Vista doesn't appear to have any killer must-have features or functionality, but it is clearly a better operating...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
system than its predecessors. The kernel mode security enhancements are quite substantial, resulting in a dramatic reduction of its overall attack surface. Features like native support for IPv6, BitLocker Drive Encryption, USB device control and the hundreds of other security add-ons will eventually make the day-to–day lives of many administrators a lot easier.
However, I think the upgrade path complexities, hardware compatibility issues and user education will give administrators a few sleepless nights early on. Plus getting quickly up to speed on Vista is a lot to ask of an IT department. Also, if you are still running Windows 2000 and XP machines, do you really want to add yet another version that needs to be supported?
I would advise against being an early adopter, and instead wait to see if any flaws are found. With Vista out in the wild and subject to the accelerated cycle of real-world vulnerability testing, many flaws will be discovered. You don't want your organization to be part of the Vista case history.
In the meantime, I would evaluate it yourself and test how well it sits in your own environment. If you use Active Directory and Group Policy to enforce policy standards, you will want to check the extended Group Policy settings. The hundreds of new settings may appear a little daunting, but they should allow you to configure settings to match your specific environment. The Network Access Protection (NAP) service also lets you set security standards that all computers must meet before connecting to a network. It could be set up so that virus signatures, for example, must be up-to-date before a server allows a connection. This will certainly reduce the problems caused by remote users connecting infected systems to your network.
Dig Deeper on Windows Security: Alerts, Updates and Best Practices
Related Q&A from Michael Cobb
Open source NoSQL MongoDB database faced 30,000 insecure instances. Expert Michael Cobb explains the misconfiguration that led to this, and how to ...continue reading
A new Veracode report offers details on common mobile application security risks. Expert Michael Cobb explains these flaws, and what developers can ...continue reading
Juniper firewall products were found to have two backdoor vulnerabilities. Expert Michael Cobb explains how a cryptographic algorithm and hardcoded ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.