Title: Active Directory Tip
![]() |
![]() |
![]() |
Issue Sponsored By:
> Free White Paper: Managing Email as a Service
![]()
IN THIS ISSUE:
> Applications and administrator accounts
> Learning guide: Managing your Active Directory, Part 2
> Secure administration and administrator privileges
> Column: The uniquely American solution to every problem
> Welcome to the Blooper Zone
![]()
![]() |
![]() |
![]() |
![]() |
Free White Paper: Managing Email as a Service
This free white paper provides an introduction to service-driven management. Participants will learn best practices for managing and monitoring the key elements critical to insuring Email health and performance, including Exchange, Active Directory, Network, and Storage.
Click here for your free white paper. |
|
![]() |
![]() |
![]()
Applications and administrator accounts
[James Michael Stewart]
When a new system joins a domain, the domain administrators group is added to the local administrators group on that system automatically. This ensures that domain administrators have full access to the newly connected system. Unfortunately, this also means that the system is vulnerable to high-level malicious code attacks.
Learning guide: Managing your Active Directory, Part 2
[Marilyn Cohodas]
We've gathered our best AD administration and management resources. These chapters will help you get the most out of all the new AD features and services.
Secure administration and administrator privileges
[James Michael Stewart]
Even if you have installation and setup procedures that ensure a secure domain controller, you still have to have reliable people perform administration. They also must do so in a secure and controlled manner. Find out more details in this tip.
Column: The uniquely American solution to every problem
[John Hogan]
Only in America do people think that the best solution to a problem is a lawsuit. And that apparently holds true for the information technology industry.
![]()
NEWS: Should Microsoft, others share security pain?
Some customers and IT experts attending the Microsoft Security Summit say vendors would create more secure software if they were held liable for security breaches.
TOPICS: Welcome to the Blooper Zone
The May Blooper contest is over and we have a winner! A.S., a former technical support person from Illinois, snagged the top spot. Read his and other hilarious stories here!
TOPICS: June Tip Contest: Win a Rio Cali 128 MB sport MP3 player!
Have you been thinking about participating in one of our monthly tip contests? Start fresh in June and get your Windows-related IT tips submitted early for a crack at this month's awesome prize: a Rio Cali 128 MB sport MP3 player!
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
|
![]() |
![]() |
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!
|
SearchWin2000: Security Tip |
|
![]()
|
| Not a Member? We'll activate your membership with your subscription. |
|
![]() |
![]() |
![]() |
|
![]() |
|
![]() |
|