Wednesday, April 25, 2012

Taking On Microsoft's Lync Certification!


As a technical instructor, we are often challenged to take on and learn new technologies. For a Microsoft Certified Trainer, there are additional challenges – we have to earn our certification in those technologies before we can step into the classroom and share what we have learned.

Over the course of the past year, I’ve decided to tackle Microsoft Lync 2010. It seemed to be a good fit for me, as I spend a lot of time working in the messaging space with Microsoft Exchange 2010, and Lync integrates with Exchange. The other side of it is the fact that Lync evolved out of components that were part of Exchange back in the early days (pre-Active Directory), so that reinforced my resolve.

There are two exams to earn one’s MCITP:Microsoft Lync Certification. The first step is to become Microsoft Certified Technology Specialist for Lync by passing the TS: Microsoft Lync Server 2010, Configuring exam (70-664).  The second best piece of advice I can offer regarding this exam is to spend time with the product and the Lync 2010 Resource Kit. Specific to the exam, however, the best advice is to thoroughly ingest every article mentioned in Enrique Lima’s study guide for the Lync exam.

After you punch your ticket on 70-664, you’ll ramp up for the 70-665 exam. Once again, my old friend Enrique has another unofficial prep guide, and this one is a two parter: part one can be found here, and part two here.

Feel free to shoot me a line about any other questions you might have with Lync certification. Lync is one of Microsoft’s hottest properties right now, and the need for knowledgeable, certified professionals is on the rise.

Bob Reinsch

breinsch@centriq.com

Tuesday, April 24, 2012

How Can I Print in Color in Visual Studio?


One issue that came up in class some time back was that a student was printing his code from Visual Studio when he noticed that all of his code was being printed in black and white. From a learning perspective, he sometimes likes to view his code on paper, mark it up by hand, draw arrows and in other ways interact with it and make it sense of it.

However, one of the helpful features of Visual Studio, of course, (and of most Integrated Development Environments) is the color coding. By default, comments are shown in green, strings of text in red, keywords in dark blue and so on. So the student wanted to see if there was any way to get Visual Studio to print the code using the color coding that shows up onscreen.

It turns out that in Visual Studio 2008 and 2010, the color coding isn't enabled for print-outs. However, there is an extension from Microsoft that can be loaded to enable it to print in color.

The upside is being able to print in color.

The downsides are:
1)      The extensions are not supported in the Express versions of the Visual Studio products, and so Microsoft's color printing extension cannot be loaded on those versions.
2)      Collapsible regions will be printed as expanded; they cannot be skipped from the printout.
3)      The new print dialog box doesn't enable printing line numbers, and so they can only be printed by enabling line number margins in Tools-->Options.
4)      Margins for the page itself cannot be altered in this version.

To review the documentation and/or install the Color Printing extension for Visual Studio, visit: http://visualstudiogallery.msdn.microsoft.com/00ec88c2-1553-47d2-8170-3c5baa0c6e44/?SRC=Home

Monday, April 2, 2012

What's New With SQL Server 2012 Training?

I wanted to share with everyone what to expect in the classroom from SQL Server 2012 courses.  As many of you know, for a long time SQL Server classes have been arranged in three core courses, while the content has changed over the years to support the various versions, the structure of these three courses has remained the same.  This structure being: query writing, "traditional" db administration, and database development.  With 2012, these three core facets remain in place in three new 2012 courses.  The query writing course which used to be a jammed packed three day course is now a jammed packed 5 day course (thankfully).  The administration and development courses remain unchanged in length and strong in focusing on the core fundamentals of both administration and development, like backup, restore, indexing, tuning, automating, auditing, and error handling.

These courses are now in beta and we at Centriq are evaluating and providing feedback to Microsoft to ensure the courses offer students what they need.  We plan on offering them to the public as soon as possible and right now that looks like second quarter.

I feel very good about the 2012 SQL training present offerings and I hope to see you in class!

Please use the following URL to get detailed course information on these core course and additional courses as Microsoft makes them available.

Part I - Threats and Vulnerabilities, SMB - Security Is At The Forefront

SMB's share a lot of similarities with large enterprises when it comes to IT Security.  Those similarities include confidentiality of data, preventing unauthorized access and ensuring availability of data.  However, enterprises have the resources such as security personnel to ensure these objectives are achieved.  SMB's have the same threats and vulnerabilities except they may or may not have the the personnel or knowledge that these threats and vulnerabilities may even exist or that they may even be effected by them.  

In Part I of of my "SMB - Security Is At The Forefront" series I am going to explore the unique challenges presented by threats and vulnerabilities for SMB's. 

I. Security Policies  - The Key

Whenever I do a security audit for a SMB, the first thing I find is the lack of a specific security policy.  I either find no policy or only a statement in the employee handbook about the AUP (Acceptable User Policy).  This is not enough in this day and age to ensure a secure environment.  First, the owner or owners need to understand that security is important and that their acceptance and support of a security policy is first and foremost.  A written policy explaining the policies, baselines, standards, procedures and who is responsible for security should be created so everyone understands what is to be expected with regards to security. 


II. Patching Control 

Most SMB's do not have a managed patching system.  By this I mean a centralized method of controlling when and what patches are applied to OS's and applications.  Most SMB's rely on Windows Update to individually update the OS, however it is up to the individual to ensure the updates are applied.  This can mean a workstation might not be updated and have a serious vulnerability.  A major component to a secure system is ensuring that all systems are up to date with the latest patches.  This includes a process that ensures that patches and updates are tested and rolled in a timely fashion.  This can be done easily and effectively by WSUS (Windows Server Update Service).  Also, ensuring a set of procedures to audit to ensure all systems are up to date is very important.

Weak Passwords

This is one of the biggest vulnerabilities for a SMB.  A lot of SMB's have weak password policies or none at all.  Employees are allowed to create passwords on their own for their workstations without any guidelines nor are they made to change them.  Also, in some cases there is no password on the system at all.   A strong password policy is crucial to securing a system.  All employees should be required to have passwords that are at least 8 characters, have a number and a character and should be changed at least every 45 days. 

Default Accounts

The use of default accounts is also sometimes an issue.  By this I mean workstations have just a default account on them such as administrator or guest with no password.  This allows anyone to use the system with minimal or no controls creating a vulnerability whereas a hacker or employee could exploit the machine.

Physical Controls

Since most SMB's only have a few offices, there may not be a great need for locks and door security since this is usually done.  However security to the IT closet or where the servers are located needs to be addressed.  Normally having only a few devices does not negate the fact that all servers, routers, switches and firewalls need to be in a secure place and have limited access. 

Wireless - Rouge Access Points, Weak Wireless Security

Sometimes SMB's will employ wireless solutions just as they would as if they were installing one at home.  This can be a serious concern because business wireless should not be treated like home wireless.  Business wireless should be concerned with getting connectivity with secure protocols and most importantly controlling access to the wired network.  Basic installation and lack of controls on the use of the wireless usually lead to a security breach.

Lack of Security Awareness

Owner and employees need to be aware of secure practices when doing their job.  All employees should understand the impact on the company if they are working on a computer regardless if it is connected to a network.  Having a good understanding of secure practices will help protect the company from most security breaches.

Next month in part 2, I will be discussing most specifics on how to create a SMB security policy.

Thank you and if you have any questions during the series please feel free to email me at wpruett@centriq.com 


Tom Pruett

Network Security Engineer/Senior Technical Instructor