected]
Editorial Director Doug Barney
[email protected]
Group Associate Publisher Matt N. Morollo
[email protected]
Director of Marketing Michele Imgrund
[email protected]
Senior Web Developer Rita Zurcher
[email protected]
Marketing Programs Videssa Djucich
Manager [email protected]
Editor, ENTmag.com Scott Bekker
[email protected]
Editor, MCPmag.com Michael Domingo
[email protected]
Editor, RCPmag.com Becky Nagel
CertCities.com [email protected]
Associate Editor, Web Gladys Rama
[email protected]
President & CEO Neal Vitale
[email protected]
CFO Richard Vitale
[email protected]
Executive Vice President Michael J. Valenti
[email protected]
Director, Circulation and Abraham Langer
Data Services [email protected]
Director of Web Operations Marlin Mowatt
[email protected]
Director, Print Production Mary Ann Paniccia
[email protected]
Controller Janice Ryan
[email protected]
Director of Finance Paul Weinberger
[email protected]
Chairman of the Board Jeffrey S. Klein
[email protected]
The opinions expressed within the articles and other contents
herein do not necessarily express those of the publisher.
PHOTO ILLUSTRATION BY ALAN TAO
Project1
9/15/06
12:44 PM
Page 1
vÊ9œÕʜ˜½ÌÊ>Ûiʘ̈‡-«ÞÜ>Ài]ÊÊ
9œÕʈ}…ÌÊÃÊ7iÊ-i˜`Ê9œÕÀÊÊ
*>ÃÃܜÀ`Ê/œÊ/…iÊ7œÀ`°
-iÀˆœÕÃÊ«iœ«iÊ>Àiʓ>Žˆ˜}ÊÃiÀˆœÕÃʓœ˜iÞÊ
`iۈȘ}ÊëÞÜ>ÀiÊ̜ÊÃÌi>Êˆ˜vœÀ“>̈œ˜ÊœvvÊ>˜ÞÊ
*
Ê̅iÞÊV>˜ÊÀi>V…°Ê6ʘ̈‡-«ÞÜ>ÀiʈÃÊ̅iÊ
œ˜ÞÊ`ivi˜ÃiÊ̅>ÌÊVœ“Lˆ˜iÃÊ>`Û>˜Vi`Êvi>ÌÕÀiÃÊ
ÃÕV…Ê>ÃÊ}i˜iÀˆVÊ՘«>VŽˆ˜}ʜvÊVœ“«ÀiÃÃi`Ê
“>Ü>Ài]ÊÌÀÕiʓi“œÀÞÊÃV>˜˜ˆ˜}Ê>˜`ÊLˆ˜>ÀÞÊ
È}˜>ÌÕÀiÃÊ̜Ê̅œÀœÕ}…ÞÊ>˜>ÞâiʅœÃ̈iÊ
«Àœ}À>“ðÊ7ˆÌ…ÊÓ{ÉÇÊÃÕ««œÀÌ]ʈ̽ÃÊ̅iÊLiÃÌÊ
Û>Õiʈ˜Ê>˜Ìˆ‡Ã«ÞÜ>ÀiÊ«ÀœÌiV̈œ˜p>˜`ʈÌÊܜ˜½ÌÊ
Lœ}Ê`œÜ˜ÊޜÕÀÊVœ“«ÕÌiÀ°ÊiÊ>ÊÀi>ÊvÀˆi˜`\ÊÌiÊ
ޜÕÀÊvÀˆi˜`ÃÊ>LœÕÌʈ̰Ê
/…iÀi½ÃÊ>ÊvÀiiÊÎä‡`>ÞÊÌÀˆ>ÊÊ
Ü>ˆÌˆ˜}ÊvœÀÊޜÕÊ>ÌÊ>Û}‡>˜ÌˆÃ«ÞÜ>Ài°Vœ“
œÜ˜œ>`ÊޜÕÀÊvÀiiÊÎä‡`>ÞÊÌÀˆ>Ê̜`>Þ\Ê>Û}‡>˜ÌˆÃ«ÞÜ>Ài°Vœ“
1006red_Letters8.v7
9/15/06
10:26 AM
Page 8
[email protected]
Some Cheese with Your Whine?
How about an article on how the qualifications to be a staff writer or
editor for your magazine seem to include being a whiny crybaby
about Microsoft? After reading Redmond for a year or so, my conclusion is that with you people no matter what Microsoft does ...
it will be wrong. You’re not really an independent voice. You’re
just a blathering, childish voice complaining about anyone more
successful than you.
Andy Fralic
Fenton, Mich.
All Things Being Equal …
In Doug Barney’s column [“Glutton for
Market Share,” September 2006] he
says that Microsoft used to behave
properly in the market place and now it
doesn’t. I beg to disagree.
Microsoft’s behavior is the same: It
tries to conquer all. Barney judged this
as acceptable during the time that
Microsoft was the underdog. Nowadays, when Microsoft is a behemoth, he
seems to think that the very same attitude is no longer proper. How so?
Microsoft is on top because it’s very
good at what it’s doing. What does it have
that its competitors do not? Money?
Nope, venture capitalists continue to
pour money into dumb ideas. Brilliant
minds? Hardly, as a lot of bright people
are choosing to work for other companies big and small. Political support? No
way—who else was hit globally as badly
as Microsoft in the entire IT history?
Public sympathy? I wouldn’t know, but
I’ve had friendly arguments with people
who aren’t in love with Microsoft and
I’ve always been in the minority.
Whaddya Think
?!
Send your rants and raves to
[email protected].
Please include your first and
last name, city and state. If we
use it, you’ll be entered into a
drawing for a Redmond t-shirt!
Of course Microsoft wants to maximize
its market share. Isn’t it the corollary of
any company’s goal of maximizing profits? I bet that its competitors, including
the niche companies, want that as well.
Don’t base your buying
decisions—indeed any
business decisions—on
ideology. You’ll probably incur
bigger costs and diminished
returns and you’ll be fired or
go bankrupt.
Stop Looking at Me
What’s up with so many pictures of
Stephen Toulouse’s head in the August
2006 issue? I love your magazine, but
how many pictures can you have of the
same guy staring at us? It’s kind of weird.
Michael Brown
Mobile, Ala.
I think Barney has a point in saying that
monopolies can control prices, but people want to buy Microsoft. Even when
there are cheaper or even free alternatives, even when the governments mandate, encourage and force people to buy
or use something else, people continue to
buy and pirate Microsoft products. Why?
Because from the users’ perspective,
Microsoft’s products are better.
All other things being equal, why
would I buy something that I perceive as
inferior? Because it’s from the underdog
in the respective market? If I did that, my
boss would start asking questions.
Don’t base your buying decisions—
indeed any business decisions—on ideology. You’ll probably incur bigger costs
and diminished returns and you’ll be
fired or go bankrupt.
Empathetic Reader
We had a similar issue with 3Com
switches (Baseline 2226 Plus and another,
larger one, but I can’t remember the
model) not holding their configurations
after power going out [see the August
2006 reader-contributed Never Again
column, “Virtual Panic”]. They didn’t
hold anything: IP addresses, VLANs,
name, location.
The backed up configuration didn’t
restore the VLAN info or anything
else. The latest firmware revision
Readme mentioned the backup option
being fixed, but we still had issues
after installing this version.
After calling 3Com and explaining
what was going on, they RMA’d all five
switches with no problems. Apparently
they got a bad lot of EEPROMs that
failed to hold the configuration after
loss of power. It seems hard to believe
something like that would make it
through QA/QC either at the supplier
or at 3Com, but in the end, after several
frustrating rebuilds of VLAN configurations, we are back on a solid footing.
Daniel Drumea
The Netherlands
Joel Havenridge
Omaha, Neb.
8 | October 2006 | Redmond | redmondmag.com |
Project6
8/11/06
3:00 PM
Page 1
ADVERTISEMENT
Restore and Maintain Peak Performance
Eight things you need to know
about fragmentation – a special report
As an IT Professional, you know the
importance of maintaining system
performance and reliability. Your
team is the one called to the rescue
when desktops or servers crash,
slow down or freeze. Many of these
issues stem from a single, hidden
source: disk fragmentation.
Reliability issues commonly traced
to disk fragmentation: Crashes and
system hangs/freezes; slow boot times
and boot failures; slow back up times
and aborted backup; file corruption
and data loss; errors in programs;
cache issues; hard drive failures.
1.
Having files stored contiguously
on the hard drive is a key factor in
keeping a system stable and performing at peak efficiency. Even a
small amount of fragmentation in
your most used files can lead to
crashes, conflicts and errors.
The weak link in today’s computers:
A computer system is only as
fast as its slowest component. The
disk drive is by far the slowest of the
three main components of your
computer: CPU, memory and disk.
Even with the fastest CPU system
performance would be affected by
disk fragmentation.
2.
Is Daily Defragmentation needed in
today’s environment? More than
ever! Large disks, multimedia files,
applications, operating systems,
system up-dates, virus signatures –
all dramatically increase the rate of
fragmentation.
Fragmentation
increases the time to access files for
all common system activities including opening and closing Microsoft®
Word documents, searching for
emails, opening web pages and performing virus scans. To keep performance at peak, defragmentation
must be done daily.
3.
Increased server
uptime:
b
Fragmentation can
cripple server performance and reliability resulting in
downtime and lost
production.
Diskeeper can easily
and safely be used on Diskeeper’s interface shows fragmentation levels and relative
your servers includ- location of all the files and folders on the selected volume.
ing: file and print,
web, domain conAdvanced, automated defragmentatrollers, SQL, Exchange, and any
tion: Manually defragmenting
other database or application servers.
every system every day is simply not
possible in even small networks let
Virtualization and fragmentation:
alone enterprise sites. IT Managers
Server virtualization can be
use Diskeeper’s “Set It and Forget
used to reduce the number of
It”® operation
for
automatic
physical systems for more efficient
network-wide
defragmentation.
CPU utilization. However, there is
Customers agree Diskeeper maina downside; the disk subsystem
tains the performance and reliabilimust now account for increased
ty of their desktops and servers,
disk I/O. Disk fragmentation the
reducing maintenance and increasprimary cause of unnecessary I/O
ing hardware life.
overhead. Automatic defragmentation is more important than ever for Every system on your network needs
maximum performance.
Diskeeper, the Number One Auto-
4.
8.
5.
Hidden manual defragmentation
costs: Manual defragmentation
is not “free” — it has heavy hidden
costs, such as IT time to manually
defrag every system. This results
in either staying after hours to
defrag, giving the users administrator privileges (not likely!),
break-fix handlings, or more often
no defrag whatsoever.
6.
How do I find out how much fragmentation I have? Download a free
trial version of new Diskeeper 10 at:
7.
www.diskeeper.com/red6
Install it, select a volume, select
Analyze and view the report.
matic Defragmenter™ with over 20
million licenses sold!
®
The Number One Automatic Defragmenter
Special Offer
Try Diskeeper 10 FREE for 45 days!
Download: www.diskeeper.com/red5
(Note: Special 45-day trialware is
only available at the above link)
Volume licensing and Government / Education
discounts are available from your favorite
reseller or call 800-829-6468 code 4372
For test results, white papers and case studies, visit
www.diskeeper.com/docs
©2006 Diskeeper Corporation. All Rights Reserved. Diskeeper, The Number One Automatic Defragmenter, “Set It and Forget It” and the Diskeeper Corporation logo are
registered trademarks or trademarks of Diskeeper Corporation in the United States and/or other countries. Microsoft is a registered trademark of Microsoft Corporation
in the United States and/or other countries. Diskeeper Corporation • 7590 N. Glenoaks Blvd. Burbank, CA 91504 • 800-829-6468 • www.diskeeper.com
Project3
7/11/06
1:45 PM
Page 1
Š
5$'0,1
VXSHUVRQLFUHPRWHFRQWURO
ZZZUDGPLQFRPUDGPLQ
5$'0,1LVWKHPRVWVHFXUHDQGUHOLDEOHUHPRWHFRQWUROVRIWZDUHGHVLJQHGWR
PRQLWRUVXSSRUWRUZRUNRQUHPRWHFRPSXWHUVLQYLUWXDOO\UHDOWLPH5$'0,1KDV
SURYHQWREHLQFUHGLEO\IDVWDQGHDV\WRXVHDSSOLFDWLRQ5$'0,1LVDFRPSOHWH
UHPRWHFRQWUROVROXWLRQWKDWKDVDOOPLVVLRQFULWLFDOIHDWXUHV:LWKWKHLQYHQWLRQRI
'LUHFW6FUHHQ7UDQVIHUŒ7HFKQRORJ\5$'0,1UHPRWHFRQWUROVRIWZDUHGH¿QHVQHZ
VWDQGDUGVLQWKHLQGXVWU\
*HQHUDOFKDUDFWHULVWLFV
0LOLWDU\JUDGHVHFXULW\
3HUIRUPDQFH
6XSHUVRQLFYHKLFOHVSHFL¿FDWLRQV
)XOO\26LQWHJUDWHG17VHFXULW\V\VWHPZLWK
17/0YVXSSRUW
,3¿OWHUWDEOHWKDWUHVWULFWVUHPRWHDFFHVVWRVSH
FL¿F,3DGGUHVVHVDQGQHWZRUNV
6HUYHUSDVVZRUGSURWHFWLRQ
$GYDQFHGELW$(6HQFU\SWLRQIRUDOOVHQGLQJ
DQGUHFHLYLQJGDWD
$XWKHQWLFDWLRQEDVHGRQ'LI¿H+HOOPDQH[FKDQJH
ZLWKELWNH\VL]H
.HUEHURVVXSSRUW
&RGHWHVWLQJGHIHQVHPHFKDQLVPWKDWSUHYHQWV
WKHSURJUDP¶VFRGHIURPEHLQJDOWHUHG
6PDUWSURWHFWLRQIURPSDVVZRUGJXHVVLQJ
,QFRUUHFW6HUYHUFRQ¿JXUDWLRQVSUHYHQWLRQ
*HQHUDWLRQRIXQLTXHSULYDWHNH\VIRUHDFKFRQ
QHFWLRQ
6XSHUVRQLFIUDPHSHUVHFRQGVSHHGRQ/$1
IUDPHVSHUVHFRQGRUPRUHRQPRGHP
3RZHUSODQW'LUHFW6FUHHQ7UDQVIHU70
:HLJKW0E
)HUU\UDQJHXQOLPLWHG
:LQJVSDQYDULDEOHJHRPHWU\GHVNWRSVL]HG
7\SH0XOWLUROH6XSHUVRQLF5HPRWH&RQWURO
0DQXIDFWXUHU)DPDWHFK
'HVLJQHGE\'PLWU\=QRVNR
0DLGHQÀLJKW0DUFK
9LQWURGXFHG-XQH
6WDWXVDFWLYHVHUYLFH
1XPEHUEXLOWPLOOLRQV
3ULPDU\XVHUXSWRGDWHEXVLQHVVDOORYHUWKH
ZRUOG
8QLWFRVW86VTXDGURQGLVFRXQWVDYDLODEOH
$UPDPHQW
6HFXUHYRLFHDQGWH[WFKDWIHDWXUHV
)LOHFDUJRWUDQVIHU
7HOQHWDQGRWKHUXVHIXOWRROV
7ULYLD
1RFRPSHWLWLRQLQGXVWU\EUHDNWKURXJK
6XSHUVRQLF)36UDWLR
/RZHVWSURFHVVRUXVH
0LQLPXPWUDI¿FFRQVXPSWLRQ
8OWLPDWHVHFXULW\VWDQGDUGV
3ULFHUDQJH
2SHUDWLRQDOKLVWRU\
FRPSDQLHVRI)RUWXQHOLVWZLWKZLGH
JHRJUDSKLFVSUHDG
1RUWK$PHULFD
6RXWK$PHULFD
(XURSH
$XVWUDOLDDQG2FHDQLD
$VLD
$IULFD
7\SLFDOFRPEDWXVH
&RUSRUDWH
6PDOODQGPHGLXPEXVLQHVV
+HOSGHVNSURYLGHUV
7HOHFRPPXWLQJ
(GXFDWLRQDO
+RPH
‹)DPDWHFK,QWHUQDWLRQDO&RUSRUDWLRQ
5DGPLQŠDQG5HPRWH$GPLQLVWUDWRUDUHUHJLVWHUHGWUDGHPDUNVRI)DPDWHFK,QWHUQDWLRQDO&RUS
1006red_Report11-16.v9
9/15/06
10:43 AM
Page 11
October 2006
RedmondReport
INSIDE:
Work faster and easier
with Windows PowerShell.
Page 16
RSS Guru Goes Offline
Niall Kennedy, touted as an important hire for Microsoft’s Live effort, talks
about what went wrong during his short tenure.
Microsoft I think I would have to hold
my breath awhile before getting it done.
BY MICHAEL DESMOND
hen Niall Kennedy abruptly
left Microsoft in August, it
surprised a lot of Web 2.0
watchers. Many had hailed the RSS
guru’s arrival from Technorati as a
sign that Microsoft was really “getting
it” when it came to developing innovative new Web technologies and
services. But less than six months after
starting at Microsoft, he was gone.
Kennedy spoke with us from San
Francisco and explains what went
wrong and how Microsoft might get it
right as it competes with hungry Web
2.0 competitors.
W
Q. Redmond: If before going in
someone had told you, six months
from now you will be out the door,
would you have believed them?
A. Niall Kennedy: I had people who
told me that, actually. And I said, well
there is only one way to find out, and
it’s too good of an opportunity not to
try. The ability to shape the future of
RSS and Atom feeds and the syndication platform in general at the scale
Microsoft has. My response was, well,
I at least have to try.
Q. What were your expectations
going in?
A. I joined Microsoft because there
was an invest-to-win strategy, where
the company wanted to make a big
splash in the online services base. I
felt like they had woken up after many
years of Google being triumphant in
search and other areas and they were
ready to make a serious play in this
space. And that was one of the reasons
I was hired, because my bosses knew I
Kennedy, pictured here sitting at his
“outside office,” spent six months with
the Windows Live group in Microsoft,
before heading out on his own.
could attract some talent into the
company to work on projects like this
with me.
Q. You were at Microsoft during an
incredibly busy time, weren’t you?
Was that a factor?
A. There is definitely a lot going on
and a lot of releases happening at the
same time in the desktop space, which
accounts for the majority of Microsoft’s
revenue. How that impacted the head
count that my division had and my ability to hire is something I still question,
because I just didn’t have it. There are
so many things that are changing within
Q. Is Ray Ozzie surrounding himself with the right technical people
to compete in the Web 2.0 space?
A. Well, he has some incubation
groups that can operate outside the
Microsoft bureaucracy. Small groups
that are introducing things like Live
Clipboard. Some of these different
groups that have introduced the
things that people look at Microsoft
and say, ‘Oh that’s really cool.’ It’s
the small teams that have been set
up just directly reporting into Ozzie,
and getting outside of that 72,000person structure.
The question with Ozzie that will have
to be determined long term is that there
are a lot of people there who have been
there 10 to 14 years. How well will the
rank and file react to someone who is
fairly new to the company, under a year?
Q. You’ve talked about opportunities in the spaces between existing
vendors and services.
A. I’ll take advantage of that void a bit.
Microsoft is not going to pull in
del.icio.us links, or for example Google
won’t display a Virtual Earth Bird’s Eye
view. But if you have a service such as
Zillow, they can give Google Maps as a
map view and then they can also provide
an additional view on that, using the
Bird’s Eye view from Microsoft, where
none of these big companies can do
something like that. It’s looking at what
is the best data out there, what are the
best services out there you want to use.
Continued on page 14
| redmondmag.com | Redmond | October 2006 | 11
1006red_Report11-16.v9
9/15/06
10:43 AM
Page 12
RedmondReport
Will Microsoft or IBM Have CIOs in
the License that Kills?
No Rush
Each company’s licensing plan figures to play
a role in winning the middleware battle.
BY ED SCANNELL
icrosoft officials reacted
strongly to IBM Corp.’s
recent Processor Value Unit
(PVU) licensing for both its proprietary and Intel-based server applications. Perhaps a little too strongly.
In early August, IBM took a decidedly
different path from many of its competitors in the way the company prices
its middleware products running on
multi-core chips. The new softwarelicensing
scheme is
based on the
idea of PVUs, which replaces Big
Blue’s existing per processor licensing
policy. The PVU concept reportedly
provides a framework for licensing
differentiation on a number of different processor technologies. The software is then licensed based on the
number of “value units” assigned to
each processor core.
IBM believes its PVU approach
allows the company to “more appropriately align software cost and value,” and
address other issues related to multicore technologies. The licensing
scheme kicks in during this year’s
fourth quarter, when the company
ships an Intel-based server using a
quad-core version of the Xeon chip.
The PVU idea stands in sharp contrast to the software-licensing models
for multi-core chips of Microsoft,
which has stuck with its per-chip model
that counts a chip as a single processor
no matter how many cores it has. Some
Microsoft officials see the difference in
licensing as an important weapon in
the battle between the two companies
M
NewsAnalysis
where the high-cost, low-volume software of IBM figures to clash with
the low-cost, high-volume software
of Microsoft.
“This is the collision of two worlds
meeting somewhere in the middle.
What is interesting here is IBM using
this to keep [its] prices high, yet still
wanting to compete with Microsoft,”
says Andy Lees, corporate vice president in charge of Microsoft’s Server
and Tools Marketing.
The financial stakes involved could be
enormous. As more cores are added to
increasingly less expensive single
processors—single Intel chips alone
could typically have eight cores in the
next year or two, with proprietary chips
having many more—sales of such
servers and their applications figure to
explode as many more small and midsize companies can start to afford them.
“Multi-core chips in general-purpose
machines means they will have supercomputing power. What we believe
could and should happen is that lowcost, high-volume software goes up and
replaces the need for these esoteric
hardware and software products with
their esoteric pricing,” Lees says.
Some analysts agree with Lee’s opinion that IBM’s PVU idea is overly
complicated. They are quick to add,
however, that Microsoft can hardly
serve as a beacon of light when it
comes to simplified licensing models
given the confusion generated by its
Software Assurance plan.
“Microsoft will have a very difficult
chore convincing anyone that it can
12 | October 2006 | Redmond | redmondmag.com |
Continued on page 14
to Buy
Vista
BY ED SCANNELL
n a Merrill Lynch survey asking
CIOs what their intentions were
for enterprise and server software
spending, many indicated that they
planned to push back plans to
upgrade to Windows Vista.
According to the survey results, only 8
percent of CIOs intended to upgrade
to Vista in 2007, which is down from
14 percent who said they would do
so when asked back in January. Some
75 percent said they are still waiting
to hear from Microsoft about exactly
when the company planned to launch
the long overdue operating system,
before making any purchasing decisions. That figure is up from 65 percent back in January.
I
There was more bad news for
Redmond as part of that same survey.
Because of the multiple delays to
both Vista and Office 2007, many
CIOs said they would push back
the renewals of their Microsoft
Enterprise Agreements.
While the number of CIOs that
plan to renew in 2006 held steady at
27 percent, some of those renewals
have been pushed back from the third
quarter to the fourth. Only 7 percent
intend to renew in the third quarter
compared to 10 percent in the last
survey conducted earlier this year.—
Project8
5/15/06
4:11 PM
Page 1
You do it all the time.
Do you think
the bad guys won’t?
Sunbelt Messaging Ninja:
Kill viruses, spam, and bad attachments
Other attachment filters don’t filter
attachments: They filter extensions.
Anyone can change extensions. And the bad
guys don’t need an FAQ to show them how. It’s
an easy trick—at least it was. Until now. Meet Sunbelt Messaging
Ninja—the new all-in-one, best-of-breed, third-generation
messaging security solution: Ninja is a plug-in framework that
integrates best-of-breed
antivirus, antispam,
and SMART* attachment-filtering modules
on your Exchange
server. Full control:
The policy-based plugin architecture allows you powerful, granular control. You can finally
rule with an iron fist. SMART attachment filtering: Ninja features
the first flexible policy-based attachment filter that isn’t fooled by extensions. It looks inside files to determine their true identity. Your policies
decide what
happens to all
FREE
attachments
SM
based on criAttac ART ™
hmen
teria such as inbound and outbound
t
email direction and internal or external
recipients. Dual-engine antivirus:
Ninja combines the power of two high-quality
AV engines: Authentium and BitDefender. Dual-engine antispam:
Ninja’s spam filtering decimates junk mail with both Cloudmark (which
includes antiphishing) and Sunbelt’s own heuristics-based iHateSpam
engines. And, of course, it also supports RBLs and SPF.
FREE attachment filter: For a limited time you can have Ninja’s
attachment filter for FREE. It’s full-featured. Not crippleware. All you
have to do is download it at www.sunbelt-software.com/ninjared.
TM
Filter
Sunbelt Software Tel: 1-888-NTUTILS (688-8457) or 1-727-562-0101 Fax: 1-727-562-5199 www.sunbelt-software.com [email protected]
*Suspicious Mail Attachment Removal Technology™
© 2006 Sunbelt Software. All rights reserved. Sunbelt Messaging Ninja, SMART and Suspicious Mail Attachment Removal Technology are trademarks of Sunbelt Software. All trademarks used are owned by their respective companies.
1006red_Report11-16.v9
9/15/06
10:43 AM
Page 14
RedmondReport
Continued from page 11
Q. How is Microsoft positioned
today to compete in the Web 2.0
space?
A. They have a tough road ahead of
them. I think the Web crowd is a crowd
that generally favors more open companies. Microsoft hasn’t had an open reputation. [These developers] use tools like
PHP, they program in open source tools
like Eclipse, so that’s a tougher ground to
go into.
But there is a big play for Microsoft
in Web 2.0 in the enterprise, and
that’s where people are already using
Exchange and Active Directory. Programmers want integration with that
kind of back-end. So I see a lot of the
tools that are out there in the Web 2.0
Internet world making their way into
Continued from page 12
serve as the defender of simple,
straightforward licensing,” says Dana
Gardner, principal analyst with InterArbor Solutions Inc. in Gilford, N.H.
Gardner notes that licensing plans for
both software and hardware from major
vendors are generally much too complex
these days and hurt large IT shops and
eventually the vendors themselves. A
complex licensing plan or too many
changes to such a plan, only gives IT
shops a reason to look at a vendor’s competitors’ products and licensing options.
“If users can get a direct and understandable way to license, then they
would be interested in buying more
product and/or upgrading faster, which
is what the vendor should be interested
in getting them to do,” Gardner says.
IBM, Microsoft and other vendors selling to large enterprises are missing the
larger picture by focusing too much on
licensing plans involving complex technologies such as multi-core chips and
virtualization. If IT shops become too
frustrated with the lengthy process of
the new round of applications for the
enterprise and how you get work done
inside a browser window at work.
Q. Is it hard to keep Web 2.0 talent
at Microsoft?
A. I think it’s tough to keep them
at Microsoft. You see employees leave
for smaller companies. It also depends
on a manager referring to his employees as ‘warm bodies’—which is something I heard multiple times at
Microsoft—or are these employees
actually intellectual leaders?
One Microsoft employee when I left
decided to blog about 10,000 people
joining Microsoft over the last year
and yeah, some people left—as if trying to use a pure numbers game to
talk about the type of people who are
working on these new projects.
sorting out the cost benefits of such
plans, they might just opt for a comprehensive subscription plan that subsumes
such technology issues and also provides
them with support, maintenance and
even hosting, according to Gardner.
Q. Hmm. So all of a sudden you
are talking about pork bellies
over there.
A. Right. You’re talking about warm
bodies, instead of the innovation
that is quoted by the executives all
the time.
Q. It comes back to respecting the
intellectual capital, doesn’t it?
A. Right, I think intellectual capital
is very important, and recognizing
that intellectual capital and keeping
those types of performers around,
as well as encouraging small teams
of developers. Start.com was a very
small group that was given support by
the management to do something new
and now that’s the centerpiece of
Windows Live. Live.com is what
Start.com became. —
these high-volume (multi-core-based),
mission-critical servers we offer highly
competitive on an industry standard platform,” Lees says.
Both Intel and AMD executives have
told Microsoft, according to Lees,
If users can get a direct and understandable way to license,
then they would be interested in buying more product and/or
upgrading faster, which is what the vendor should be interested
in getting them to do.
— Dana Gardner, Principal Analyst, InterArbor Solutions Inc.
Microsoft argues, however, that the
emergence and continued acceptance
of multi-core servers is merely an
extension of Moore’s Law, something
Lees says benefits the general health
of the entire industry. But IBM’s PVU
approach is something that not only
works against Moore’s Law, but could
slow the acceptance of multi-core
technology across the board.
“It is troubling from the industry’s point
of view because effectively what [IBM is]
doing is hedging against Moore’s Law.
[It’s] nervous that Moore’s law will make
14 | October 2006 | Redmond | redmondmag.com |
that charging per core could slow the
adoption of multi-core technology.
They point out that a dual core chip,
for instance, does not give users twice
the performance over a single core
chip, but more like 1.6 to 1.7 times
the performance.
“People would end up paying twice as
much for the software and not getting
twice the performance, and they would
be discouraged from accepting this latest
technology, which has everything to do
with Moore’s Law. This is why we want
to fight it,” Lees says. —
Project6
9/12/06
2:29 PM
Page 1
EXCHANGE JUST WENT DOWN
The Most Recent Backup Was Done Last Night
What Are You Going To Do?
The Problem: Massive Data Loss Due to Protection Gaps.
Traditional Exchange backup agents from CA,
CommVault, Dantz, EMC, Legato, Symantec,
Veritas and other traditional backup solutions
leave you vulnerable – up to 24 hours or more
of data-loss.
The Solution: Continuous Data Protection Closes the Gap.
Lucid8’s DigiVault Continuous Data Protection
solution with SingleTouch Recovery™ represents
a major improvement over traditional backup,
replication, and snapshot systems.
• Automatically captures all changes to the
Exchange databases as they are made
• Advanced features like compression saves
bandwidth and disk space (up to 80%) and
256-bit encryption keeps the bad guys out
• SingleTouch Recovery™ to multiple points
in time before the corruption occurred
• Centralized management, Enterprise capable,
Easy to implement, Simple to use
The Bonus: TRADE-UP to DigiVault with CDP
Created by
and SingleTouch Recovery™ by
12/31/2006 and receive a healthy
trade-up discount to help offset the
money you’ve already spent on the
outdated Exchange agent from those
other guys.
TRADE-UP TODAY
To learn more, call 425 456 8478 or visit our website at
www.lucid8.com/tradeup for a FREE 30-Day DigiVault Test-Drive and a copy
of The Essential Guide to Continuous Data Protection for Exchange.
Copyright © 2006 Lucid8. All rights reserved. Microsoft® Exchange Server is a registered trademark of Microsoft® Corporation. All other trademarks are property of their respective owners.
1006red_Report11-16.v9
9/15/06
10:43 AM
Page 16
RedmondReport
BetaMan
Command Performance
Windows PowerShell is almost ready for prime time.
M
icrosoft has officially locked
Windows PowerShell into
Release Candidate status.
That means it’s pretty much featurecomplete and now it’s down to bug
fixes. Before it’s released to the world,
let’s take another look at this muchballyhooed new tool and what it can do.
To be perfectly clear, PowerShell
(formerly code-named “Monad” and
called the Microsoft Shell) is not a
new scripting language. It has a
scripting language, in much the same
way that the old Cmd shell has a
batch “scripting” language.
The comparison to Cmd is perfectly
appropriate. Like Cmd, PowerShell can
run commands interactively. You type
the command and it runs right away.
You also see the results right away.
PowerShell is actually built as a
drop-in replacement for Cmd. It
runs all the same command-line tools
and has most of the same built-in
commands. So you can actually ditch
Cmd and start using PowerShell with
very few bumps in the road. Of
course, PowerShell goes further by
providing a host of new cmdlets
(“command-lets”) that perform various advanced functions.
It’s All in the Cmdlets
Cmdlet names all take a standard verbnoun structure, like Get-Wmiobject or
Get-Command. There are several commands you can run for more detailed
information on what’s available:
• Run Help cmdletname to get
instant, detailed help on any command
• Run Get-Command to see a comprehensive list of cmdlets
Windows PowerShell
Version reviewed: RC1
Current status: RC1
Expected release: Late 2006
• Run Get-Alias to see a full list of
cmdlet aliases (or nicknames)
You’ll spot many familiar Cmd commands—like Move and Type—in the
list of aliases. PowerShell uses these
aliases to map familiar Cmd commands
to new PowerShell cmdlets.
PowerShell cmdlets also use a standardized syntax. For example, any
cmdlet that connects to a remote
computer uses the –computer argument to accept the computer name.
That standardization makes learning
new cmdlets easier than learning full
Cmd commands.
Cmdlets are also powerful. Run
gwmi Win32_OperatingSystem –co
Server1 and you’ll be able to determine the operating system and service
pack version for a machine named
Server1. Gwmi is an alias for the GetWmiobject cmdlet and -co is the
shortened version of the –computer
argument. You only have to type
enough letters of the argument name
to distinguish it from other arguments
within PowerShell.
Through the Pipeline
Like Cmd batch files, PowerShell
scripts are basically a series of cmdlets
strung together. PowerShell does have
a more advanced scripting language,
but it still only has a dozen or so constructs for things like If/Then decisions
16 | October 2006 | Redmond | redmondmag.com |
and loops. Consequently, the language
is pretty easy to learn.
What’s a bit tougher to learn is the
pipeline in PowerShell. There was a
pipeline in Cmd where you may have,
for example, run something like type
filename | more. This would execute
the type command, send it a filename
to display and pipe the output to the
more command to display the file’s
contents one page at a time.
PowerShell works in pretty much
the same way. Entering ps | ft will
run the Get-Process cmdlet (ps is its
alias), and pipe the output to ft (an
alias for Format-Table). The result is
a formatted list of all processes. Running ps | kill is dangerous, because it
takes the output of Get-Process and
pipes it to kill (an alias for StopProcess). This effectively shuts down
every process on your machine.
The syntax is pretty straightforward,
although it does take a bit of getting
used to. Nearly everything is aliased.
This honestly makes PowerShell a
bit tougher to read, although faster
to type. Always keep in mind that
nearly anything you’re typing is either
a cmdlet or an alias. If it doesn’t follow the verb-noun format, then it’s
probably a cmdlet alias.
Getting used to this new tool will give
you a leg up on the competition. Once
you’re familiar with the syntax and
structure, you’ll be able to work faster
and easier. —
Beta Man has gone under cover to give
you some of the earliest and most
unflinching takes on important software
under development at Microsoft.
1006red_RedSubAd_17
9/15/06
9:59 AM
Page 1
Project2
8/11/06
12:43 PM
Page 1
1006red_ProdRev19-22.v7
9/15/06
10:37 AM
Page 19
ProductReview
Keep Power Users Under Control
PolicyMaker Application Security lets you apply specific,
application-level privileges.
PolicyMaker Application Security 2.0
DesktopStandard Corp.
$21.00 per node
(Upgrade Assurance $4.20; Premium Support $2.10)
www.DesktopStandard.com
BY BILL HELDMAN
Engineers and software
developers present a special
challenge for IT managers.
Unlike others in the workplace, these groups require
admin privileges to do their
jobs—a problem that can
really complicate management for PC and server
administrators. Group Policy
Objects (GPOs) and their
associated management
interfaces—the Group Policy
Management Console
(GPMC) and the Group
Policy Object Editor
(GPOE) MMCs—only get
you part of the way there.
If you’re a full-time GPO
manager, you probably mastered GPOs a long time ago.
REDMONDRATING
Documentation: 15% ____ 9
Installation: 10% ________ 7
Feature Set: 35% ________ 8
Performance: 30% ________ 8
Management: 10% ______ 7
Overall Rating: 8.0
________________________
Key:
1: Virtually inoperable or nonexistent
5: Average, performs adequately
10: Exceptional
Still, you probably can’t send
a single policy to a group of
users to increase their privilege for a single application.
You can decrease privileges
all you like, but increasing
them is tough.
For example, software
developers using Visual Studio need advanced rights to
compile applications. If you’re
like most administrators and
simply allot them full administrative rights, you set yourself up for the probability of
completely crashed machines
at the close of the day.
PolicyMaker Application
Security effectively limits
a user’s capability, while
simultaneously granting
the permissions needed to
run applications. DesktopStandard calls it “leastprivilege.” The tool is now
in version 2.0 (version 3.0
will support Vista).
Why is this so important?
According to industry
reports, power users and
admin-level users are the ones
who leave the door open to
98 percent of viruses and malware on the local machine. It
may not be Sally in the
Figure 1. Select rules from a list of categories.
accounting department who
can create the most trouble. It
might be Bob, the senior programmer in your applications
development unit.
There are two components
to PolicyMaker Application
Security. The first is a GPMC
and GPOE snap-in, the second is a client component.
The client component is
deployed as an .MSI. It acts as
a driver on the local computer, monitoring the Resultant
Set of Policies (RSoP), listening to process launches and
checking them against any
PolicyMaker privilege rules.
The client makes this happen by managing the security
token for the user, elevating
his privileges for that application and only that application. This has a positive
effect in three ways:
• It doesn’t require secondary accounts
• It doesn’t increase the
security exposure of the
computer
• Applications that write to
HKEY_CURRENT_USER
run as the authenticated user
Living by the Rules
There are many ways to set
up PolicyMaker rules (see
Figure 1). You can target an
application based on its program file path, a simple hash
| redmondmag.com | Redmond | October 2006 | 19
1006red_ProdRev19-22.v7
9/15/06
10:37 AM
Page 20
ProductReview
of the file, all of the applications in a given folder, applications targeted by an .MSI
file path or by installed
ActiveX components.
If you set up a rule based on
its file path, for example, the
resulting dialog lists various
supported applications. It will
also list functions you may
want to control (and points
out any different service pack
elements). For example, suppose you have Web programmers who need to work
extensively with data that
traverses the Windows Firewall. Those programmers
belong to the WebDev OU.
You would set up this rule to
elevate the Windows Firewall
security context and denote
the WebDev OU. You could
also establish various permissions like “Replace a Process
Figure 2. There is a list of filters you can apply to your rules as well.
Level Token,” or even apply
filters to rules (see Figure 2).
Once you’re finished, this
policy becomes a part of
whatever Group Policy
you’re working with. It will
ship as part of the GPO to
those OUs, domains and sites
(even single users) assigned to
receive it. Upon receiving the
GPO, the PolicyMaker client
sees that it has to elevate permissions, apply additional
privileges or introduce a filter
for a given program.
In native Windows GPOs,
there are more than 1,700
individual policies you can set
within GPOE. You can also
stack them so a given set of
users may have an RSoP that
is different than what you
expect. Add to that the complexity of different user
needs—even though they
may work side by side in the
same department—and you
can see what a daunting task
it is to administer GPOs.
PolicyMaker does indeed give
you more arrows in your
quiver, but doesn’t necessarily
make you a better archer. You
still have to determine which
rule set will work best.
One of the best things
about PolicyMaker is its
ability to “shatter-proof” a
computer. Windows is a
message-based system. Programmers don’t write code
that manipulates Windows—
they write code that passes
messages to Windows asking
it to perform a certain way.
Hackers can pass messages
to break a system, without
Project1
1/9/06
10:32 AM
Page 1
1006red_ProdRev19-22.v7
9/15/06
10:37 AM
Page 22
ProductReview
even having to worry about
the security context. Because
message passing is at the
heart of Windows, a wellcrafted message or two could
“shatter” Windows. PolicyMaker has a process-isolation
rule that can “shatter-proof”
a computer.
Ups and Downs
The documentation for
PolicyMaker Application
Security is first-rate. It
includes two appendices at
the end of the user guide for
first-timers wanting to learn
more about GPOs. I particularly liked the “I want to …”
section of the documentation. For example, your question might be “I want to
inoculate against shatter
attacks.” The answer would
be “Select any type of rule,
then enable Process Isolation
(ShatterProof) in the administrative template.”
What I didn’t like was the
process I had to go through to
get the product licensed. As
per the well-written instructions (complete with helpful
screen shots) you install the
code and launch GPOE.
Next, you go through a mini
Q&A session to establish
how many OUs and possible
users you have. You send the
results to an XML-based file,
e-mail it to DesktopStandard
and you’re sent back an
unlock key. It took me a week,
plus the compulsory conference call, to get my 20-node
evaluation license.
When companies like Oracle are putting all of their
software on the Web completely unlocked, a complex
licensing methodology
becomes a hindrance. To be
fair, when I queried the marketing folks, they said, “Hey,
if someone just calls us up, we
can get them licensed and out
the door.” Nevertheless, the
licensing methodology could
be simplified.
At $27 per node (including
the cost per node for premium support and upgrade
assurance), it also seems
pricey. You’ll want to run a
cost-benefit analysis to see
what kind of savings you’ll
realize by being able to
apply application-level permissions and privileges for
certain groups.
Keep in mind that you
won’t need this kind of tool
for your run-of-the-mill user.
This is for securing power
users, so it’s not as though
you’d be looking at a milliondollar deployment. Still,
you’ll have to look at the cost
versus the payback of reducing power-user headaches.
If you’re in a larger enterprise where desktops are
locked down as a matter of
corporate policy, PolicyMaker
Application Security offers a
way to efficiently dole out
heightened privileges to
those who truly need it. —
Bill Heldman (www.billheld
man.com) is an instructor at
Warren Tech, a career and tech
ed high school in Lakewood, Colo.
He’s authored several books for
Sybex, his latest is about using
Excel 2007 and SharePoint Portal Server 3 for project management, which is co-authored by his
wife Kim. You can contact Bill at
[email protected].
Project1
9/13/06
10:23 AM
Page 1
LOGGING IN DEPTH
www.eventLogManager.com
Secure — Detect, prevent, react, recover
Comply — Automate compliance for SOX, HIPAA, FISMA
Save — Reduce operational costs
EventTracker
Logging In Depth
TM
Get a free trial and ROI analysis —
www.eventLogManager.com
1006red_ReaderRev24-28.v7
9/15/06
10:42 AM
Page 24
ReaderReview
Your turn to sound off on the
latest Microsoft products
Virtual Server Has Real Fans
Now that it’s free and has “official” Linux support, users find Virtual
Server 2005 R2 a more compelling option.
RE A
M
EN
IV
BY JOANNE CUMMINGS
DR
ER
icrosoft’s Virtual Server is gaining fast on marketD
leader VMware. Microsoft bought the core
technology for Virtual Server from Connectix,
and originally charged $199 for the enterprise edition
and $99 for the standard version. When Virtual Server
2005 R2 Enterprise Edition debuted last April,
Redmond
Microsoft dropped the standard version altogether and
made the enterprise edition a free download.
The response was overwhelmingly positive. “It’s Microsoft, it’s free and I don’t have
to take any money out of my budget to give it a try. And it works great,” says Tom
Catalini, director of IT for William Gallagher Associates, an insurance firm in Boston.
Catalini just recently began experimenting with Virtual Server. By taking one
physical server and using it to run multiple virtualized servers, Virtual Server lets
him consolidate hardware while easing overall management. “Now I don’t have to
worry whether or not it’s the same kind of machine with the same hardware and
I don’t have to take any money out of my
budget to give it a try. And it works great.
Tom Catalini, Director of IT, William Gallagher Associates
drivers,” Catalini says. “By abstracting that hardware layer, I can port my applications wherever and whenever I need.”
Users say server virtualization helps increase capacity without stretching the
budget. “We’d love to have a full-fledged test center, with five or 10 machines, but
we don’t have the space or the equipment to do that,” says David Feldman, director of IT at Orchard Place, a Des Moines, Iowa-based group that provides mental
health and juvenile justice services for at-risk youths. “Using Virtual Server lets us
get stuff accomplished with a lot less hardware.”
Living La Vida Linux
One of the most important changes to Virtual Server R2 was Linux support. “I loved
it before but it didn’t do Linux, and because of that I had no use for it,” says Randy
Hinders, senior NT administrator at Donet Inc., an ISP in Dayton, Ohio. “Now that
it’s free and supports Linux, it’s definitely an eye-opener.” Donet is looking to offer
Web hosting on virtualized servers, and many of its customers wanted to use Linux.
David Marshall and Wade Reynolds, both senior infrastructure architects at Austin,
Texas-based Surgient Inc., agree that Linux support was critical. “People have been
asking for Linux forever,” Marshall says. “It was in the initial Connectix product and
was pulled out, but a lot of people run both Windows and Linux, especially in testing,
24 | October 2006 | Redmond | redmondmag.com |
Microsoft Virtual Server R2
Enterprise Edition
Free
Microsoft Corp.
800-426-9400
www.microsoft.com
so that was a problem.” He says you
could virtualize Linux servers prior to
R2, but it wasn’t officially supported so
it ran poorly.
Still, big Linux shops may want to
consider VMware or the open source
Xen server virtualization tool. “They
currently support a wider variety of
Linux distributions,” Reynolds says.
Virtually Painless
Users give Virtual Server high marks
for ease of use, especially when it comes
to building a virtual machine (VM) and
using the integrated Web-based management console. “It’s definitely easy
to learn, easy to install and easy to get
your virtual machines created,” says
Reynolds. “You can do it with a lot less
planning [than with VMware], so it’s
an easier point of entry.”
The management console, because it’s
Web-based and not a typical MMCtype plug-in, is also easy to use. “The
console is pretty intuitive,” Hinders says.
“If you’re used to looking around Web
sites, you shouldn’t have any problem.”
The console also has some features
that other virtualization tools do not.
“One nice feature is a thumbnail view
of what’s going on inside each virtual
machine,” Marshall says. “If you have
your Web administrator interface up
Project1
9/13/06
12:17 PM
Page 1
1006red_ReaderRev24-28.v7
9/15/06
10:42 AM
Page 26
ReaderReview
and you have 10 VMs running on that
box, you can actually see a thumbnail
image of what’s on them.”
Catalini also likes the console because
of its portability and accessibility. He
did add, however, that he doesn’t use it
much because he found it was easier to
simply turn on remote management in
the operating system itself. “That lets
me use the remote desktop connection
just like I do for any other server,” he
says. “You can’t tell the difference.”
Microsoft has also made licensing for
virtualized servers more attractive.
“Microsoft’s making it hard to resist,”
says Michael Hanna, senior systems
engineer at Infinity Network Services in
Tallahassee, Fla. “You can run up to four
virtual machines on an enterprise server
if you’re running Virtual Server. That
alone is pretty compelling because,
although I lean toward VMware, when
you factor in the cost of licensing, the
differences aren’t enough. I’m not going
Knock out spam at
Exchange level!
Only
$ 1195
for 100
users!
DOWNLOAD YOUR FREE TRIAL FROM WWW.GFI.COM/RMES/
Anti-spam for Exchange, anti-phishing and email management
Eliminate spam from your mail server with GFI MailEssentials for Exchange/SMTP:










Block spam at server level – No need to update email clients
Bayesian filtering – Detects spam based on statistical message analysis
Anti-phishing – Detects and blocks phishing emails
Automatic whitelist management – Keep whitelists up-to-date without extra admin
GFI MailEssentials configuration
User-based spam quarantine – Sort spam to users’ ‘junk mail’ folders
Blacklists scanning – Stop mail from blacklisted senders and invalid domains
SURBL checking – Checks email content against SURBL servers
Email header analysis and keyword checking – Blocks spam based on message field info and keywords
Directory harvesting detection – Checks validity of all recipient email addresses in an email
Also supports Lotus Notes & SMTP mail servers
tel: +1 888 243 4329 | fax: +1 919 379 3402 | email: [email protected] | url: www.gfi.com/rmes/
26 | October 2006 | Redmond | redmondmag.com |
to spend a couple thousand on licenses
just because I like ESX a little better.”
Starting Oct. 1, licensing becomes
more compelling as Microsoft will let
Windows 2003 Datacenter Edition
users run an unlimited number of virtualized instances of Windows Server.
Not There Yet
Although Virtual Server meets users’
needs right now, they have specific feature requests for future releases. “The
only thing that’s missing that I’ve
noticed is the ability to do snapshots,
where you can quickly revert back to a
previous state,” Feldman says.
Hinders says VMware enjoys a lead
with its ability to take snapshots of guest
operating systems. “But with Virtual
Server, there’s no automated way to do
that. You can manually pause it, copy the
Virtual Server file and restart it. For
internal usage or testing, it’s no big deal.
But when you start taking this to production environments running missioncritical applications, you can’t have that.”
Virtual Server’s robust scripting capabilities can help out there, other users
say. “We could write a script that shuts
down the servers at midnight, copies
them to New Jersey, and then turns them
back on again,” Catalini says. “So I’d get
the same thing, have a clean up-to-date
copy, and there’s no management overhead to doing that.” He added that he
would, however, prefer to eventually see
an automated snapshot capability.
Another missing piece is support
for 64-bit guest operating systems.
Currently, Virtual Server will support
a 64-bit operating system on the host
machine, but not on the virtual
servers. “That’s going to be a big issue
with the new Exchange, which is going
to be 64-bit only,” Hanna says. “Right
now, we’re constrained to actually use
a 64-bit machine for testing when
we’d like to virtualize it instead.”
Virtual networking support is another
element that is less than robust. “That’s
one area that VMware has over Virtual
Server,” Hanna says. “With VMware,
Project3
2/14/06
11:31 AM
Page 1
1006red_ReaderRev24-28.v7
9/15/06
10:42 AM
Page 28
ReaderReview
you can go to your own virtual switch or
subnets, and you have more options. You
can create virtual networks in Virtual
Server, but you essentially tie it to an
adapter and that’s it. It’s not as granular.”
Reynolds agrees, and says he’d like to
see Virtual Server support 802.1Q
VLAN tagging. “Virtual Server has a
little bit of catch up to do with VMware
on its robustness of virtual networking
and virtual switches,” he says.
Lack of virtual SMP support is also an
issue. “With Virtual Server, you can do
relative weight, but you can’t specify
[something like] this VM uses this percentage of this processor,” Marshall says.
“A nice [feature] to have for us would be
virtual SMP support, so you can say it
will share from these two processors out
of these four, or something like that.
Realistically, if you’re trying to get into
the production data center, you really do
need to have a virtual SMP.”
Still, readers say Microsoft Virtual
Server 2005 R2 is worth a look. “I’m
Different Strokes
here are two main flavors of server virtualization, and Microsoft has
both covered. Microsoft’s Virtual Server, like VMware’s VMserver
(previously called GSX server), is a hosted server virtualization platform.
That means the virtualization software must run on a host operating
system on the server hardware.
The other flavor is what Microsoft is calling Hypervisor, which requires no
host OS prior to loading the virtualization software. VMware’s ESX Server,
XenSource’s Xen and the virtualization functionality in Longhorn Server all
employ a Hypervisor server virtualization layer.
Generally speaking, Hypervisor-type products minimize overhead for
better performance and robustness. A main differentiator is cost. Most
hosted types, like Virtual Server and VMserver, are free. Most Hypervisor
products, like ESX Server, charge a licensing fee. Xen is an exception,
because it’s open source.
The Hypervisor capability in Longhorn is expected to become a part
of the operating system, with no extra license required.
— J.C.
T
pretty jazzed up about it,” Catalini
says. “Right now, I have rickety
old PCs that are strung together.
With this, I get to clean them up
and they go away. Things are going
to run on better hardware, be backed
up more consistently, be more
portable and recoverable and have
cleaner configurations.” —
Joanne Cummings ([email protected])
is a freelance technology journalist.
Project18
9/5/06
3:39 PM
Page 1
Defragment Every Drive On Your Enterprise
Without Leaving Your Chair
(Or even lifting a finger)
PerfectDisk Command Center™
Perfection Made Automatic
Introducing
Centralized Management
And Reporting
Patent-pending
Resource Saver™ Technology
Exclusive Space
Restoration™ Technology
Exclusive AutoPilot
Scheduling™
Recognized as the world’s most powerful
defragmenter, PerfectDisk has always been the
secret to faster, more reliable computers. Now,
with a powerful new suite of enterprise tools,
PerfectDisk 8.0 takes disk defragmentation to
the farthest reaches of the enterprise, while
placing total control right at your fingertips.
Are you sitting down? Good. Because
with the PerfectDisk Command Center™ you
can easily deploy, configure and manage the
defragmentation of every system on the enterprise... all from the comfort of your own desktop. And that’s just the beginning.
Our all new enterprise reports deliver
valuable performance statistics and at-a-glance
graphical displays that track and identify any
fragmentation issue on any managed computer,
and much more.
In addition, PerfectDisk‘s patent-pending
Resource Saver™ technology finds file frag-
mentation without having to first open the file,
further reducing any system impact of defragmentation. And new disk and CPU throttling
provide even greater control over resources.
What’s more, Raxco’s exclusive AutoPilot
Scheduling™ provides automatic defragmentation at the optimal time for each user. And
AutoPilot Scheduling’s Screen Saver Mode
enables idle-time defragging at user-defined
intervals. (There’s really nothing to it.)
And features like our Single File Defrag
and Consolidate Free Space Defrag (part of
PerfectDisk's Space Restoration Technology™ )
are particularly valuable for users working with
supersize files.
Give your users reason to stand up and
cheer. And while PerfectDisk 8.0 is busy keeping each computer in tip top shape, you can sit
back and simply take the credit. For the details
and a free demo, visit
www.pd8command.com
®
1-800-546-9728
www.raxco.com
June 8, 2004
PerfectDisk 6.0
¤
May 24, 2005
PerfectDisk 7.0
Microsoft, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. PerfectDisk is a registered trademark of Raxco
Software. PC Magazine Editors’ Choice Award Logo is a registered trademark of Ziff Davis Publishing Holdings Inc. Used under license. All other product names mentioned herein are the trademarks of
their respective owners.
Project3
8/11/06
12:50 PM
Page 1
1006red_Roboto31.v6
9/15/06
10:27 AM
Page 31
Mr. Roboto
Automation for the Harried Administrator | by Don Jones
Intelligent Transfer
A
fter downloading some sizeable images for product
updates, it occurred to me that life is pretty good. I
can start downloads, let them run all day and night in
the background, and still use my computer—almost as if
nothing else was happening. I can do this because I use
BITS, the Background Intelligent Transfer Service built
into Windows. You can use it too, and you’ll love it.
First, download BITS 2.0 and WinHTTP 5.1 from Microsoft. Don’t
worry—they’re free. BITS will let you
know if all your patches are up to date,
and it will not overwrite anything.
You’ll also need the WinXP SP2 Support Tools. Once you have everything
installed, you’re ready to roll.
Now find a nice juicy URL you want
to download. You can get at it via
HTTP or HTTPS, and it’s no problem
if it requires log-in credentials. Next,
create a new BITS download job by
opening a command-line or PowerShell
window and running bitsadmin /create
/download MyJob. (Use whatever name
you like in place of “MyJob.”)
Add your URL to the job by running
bitsadmin /ADDFILE MyJob
http://whatever.com/file.zip
c:\local\file.zip. You’re providing the
job name (in place of “MyJob”), as well
NeedHelp?
What Windows admin task would you
like Mr. Roboto to automate next?
Send your suggestions to
[email protected].
You can download this month’s tool
from Redmondmag.com.
FindIT code: Robot1006
as the remote URL and local filename
you want to use for the file. That local
filename needs to be a complete path.
The file won’t appear until the job is
in the background, using “spare”
bandwidth so you can continue using
your computer for other tasks. Run
the bitsadmin /addfile as many times
as you like to add more download
URLs to the job. They will download
in order.
You can check the status by running
bitsadmin /monitor. You’ll get a continuously updated status report, which you
can break out of by pressing Ctrl+C
(downloading continues in the background). Suspend a job by running
bitsadmin /suspend MyJob (or whatever
job name you used), and resume again
whenever you like. When the job is
BITS will download in the background, using “spare” bandwidth
so you can continue using your computer for other tasks.
completed, so don’t panic if you don’t
see a zero-byte file show up right away.
If you need to set proxy settings, run
something like bitsadmin /setproxysettings MyJob preconfig. This sets BITS
to use Internet Explorer’s proxy settings, which are easy to set with the
Internet Options control panel. They
are most likely already set correctly on
your computer.
Finally, if the URL you’re downloading requires a log-in, add credentials to
the job by running bitsadmin /setcredentials MyJob server basic username
password. Substitute the correct values
for “username” and “password.” This is
basic (clear-text) authentication. You
can specify ntlm instead of basic to use
Windows integrated authentication. In
that case, you’d leave out the username
and password because it will use your
log-on credentials.
Now you’re ready to kick everything off by running bitsadmin
/resume MyJob. BITS will download
finished, you’ll have to “complete”
the process to make the destination
files actually appear. Run bitsadmin
/complete MyJob to do this.
BITS 2.0 offers a ton of additional
flexibility, including the ability to add
lists of URLs from a text file, control job
access, control lists and more. Run bitsadmin /? to learn about all the details.
BITS may require a bit of commandline jockeying to use (Windows doesn’t
ship with a GUI for the tool), but it’s a
better download manager than many
browser plug-ins, at least for background downloads. BITS can resume
interrupted jobs where it left off, which
saves time, and it hums away in the
background to download large files
while you’re tackling other tasks.—
Don Jones ([email protected] ) is a
contributing editor for Redmond
magazine. He’s currently working on
a new book, “Windows PowerShell:
TFM” (www.sapienpress.com).
| redmondmag.com | Redmond | October 2006 | 31
1006red_F1Badv9
9/15/06
12:17 PM
Page 32
Spying, blackmailing and
thievery—are there criminals
BY DOUG BARNEY
in your IT shop?
i
n 2003, a 911 dispatcher in Pennsylvania named
Michael Michalski broke into private motor vehicle records looking for his ex-girlfriend. Michalski
kept digging even after he was suspended from his
job. In fact, former co-workers helped him gather some
data. Michalski found what he was looking for, and proceeded to track down and kill his ex and her new boyfriend.
In the right hands, information is a valuable tool. In the
wrong hands, it can ruin lives, destroy companies and land
offenders in jail. This puts IT in a precarious position. There
is a fine line between protecting information and abusing it.
“IT can look at anything at anytime. All of the accounts
and privileges go through IT,” says one admin who, like
most of the IT professionals interviewed for this story,
declined to be identified due to the sensitivity of the topic.
“As the network systems admin for my company, I’m only a
sniffer away from any information I want. Do I do that?” he
asks. “Of course not. It’s not ethical. If you don’t trust your
IT people, get rid of them. All of the data in your company is
in their hands, so they had better be trustworthy.”
Ensuring trustworthiness is easier said than done,
because there are some who just can’t resist temptation.
32 | October 2006 | Redmond | redmondmag.com |
“We have a network guy who monitors everyone’s
Internet usage. Most employees don’t know this because
our boss tells everyone that there’s no one monitoring
the Internet and that he doesn’t want to know anyway,
but this network guy always seems to know what everyone is surfing for. He even talks about it with other
employees,” says Jeff Osia, senior application developer
for JW Software Inc.
1006red_F1Badv9
9/15/06
12:17 PM
Page 33
Moonlighting by Day
Invasions of privacy are bad enough, but other IT abuses can
be much more serious. An IT worker for a school district
lived though a nightmare when the district’s IT director and
a network co-worker became partners in crime. “They had a
computer consulting business they ran on the side and would
leave the district several times a day to work on client computers without taking vacation time,” the IT worker explains.
What started as moonlighting on school district time
grew steadily worse. “They discovered the program
eBlaster, which records everything you do on the computer
and attaches keylogs, screenshots, Internet usage and a lot
of other info in an e-mail and sends it to a specified
address for review,” the worker explains.
This went far beyond mere snooping. “This was initially
used to monitor users suspected of spending too much
| redmondmag.com | Redmond | October 2006 | 33
1006red_F1Badv9
9/15/06
12:18 PM
Page 34
time surfing the Internet or inappropriate e-mail. It was
put on the CFO, COO and superintendent’s computer. It’s
also suspected that it was put on a few of the school board
members’ computers.”
According to the IT worker, those involved hoped to use
knowledge of employees’ and school board members’ positions on various issues to help advance new initiatives and
gain political favor.
“They also installed a server with Lightspeed software
that would record all network packets and save any information that went through the network for specific users,
including documents and e-mail and that would send
reports to a specified address. This was brought to the
attention of the CFO (who some suspected was the one
who wanted the info) and he conducted an internal investigation. His investigation
showed that nothing was happening,” the worker continues.
While the internal investigation glossed over the situation,
other authorities weren’t convinced. “Less than a week after
the internal investigation was
complete and the school board
was told nothing was going on,
the FBI came in and confiscated
our Exchange server, the
LightSpeed server, all of the IT
department computers and all
the computers that were suspected to have eBlaster
installed.” The case is now with
the local DA, who is reportedly negotiating plea bargains.
Besides spying on their colleagues, these miscreants also
used school district funds to pay for their new company.
“They were ordering parts from our vendor, building them
into new cases and selling them to their clients. A few of us
suspected this when we saw parts come in that we didn’t
use anywhere,” he says. “One day we saw a tape drive in a
box of parts and the next day it was gone. A few days later,
our network engineer brought in pictures of the new server
he built for a client and it had that tape drive in it.”
Ironically, when this whistle-blower moved to a new job,
he was able to help nail these crooks. “When I started my
new job, I was trying to collect inventory of the computers
and software. I used AuditWizard to scan all the computers
and build the database. I was having problems with three
computers collecting the information. I checked the data
and they happened to be from the same vendor we had at
the school district,” he says.
Then it was time for some detective work. “I contacted
the rep ... and gave him the serial numbers from the systems. He gave me the purchase order and specifications as
computers that were sold to the school district,” he says. “I
had my accounting people pull the purchase orders and
34 | October 2006 | Redmond | redmondmag.com |
they were purchased from the business owned by the
[school district’s] network engineer and IT director less
than two weeks after they were sold to the school with the
identical configuration in a different case.” No getting out
of it this time—they were busted.
Snoop Dog
Privacy invasions are the most common issues. “We
hired a bright young guy to operate our network. We
soon found he was operating an online store from our
server,” says the president of a computer firm who asked
to remain anonymous. “We also discovered he was reading e-mail to and from executive staff and doing other
subversive activities. The moron didn’t see anything
wrong with any of his activities.”
Snooping on the CEO’s e-mail
to his mistress or your boss’ personal messages may seem like a
joke, but in doing so, you’re violating corporate policy, personal
privacy and possibly the law. Disclosing what you’ve learned to
co-workers is a whole different
level of wrongdoing.
“A couple of years ago, one of
the techs in our department
seemed to ‘know’ about
announcements before they were
made public. He also seemed to
‘know’ things about one other
tech who had declined to go out
with him. She was positive he
must have been reading her e-mails, because he would
say things to her he could only know by reading those emails,” says Cathy, another anonymous IT pro.
This is not as rare as you would like to think. “I had been
working for someone [from whom] I was learning administration. I saw cases where this person was fixing a problem,
and reviewed seemingly every file the user had on the hard
drive. ‘Snooping’ doesn’t quite describe what he did,” says
an anonymous IT worker.
Attraction to a coworker is often the motivation for this
type of cyber-stalking. “It boils down to either blackmail,
when the person was disliked, or spying when there was a
sort of attraction. It’s pretty easy to set up rules to forward
e-mails from one account to another,” says AJ Burch, a
consultant pro from Wilmington, N.C.
Indiscretions don’t always end with simply snooping on
electronic communications. “I worked for a company
where the IT department read every e-mail that came
from external sources or was sent to external destinations.
They had great fun telling others the contents of the
e-mails—some very personal. It was well known who was
doing what with whom and when,” recounts an anonymous
Redmond reader.
Project3
9/12/06
12:11 PM
Page 1
1006red_F1Badv9
9/15/06
12:18 PM
Page 36
“During the stock market boom,
every day was an IPO celebration day. I
was working as a Web admin in an
online traders Web server team, so I
opted to work the evening shift when
all the work was done,” says Farooq
Ali. “One night, I saw the domain
admin and one of his e-mail admins
working into the evening. Then I saw
them in the same room around almost
10 p.m., so out of curiosity I walked
over and asked, ‘What’s going on?’”
“They said they had been asked to
fetch all the e-mails sent in the past
year by some of our executives. SEC
has been investigating us and now
they’ve asked us to get the data from
the backups,” he says.
“I noticed that they have successfully
uploaded an entire e-mail inbox of
an executive and that they’re reading
36 | October 2006 | Redmond | redmondmag.com |
his e-mails,” says Ali. “Now this executive was an older person and not well
trained in the e-mail business, so he
used his office e-mail for his personal
e-mail as well. Some of the e-mails
were of an extremely private nature.”
“One of the admins made a copy of all
the e-mails. I do not know what happened of the SEC inquiry, but I do know
that we were all surprised when we
heard that same admin was promoted
to head of the department, bypassing
two other senior admins. Recently I saw
the promoted admin in Manhattan and
asked him directly. He said yes, he had
taken those e-mails to the executive
and asked for a promotion.”
— D.B.
Project2
4/6/06
4:54 PM
Page 1
1006red_F1Badv9
9/15/06
12:18 PM
Page 38
Dirty Work
Some IT folks are pressured into doing things that may be
unethical or illegal. “When an employee is thought to be
slacking and using the Internet for personal reasons, I’m
told to find out what they’re looking at. I poke around in
their workstation at their history files and temp Internet
files, and then report back to their team leader. At first, I was
OK with this. Then an employee that I didn’t particularly
like (because he didn’t do any work) was fired based on
what I found on his computer,” says an IT pro who asked
to be called Reluctant Spy.
“Reluctant Spy” worries about his
standing after that incident. “How
do I prove that if he ever filed a suit?
Could I be liable?” he asks. “I’m in a
very awkward situation. There are
others, including bosses and team
leaders, who also abuse the Internet.
I would really like to publish what
they’re doing, but I haven’t gotten
on their machines and looked.”
IT is also sometimes used to cover
up the actions of executives. “I’ve
been asked too many times by senior
level company personnel to cover up
their mistakes and bad judgments,”
says Will, another anonymous
admin. “I’ve been asked more than once to delete mail items
out of users’ mailboxes because someone who probably had
good business skills but hadn’t figured out the difference
between ‘Reply’ and ‘Reply to All’ sent out sensitive or
potentially damaging information via e-mail. I always did
what was asked, but it sometimes rubbed me the wrong way.”
While IT staffers often perpetrate abuse, they can also be
the victim. “I was an e-mail admin for a local bank and was
in charge of an automated user creation tool for several
databases. I needed to keep track and retain many of the
requests, so I created an agent to monitor delivery—return
receipt and post in a folder on my mail database. I used
this format for most of my correspondence,” says Scott,
currently a systems integrator at another firm.
“I moved on to another position and transitioned my job
to another admin. After about a month, I started getting
return receipts and transmission reports from my old OU
e-mail address. My replacement was going through not
only my mail file but the smtp.box and local mail.box on
the e-mail servers, reading mail and looking at attachments.” There is a happy ending to this story, though. “By
gathering information on the times and dates, we built a
case for his termination.”
“I’ve witnessed ignorant IT management entertain other
department manager’s requests for user’s browsing records.
My recommendations that they refrain from snooping until
HR is involved went unheeded. I refused to participate unless
HR was involved, but the ignorant managers proceeded at
their own peril,” says Piper, an IT team leader.
“Just because IT has the ability to snoop on users does not
give them the authority to do so unless directed by HR.
Otherwise, you’re simply setting yourself up for a labor relations lawsuit that will be difficult and expensive to defend.
User behavior is a performance
management issue, not an IT
issue. It is only the incompetent
IT manager that engages in user
snooping without the assistance
of HR. Competent managers are
able to properly manage their
staff’s behavior.”
HR and well-defined corporate policies should drive all
“spying” activities, one IT pro
argues. “I definitely think this
should be done by HR, but they
usually don’t have the skills to
go to the admin share on a
workstation and know where to
find the footprints.”
The misguided actions of IT don’t just result in dismissals,
privacy invasions and anger. They can ruin lives. “My wife
one day received an anonymous letter that contained several
of my personal e-mails. They did not try to blackmail me by
asking for money, they just felt it was their “moral” duty to
inform my wife of what I was writing. I quit the company
and my marriage ended in divorce. My credit was ruined by
the bankruptcy and divorce,” says Arnold Radloff of Lincoln,
Neb. “Now I never use my company computers for personal
e-mail. As a result, I have kept my current job and things are
finally getting better in my life.”
Silver Bullet?
Don’t Be a Spy
There is no silver bullet solution to the spying problem. For
IT managers, a lot boils down to simple judgment. Admins
must be smart enough to use their tools and access privileges within the guidelines established by the company.
“I have had to tune spam filters and Web filtering software. In that position, you see many things that you would
rather not see. It’s hard to not be sucked into reading the
e-mails about affairs and other things that people are stupid enough to include in messages from their work email,” says another IT professional who asked not to be
identified. “It really changes the way you look at people.
There are some things I would rather not know.” —
There can be pressure from all over—bosses, co-workers and
even your own curiosity. Spying, snooping and stealing are
wrong no matter who asks you to do it.
Doug Barney is the editorial director of the Redmond Media
Group. Reach him at [email protected].
38 | October 2006 | Redmond | redmondmag.com |
Project8
9/6/06
11:30 AM
Page 1
Project6
8/11/06
3:10 PM
Page 1
Still Looking For An Effective
Solution To Train Your Entire Staff?
Unlimited Users
Instructor Led Training On Demand
Content includes:
Microsoft
CompTIA
Cisco
Safety
Ethical Hacker
+ Many More
Manage Courses And Students From One Location
Connects Directly To Your Computer Network
40-90% Savings Over Individual Courses
Over 500 On-demand Course Titles
Unlimited Access
Then Stop Looking!
Introducing...
®
ThinkTank
Learning Management System
The Revolutionary, Enterprise-Wide Training Solution
ThinkTank3 provides a company with the necessary tools to effectively
train an entire workforce. Affordable, scalable, and cost effective,
ThinkTank3 answers all of your training needs
ThinkTank3 is designed to quickly plug into a standard network
connection and be up and running within minutes. Built for ease-of-use,
ThinkTank3 works on most networks with little or no configuration.
ThinkTank3 uses a centralized, flexible, and portable hard-drive system
allowing for fast and simple installation and maintenance.
Call Now to Learn More
1-800-942-1660 or 1.866.268.2920
or visit www.specializedsolutions.com
International: (727) 669-1415
Developing Tomorrow’s Training Standards Today.
1006red_F2Core41-46.v8
9/15/06
3:26 PM
Page 41
C:/
dd
dddddddd
WWWWWWWWWWWW
WWW
WWWWWWWWW iiii
dddddd
iiiiii
WWWWWWW
WWWW
WWWW
dddddd
iiiiii
WWWWWW
WWWWW
WWW
dddddd
iiii
WWWWWW
WWWWWW
WWW
dddddd
wwwwwwwwww
ww
wwwwwwww
sssss
WWWWWW
WWWWWWW
WWW
oooooo
ddddddddddd
wwwwww
www
wwww
sssssssss
iii
WWWWWW
WWWWWWWW
WWW
nnn
nnnnn
ooooo ooooo
ddddd
dddddd
wwwww
www
ssss
sss
ss
iiiiiiii
WWWWWW
WWW WWWWWW
WWW
nnnnnnnnnnnnnnnnn
ooooo
oooooo wwwwww
ddddd
dddddd
wwwwww
www
ww
sssss
ss
iiiiii
WWWWWW
WWW WWWWWW
WWW
nnnnnn
nnnnnn
oooooo
ooooooo wwwwww
dddddd
dddddd
wwwwww wwwwwwww www
sssssssss
iiiiii
WWWWWW WWW
WWWWWW WWW
nnnnnn
nnnnnn
ooooooo
ooooooo
dddddd
wwwwww ww wwwwww www
sssssssssss
ssssssssss
iiiiii
WWWWWW WWW
WWWWWW WWW
nnnnnn
nnnnnn ddddddd
ooooooo
ooooooo
dddddd
wwwwwwww wwwwwwww
ssssssssss
iiiiii
WWWWWWWW
WWWWWWWW
nnnnnn
nnnnnn ddddddd
ooooooo
ooooooo
dddddd
wwwwww
wwwwww
ss
ssssss
iiiiii
WWWWWWW
WWWWWWW
nnnnnn
nnnnnn ddddddd
oooooo
oooooo
ddddddd
dddddd
wwwww
wwwww
sss
sssss
iiiiii
WWWWWW
WWWWWW
nnnnnn
nnnnnn
oooooo
ooooo
ddddddd dddddd
wwww
wwww
ssss
sssss
iiiiii
WWWWW
WWWWW
nnnnnn
nnnnnn
oooooo ooooo
ddddddddddddddddd
www
www
ssssssss
iiiiiiiiii nnnnnnnnn nnnnnnnnn
WWW
WWW
ooooooo
hhh
WWWWWWWWWWWW
WWW
WWWWWWWWW iiii
hhhhhhhhh
iiiiii
tt
WWWWWWW
WWWW
WWWW
hhhhhh
tt
iiiiii
ttttt
WWWWWW
WWWWW
WWW
hhhhhh
ttttt
iiii
tttttt
WWWWWW
WWWWWW
WWW
hhhhhh
tttttt
uuu
uuu tttttttttttt
oooooo
WWWWWW
WWWWWWW
WWW
hhhhhh
tttttttttttt
uuuuuuuu uuuuuuuu ttttttttttttt
iii ttttttttttttt
ooooo ooooo
WWWWWW
WWWWWWWW
WWW
hhhhhh hhhhhhh
uuuuuu
uuuuuu
iiiiiiii
ooooo
oooooo
tttttt
WWWWWW
WWW WWWWWW
WWW
hhhhhhhhhhhhhhh
tttttt
uuuuuu
uuuuuu
iiiiii
oooooo
ooooooo
tttttt
WWWWWW
WWW WWWWWW
WWW
hhhhhh
hhhhhh
tttttt
uuuuuu
uuuuuu
iiiiii
ooooooo
tttttt
WWWWWW WWW
WWWWWW WWW
hhhhhh
hhhhhh ooooooo
tttttt
uuuuuu
uuuuuu
iiiiii
ooooooo
tttttt
WWWWWW WWW
WWWWWW WWW
hhhhhh
hhhhhh ooooooo
tttttt
uuuuuu
uuuuuu
iiiiii
ooooooo
tttttt
WWWWWWWW
WWWWWWWW
hhhhhh
hhhhhh ooooooo
tttttt
uuuuuu
uuuuuu
iiiiii
oooooo
oooooo
tttttt
WWWWWWW
WWWWWWW
hhhhhh
hhhhhh
tttttt
uuuuuu
uuuuuu
iiiiii
oooooo
ooooo
tttttt
WWWWWW
WWWWWW
hhhhhh
hhhhhh
tttttt
uuuuuuuuuuuuuuuuu tttttttttt
iiiiii
oooooo ooooo
WWWWW
WWWWW
hhhhhh
hhhhhh
tttttttttt
uuuuu
uuuuu
iiiiiiiiii
ooooooo
ttttt
WWW
WWW
hhhhhhhhhh hhhhhhhhhh
ttttt
dd
dddddddd
WWWWWWWWWWWW
WWW
WWWWWWWWW iiii
dddddd
iiiiii
WWWWWWW
WWWW
WWWW
dddddd
iiiiii
WWWWWW
WWWWW
WWW
dddddd
iiii
WWWWWW
WWWWWW
WWW
dddddd
wwwwwwwwww
ww
wwwwwwww
sssss
WWWWWW
WWWWWWW
WWW
oooooo
ddddddddddd
wwwwww
www
wwww
sssssssss
iii
WWWWWW
WWWWWWWW
WWW
nnn
nnnnn
ooooo ooooo
ddddd
dddddd
wwwww
www
ssss
sss
ss
iiiiiiii
WWWWWW
WWW WWWWWW
WWW
nnnnnnnnnnnnnnnnn
ooooo
oooooo wwwwww
ddddd
dddddd
wwwwww
ww
www
sssss
ss
iiiiii
WWWWWW
WWW WWWWWW
WWW
nnnnnn
nnnnnn
oooooo
ooooooo wwwwww
dddddd
dddddd
wwwwww wwwwwwww www
sssssssss
iiiiii
WWWWWW WWW
WWWWWW WWW
nnnnnn
nnnnnn
ooooooo
ooooooo
dddddd
wwwwww ww wwwwww www
sssssssssss
ssssssssss
iiiiii
WWWWWW WWW
WWWWWW WWW
nnnnnn
nnnnnn ddddddd
ooooooo
ooooooo
dddddd
wwwwwwww wwwwwwww
ssssssssss
iiiiii
WWWWWWWW
WWWWWWWW
nnnnnn
nnnnnn ddddddd
ooooooo
ooooooo
dddddd
wwwwww
wwwwww
ss
ssssss
iiiiii
WWWWWWW
WWWWWWW
nnnnnn
nnnnnn ddddddd
oooooo
oooooo
ddddddd
dddddd
wwwww
wwwww
sss
sssss
iiiiii
WWWWWW
WWWWWW
nnnnnn
nnnnnn
oooooo
ooooo
ddddddd dddddd
wwww
wwww
ssss
sssss
iiiiii
WWWWW
WWWWW
nnnnnn
nnnnnn
oooooo ooooo
ddddddddddddddddd
www
www
ssssssss
iiiiiiiiii nnnnnnnnn nnnnnnnnn
WWW
WWW
ooooooo
The new Server Core is a stripped-down,
rock-solid version of Longhorn.
OOOOOOO
OOOOO
OOOOO
OOOOO
OOOOOO
OOOOO
OOOOOO
OOOOOO
OOOOOO
OOOOOO
OOOOOO
OOOOOO
OOOOOO
OOOOOO
OOOOOO
OOOOOO
OOOOOO
OOOOOO
OOOOOO
OOOOOO
OOOOOO
OOOOOO
OOOOO
OOOOO
OOOO
OOOOOOOOOO
OOOO
ne of the most innovative features coming in Windows “Longhorn” Server
isn’t really a feature as much as a whole
new version of Windows. It’s called
Server Core, and it will only take onesixth of the disk space of a normal
Longhorn installation. It’s not expected to need anywhere
near as many patches and hotfixes as Windows 2000. It’s a
version of Windows that does not, in fact, use windows. It’s
breaking Microsoft’s long-standing reliance on graphical
interfaces and shaking things up in several of Microsoft’s
product groups.
Server Core reflects a changing view of servers. “Administrators are accustomed to thinking of servers by their
role. That’s my file server, that’s a domain controller, that’s
an Exchange server,” says Andrew Mason, a Microsoft program manager for Server Core. Some of those roles really
don’t use much of what is built into Windows.
Server Core also recognizes—based on painful experience—
that fewer “moving parts” in an operating system equates to
BY DON JONES
fewer vulnerabilities, stability issues and maintenance
points. Reducing the amount of code can help reduce the
amount of bugs. That’s what Server Core is all about.
Server Core can only act as a file server, domain controller, DNS server or DHCP server. As such, it’s far from
being a full-fledged Windows operating system (although
Microsoft is considering other roles for future versions).
Besides these four core roles, Server Core also supports
Cluster Server, Network Load Balancing, the Unix subsystem, the new Windows Backup in Longhorn, Multipath
I/O, Removable Storage Management, BitLocker drive
encryption and SNMP. Server Core also supports
Remote Desktop administration, although you’ll only
get a command-line window when you connect.
That’s about it. There’s no Internet Explorer, no Outlook
Express, Calculator or Windows Paint, no Wordpad,
Windows Messenger or Media Player—just the basics.
Microsoft did add Windows Notepad to Server Core at
the request of several sneak-preview customers, but even
that’s a stripped down version. You can’t, for example, use
| redmondmag.com | Redmond | October 2006 | 41
1006red_F2Core41-46.v8
9/15/06
3:26 PM
Page 42
Server Core
Figure 1. While Server Core is essentially Windows without
windows, you do still have access to some Windows tools.
the “Save As” function, because Server Core doesn’t have
dialog boxes for functions like Open and Save As.
There’s also no Microsoft .NET Framework. This means
you can’t run any managed code on Server Core. Mason says
his development team wants to add the .NET Framework to
Server Core, but they first need the Framework team to
modularize the code so they can add just the essentials. The
Framework’s absence in Server Core is significant. For example, you can’t run Windows PowerShell, Microsoft’s vaunted
new management shell, on Server Core. That doesn’t mean
you’re out of remote management options, however.
Server Core will come in Standard, Enterprise and Datacenter editions for i386 and x64 platforms. Most companies
will probably opt for the Standard edition because most of
the differences found in the Enterprise and Datacenter editions of Longhorn won’t be present in Server Core. The
Enterprise Server Core does, however, get you more processor and memory support, as well as clustering. Datacenter
adds the whole Datacenter hardware program and 99.999
percent reliability—although the current Datacenter isn’t
exactly flying off the shelves.
Get to the Core
Server Core comes up as an installation option when you
install Longhorn Server. It’s important to understand that
going with Server Core requires a clean install (no
upgrades from earlier versions or from the full version of
Longhorn). There’s also no “upgrade” path from Server
Core. You can’t, for example, make it into a full Windows
server without performing another clean install.
The absence of a graphical interface is almost immediately
apparent. Logging onto the server doesn’t bring up the usual
first-run “Finish setting up Windows” screen displayed by
the full version of Longhorn. This also brings up your first
42 | October 2006 | Redmond | redmondmag.com |
quandary: How do you change the Administrator password?
How do you join a domain? How do you activate the thing?
After all, without system notification, there are no “Activate Windows” balloon reminders (not that anyone will
miss those). There’s certainly no Start Menu from which to
launch activation. The setup experience, in fact, is one of
the primary challenges Mason and his team had to handle.
For all of Microsoft’s boasting about the ease of remote
Windows management, the Server Core team has dealt with
a slightly different story. They’ve built custom utilities to
cover for Windows’ remote management shortcomings. The
only file that comes with Server Core and no other edition of
Windows is SCRegEdit.wsf, a VBScript the team cobbled
together to set up Windows Update, configure a pagefile, set
up the time zone and enable Remote Desktop. You would
normally need a mouse and a GUI to complete those steps.
You can use existing tools like Netdom.exe to join the
machine to a domain, rename it and so on. For automatic
product activation, you can use Slmgr.vbs. That can even
handle phone-based activation, although given the length
of the activation code you have to type into the command
line, you’ll want to make sure automatic activation works if
at all possible. You can even use Slmgr.vbs from another
machine for true remote manageability.
Zen-like Simplicity
When you first log onto a Server Core console, you’ll see
two command-line windows. Why two? In case you close
one, of course. The final version will probably display only
one command-line at logon—you can hit Ctrl | Alt |
Delete and bring up the Task Manager to launch a new
Cmd.exe process if you accidentally close one.
In fact, Figure 1 shows that the statement “Windows without windows” isn’t exactly true. You’ll see that it does have a
bare minimum of Windows’ GUI capabilities for simple
dialogs like Task Manager and basic installation software.
The mouse also works, in case you were wondering.
Want to make a domain controller? Just run Dcpromo.exe,
as always. Because Dcpromo.exe can’t display graphically,
however, you’ll need to provide an unattended installation
text file. This is the same kind of file you would use to promote any DC in your environment. Server Core uses Longhorn’s technique of actually installing and removing the real
binary code when you add and remove roles. It’s not just
starting a few services. It’s actually copying real bits into the
system directory. This helps improve security. If you aren’t
running a feature, physically removing its code ensures that it
can’t be used against you.
Managing the Beast
Forget about logging onto a Server Core console and managing it from there. Sure, you can do it. There’s no GUI on
the server, though, and there’s no point making the trip to
the datacenter or even firing up the Remote Desktop con-
Project3
7/17/06
12:04 PM
Page 1
Citrix Education
Has Rolled Out New,
Advanced Certifications...
...and IT professionals
everywhere are celebrating.
With advanced certifications and training, IT professionals
now can provide the best access experience by:
• Designing and building the most efficient Citrix environments
• Providing optimal support for Citrix Access SuiteTM products
• Drastically reducing implementation costs
Citrix’s advanced certifications are among the most highly
respected in the industry:
Citrix Certified Enterprise AdministratorTM 4.0 (CCEA)—
provides extensive preparation for build, test, rollout and
support of all Citrix Access Suite products.
Citrix Certified Integration ArchitectTM 4.0 (CCIA)—
provides advanced preparation to analyze the existing IT
environment, and design for a successful implementation of
the Citrix Access Suite.
Get rolling with our most advanced certifications and
more at www.citrix.com/edu/redmond
C I T R I X
E D U C A T I O N
©2006 Citrix Systems, Inc. All rights reserved. Citrix ® , Citrix Access Suite TM , Citrix Certified
Enterprise Administrator TM and Citrix Certified Integration Architect TM are trademarks or
registered trademarks of Citrix Systems, Inc. in the United States and/or other countries.
All other trademarks and registered trademarks are the property of their respective owners.
1006red_F2Core41-46.v8
9/15/06
6:07 PM
Page 44
Server Core
sole. You can do everything you need remotely. Just use the
Right now, WinRS doesn’t support interaction. Your comMicrosoft Management Console snap-ins you always have
mands must be all-inclusive so the command doesn’t need
for administering DHCP, DNS or Active Directory.
additional information. That may improve later in the LongUse Explorer for file and folder management. Heck, use
horn development cycle as the product teams try to add
your VBScripts or Windows
more back-and-forth capabilities.
PowerShell, since Server Core
Less Is More
supports both remote WinServer Core is not
Cramming Windows into a
dows Management Instruthe stripped-down
single gigabyte or less (down
mentation and Active
Yugo of the Windows
from Longhorn’s 5GB to 6GB
Directory Services Interface
world. It has what
footprint) requires leaving out
connections. The only differplenty of elements. Drivers
ence is that you’ll run these
you need, and only
are a good starting place.
management tools on your
what you need.
Server Core doesn’t do sound,
system, not the server console.
so it doesn’t need sound-card
You can use Group Policy to
centralize configuration. Server Core reads and obeys Group drivers. It doesn’t print, so it doesn’t need printer drivers.
This is the type of missing stuff that, quite frankly, you’ll
Policy objects (GPOs) from the domain just fine. In fact,
GPOs are the best way to configure Server Core features like never miss.
On the topic of drivers, though, how the heck do you install
the Windows Firewall and Automatic Updates client.
new hardware without the Control Panel or Add Hardware
If your workstations will be running Windows Vista, you
can use a cool new feature called WS-Management. Server Wizard? Relax, Server Core supports plug ‘n’ play, but it
does so silently. If you need to provide a custom driver, install
Core includes a WS-Management “listener.” Vista has the
it first with the Drvload utility. Point it at the driver’s INF
new WinRS—that’s the Windows Remote Shell client.
file and your driver will become part of Windows’ built-in
Type a command and WinRS transmits it to the server,
list and you can silently install the hardware.
where the command executes. Any output is displayed on
That will work if the driver itself is digitally signed. Right
your workstation. Finally, a compelling reason to upgrade
now, there’s no GUI to configure driver-signing policy.
to the much-delayed Vista.
Project1
8/3/06
9:38 AM
Page 1
1006red_F2Core41-46.v8
9/15/06
3:26 PM
Page 46
Server Core
Server Core does have the Group Policy client, so you
could use Group Policy to configure driver signing.
Microsoft is considering adding a command-line utility to
control driver signing options for Server Core.
Server Core isn’t the stripped-down Yugo of the Windows
world. It has what you need, and only what you need—
IPSec, Windows Firewall, Event Log, Performance Monitor
counters, Licensing, Windows File Protection, outgoing
HTTP support and then some. Nothing strictly necessary
was tossed overboard. The default services list is miniscule,
with about 40 entries.
If you use third-party software agents to help improve
manageability, software deployment or other tasks, you
should be in good shape. Most agent software doesn’t
display any kind of GUI, so they’ll usually install fine.
This is especially true if they’re packaged in an .MSI file
(Server Core includes the Windows Installer service).
If they use .NET managed code, however, you’re out
of luck. Make sure you test any agents you plan to use
in advance.
Systems Management Server and Microsoft Operations
Manager, for example, seem to work fine. The anti-virus
software used by Microsoft and many other enterprise-class
anti-virus packages also work. Microsoft’s “Designed for ...”
logo program for Windows Longhorn Server will include a
Server Core element, so third-party developers can identify
code that’s compatible with Server Core.
Ready for Your Core?
Perhaps more interesting than Server Core itself is what it
promises for the future. With a stripped down version of
Windows, Microsoft has to provide better remote, non-GUI
management tools. These tools can make it easier to automate repetitive administration tasks.
Microsoft product teams will have to think in layers, imagining a minimum set of features that can run on Server Core
with minimal dependencies. Then they can conjure a broader set of features for full versions of Windows. Manageability
will become distinctly separate from server products.
Server Core is shaping up as the perfect infrastructure
server. With a smaller disk and memory footprint, there are
more system resources available for the server’s workload.
The reduced management and attack surface also make it
more stable and reliable than other versions of Windows.
When Longhorn Server ships in 2007, Windows will
have finally “caught up” to Novell NetWare 3.x. Server
Core is a server that’s just a server, not a full-fledged client
as well. Get your hands on the public beta of Longhorn
Server to check out Server Core. In the meantime, start
getting used to that command-line prompt. It’s your new
best friend. —
Don Jones is a contributing editor for Redmond. He’s currently
working on “Windows PowerShell: TFM” (www.sapienpress.com).
You can reach him at [email protected].
NORTHERN
STORAGE
SUITE
More than a third of your company’s saved data is irrelevant, outdated and nonwork related. Where do more than half of the Fortune Global 100 turn when they
need intelligent storage management?
“Microsoft is pleased about Northern’s focus and 10 year history in developing and delivering complete storage resource management solutions for
Windows environments, making it a good choice for Microsoft’s internal deployment”, said Ben Fathi, General Manager, Windows Server Division.
WWW.NORTHERN.NET / [email protected] / 1.800.881.4950
© Northern Parklife, Inc. All trademarks are properties of their respective owners.
Project3
7/17/06
11:15 AM
Page 1
The Most Universal Three Letters Since URL
At HP, a PMP® [credential] is a stamp of
approval. Our major reason for focusing
on project management certification is customerbased: We want to make sure we’ve got the best
project managers. Customers across countries
and industries ask us, what kind of project managers do you have? What
kind of certification do they have? We can tell them that the majority of our
project managers are certified. HP values certification. We have four levels of
project managers, and the top three require a PMP certification.
Ronald L. Kempf, PMP | Director, HP Services Project Management Competency Development & Certification
®
Making project management indispensable for business results.
www.pmi.org/pmpredmond.htm
®
Project Management Institute
© 2006 Project Management Institute, Inc. All rights reserved. “PMI”, the PMI logo, “PMP”, and “Making project management indispensable for business results” are registered marks of the Project Management Institute, Inc.
PMP_ad_Redmond.indd 2
5/18/06 10:10:15 AM
Project1
9/15/06
10:08 AM
Page 1
1006red_F2SharPnt49-58.v9
9/15/06
10:18 AM
Page 49
Itching to deploy Microsoft’s powerful new SharePoint
portal server technology? Better know what you’re
getting yourself into first. BY RICK TAYLOR
icrosoft’s SharePoint Portal Server 2003 lets
enterprises gather, leverage and expose vast
stores of knowledge. However, the process of
deploying the software can overwhelm IT managers who
find themselves working across a dizzying array of technical and business disciplines to tie it all together.
How do you make a SharePoint deployment fly at a large
enterprise? Join me on a high-stakes deployment at a very
large Food and Beverage Company that we will call FBC.
I meet with the CIO for the first time since I’ve been
hired. Nice guy. He asks me how much I really know about
SharePoint because he saw my resume, which mentioned
my expertise. It turns out one of his direct reports has been
charged with finding a solution for document collaboration and management. One of the project managers has
some SharePoint experience and FBC is looking seriously
at the software. The project manager and I hit it off almost
immediately and start geeking out on SharePoint technology. The project manager tells me he’s a developer and is
glad an IT guy like me can help with the deployment.
I meet with key stakeholders in the project. I have been
around the block enough times to know that leaving people out of the loop can build walls, and in the case of
SharePoint, you need to know who all the players are from
a business perspective. The taxonomy in SharePoint is key
and this makes knowing who’s who in the organization an
immediate priority.
I make it clear in the meeting that SharePoint will not
automatically organize the information, that care and planning on our part will be critical to success. Then I drop the
bomb: “Where’s the information that your organization
needs to have and use to be successful?” I ask.
| redmondmag.com | Redmond | October 2006 | 49
1006red_F2SharPnt49-58.v9
9/15/06
10:18 AM
Page 50
The silence is deafening. The most common answer
after the silence is “Everywhere.” Sorry, but that doesn’t cut
it. We need to know exactly where the information is. Don’t
know? Find it. And once you find it, figure out what’s relevant and what’s not relevant. Based on the looks I get in the
meeting, answers won’t be easy to come by. And yet, this is
probably the No. 1 planning issue in deploying SharePoint
Portal Server 2003—knowing where the relevant information resides and how much of it there is. (In Microsoft
Office SharePoint Server 2007, the Knowledge Network
feature makes this issue a lot less daunting.)
After the information is located and assessed, the decisions as to what content sources to include are all but
made. In SharePoint a content source can be a file share,
an Exchange public folder, other SharePoint servers, or
other Web sites. Content sources are important because
SharePoint uses them to build a Content Index, which is
created when SharePoint crawls the locations where the
information resides and stores them. The context index is
then accessed by search queries. In order to create and
manage additional indices, you’ll need to enable Advanced
Search Administration mode.
Everyone is on board. Actually, the word’s gotten out and
more people want to get on board! I’m starting to get emails about when the application will be deployed and when
particular departments will receive their “portal.” I share the
e-mails with the project manager who moves them up the
chain to his boss. As this is a pilot project, we need to keep
the lid on things and limit the scope of the effort. This
means no extra “stuff” or “tools,” and all the hardware and
software must be commercial, off the shelf (COTS).
Actually, all this makes the job more manageable. We
know how many departments and groups will be allowed to
participate in the project and we can avoid fighting with
vendor support in this deployment. The server stack
includes Microsoft Server 2003 Enterprise Edition, SharePoint Portal Server, Microsoft SQL Server 2000 Enterprise
Edition, Microsoft Cluster Server and Microsoft Network
Load Balancing. Next, I interview the groups to find out
exactly what their individual needs are, and how many documents they are planning on using to collaborate with others.
The interviews were informative. I now have enough
information to start planning the logical structure. I’ve
decided that a large server farm is appropriate, even for
this pilot project. There are five business units in four distinct locations (all in North America) that make a convincing pitch for needing SharePoint.
Now for the physical infrastructure. I need to figure out
where the servers will be placed geographically, what DNS
entries to make (A records and CNAME records are used
heavily in SharePoint) and the exact topology. I will have
50 | October 2006 | Redmond | redmondmag.com |
to work with the Active Directory team to ensure that the
proper accounts are created and I will need to work with
the Network team to get the appropriate IP addresses for
each server. I wonder if is there is a database team? (I later
find out that there was.) I will need to bring them in the
loop since SharePoint must store its configuration information there. Emails go out to about 40 people.
While I wait for the response to the emails, I use the time
to think about the hardware. What type, how much and
what are the specifications? Because FBC has a contract
with a very large hardware vendor (LHV), my options are
somewhat limited. This is a large server farm, so I will
need servers to host the Web front-ends (WFE), Search,
Index and a clustered database. I calculate how much space
I will need for the implementation. This gets interesting. I
will need about a 5:1 disk space ratio—for every 1GB of
data I want to put into SharePoint, I will need 6.5GB of
free disk space. Where does that ratio come from? Let’s do
the numbers.
If I have 1GB of data, I’ll need 1GB of free disk space,
obviously. Because this space is in SQL server, I will also
need 100 percent free disk space equal to the size of the
database for SQL DB maintenance routines. We estimate
we’ll need about 300MB of storage for the internal index,
and four times that amount for indexing external data,
such as data from file servers, public folders, other Web
sites and the like. Finally, we’ll need plenty of available
storage for the farm backup. The numbers for our project
shake out as shown in the table below.
Free Space Needed
Documents . . . . . .
Database . . . . . . .
Index (internal content)
Index (external content)
Farm backup . . . . .
GRAND TOTAL . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 1.5TB
. 1.5TB
. 300GB
. 1.2TB
. 3.0TB
. 7.5TB
Because this is a large server farm, the server components
need a high-speed connection between them (and a T1 is
decidedly not high speed). The reason: WFE and Search
servers talk to one another constantly and a long delay (of say
more than 30 seconds) could bring down the server farm.
Also, FBC utilizes SSL on its Web servers and uses ISA
Server as its proxy, which may be an issue. Incoming
HTTPS request packets are received as an HTTP address by
SharePoint, which makes it impossible to upload documents.
The folks in Information Security aren’t likely to
change their default configuration just for me. But when
I show them that we can end run the problem by implementing host-header forwarding, the group gets on
Project1
9/13/06
1:27 PM
Page 1
7:30 - Running with Marty
9:00-12:00 - Replace RAID controller
12:00 - Lunch with Dennis
12:30 - Installing SQL Server 2005 Class
2:00-4:00 - Meet w/ hardware vendor
it’s your time.
4:30 - Monitor usage queue’s
5:30 - See tape library demo
6:30 - Managing SQL Server Security Class
Focused learning. One-on-one mentoring. Flexible scheduling.
New Horizons Mentored Learning program puts time back in your hands. Flexible
course schedules allow you to acquire valued new skills around your daily schedule.
Targeted learning means you learn what you need to learn without wasting your
time with what you may already know. New Horizons knows that time is money and
Mentored Learning allows you to maintain productivity, schedule around deadlines
while increasing your capabilities. Choose from over 280 learning centers in 56
countries. Certified instructors are available to lead you through a variety of
programs at your pace. Stay productive, stay in charge.
Start here at www.newhorizons.com
mentored
learning
1006red_F2SharPnt49-58.v9
9/15/06
10:18 AM
Page 52
board. Now ISA Server can forward the HTTPS packets
to the WFE without altering the original host header in
the HTTPS packets.
Another option is SSL bridging, though it’s more problematic when troubleshooting search than host-header forwarding. ISA Server enables HTTPS-to-HTTP bridging,
but the functionality is not supported when publishing
with SharePoint. SharePoint uses absolute URLs, and the
URL from the client and the URL sent to the server must
match. To keep the URL sent from the client to ISA Server the same as the URL sent from ISA Server to the Web
server, a new SSL connection must be established between
ISA Server and the Web server.
SharePoint Infrastructure
Client using
Web browser
SEARCH01
ISA 2004
INDEX01
Database
WFE01
Figure 1. ISA Server receives a secure HTTPS request, then
uses host-header forwarding to send an HTTP request for the
published site.
I tally up the best estimates from all the groups as to how
many documents they have and decide that I will need substantial hard drive space; somewhere in the neighborhood
of three terabytes. I make a call to the hardware vendor and
get the exact specifications for the servers and RAID arrays
and receive a quote. I send the quote to the finance guy and
he gives me an ETA on when I can get the hardware.
With infrastructure pieces of the deployment planned, it’s
time to pull in the project manager who has development
experience to discuss possible development issues in SharePoint. Some groups will be developing custom web parts,
and as a responsible administrator I need to negotiate what
should and should not be done in SharePoint from a development perspective. This means a discussion about Code
Access Security (CAS).
CAS is an important aspect of SharePoint. If you, as an
administrator, allow developers to write and deploy whatever
they want, you are asking for problems. If a developer were
to create an assembly that performs file I/O, you should
ensure that the code is restricted to specific (and hopefully
isolated) areas of the file system. CAS also means that you
52 | October 2006 | Redmond | redmondmag.com |
should prevent other code developed externally from calling
internal code. CAS can also use an assembly’s URL, or hash,
to identify code. In the .NET framework, evidence is used to
identify assemblies and grant appropriate permissions to
those assemblies. This can be the URL, or Zone, from which
the assembly was obtained. Evidence could also be a digital
signature or hash. In addition to the default ASP.NET security policy files, Windows SharePoint Services (WSS) provides two policy files: (wss_minimaltrust.config and
wss_mediumtrust.config). Each policy file has a set of code
groups which are used to assign permissions to assemblies.
What does this information mean to an IT administrator? For one, it means understanding and restricting the
behavior of assemblies installed on your WFEs. A utility
called PERMVIEW lets you view all declarative security
used by an assembly. The syntax is: PERMVIEW [/output
filename] [/decl] manifestfile
Let’s say that your developer created an assembly called
UBERassembly.exe and you want to know all the declarative security on this file. You would run PERMVIEW /output whatsitdoing.txt /decl UBERassembly.exe. Review the
output and if you see RequestMinimum permission,
understand that this lowers the security threshold required
for the code to run. Also, if the output shows
Unrestricted, you’ll know that once it has obtained minimum permission, the code will enjoy unrestricted access to
whatever resource it is calling. You are well advised to
make sure that developers understand this code will not run
on your WFEs. Here is a short list of questions you should
be asking your developers:
• Is your assembly strong named? That is, does it have
a hierarchical name, rather than a weak (flat) name?
• Do you request minimum permissions? Minimum permissions make it much easier for code to run unrestricted.
• Have you scanned your code for Assert calls?
Remember, Asserts that are not handled carefully may allow
malicious code to call your code through trusted code.
If your developer gets uppity, or tries to dazzle you with
dev talk simply tell him/her that the code will stay in a dev
environment until proven safe.
The rest of the day is spent developing Visio diagrams of
the proposed SharePoint infrastructure, to be presented at
the stakeholder meeting tomorrow. Figure 2 on p. 58
shows how it might look.
Hardware will be here in a few days and I’m preparing to
present to the stakeholders again. The number of stakeholders has grown from eight to more than 20. My goal at
the meeting is to present the proposed infrastructure diagram, outline principles of governance, and have a minitraining session over how to navigate the user interface. I
will break out of the meeting and meet with the future
application owners to show them how to craft a useful
search result, which may take half the day.
1006SharepointGuideFinal.qxd
9/15/06
1:32 PM
Page 53
Redmond’s SharePoint Partner Showcase
FREE TRAINING
Ź www.organice.com
NEW! Microsoft®
SharePoint® Server 2007
up to a $125 value!
SharePoint®
2007
easy.
affordable.
integrated.
See AppDev quality for
yourself!
Visit our Web site today and get
your FREE Exploring SharePoint
Server 2007 training CD-ROM or
download. You will receive up to
3 hours of award-winning training
taken directly from our NEW
SharePoint Server 2007 training
course.
See why thousands have voted AppDev the best!
Request your FREE CD-ROM or download today.
Document Management
TM
Tech
n
ical learning...in a
yi
sb
clas
www.appdev.com/freetrain/12
lf
t se
Ŷ Create
Ŷ Search
Ŷ Print
Ŷ Capture
Ŷ View
Ŷ Distribute
Ŷ Structure
Ŷ Publish
Ŷ Archive
| redmondmag.com | Redmond | October 2006 | 53
1006SharepointGuideFinal.qxd
9/15/06
1:32 PM
Page 54
Redmond’s SharePoint Partner Showcase
Find information. Understand Information.
Act—much faster.
Coveo Enterprise Search for SharePoint (CESS) offers
“supercharged search” for content in Microsoft
SharePoint Portals and WSS sites.
Winner of the 2006 Microsoft Partner Regional Winning
Customer Award, CESS delivers the best value in the
marketplace with out-of-the-box security, unparalleled
accuracy, ease of use, and an implementation cycle of
less than 24 hours.
Whether it’s to meet regulatory compliance, respond
faster to customers, or to improve processes, Coveo
Enterprise Search for SharePoint offers advanced search
that improves user adoption of SharePoint, and enhances
the value of an organization’s investment in SharePoint.
Free 30-Day Evaluation.
www.coveo.com
800-635-5476
54 | October 2006 | Redmond | redmondmag.com |
1006SharepointGuideFinal.qxd
9/15/06
1:32 PM
Page 55
Redmond’s SharePoint Partner Showcase
Advanced SharePoint
Migration Solutions
Tzunami, a Microsoft Gold Certified Partner, is the
leading provider of migration solutions for SharePoint
2003 Products and Technologies, Windows
SharePoint Services, and Office SharePoint
Server 2007.
Tzunami offers a proven track record of advanced
migration solutions from Documentum, LiveLink,
Notes, eRoom, Exchange Public Folders, legacy
SharePoint servers, and various other systems.
Tzunami is selling and supporting migration projects
worldwide.
http://www.tzunami.com
[email protected]
Improved search on SharePoint
Mondosoft provides a complimentary suite of products and web parts designed to improve and enhance
your SharePoint portal. Our solutions increase SharePoint portal adoption by helping your users find the
information they are looking for the first time - every time.
Can your users find relevant information in SharePoint?
Can you measure the success of your SharePoint Portal?
How do you get a faster ROI on your SharePoint investment?
The answer is Ontolica PortalSearch
- download a free evaluation copy on www.ontolica.com
www.mondosoft.com
Toll Free +1 800 625 1175
www.ontolica.com
| redmondmag.com | Redmond | October 2006 | 55
1006red_F2SharPnt49-58.v9
9/15/06
10:18 AM
Page 56
The mini training goes longer than expected. So many
questions! The training aspect of this initiative suddenly
hits me like a ton of bricks. Universal adoption requires
that the end user be trained, but you can’t expect everyone
to acquire significant new skill sets.
The breakout meeting was also interesting. They were
surprised the search functionality of SharePoint was as
It gets better. The newest version of the SharePoint
platform greatly improves the collaborative tools,
content management, tracking capabilities and
hosting of other services to the knowledge worker.
According to Kurt DelBene, Microsoft’s corporate
vice president of the Office Server Group, the
extensibility of Windows SharePoint Services is
a conscious design choice to create a product
that takes advantage of the industry’s rich ecosystem of solution providers and highly specialized
software developers.
“We have designed Windows SharePoint Services
with the foundational components that enable customers and partners to develop solutions for collaboration, content management, and portals,”
DelBene says.
As in WSS v2, the new version can provide a single
workspace for teams to coordinate schedules,
organize documents, and participate in discussions—
within the organization and over the extranet.
So what’s new? To begin with, the new user interface is breathtaking. There’s a ton of information on
Figure A. The new start page puts everything at a
mouse-click away.
the starting page of the new Windows SharePoint
Services version 3 (WSSv3).
It’s all about organization. As you can see the five
main areas of Permissions, Look and Feel, Galleries,
Site Administration and Site Collection Administra-
56 | October 2006 | Redmond | redmondmag.com |
powerful as it was configurable. Unlike other search
engines, SharePoint’s search uses what is called “Free Text
Queries” and ignores wildcards and Boolean expressions.
SharePoint attempts to understand what you are searching
for rather than matching the words you put in the search
field. It uses different components to help best match your
intent. One of those components is the Thesaurus. The-
tion are all laid out for you on the same page, a
real improvement over version 2. There are two
key component improvements in WSSv3:
— Improvements to collaboration workspaces.
SharePoint sites now offer e-mail and directory integration, alerts, Really Simple Syndication (RSS) publishing, templates for building blogs (also known as
weblogs) and wikis (Web sites that can be quickly
edited by team members requiring no special technical knowledge), event and task tracking, improved
usability, enhanced site navigation and more.
— Enhancements to content storage. SharePoint
lists and libraries now provide per-item security for
better data control and integrity, a recycle bin and
enhanced flexibility for storing more types of content. Row and column capacity has also been
increased, as has retrieval speed. WSSv3 can be easily integrated with smart client tools. In particular,
close integration with Microsoft Office Outlook 2007
provides offline access to events, contacts, discussions, tasks and documents.
One of the best interface updates is the breadcrumb feature, which always shows users where
they are in the site hierarchy. It’s a well-known fact
that if users have to click more than six times to
get somewhere, they’ll become frustrated and give
up. Breadcrumbs should eliminate this issue.
Microsoft shied away from the term “document
management” in the last version of WSS, but no
more. Version 3 is a full-blown document management environment, with workflow, scheduling,
tracking, and other features vital to keeping tabs
on document creation and archival.
The new SharePoint even boasts a built-in calendar,
which can sync with Outlook and has an RSS feed
that allows you to subscribe to sites. The new version also adds item level security in lists, providing
much higher granularity when managing access to
information. It’s a long-awaited improvement that
most IT managers will welcome.
The list goes on and on and the best part is
that it’s free. You can download your copy at
Redmondmag.com. FindIT code: SPDiary
— R.T.
Project1
7/6/06
9:52 AM
Page 1
1006red_F2SharPnt49-58.v9
9/15/06
10:18 AM
Page 58
Client
Client
Client
saurus files are located in %systemroot%\Program
Files\SharePoint Portal Server\DATA\Config. The files
are separated by language and if you are using English, be
sure to edit the correct English file (ENU for USA, ENG
for UK). For FBC, there were many words for which we
needed to expand the Thesaurus. For example, “Water” was
expanded to “Still,” “Sparkling,” “Spring” and “Drinking.”
It was also suggested that certain words be excluded—
achieved using the Noise Word file. It tells SharePoint to
exclude words from the Index, such as prepositions, conjunctions and articles. Just realize, if a library wanted to
index the movie “The Way We Were,” it would be invisible
Search Server
FBCSR800
Index/Job Server
FBCIDX01
Index Server
FBCIDX00
Search Server
FBCSR801
Web Front-End
FBCWFE03
Web Front-End
FBCWFE02
Web Front-End
FBCWFE01
Web Front-End
FBCWFE00
Hardware IP
Load Balancer
SQL Server
Cluster
FBCSQL00
Microsoft SQL 2000 Log Shipping
SQL Server
Cluster
FBCSQLX00
Figure 2. An overview of FBC’s SharePoint environment reveals
ample redundency.
to SharePoint. Every word in the title is a default Noise
Word. If changes are made to the file, you must restart the
Microsoft SPS Search service. Troubleshooting the Search
functionality is the most time consuming and sometimes
the most frustrating of all. Since the Thesaurus is case sensitive, both cases of the word should be tried if necessary.
Now I just wait for the hardware, fill out the appropriate
change request forms, hold the proper follow-up meetings,
purchase the software licenses, do my normal day-to-day
chores and work with the facilities managers at each location
to actually get the hardware racked and cabled up. The hard
part—planning—has been done. Then we’ll have to work on
training the users. Now that will be a major headache. —
Rick Taylor is a consultant who has been deploying every version
of SharePoint portal for major corporations since 2001. You
can reach him at [email protected].
58 | October 2006 | Redmond | redmondmag.com |
An effective SharePoint deployment must
be built with a solid understanding of the
organization’s design needs. Here are some
of the most common things you should take
into account before (or as) you design your
SharePoint infrastructure.
1. Thou shalt not put all documents into
SharePoint. This is a common mistake. SharePoint is a good document repository, but it
should not replace your file servers. Keep noncollaborative documents on your file servers
and point SharePoint to the file server as a content source. Dropping all documents into SharePoint unnecessarily grows your SQL database
and makes a backup and restore more cumbersome, especially for a file-level restore.
2. Thou shalt put processing power on the
Web front-end. Architects often place the
biggest, most powerful piece of hardware at
the back-end with SQL. But if that database
is dedicated to SharePoint, you are off
course—the “hoss” should be placed at the
front-end with the WFE. That’s the end that
gets busy with crawling content and serving
up user requests.
3. Thou shalt not underestimate storage
requirements. Obey the Golden Rule of SharePoint—for every 1GB of data, set aside 5GB to
6GB of storage capacity. If you don’t adequately
size your disk space, you’ll be forever adding
space at inconvenient times.
4. Thou shalt not scrimp on user training.
What if you built a killer app and no one used
it? Fail to train your users, and you’ll find out.
Develop an internal training program or pay
for competent external training, but do not let
your investment go down the drain.
5. Thou shalt respect search. If you
deployed SharePoint for its search, you must
invest man-hours to make it work right. Expect
to budget 0.5 FTE (Full Time Employee) for
every 100 content sources SharePoint server
must crawl. That half-day will reflect time
spent ensuring content sources are being
correctly crawled, that filters are working and
that quality results are being returned. — R.T.
Project1
8/3/06
10:20 AM
Page 1
1006red_Never60.v7
9/15/06
10:28 AM
Page 60
NEVER
AGAIN
By Jim Desmond
SQL Slip Up
arly in my IT career I worked for a small training-
E
resource software firm. At the time, my company
was at the cutting edge of client/server-based
applications, employing Microsoft SQL Server 4.2
as its back-end database.
One of our largest customers was using
our software to support its training
department. The software let thousands
of employees register for classes, checkout resources and see their progress
toward certification. They needed some
customizations done to support a government client, so as the only person
with experience in Microsoft SQL
Server, I traveled to the customer site.
Our company president, who also doubled as our head programmer, came to
support the database side.
The customizations had been completed, tested and saved to floppy disk
before we left our office in Chicago.
Before we could install the code
changes, however, we had to massage
the live production data. Simple
enough. The first step was to run a
SELECT query that looked for
records in the STUDENT table that
would not fit into the new customizations. We needed to make sure our
final query would successfully update
the table with the correct information.
What’s Your Worst
IT Nightmare?
Write up your story in 300-600 words
and e-mail it to Michael Desmond at
[email protected].
Use “Never Again” as the subject line
and be sure to include your contact
information for story verification.
My boss worked up a query that
returned all students who did not have
an employee ID registered. A second
UPDATE query then altered the data
in the LAST_NAME field for all the
matched records. This way, the records
would remain in the
database, but would
not display in the
application.
My boss was flying
through the
process, which,
to be honest,
he was very
good at.
However, he
accidentally
placed a carriage return in the
SQL query text, causing the UPDATE
query look to overwrite the last name
for every record in the customer’s
database and made it TERMINATED.
I watched him prep the query and
remember wanting to scream “Nooooo!”
as his hand hovered over the Enter button. I said to my boss, “David, do you
realize what you just did?” His eyes
flicked back and forth over the screen
and he whispered, “Oh my god.”
It was bad. We had been working on
the production database. That’s never a
good idea, especially when the database
belongs to your largest client.
My boss was frantic, trying to keep
the customer from finding out what
60 | October 2006 | Redmond | redmondmag.com |
happened while we tried to recover
the lost data. I searched for recent
database dumps. There were none.
After a couple of hours, we knew we
had to tell the client.
They were … unhappy. They had to go
to their tape storage facility and perform
a full restore of their database. And back
then, restoring from tape was really hard.
Needless to say, all of our professional
services during that trip were gratis,
including our expenses. I think the only
reason they didn’t kick us to the curb
right then was that our software was
so heavily embedded into their business.
To appease them, we offered
deep discounts and
free professional
services for a
year. We lost a
lot of money on
that trip, but
we did keep
the customer.
Like most
disasters, a lot
of little mistakes were made
on the way to a big
calamity. But one error stands out: The
decision to run an untested query on a
production database. We also failed to
confirm the presence of a recent data
backup. Had we taken that step, we
might have been able to quietly recover
from our error without involving the
client. Instead, we learned a hard lesson
in customer retention.
As for the president of the company, he
stopped working on live data, providing
only pre-tested scripts to customers that
need data customizations.—
Jim Desmond, CISSP, works in information security and contingency planning in
the San Francisco Bay area.
ILLUSTRATION BY MARK COLLINS
Project1
7/6/06
9:30 AM
Page 1
Project3
7/17/06
11:24 AM
Page 1
Get noticed
for the right reasons
Not standing out as the professional you are? Increase your career opportunities and earning power. Get your
CAPM® credential — the globally recognized certification for IT professionals with project responsibilities. You’ll
catch the eye of management with your proficiency in project management application.
Start getting noticed. Earn your CAPM® credential, brought to you by the organization that furthers careers in
project management: Project Management Institute.
®
Making project management indispensable for business results.
www.pmi.org/capmredmond.htm
®
Project Management Institute
© 2006 Project Management Institute, Inc. All rights reserved. “PMI”, the PMI logo, “CAPM”, “PMP”, and “Making project management indispensable for business results” are registered marks of the Project Management Institute, Inc.
PMI_CAPM_peek_Redmond.indd 1
5/17/06 4:41:18 PM
1006red_Winsider63-64.v5
9/15/06
10:25 AM
Page 63
WindowsInsider
Greg Shields
Cut the Crap
Y
ou’ve tried everything from subtle cajoling to aggressive user policies, yet it still manages to seep and creep
into your network. You know the four-letter word I’m
talking about: crap. Whether it’s MP3s, .MOVs or boatloads
of inappropriate pictures and videos, it is filling up your
expensive hardware drives with useless information.
Let’s face it; dealing with unwanted
excrement is just a fact of life in IT.
But if you’re one of the lucky ones who
have upgraded to Windows Server
2003 R2, you may have already played
around with Microsoft’s new tool
designed to stop the inevitable pileup
of digital dung, the File Storage
Resource Manager (FSRM).
FSRM is actually a suite of three tools
designed to give you more flexibility in
identifying, monitoring and preventing
useless and redundant data from getting onto your file servers. You should
think of FSRM as your old friend the
disk quota, but all grown up.
To install FSRM on a new R2 server,
navigate to the “Manage Your Server”
wizard and add the File Server role. If
you’ve already created a file share,
select the existing File Server role and
choose “Upgrade This Role.” In either
case, you’ll be given the choice of
adding four optional services for DFS
Replication, NFS, Macintosh Services
or the Storage Manager for SANs. As
an aside worth noting, though considered to be part of FSRM, the Storage
Manager for SANs fulfills a much different function by providing management for iSCSI and Fibre Channel
disk arrays.
To launch the FSRM’s MMC console,
click on the File Server Resource Manager link from Administrative Tools.
The three tools that comprise FSRM
are designed to address three critical
data storage problems.
Figure 1: FSRM’s robust e-mail engine can
send detailed reports to offending users on
their disk waste problems.
The first problem is limiting the
quantity of crud. By using Quota Management, you can create quotas for any
drive or folder on your network. Unlike
disk quotas, which are only enabled at
the volume level, FSRM’s quota management can create multiple quotas at
every level in your file structure.
When quotas are reached, the
administrator can configure reports
to be generated, scripts to be run,
Event Log entries to be sent or e-mail
messages to be delivered. The e-mail
engine is robust enough to send preconfigured messages populated with
selected variables to the offending
users telling them exactly what they
have done wrong. Event Log messages
can be similarly customized.
One of the most useful features is the
ability to generate and send detailed, customized reports on disk use directly to
the offending user when they approach
or hit their quota. The administrator’s
biggest disk management headache has
always been sifting through the important data to find what’s useless and
redundant. Because you, the administrator, don’t know what’s bad, you probably
choose to just enlarge the volume. The
user, however, likely does know. By
receiving a usage report, they can take
matters of deletion into their own hands.
Second is generating administrative
reports of online offal. The FSRM’s
storage reports management exposes
eight canned reports that can be further
configured to best suit your reporting
needs. Although creation of additional
reports is not an option in this version
of the tool, the existing reports on
duplicate files, file screening, files by
file group or owner, large files, least
and most recently accessed files, and
quota usage should provide most of the
necessary information.
Because a detailed scan of a folder
structure’s tree can consume system
resources, FSRM configures and schedules reports to be run during off-hours.
These reports, when complete, are
stored in %SystemDrive%\Storage
Reports and can be sent via e-mail to a
pre-configured account. Reports can be
saved in DHTML, HTML, text or
.CSV formats. But if you’re integrating
them with out-of-band databases or
third-party applications that support it,
an .XML document can be delivered.
The third problem has to do with
blocking certain types of junk. If setting
quotas, monitoring reports and notifying users of their bad behavior does not
satisfy you, then FSRM also has the
ability to completely block storage of
files. This capability is based on what
are called “file screens,” which is a configurable set of files specifically permit-
| redmondmag.com | Redmond | October 2006 | 63
1006red_Winsider63-64.v5
9/15/06
10:25 AM
Page 64
WindowsInsider
ted to or restricted from being copied
to the server.
File screens are broken up into three
components. The first, called the file
group, establishes the type of blocked file
by its file name or extension. File groups
To get around the file screens, users
only have to rename the file to something not scanned by the engine.
According to Microsoft, file screens
based on content are forthcoming, so
this feature is worth keeping an eye
With tools like Microsoft’s FSRM, systems administrators can
now have the ability to add monitoring, file screening and hardline blocking of inappropriate file types to their quiver of tools.
are collected into file screen templates
that tell the system what action to take
when a user attempts to copy a restricted
file. Actions here are similar to those for
quota management in that scripts or
reports can be run or e-mail or event log
messages can be generated.
Although useful for preventing the
worst kinds of data storage violations
of things like MP3s or .MOVs, file
screens have a major limitation in that
they are currently name-based only.
Microsoft, Sun,
CompTIA, Cisco
on. Also, no capability for managing
any of these settings via Group Policy
is currently supported, although this
capability is also being planned for a
future release.
Lastly, like any new Microsoft tool, a
command-line interface to the tool is
available and fairly representative of the
capabilities contained in the GUI. Three
command-line utilities represent the
three nodes in the FSRM tree: dirquota
for Quota Management; filescrn for File
Screening Management; and storrept for
Storage Reports Management. Like the
GUI, the command-line tools have the
capability of managing remote FSRM
instances, as well.
For many, the solution for growing
storage needs has been to purchase
increasingly larger disk arrays, moving
from DAS to SAN or NAS storage, or
the manual deletion of aged data. With
tools like Microsoft’s FSRM, even in its
first release, systems administrators can
now have the ability to add monitoring,
file screening and hard-line blocking of
inappropriate file types to their quiver
of crap-deflecting tools. —
Greg Shields, MCSE: Security, CCEA,
is a senior consultant for 3t Systems in
Denver, Colo. (www.3tsystems.com). A
contributing editor to Redmond magazine
and a popular speaker at TechMentor
events, Greg provides engineering support
and technical consulting in Microsoft,
Citrix and VMware technologies.
Do you have a certification from one of these organizations?
Then you may have completed up to 25%
of your bachelor’s degree at WGU.
Let’s face it, IT certification earns you a job. But you need a degree to advance your
career. At Western Governors University (WGU), you can earn the only accredited,
online competency-based IT degree in the country, including up to eleven respected IT
certifications. If you already hold major IT certifications, you may be able to waive some
of your degree requirements and graduate faster—and for a lot less money. WGU is ideal
for working IT professionals because you can study when it’s convenient for you, under the
guidance of faculty mentors dedicated to your success.
Call us today at 1.800.219.6689
or visit us online at www.wgu.edu/rdm
Bachelor of Science in Information Technology
Emphasis Areas Offered: Networks, Databases, Security, and Software
Western Governors University
KJHEJA =??AHAN=PA@ =BBKN@=>HA =??NA@EPA@
Project6
9/12/06
2:47 PM
Page 1
1006red_SecAdvisor66-68.v6
9/15/06
3:29 PM
Page 66
SecurityAdvisor
Joern
Roberta
Wettern
Bragg
Risky Travels
S
taying connected while you’re traveling is a challenge.
Establishing secure connectivity is even trickier. My
work has involved a lot of travel over the last few
years. While it’s exciting—and sometimes tedious—the one
constant of traveling is the challenge of maintaining secure,
reliable and affordable connectivity on the road.
Fortunately, you can get relatively reliable connectivity in most places, even
though speeds can be surprising. The
slowest public access speed I have seen
was a 9600 baud modem connection
shared between two computers. Considering that was on a remote island with
only a satellite telephone connection to
the mainland, even that was remarkable.
While getting a connection might be
easy, paying for it is another matter.
Hotels are notorious for charging
guests “extras” for things like connectivity. I have seen rates that were more
than $30 a day—and that was in a place
where the local phone company
charges their subscribers that much for
an entire month of DSL service.
There are also wireless hotspots,
cafés and hotels that offer fast, reliable
Internet connections for cheap or free.
Connecting anywhere is indeed getting
easier all the time, but it still creates
some unique security challenges.
Want Coffee with That?
If you’re traveling without your computer, the most obvious choice for
Internet access is to visit an Internet
café. These days, you can find them just
about anywhere. Internet cafés often
brew some good coffee, as well, so
they’re a pleasant place to take a break
and do some browsing.
However, public-access computers in
Internet cafés, airports or hotel lobbies
are not a secure way to access your corporate network. While these computers
are often configured to prevent someone from installing a key logger or
other monitoring device, it’s often a
simple solution that is easy for a criminal to circumvent. The technician at a
neighborhood Internet café may be an
honest and knowledgeable guy, but he
probably can’t stop a determined hacker from installing rogue programs on
one of the computers. Even in places
you trust, you’ll find surprising risks.
Unfortunately, I have seen many
cases of people displaying risky com-
There’s nothing wrong with
checking the weather report
from an Internet café,
but be careful when reading
and sending e-mail.
puting behavior, even when they
should know better. For example, I
often teach in classrooms where students all log on with administrative
privileges (the Administrator password
is identical on all computers). With this
configuration, any student in the classroom could install a keystroke logger
on any of the computers.
Typically, about half of the attendees,
many of whom work in the security
field, still check their work e-mail during class or do other things that require
them to enter passwords. While it’s
unlikely that anyone has ever tampered
with any of the classroom computers,
there’s no guarantee that this hasn’t
66 | October 2006 | Redmond | redmondmag.com |
happened in any classroom, lab, hotel
lobby or Internet café.
There are different ways to protect
yourself against password theft on a
public computer, like one-time passwords. However, even those don’t protect you against someone intercepting
the characters you type or taking snapshots of everything displayed on your
computer screen. The only effective
defense against those types of threats is
to stay away from public-access computers unless what you’re doing doesn’t
involve anything confidential.
There’s nothing wrong with checking
the weather report from an Internet café,
but be careful when reading and sending
e-mail. If you need to check your e-mail
while you’re out of the office, take along
your laptop. If you leave your laptop at
home during your next trip, consider setting up a free e-mail account or getting a
phone that can send and receive e-mail.
No Privacy on Public Networks
The best way to avoid the security problems associated with public computers is
to use your own equipment. Lugging
around a laptop can be tedious, but it
makes computing away from home that
much more secure. Taking your computer outside the firewall and the protected
environment of your network and
attaching it to a public network does
require some extra precautions, however,
like enabling a personal firewall and
being more diligent about installing
security updates and virus protection.
Even if you do all the right things, you
should still be concerned about privacy
when you connect your laptop to a public network, whether wired or wireless.
Even the best personal firewall will leak
some information. Whenever you connect a computer running Windows to
any network, it has to initiate broadcasts
and send DNS queries for domain information. Someone who monitors network
traffic with a protocol analyzer like
Project1
9/13/06
12:54 PM
Page 1
1006red_SecAdvisor66-68.v6
9/15/06
3:35 PM
Page 68
SecurityAdvisor
Microsoft Network Monitor or Ethereal
can capture and view this network traffic.
Within that traffic is information like
computer, domain and user names. Having this information won’t let a hacker
break into your network, but it may still
reveal some information you don’t want
to share.
To fully understand the risks, at some
point you should connect a laptop that
is part of your Windows domain to a
segment of your network that you
monitor with a protocol analyzer. Look
at the broadcasts and other packets
transmitted by the computer. Then you
can make an assessment of whether any
of the transmitted data would constitute a security breach if it became available outside of your organization.
Another thing to keep in mind is that
all network traffic going across most
public wired or wireless networks is not
encrypted—unless you connect to an
SSL-protected Web site or use some
application that encrypts the communi-
cations between server and client. To
ensure confidentiality while you’re connecting to the Internet from a hotel
room or a wireless hotspot, you’ll need
to establish a VPN connection to your
corporate network as soon as possible
after initially establishing connectivity.
Then you can work relatively securely
over this VPN.
One thing you can’t hide is the hardware (MAC) address of your network
adapter. Getting this information doesn’t
allow someone access to confidential
information, but it may let someone
hijack your connection and impersonate
your computer. The biggest risk there is
that someone can capture packets
between your computer and a wireless
hotspot. Most of these hotspots require
some initial authentication. After that,
however, they rely solely on the MAC
address to ensure that network packets
come from an authenticated computer.
A hacker monitoring network packets
to and from the hotspot can easily
change his own computer’s MAC address
to match yours. Because the hotspot
treats all network packets from that
address as authenticated, the hacker
would get free Internet access.
Stay Safe
Both public computers and public networks present their own security risks.
The only way to truly stay secure while
you’re on the road is to bring your own
computer and connect to your own network. Bringing your computer is the easy
part. Connecting to your own network
can be more challenging, but a VPN
connection can do the trick. —
Joern Wettern ([email protected]),
Ph.D., MCSE, MCT, Security+, is the
owner of Wettern Network Solutions. He’s
written books and developed training courses
on numerous networking and security topics.
He helps companies implement network security solutions, teaches seminars and speaks at
conferences worldwide.
Project1
9/13/06
12:02 PM
Page 1
Broken links caused
by data migrations?
• Migrating
data due to
server upgrades, server
consolidations or new
storage servers?
LinkFixerPlus is the first application that automatically maintains
links in files when you move or rename files, folders or drives.
With LinkFixerPlus, you can:
• Perform data migrations of Excel, Word, Access,
PowerPoint, AutoCAD, HTML, PageMaker, InDesign
and PDF files, in batch, without causing broken links.
• Folder
reorganizations?
• Automatically fix broken links in files that have already
been moved.
• Server
name changes?
• Generate broken link reports and detailed parent and
child file reports.
• Broken
links?
• Process thousands of files in one run.
Request your free 30-day evaluation copy of
LinkFixerPlus from: www.LinkTek.com. E-mail us
at [email protected] or call 727-442-1822.
Copyright © 2006 LinkTek. All rights reserved.
LinkFixerPlus is a trademark of LinkTek
Corporation. Patent No. 7,032,124. All other
products mentioned are trademarks of their
respective holders.
Project7
4/12/06
3:07 PM
Page 1
1006red_Index_71.v2
9/15/06
3:08 PM
Page 71
AdvertisingSales
RedmondResources
AD INDEX
Advertiser
Page
3CX Ltd.
45
www.3cx.com
Acronis Inc.
C3
www.acronis.com
AppDev Training
53
www.appdev.com
www.avepoint.com
48,53
www.avepoint.com
Citrix Education
43
www.citrix.com
CNS Software
22
www.cns-software.com
Matt Morollo
Coveo Solutions, Inc.
54
www.coveo.com
Associate Publisher
508-532-1418 tel
508-875-6622 fax
[email protected]
DigiVault by Lucid8
15
www.Lucid8.com
Diskeeper Corporation
9
www.diskeeper.com
EMC Corporation
3
www.emc.com
www.eventlogtracker.com
23
www.eventlogtracker.com
West/MidWest
East
Dan LaBianca
JD Holzgrefe
Director of Advertising, West
818-674-3417 tel
818-734-1528 fax
[email protected]
Director of Advertising, East
804-752-7800 tel
253-595-1976 fax
[email protected]
SALES
Bruce Halldorson
Western RegionalSales Manager
CA, OR, WA
209-473-2202 tel
209-473-2212 fax
[email protected]
Danna Vedder
Microsoft Account Manager
253-514-8015 tel
775-514-0350 fax
[email protected]
Tanya Egenolf
Advertising Sales Associate
760-722-5494 tel
760-722-5495 fax
[email protected]
CORPORATE ADDRESS
1105 Media, Inc.
9121 Oakdale Ave. Ste 101
Chatsworth, CA 91311
www.1105media.com
MEDIA KITS: Direct your Media Kit
requests to Matt Morollo, associate publisher, 508-532-1418 (phone), 508-8756622 (fax), [email protected]
REPRINTS: For all editorial and advertising reprints of 100 copies or more, and
digital (Web-based) reprints, contact
PARS International, Phone 212-221-9595,
e-mail: [email protected], Web:
www.magreprints.com/QuickQuote.asp
LIST RENTAL: To rent this publication’s
e-mail or postal mailing list, please
contact our list manager Worldata:
Phone: 800-331-8102.
E-mail: [email protected]
Web site: www.worldata.com/101com.
Postal Address: 3000 N. Military Trail,
Boca Raton, FL 33431-6375.
Redmond (ISSN 1553-7560) is published
monthly by 1105 Media, Inc., 9121 Oakdale
Avenue, Ste. 101, Chatsworth, CA 91311.
Periodicals postage paid at Chatsworth,
CA 91311-9998, and at additional mailing
offices. Complimentary subscriptions are
sent to qualifying subscribers. Annual
subscription rates for non-qualified subscribers are: U.S. $39.95 (U.S. funds);
IT CERTIFICATION
& TRAINING – USA,
EUROPE
Al Tiano
Advertising Sales Manager
818-734-1520 ext. 190 tel
818-734-1529 fax
[email protected]
URL
Famatech
10
www.famatech.com
GFI Software
26
www.gfi.com
GOexchange by Lucid8
65
www.Lucid8.com
GRISOFT Inc.
7
www.grisoft.com
IBM Corporation
C2,1,57,59,61
www.ibm.com
iTripoli Inc.
30
www.itripoli.com
KnowledgeLake
54
www.knowledgelake.com
LinkTek
69
www.linktek.com
Mondosoft Inc.
55
www.mondosoft.com
Microsoft
18
www.microsoft.com
NetSupport Software
20
www.netsupport-inc.com
netikus.net ltd
28
www.netikus.net
New Horizons Computer
Learning Centers
51
www.newhorizons.com
NORTHERN Parklife, Inc.
46
www.northern.net
Organice
53
www.organice.com
PRODUCTION
Project Management Institute
47,62
www.pmi.org
Kelly Ann Mundy
Quest Software
C4
www.quest.com
Production Coordinator
818-734-1520 ext. 164 tel
818-734-1528 fax
[email protected]
QuickStart Intelligence
54
www.quickstart.com
Raxco Software Inc.
29
www.raxco.com
Canada/Mexico $54.95; outside North
America $64.95. Subscription inquiries,
back issue requests, and address
changes: Mail to: Redmond, P.O. Box
2063, Skokie, IL 60076-9699, e-mail
[email protected] or call 866-2933194 for U.S. & Canada; 847-763-9560 for
International, fax 847-763-9564. POSTMASTER: Send address changes to Redmond, P.O. Box 2063, Skokie, IL
60076-9699. Canada Publications Mail
Agreement No: 40039410. Return Undeliverable Canadian Addresses to Circulation Dept. or DHL Global Mail, 7496 Bath
Rd., Unit 2, Mississauga, ON, L4T 1L2.
© Copyright 2006 by 1105 Media, Inc. All
rights reserved. Printed in the U.S.A.
Reproductions in whole or part prohibited
except by written permission. Mail
requests to “Permissions Editor,” c/o
Redmond, 16261 Laguna Canyon Road,
Ste. 130, Irvine, CA 92618.
The information in this magazine has not
undergone any formal testing by 1105
Media, Inc. and is distributed without any
warranty expressed or implied. Implementation or use of any information contained
herein is the reader’s sole responsibility.
While the information has been reviewed
for accuracy, there is no guarantee that the
same or similar results may be achieved in
all environments. Technical inaccuracies
may result from printing errors and/or new
developments in the industry.
Redmond Magazine
17
www.redmondmag.com
SAPIEN Technologies, Inc.
35
www.sapien.com
SharePoint Solutions
55
www.sharepointsolutions.com
Special Operations Software
27
www.specopssoft.com
Specialized Solutions
40
www.specializedsolutions.com
St. Bernard Software
5
www.stbernard.com
Sunbelt Software
13,37,67
www.sunbelt-software.com
SWsoft, Inc.
25
www.swsoft.com
The Training Camp
70
www.trainingcamp.com
TNT Software
21,68
www.tntsoftware.com
Tzunami Inc.
55
www.tzunami.com
Western Governors University
44,64
www.wgu.edu
Wiley Publishing
39
www.wiley.com
EDITORIAL INDEX
Company
Page
URL
Advanced Micro Devices Inc.
14
www.amd.com
DesktopStandard Corp.
19
www.DesktopStandard.com
Donet Inc.
24
www.donet.com
Google
11
www.google.com
IBM Corp.
11, 14
www.ibm.com
Intel Corp.
12, 14
www.intel.com
JW Software Inc.
32
www.jwsoftware.com
Layton Technology
32
www.laytontechnology.com
Lightspeed Systems Inc.
32
www.lightspeedsystems.com
Oracle Corp.
19
www.oracle.com
SpectatorSoft Corp.
32
www.eblaster.com
Surgient Inc.
24
www.surgient.com
VMware Inc.
24
www.vmware.com
XenSource Inc.
24
www.xensource.com
This index is provided as a service. The publisher assumes no liability for errors or omissions.
| redmondmag.com | Redmond | October 2006 | 71
1006red_Foley_72.v5
9/15/06
10:15 AM
Page 72
Foley on Microsoft
By Mary Jo Foley
What’s Next for Microsoft’s IE?
M
icrosoft’s Internet Explorer (IE) 7 is due to go live
Not all of these items will emerge as
new features in the next versions of IE,
any day now, and you know what that means: Time and other features remain unaddressed.
Two that come to mind are printing
to start talking about what’s next. Hey, just because
support for tables that are hundreds of
Microsoft officials are banned from publicly discussing IE 7.5 columns wide, and the ability to run
different versions of IE simultaneously
and IE 8—or whatever the next pair of
on a single machine.
Beyond CSS, the IE team is considerbrowser updates gets labeled—doesn’t
One feature I want to see is autoing a host of other features. We perused
mean we can’t talk about them. And,
matic page recovery, which can
a couple of transcripts of recent IE
based on remarks the IE team has made
Web chats where Microsoft team mem- restore Web pages that were accidenin various forums over the past couple of
tally closed (or killed during a system
bers solicited and got plenty of user
months, it’s even possible to make some
feedback. Based on those chats, here are crash). Microsoft has deemed this
educated guesses as to what’s in store.
capability a potential privacy issue,
some features Microsoft is considering:
Here’s what we know for sure, based
but I’d like the company to find a
• Including the ability to “lock” a
page to prevent users from accidentally
on comments from Microsoft execs.
way to get this functionality into the
navigating away from a page
Contrary to what the IE team actually
next rev. As a longtime IE 7 beta
believes, users can expect a new release
tester, I have lost my browsing “place”
• Adding a “Find on Page” capability
within nine months, rather than a full
more than once to a system hiccup,
• Updating the IE rendering engine
and Javascript
year. Bill Gates uncorked that surprise
and typically have a heck of a time
at the Mix ’06 conference in March,
remembering where I was before.
• Improving username/password
management
catching both attending Microsoft
One solution: Implement it as off by
developers and Microsoft’s own IE
default, so those running IE 7 on a
• Changing the “mini-address” bar
(part of drop-down browser windows)
team members seemingly off guard.
single-user, private machine can enjoy
to make it more useful
We also know that Microsoft is
this helpful convenience.
already building the next two versions
Another feature I would welcome is
• Lightening up .PNG images
of IE. One of the versions will include
“parallel browsing,” something browser
• Restoring the “Image Toolbar”
provided in earlier IE 7 test builds
“a complete reworking of the networkvendor Maxthon has pioneered. This is
ing stack,” according to Dean Hacham• Changing the download mechanism, a bit like picture-in-picture on a TV,
perhaps eliminating the initial download
ovitch, general manager of the IE team.
allowing you to view pages side-by-side
He articulates three overall goals for the to the “temporary Internet
in the same window,
Be sure to log on
files” folder
next IE releases: great standards suprather than switching
to Redmondmag.com
port, improved safety/security and a
between tabs.
and read more about
• Adding easily editable
IE7, including the
config files (similar to
positive experience for end users.
It seems that after
available add-ons and
Firefox’s userChrome.css
That’s all well and good. The real
years of refusing to
recent chat transcripts.
question is what could, and should, make and UserContent.css)
FindIT code: Foley1006 respond to users’
it into the next release or two of IE?
requests, the IE team
• Enabling draggable
Based on Microsoft’s promises, we can tabs from one IE window to another
finally has its eyes and ears wide-open.
assume better Cascading Style Sheet
So, what’s on your IE wish list? Write to
• Supporting themes
(CSS) standards compliance is coming.
• Configuring tabs so that each has its me at [email protected].—
own private cookie cache
Microsoft already fixed/added 200
Mary Jo Foley is editor of Microsoft
CSS-related tweaks in IE 7 to make it
• Introducing new status bar info,
possibly with fields such as “last accessed
Watch, a Web site and newsletter (Microsoftmore CSS-compliant, but as critics
by user” and “window last updated”
Watch.com), and has been covering Microsoft
have noted, that job is not done. I
for about two decades. You can contact her at
expect a more fully compliant browser
• Enabling add-ons, such as stocks,
movies, etc., a la Mozilla’s Firefox
[email protected].
to emerge down the road.
72 | October 2006 | Redmond | redmondmag.com |
Project1
9/13/06
1:12 PM
Page 1
FOLD
FOLD
DATA BACKUP
WITH
OUT
THE COMPLETE DATA BACKUP
AND RECOVERY SOLUTION
DOWNLOAD A FREE EVALUATION AT:
FOLD
ACRONIS
WWW.ACRONIS.COM/LOL
FOLD
Project1
9/13/06
11:03 AM
Page 1
W i n d o w s
“
Snap-on Incorporated relied on Quest for our recently
completed Microsoft Active Directory project. It was
a global implementation and Quest’s expertise in
migration and management tools made the project
M a n a g e m e n t
Analysts Rank Quest #1
in Windows Management
And with Quest, you can be #1 at your business.
run much smoother. We’ve been very pleased
with the Quest products as well as their customer
”
support team.
Why shop around when all of your Windows Management needs can be found at one
place — Quest Software. With expert innovation and best of breed solutions to simplify,
automate and secure your infrastructure, your shopping trip ends here.
Steve Reeves
Sr. Director of IT Operations
Snap-on Incorporated
Hear what Quest customers and partners say about us. Watch the “Community on Quest”
video brochure at www.quest.com/numberone
©2006 Quest Software, Inc. All rights reserved. Quest and Quest Software are trademarks or registered trademarks of Quest Software.
All other brand or product names are trademarks or registered trademarks of their respective holders. WM-ONE_REDMOND_Q42006.