Microsoft Windows Vista security: Considerations and expectations

Though Microsoft Windows Vista isn't perfect, it is the most secure version of Windows ever created. Value-added resellers, systems integrators and security consultants should know how to use the new features available, so get tips from Brien Posey about how to use the code signing, Windows Defender and Secure Startup features, and learn more about features and adoption considerations from Michael Cobb.

    Requires Free Membership to View

Vista's security features: What to expect
Ever since Windows Vista was initially announced, Microsoft has claimed that it will be the most secure version of Windows ever created. Although Vista does offer a lot of promising new security features, you may be wondering what you can do to take advantage of those features once Vista is finally released toward the end of the year. In this article, I will attempt to answer this question by discussing some of Vista's new security features and the impact that they will likely have on you.

Get details on code signing, Windows Defender and Secure Startup features.

Windows Vista: Security issues to consider
Automakers are certainly clever. A consumer will be perfectly happy with the car he or she owns, and then automakers bring out new models featuring all the latest belles and whistles, luring buyers back into the showrooms. Inspired perhaps by that automaker savvy, Microsoft is hoping to inspire some OS envy with the release of Windows Vista. After five years in the making, Windows Vista's shiny new Aero interface will soon be found on home PCs everywhere. But the choice to upgrade enterprise machines has to be based on what's under the hood, not how it looks. While Microsoft touts hundreds of security improvements in Vista, are they really going to make life easier for system administrators?

Familiarize yourself further with Vista security features and adoption considerations.

About the authors
Brien Posey, MCSE, is a Microsoft Most Valuable Professional for his work with Windows 2000 Server and IIS. He has served as CIO for a nationwide chain of hospitals and was once in charge of IT security for Fort Knox. As a freelance technical writer, he has written for Microsoft, TechTarget, CNET, ZDNet, MSD2D, Relevant Technologies and other technology companies. You can visit his personal Web site at www.brienposey.com.

Michael Cobb, CISSP-ISSAP is the founder and managing director of Cobweb Applications Ltd., a consultancy that offers IT training and support in data security and analysis. He co-authored the book IIS Security and has written numerous technical articles for leading IT publications. Mike is the guest instructor for several SearchSecurity Security Schools and, as a SearchSecurity.com site expert, answers user questions on application security and platform security.

This was first published in April 2007

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.