Articles by Brien M. Posey 

Connecting Clients to a Wireless Network

In the second part of this series, you'll learn how to connect wireless clients and how to ensure wireless security.

Wireless Networking Benefits and Hardware Requirements

In this article series, learn about the benefits of adding wireless capabilities to your network, beginning with configuration and performance issues.

Add Security by Filtering TCP/IP Packets

Take advantage of Windows 2000's firewall capabilities, which let you block ports and protocols.

Avoiding Permissions Problems

Even with all of Windows 2000s security features, if you dont take care of permissions at the lower levels, higher-level security features wont be effective.

Backing Up the System State

To be sure you're performing a comprehensive backup in Windows 2000, you must back up the System State.

Default Groups and Administrative Security

You can get a lot of mileage out of the many built-in groups that come with Windows 2000.

Configuring the Terminal Server Client

Putting it all together: preparing and testing the network connection between your handheld PC and Windows 2000 terminal server.

Preparing the Network Card and Terminal Server Client

Configuring your terminal server client to remotely access the Windows 2000 server.

Installing Terminal Services on the Server

Brien Posey explains system requirements and the installation process for configuring terminal services on your Windows 2000 server.

Terminal Services Basics

Sometimes theres no substitute for being able to see the servers screen in real time. Part 1 of this series explains the basics of Windows 2000s terminal services.

Staying Connected on the Road with Cellular Modems

On the road? In spite of significant limitations, a standard cellular phone may be your best choice for a wireless Internet connection.

Using an Infrared Link

How to establish an infrared link between devices with Windows 2000, and use it to exchange files, print, or transfer images from a digital camera.

Configuring Windows 2000 Networks for Mobile Users

You can configure your Windows 2000 remote access policies to achieve whatever level of security your organization requires.

Installing and Configuring Infrared Support

Get on the wireless bandwagon by getting infrared capabilities up-to-speed in Windows 2000.

Auditing Specific Events

Part 3 in our series on auditing Windows 2000 security helps you refine your auditing techniques.

Planning a Shared Folder Structure

In a Windows network, mixing up the different the different techniques for sharing resources may be the way to make sure that users get access to information they need while being kept out of restricted areas.

Setting Up an Audit Policy

Part 2 of Brien Poseys series on setting up audit policies, an essential element in your Windows 2000 security arsenal.

Capabilities of the MOVETREE Command

In a Windows 2000 network, you can use the MOVETREE Command to move universal groups within a domain or between domains that exist in the same forest. But beware the limitations of this tricky but powerful command.

Infrared Networking Basics

Its time to whip out your infrared-enabled devices and communicate without wires. In Part 1, learn the basics of infrared networking in Windows 2000.

Planning Your Group Structure Implementation

Without a clear, organized plan, its easy for the groups to blend together and overlap each other, resulting in chaos.

Using ESP to Prevent Replay Attacks

Find out how to safeguard Windows 2000 networks from replay attacksa particularly sophisticated type of attack where a hacker uses a protocol analyzer to monitor and copy packets as they flow across the network.

Behind the Scenes with Active Directory

Brien Posey explains some of Active Directory's intricacies, including the global catalog and replication between Active Directory servers.

Creating an Audit Policy

By auditing your system on a regular basis, you'll know what your users are up to--and you'll be able to spot attempted network intrusions.

Implementing Windows 2000 Groups

Groups are more than a convenience for assigning permissions: They're the backbone of a good Windows 2000 security infrastructure.

Managing Windows 2000 Security Logs

When your Windows 2000 security log fills up, you really only have two choices: archive the log or overwrite it. Increasing the size of the log is a temporary solution because it inevitably fills up again.

Reorganizing Active Directory

Brien Poseys new series on moving Active Directory objects walks you through procedures from the simple to the arcane. In Part 1, moving objects within and between domains.

Get the Latest Scoop with Enterprise Networking Planet Newsletter