-
Custom network security policy checklist
A well-designed security policy, commonly associated with the gpedit snap-in console, is a powerful tool in your network security arsenal. Using built-in tools found in Windows XP, you can create a...
-
Deploying apps via Group Policy -- cost-effective, but
You can deploy applications using Group Policy. But without the proper planning, this is a good way to shoot yourself in the foot.
-
In the know with intranets
Small and midsized businesses can benefit most from intranets, which offer better productivity, knowledge sharing and money-saving resources.
-
Purchasing the right Wi-Fi client
Companies devote considerable attention to purchasing Wi-Fi access points, routers, and switches, giving far less thought to Wi-Fi client selection. But it takes two to tango: client devices have ...
-
Eight reasons to plan out your security testing
You would think that if you are taking the time to test your Windows networks for security vulnerabilities, that any testing is a good thing. Not so, says security testing expert Kevin Beaver. In t...
-
Using Snort, Nessus and Tripwire for network security
Why pay a proprietary vendor a ton of money for a security application you can get for little or no money? In this tip, learn the pros and cons of open source network security tools Snort, Nessus a...
-
Designing a DMZ and using iptables
Our editors posted a question on ITKnowledge Exchange to help out "Ruhi" plan for a DMZ using iptables, and fellow techies jumped in to help out, providing excellent advice for DMZ design.
-
The most important security lesson for employees
Social engineering may be the most significant security threat organizations face when it comes to educating their employees. Security expert Michael Gregg explains why, and provides instructions f...
-
Introducing Vista's Network Center
In Windows Vista Microsoft has made it a lot easier to quickly gather information about how a workstation is connected to a network through a new component called the Network Center. This expert ti...
-
Know your wireless encryption options
Understanding wireless encryption is essential to deploying a secure wireless network. Contributor Tony Bradley breaks down the different encryption methods and explains why some are better than ot...
-
Power over Ethernet for network architects
David Jacobs discusses how Power over Ethernet (PoE) is defined by the 802.3af standard, then looks at how PoE can help network architects simplify power distribution and potentially save money.
-
Enterprise router buyer's guide
This tip provides a concise buyer's guide to companies and their products that compete in the enterprise and branch office routing arena, along with brief descriptions of those products and links t...
-
Two-factor authentication and compliance: What it is an
The Federal Financial Institutions Examination Council has mandated that federal institutions deploy two-factor authentication for online banking. But what constitutes two-factor authentication is ...
-
Troubleshooting routing
Network troubleshooting can be challenging for a number of reasons, not the least of which is the lack of a standard methodology. In this tip, Tom Lancaster looks at some of the best and fastest wa...
-
Proper planning, communication help avoid user headache
A recent, informal survey of SearchNetworking.com readers revealed that while admins deal with plenty of technical issues, their most common problems come from users who submit redundant and often ...
-
The QoS scam: Paying for reduced bandwidth
On an unhealthy or broken network, quality of service (QoS) is a rudder on a sinking boat -- it fixes nothing and cannot resolve degradation issues. On a healthy, well-provisioned network, QoS is n...
-
How to ensure your next firewall isn't a dud
A firewall can be an invaluable tool when it comes to securing your network. On the other hand, a less-than-stellar firewall can leave your network open to attack and leave you with a false sense o...
-
Six user headaches Windows admins can avoid
SearchWinSystems.com's desktop management expert, Serdar Yegulalp, offers six tips for making an administrator's task of monitoring and restricting user rights easier.
-
Network monitoring freeware
This collection of free network monitoring tools will help analyze, monitor and report on your network performance without spending a dime.
-
Troubleshooting a Windows-based network
We've all been taught at one time or another that on a Windows network, if at least one domain controller within each domain is functional, then the domain itself should be functional. Sadly, this ...
-
Premises- or provider-based network management?
IT expert David Davis outlines the pros and cons of premises- versus provider-based network management.
-
Networking blogs: Reevaluating the optical market
This week, networking bloggers discuss a potential sea change for the optical market, and reveal some key tips for using custom config builders.
-
Data center spaghetti: Trials, tribulations of cabling
Switching out servers at a data center can go from ho-hum to disaster unless you have a tested cable management plan in place.
-
Networking blogs: Wi-Fi Certified 802.11ac is here
In this week's blog roundup, get expert insight on preparing for 802.11ac and solutions to CDN bandwidth issues.
Network Management Strategies for the CIO