Manage your WServerNews profileWServerNews privacy policy
WServerNews (formerly W2Knews)
Vol. 12, #15 - Apr 16, 2007 - Issue #621
No More WinXP In 2008

  1. Editor's Corner
    • Question: Use Symantec or McAfee on Exchange?
    • Which Goodie Would You Like at Tech.Ed
    • CounterSpy Enterprise V2.0 Is Close
    • Quote Of The Week
  2. Admin Toolbox
    • Admin Tools We Think You Shouldn't Be Without
  3. Tech Briefing
    • Windows Listed As Most Secure Operating System
    • Tip: Control Virtualization Chaos With VM Management Automation
    • SQL Server 2005 Performance Tuning Tools A-Z
    • Expert Advice: Disaster Recovery Planning
    • Surviving A Compliance Audit
    • Troubleshooting A Corrupt Outlook Profile After A Vista Upgrade
  4. Windows Server News
    • No More WinXP In 2008
    • Goldman Sachs: Microsoft Pushed Off Top List
    • Microsoft Virtualization Products Face Delays
    • Redmond Warns Of Dangerous Flaw In DNS Server
  5. WServer Third Party News
    • FullArmor Does It Again
  6. WServerNews Fave Links
    • This Week's Links We Like. Tips, Hints And Fun Stuff.
  7. WServerNews - Product of the Week
    • BOOK: Hacking Wireless Exposed
Kill Image-Spam Dead with Ninja: Powerful Email Security

Ninja uses fingerprinting algorithms that generate identities from a
single piece of content that also maps to a large number of content

The fingerprint approach works very well for rich formats
like images because there is significant data from which features can
be extracted. In other words: Ninja Gets Image Spam!

Kill Image-Spam Today - Download your free 30-day eval of Ninja.

Editor's Corner

Question: Use Symantec or McAfee on Exchange?

Do you use Symantec Mail Security for Exchange or McAfee GroupShield for Exchange? In that case I have a short 5-question 'point-and-click' survey for you. This will take you less than a minute, but for us the data is very important. Thanks so much for taking the time! The link:

Which Goodie Would You Like at Tech.Ed

Which Tech.Ed give-away would you prefer for the 2007 Microsoft bash in Orlando? There would be many of these... not just one. We're at booth 915 this year and make sure to come and visit.
  • $500.00 Portable/vehicle GPS
  • $500.00 Digital Camera
  • Xbox 360 Elite
  • $500 in cash
  • $500 Weekend Getaway
Vote here:

CounterSpy Enterprise V2.0 Is Close

At this point we're in the Release Candidate stage, all features and functions are done. Here is a cool stat on just how much better the CSE 2.0 agent is vs. the CSE 1.8 agent in terms of scan times. Every night we run deep scans on about 30 workstations on the network, about half of those machines are running a 2.0 agent and about half are running a 1.8 agent. The quickest a 1.8 agent finishes in about 20 minutes and the slowest finishes in about 45 minutes. The quickest a 2.0 agent finishes in less than 6 minutes and the longest is 13 minutes. Yes, it's just that much better. Also the amount of RAM is dramatically lower! Want to see it in action? The info for next Tuesday's webcast on CSE 2.0 follows:

Webcast: Preview Of CounterSpy Enterprise V2.0

Alex Eckelberry and Greg Kras will be giving a preview CounterSpy Enterprise 2.0 next Tuesday. The new features are too many to mention, but one thing stands out: it includes our new VIPRE malware engine! If you want to take a look, please join us: A First Look at CounterSpy Enterprise 2.0 When: Tuesday, April 17, 2007 2:00 PM (EDT) To join the day of the event please visit:

Meeting ID: 92SSQC
Attendee Meeting Key: XR*mw9Z
Toll free 1-888-468-4618 for North America
Toll 1-620-782-8200
Participant code: 104764

Quote Of The Week

"My goal is simple. It is a complete understanding of the universe, why it is as it is and why it exists at all." -- Stephen Hawking

Hope you enjoy this issue of WServerNews! Warm regards, Stu Sjouwerman  |   Email me: [email protected]

Admin Toolbox

Admin Tools We Think You Shouldn't Be Without

Must Have FREEWARE. Web Active Directory & Self Service Password. Download now!

Reclaim up to 80% of your Exchange Store with ExchangeCompress. Download FREE trial copy today.

Kill Image Spam today with Ninja. Download your 30-day eval and see for yourself how Ninja gets image spam!

Extend Active Directory services to UNIX/Linux/Mac to enable single sign-on, set global password policies. Free white paper.

Tech Briefing

Windows Listed As Most Secure Operating System

In its latest research report, Symantec noted that when it comes to widely used operating systems, Microsoft is doing better overall than its leading commercial competitors. The information was a part of Symantec's 11th Internet Security Threat Report. The report covered a huge range of security and vulnerability issues over the last six months of 2006 (including operating systems), finding that Microsoft Windows had the fewest number of patches and the shortest average patch dev time of the five operating systems it monitored in the last six months of 2006.

Tip: Control Virtualization Chaos With VM Management Automation

Too few IT managers evaluate a very important aspect of data center management: Automating the provisioning of virtual machines (VMs). In fact, all IT organizations would benefit from examining automated virtualization management in general. In this tip, SearchServer contributor Alessandro Perillitakes a look at how this capability will become a must-have very soon, driving vendors' product development in the next few years, and at the products available today. (registration required)

SQL Server 2005 Performance Tuning Tools A-Z

Whether you're thinking about migrating to SQL Server 2005 or you've already made the leap, this collection of tips from our SQL Server experts will guide you toward optimizing Microsoft's latest version of SQL Server. Get the scoop on new tools like Database Snapshots and SQL OS. Learn how to optimize already existing features like SQL Profiler, but now in SQL Server 2005. And get introduced to entirely new features like SQL Server Integration Services (SSIS) and see how to expand its functionality. (registration required)

Expert Advice: Disaster Recovery Planning

You don't have to be the CIO or vice president of IT to be responsible for a disaster recovery plan. Every IT manager or team lead should have his or her own individualized plan. In this two-part series, expert Russell Olsen explains the disadvantages of using one-size-fits-all templates for disaster recovery planning and how to integrate operational tasks into your disaster recovery plan. And while you are at it, have a look at how Double-Take fits in those plans! (registration required)

Surviving A Compliance Audit

Compliance auditors are becoming more tech-savvy, and are asking IT managers in the trenches to show and tell. Here is some advice from managers and administrators who have been through the audit process. This is the second article in an exclusive four-part series on how Windows IT shops are handling the growing responsibility for regulatory compliance. (

Troubleshooting A Corrupt Outlook Profile After A Vista Upgrade

After a Windows Vista upgrade, you may experience a corrupt Microsoft Outlook profile that requires troubleshooting. In this tip, contributor Serdar Yegulalp provides step-by-step instructions that will resolve the problem.

Windows Server News

No More WinXP In 2008

Windows XP is to to be phased out by year's end. The bell is tolling for WXP, with Redmond's plan to stop XP OEM copies as an option for system builders. That means this; any Windows PC bought from a retailer must come with Vista - regardless of what the customer wants. While you can already find a multitude of retail machines running Vista, you might still want XP, be it lack of drivers for hardware or poor application support. In January, that'll no longer be possible. Many businesses are still ordering machines running XP in bulk due to concerns over Vista, so there could be some backlash if the issues aren't addressed before then. Retail availability will probably still last for a while afterwards, but part of the reason people choose OEM is the cost reduction. More at:

Goldman Sachs: Microsoft Pushed Off Top List

Goldman Sachs has taken Microsoft out of its "Conviction Buy" list of the best stocks. They think that Vista and the new Office 2007 will not sell as well as previously expected, and that the end of shrink-wrapped software is closer than people think. "Vista may be the last big OS developed by the company," Goldman Sachs said. All this may be inspired by CEO Steve Ballmer himself who recently warned Wall Street execs that some of the expectations for Vista were way too optimistic.

Microsoft Virtualization Products Face Delays

The first service pack for Virtual Server 2005 R2 has been delayed from the first quarter of this year to the next quarter. More at ENTMag:

Redmond Warns Of Dangerous Flaw In DNS Server

ComputerWorld reported that attackers are trying to take advantage of a newly disclosed vulnerability in several of Microsoft Corp.'s server products that could allow them to run unauthorized code on affected computers, the company warned. The attacks are limited so far, according to a Microsoft advisory issued late Thursday evening. The company is working on a patch, but no release date has been set, a spokeswoman in London said. Microsoft just issued seven critical patches on Tuesday, which is its regular monthly patch day, and isn't due for another round until May 8. The company issued an emergency patch on April 3 for a dangerous animated cursor flaw. More:

WServer Third Party News

FullArmor Does It Again

Dave Kearns made me aware of the fact that FullArmor did it again. A pretty interesting concept I have to admit. Dave described it as follows: FullArmor recently announced a product that takes existing security policies which have been created and enforced by Active Directory inside the network, and makes them portable, enforceable and auditable when the endpoints are outside the reach of the directory. The new Endpoint Policy Manager (EPM) makes continuous policy enforcement possible in a mobile and network-disconnected world, a world that - more and more - dominates the landscape we have to manage.

FullArmor EPM enforces consistent policy settings on endpoints whether they are connected or disconnected from an enterprise's Active Directory. This capability enables organizations to use their existing Group Policy infrastructure to intelligently enforce endpoint policy settings as devices drift in and out of the network. To prevent security policy 'decay', FullArmor EPM automatically corrects out-of-compliance settings when they are inadvertently changed. In addition, FullArmor EPM limits quarantine and remediation events in NAP and NAC environments [i.e., Microsoft's Network Access Protection and Cisco's Network Admission Control] by keeping endpoint configurations locked-down.

FullArmor EPM also maintains a comprehensive audit trail of applied security settings to automate compliance reporting for those subject to regulations such as GLBA, HIPAA, FISMA, or PCI (you know who you are!). Unlike Microsoft's native Group Policy reports (which only query one machine at a time and report on expected - not actual - policy settings), FullArmor EPM pulls and compares data from three sources to conclusively report on security policy compliance:
  1. Expected policy supplied by the device;
  2. Expected policy supplied by the directory; and
  3. Actual policy settings supplied by the device registry.
Your audit log thus contains exactly what security was applied - and why! There's a lot more to Endpoint Policy Manager, of course. Click here for all the details and also check out John Fontana's story in Network World for a customer perspective.

WServerNews Fave Links

This Week's Links We Like. Tips, Hints And Fun Stuff.

WServerNews - Product of the Week

BOOK: Hacking Wireless Exposed

Secure Your Wireless Networks the Hacking Exposed Way. Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures. Check it out at Amazon: