Access "Best practices for Windows 2003 migration"
This article is part of the April 2003 issue of Unwrapping Windows Server 2003: An exclusive first look at Microsoft's new OS
For Enterasys Networks CIO Len Couture, Windows Server 2003's granular controls and enhanced security features make it an attractive operating system. And migrating to the new platform was relatively straightforward, since the new OS shared the same basic architecture as Windows 2000. When the transition program started, employees would often log out of Win2K, depart for the weekend, and log in Monday morning to a Win2003 server. In all, Enterasys, a maker of networking and security solutions, has migrated its 41 servers that support 1,700 employees at 55 sites around the world. "It hasn't been as easy as putting in a CD," says Couture, who participated in the Win2003 beta program. "Some pieces have been time-consuming, but that's part of the process." Adopting Win2003 isn't supposed to be simple, says Chris Cannon, product manager for Microsoft Windows group. Microsoft wants enterprises to think about how they're deploying the operating system for efficiency, effectiveness and security. Win2K users will find the migration process relatively clear-cut, while... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Examining Windows Server 2003 operating system security
by Randal Franklin Smith
Microsoft promised Windows Server 2003 would be "secure by design, secure by default and secure in deployment." We took the wrapper off this new OS to see if it lives up to expectations.
-
Best practices for Windows 2003 migration
by Lawrence Walsh
Case study: Enterasys Networks shares the good and the bad on its Windows Server 2003 migration.
-
Exposing and addressing wireless security concerns
by Anne Saita
Campus IT managers' emphasis on wireless security puts them at the head of the class.
-
Keeping WLANs safe with WLAN security tools
by Lisa Phifer, Contributor
Check out a variety of seurity managers tools to help keep WLANs safe.
-
Computer threats gaining momentum in 2002, survey says
by Larry Bridwell and Lawrence Walsh
There were no global "virus disasters" in 2002. But the malware problem still got worse, according to the 8th annual ICSA Labs Virus Prevalence Survey.
-
VoIP security: Real-world VoIP implementation best practices
by Anne Saita
If you want VoIP security, the pros say do your homework and roll up your sleeves during VoIP implementations.
-
Examining Windows Server 2003 operating system security
by Randal Franklin Smith
-
-
Windows 2003: IIS Web server security best practices
by Randal Franklin Smith, Contributor
Sidebar: Microsoft makes good on its promise to make Windows 2003 and IIS secure by default.
-
WLAN security: Best practices for wireless network security
by Lisa Phifer, Contributor
WEP and war drivers scaring you away? Try these new solutions and best practices to protect your wireless networks.
-
Checklist for secure wireless LAN deployment
by Lisa Phifer, Contributor
Lisa Phifer outlines a checklist for secure wireless LAN deployment in the areas of policy, integration planning, and deployment and beyond.
-
Merging firewalls: Making your enterprise more secure with Sidewinder
by Fred Avolio, Contributor
Review: Secure Computing creates an impressive product by merging two leading firewalls into the Sidewinder G2.
-
VoIP network security protocols: Is VoIP secure?
by Steven Taylor, Contributor
Is your network equal to the task? Are you willing to risk exposing data and voice on the Internet?
-
Windows 2003: IIS Web server security best practices
by Randal Franklin Smith, Contributor
-
Columns
-
Lessons of cyberwar: A chance to boost information security budgets
by Andrew Briney
In the wake of an incident, CISOs should make the most of the opportunity to increase information security budgets.
-
HIPAA 2003 deadline sparks rush toward compliance
by Anne Saita
With the HIPAA 2003 privacy rule deadline approaching, some health care organizations are speeding toward HIPAA compliance; others hope to avoid a bitter security pill.
-
Network packet analyzers enable enterprise 'packet peeking'
by Marcus J. Ranum, Contributor
Marcus Ranum explains how network packet analyzers offer a worm's-eye view of what's traversing an enterprise network.
-
Reality AV: Infosec storylines make for good reality TV ideas
by Lawrence Walsh
Is a Hacker Dating Game show that far-fetched? A few infosec storylines that would play well as reality TV ideas.
-
Lessons of cyberwar: A chance to boost information security budgets
by Andrew Briney
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO