Vista doesn't appear to have any killer must-have features or functionality, but it is clearly a better operating...
system than its predecessors. The kernel mode security enhancements are quite substantial, resulting in a dramatic reduction of its overall attack surface. Features like native support for IPv6, BitLocker Drive Encryption, USB device control and the hundreds of other security add-ons will eventually make the day-to–day lives of many administrators a lot easier.
However, I think the upgrade path complexities, hardware compatibility issues and user education will give administrators a few sleepless nights early on. Plus getting quickly up to speed on Vista is a lot to ask of an IT department. Also, if you are still running Windows 2000 and XP machines, do you really want to add yet another version that needs to be supported?
I would advise against being an early adopter, and instead wait to see if any flaws are found. With Vista out in the wild and subject to the accelerated cycle of real-world vulnerability testing, many flaws will be discovered. You don't want your organization to be part of the Vista case history.
In the meantime, I would evaluate it yourself and test how well it sits in your own environment. If you use Active Directory and Group Policy to enforce policy standards, you will want to check the extended Group Policy settings. The hundreds of new settings may appear a little daunting, but they should allow you to configure settings to match your specific environment. The Network Access Protection (NAP) service also lets you set security standards that all computers must meet before connecting to a network. It could be set up so that virus signatures, for example, must be up-to-date before a server allows a connection. This will certainly reduce the problems caused by remote users connecting infected systems to your network.
Dig Deeper on Windows Security: Alerts, Updates and Best Practices
Related Q&A from Michael Cobb
Is cookie encryption enough to protect sensitive information? Expert Michael Cobb explains how salted hashes can prevent attacks, and the secure way ...continue reading
A vulnerability was found in the Blackphone's Icera modem. Expert Michael Cobb explains how attackers could hijack the device, and if this would ...continue reading
Oracle is killing off the Java browser plug-in due to security risks. Expert Michael Cobb explains the next steps for enterprises with Java-based ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.