Looking to test out Direct Access and see how it can be used within your organization but don’t feel like setting up the entire infrastructure? Head on over to the Microsoft download center and pick up a copy of the test lab guide to build out a machine using Windows Server 2012. More deets here:
Download Test Lab Guide: Demonstrate DirectAccess Single Server Setup with Mixed IPv4 and IPv6 in Windows Server 2012 from Official Microsoft Download Center
If you’ve not used Direct Access, you’re missing out. With Windows Server 2012 you don’t even need a hard token client certificate but instead can use a hardware certificate which is pretty rockin’ awesome. Only thing to be mindful of, your Windows users need to be domain joined to take advantage of this – but it’s worth it 🙂
So if you’re thinking to yourself, “Cool! Microsoft released a tool called the Office 2013 DocRecrypt Tool! I’ll be able to decrypt all those documents and do whatever I want with them! No one can stop me now!”
Not so fast there Kimosabe. You still have to have the escrow key to decrypt files before you can do anything with them. The description is definitely a little misleading if you just read the first bit…
This tool allows admins to unprotect or change the password on password protected OOXML Word, Excel and PowerPoint files.
When in reality the entirety of the description spells things out pretty clearly, removing the would be fun of those without escrow keys.
The tool gives admins who have configured the Escrow key feature options to get access to password protected files. The admin uses the tool and the private key of the escrow certificate to decrypt the file. Once decrypted the admin can choose between creating an unprotected copy of the file and changing the password of the file.
If you’re interested in obtaining the tool though, look no further than the Microsoft Download Center link here:
In case you’re working on that Visio documentation and you’re in need of a stencil for Exchange 2013, look no further, it’s available through the Microsoft Download Center here:
Always interesting when reading through the Download Center Updates that are available when something like this pops up:
Title: Explorer.exe process may crash when you tap or click the desktop in Windows 8 or Windows Server 2012
Is it just me or that’s… “Bad”?
Granted if you dig into the text you’ll see that it’s targeted at a particular language, but still interesting to see something like this pop up.