Vista doesn't appear to have any killer must-have features or functionality, but it is clearly a better operating system than its predecessors. The kernel mode security enhancements are quite substantial, resulting in a dramatic reduction of its overall attack surface. Features like native support for IPv6, BitLocker Drive Encryption, USB device control and the hundreds of other security add-ons will eventually make the day-to–day lives...
of many administrators a lot easier.
However, I think the upgrade path complexities, hardware compatibility issues and user education will give administrators a few sleepless nights early on. Plus getting quickly up to speed on Vista is a lot to ask of an IT department. Also, if you are still running Windows 2000 and XP machines, do you really want to add yet another version that needs to be supported?
I would advise against being an early adopter, and instead wait to see if any flaws are found. With Vista out in the wild and subject to the accelerated cycle of real-world vulnerability testing, many flaws will be discovered. You don't want your organization to be part of the Vista case history.
In the meantime, I would evaluate it yourself and test how well it sits in your own environment. If you use Active Directory and Group Policy to enforce policy standards, you will want to check the extended Group Policy settings. The hundreds of new settings may appear a little daunting, but they should allow you to configure settings to match your specific environment. The Network Access Protection (NAP) service also lets you set security standards that all computers must meet before connecting to a network. It could be set up so that virus signatures, for example, must be up-to-date before a server allows a connection. This will certainly reduce the problems caused by remote users connecting infected systems to your network.
Dig deeper on Windows Security: Alerts, Updates and Best Practices
Related Q&A from Michael Cobb
A reported 43% of Microsoft XML users are running vulnerable versions of the software. Security expert Michael Cobb discusses how to mitigate the ...continue reading
Security expert Michael Cobb explains what Open Authorization or OAuth 2.0 is, its pros and cons, and how it is different from bring your own ...continue reading
While the fundamentals of securing an e-commerce website haven't changed in a few years, there are new threat vectors and security risks to be aware ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.