First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Microsoft Windows Server 2008
- Windows Server 2008 is significantly faster than Windows Server 2003; easy to configure and manage host based security
- The anticipated feature, the Hyper-V server virtualisation tool, is missing;
Windows Server 2008 is definitely faster, more manageable and secure. But it's still missing the virtual link.
Price$ 999.00 (AUD)
Microsoft's long-awaited Windows Server 2008 delivers advancements in speed, security and management, but its virtualisation and network-access control features come up short.
In our testing of Windows Server 2008 we found that Microsoft has made a number of improvements to its flagship server operating system.
For example, new server administrative role schemes boost security, the Server Manager program improves manageability, Internet Information Server (IIS) Web management functionality is revamped, Active Directory is easier to control, and Windows Terminal Services has been redesigned. Windows Server 2008 is also significantly faster than Windows Server 2003, especially when client machines are running Vista.
Unfortunately, a highly anticipated feature of Windows Server 2008, the Hyper-V server virtualisation tool, is missing. Microsoft includes a beta version of Hyper-V with Windows Server 2008 editions, but it will not release final code until the third quarter of this year.
Also missing is compatibility between non-Windows (and older Windows) clients and Microsoft's Network Access Protection (NAP) scheme, Microsoft's version of NAC.
The Microsoft NAP scheme uses client-side 'health certificates' to either give or deny clients access to the network. An 'unhealthy' client is vectored to remediation servers for necessary antivirus updates or security patches (compare NAC products).
We tested the NAP scheme as implemented in Windows Server 2008 and found that it works as long as the client is running Windows XP or Vista. But it won't let clients running any other brand of operating system have access to its protected resources, thus hampering the potential success of the NAP scheme, because all client types must be vetted for NAC to work effectively.
Rethinking server roles
Microsoft wants administrators of Windows Server 2008 editions (it will ship in the usual flavours of Standard, Enterprise, Data Center and Itanium-specific code) to think of the server as playing certain roles.
Server roles are aggregated objects that suit commonly thought-of services, such as print services, file sharing, DNS, DHCP, Active Directory Domain Controller and IIS-based Web services. Microsoft has defined 18 roles in all.
There's even a minimalist installation called Windows Server Core that can run various server roles (such as DNS, DHCP, Active Directory components) but not applications (like SQL Server or IIS dynamic pages). It's otherwise a scripted host system for headless operations.
There's no GUI front end to a Windows Server Core box, but it is managed by a command line interface (CLI), scripts, remotely via System Manager or other management applications that support Windows Management Instrumentation (WMI), or by Remote Terminal Services. It's also a potential resource-slimmed substrate for Hyper-V and virtualisation architectures.
The services running on any role-based server are partitioned and enabled through Server Manager, Microsoft's renamed, revamped administrative application – either through its GUI or CLI front end.
It's a vast improvement over the 'Configure Your Server' routines found in Windows 2000 and 2003 editions. Once successfully enabled, the roles can be easily changed. The CLI version allows scripted initial or remote role changes for administrators. Server Manager adds an important improvement over prior management applications: it checks application dependencies thoroughly before it effects installation, changes, deletions or other alterations.
We got a nearly immediate taste of higher security these server roles allow when we installed Windows 2008 Server – strong administrative passwords are now required as the default.
Active Directory Certificate Services have been redesigned, and now join with Group Policy settings to allow easier certificate enrolment, discovery and storage. The public-key infrastructure that was formerly very difficult to establish, monitor and maintain in Windows 2003 Server editions has improved dramatically as choices for certificate management (including storage, issuance and certificate vetting) are wider than ever before.
A side benefit is that IPSec encryption can be used with a number of previously unavailable cryptography methods, such as elliptic-curve Diffie-Hellman or Advanced Encryption Standard choices, allowing a simple but heretofore difficult security hole to be patched: Windows 2008 can provide comprehensive network encryption services, network-wide.
In addition to Server Manager, server-based Windows Firewall MMC snap-in helped us configure and manage host based security more easily. Windows Firewall on Windows 2008 Server-based networks can be now controlled by system enforced Group Policy Objects (GPO) within Active Directory.
The ability to enforce Windows Firewall settings within an Active Directory domain provides a hierarchically enforced mechanism that thwarts branch office or subsidiary server settings made by local administrators. It's an iron-fist policy that has teeth, and we really like that.
The GPOs can now define server IP address admittance, allowing servers to simply ignore traffic from all but specific addresses, reducing their attack surface dramatically. Policies for specific routes are inherited by all clients and servers admitted to the Active Directory-controlled network, which then allows possible intruder activity to be more readily discerned from the noise of general traffic.
However, this admittance control alone doesn't reduce the effects of TCP SYN DOS attacks, but other TCP/IP settings shipping with only Windows Server 2008 can be used to reduce the effect of TCP connection-focused distributed denial-of-service (DoS) attacks.
Latest News Articles
- Yahoo acquires video streaming startup RayV
- New Relic's analysis service goes live
- Hardware hackathon hopes for new ideas on 3D printers, robots
- Wall Street Beat: Tech sales news mixed ahead of earnings
- Microsoft acquires InMage to boost Azure Site Recovery
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How to play DVD movies on your Nintendo Wii
- 5 How do I connect my TV to the Internet?
GGG Evaluation Team
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.