Despite some speculation that it might kill a planned interim release of Windows Server, Microsoft said this week that it is charging ahead with the update, code-named R2.

However, the software maker is taking a couple of features out of the operating system release to make sure it can come out by the second half of next year.

As previously reported, Microsoft is delaying one of the key selling points for R2--a Network Access Protection feature that allows corporate networks to quarantine machines re-entering the network. The company said Monday that it is delaying much of that capability until 2007 to collaborate with Cisco Systems to make sure the companies have compatible approaches to network security. (See News Below)

The R2 release was not on Microsoft's roadmap until February, when Bill Gates mentioned in an interview with News.com that some sort of interim release was likely. Microsoft later outlined R2 as a release that would add a few enhancements as well as combine some already released "feature packs."

The rest of the server roadmap, which Microsoft last outlined in May, remains on track, according to the company. Next up is Service Pack 1 of Windows Server 2003, slated for the first half of next year. Microsoft said it now sees having a near-final, or "release candidate" version of the service pack by year's end.

"We're getting closer," said Samm DiStasio, a product manager in Microsoft's Windows Server unit. Service Pack 1 adds many of the security changes Microsoft made in SP2 for Windows XP, as well as a new "security configuration wizard" as well as performance improvements, DiStasio said.

In 2006, the company expects a second service pack for Windows Server 2003 before releasing the next major update--Windows Server "Longhorn"--in 2007. The company expects to have its first beta, or test version, of Longhorn Server next year.

Some analysts had thought Microsoft might drop R2 to meet its Longhorn targets, but DiStasio said service packs and interim releases like R2 won't slow Longhorn or overload corporate IT departments.

"We're taking features that we already have in development," said product manager Samm DiStasio. "One of the things we don't want to do in these releases is put things in...that change the core and force new testing cycles."
Source : http://news.zdnet.com/2100-3513_22-5415371.html

Cisco, Microsoft pledge security interoperability

Cisco Systems and Microsoft are teaming up to make their security architectures interoperable in an effort to keep worms and viruses off corporate networks.

On Monday, the companies announced a partnership that will allow them to share technology and integrate security features on Cisco's networking gear and Microsoft's server and desktop products.

Earlier this year, each of the companies introduced its own "end to end" security architecture. Unfortunately for customers, the proposed architectures were not interoperable. Because the companies had not officially pledged they would work together, customers feared they would be forced to choose between a Cisco implementation or one from Microsoft.

But now, the companies say that customers will not be forced into a tough either/or decision.

"This partnership should give our common customers increased confidence to implement either security architecture knowing that they will be interoperable going forward," said Richard Palmer, a vice president and general manager for Cisco's security group.

The Cisco and Microsoft architectures are part of a new movement in information technology that treats security more holistically. As the cost of fighting and cleaning up after worms and viruses mounts, corporate customers are looking for solutions that combine traditional virus scanning with network policing to keep attacks from ever entering the network in the first place.

As a result, both the Cisco and Microsoft approaches are concerned not only with scanning for viruses but also with policing networks to deny connections to machines that don't conform with security policies.

Cisco introduced Network Admission Control, or NAC, last year. In June, it announced that its routers would support the NAC architecture. It plans to add NAC support to its switches in 2005. Microsoft announced plans earlier this year for Network Access Protection (NAP) architecture, saying that a key method of reducing the spread of viruses is to stop machines from re-entering a corporate network unchecked.

However, in order to make its effort compatible with Cisco's, Microsoft is delaying most of that capability until Longhorn Server, which is slated for release in 2007. The function had been one of the key features of an "R2" interim update that is scheduled for the second half of next year. That release will allow networks to keep machines that are connecting via a VPN (virtual private network) in a secure area, but the ability to quarantine laptops that are re-entering a corporate network won't come until Longhorn, according to Microsoft's Samm DiStasio.

DiStasio said that R2 will still add important features next year, including a simplified approach for managing branch servers and improved handling of multiple directory services.

"Certainly network access protection is a big thing for us," DiStasio said. "It belongs in the Longhorn Server time frame."

So far, neither company is talking about which products will be integrated or when they will be available. But engineers at the companies have already begun exchanging protocols, software coding and application programming interfaces.

"It's still too early for us at this point to know specifics about the details or timeline," said Bob Kelly, general manager of Windows Server Group for Microsoft. "The engineers are still passing the specs back and forth."

Both companies acknowledge that they have a lot of work ahead of them. One of the major obstacles they face is integrating the Remote Authentication Dial In User Service, or Radius servers. In each of the proposed architectures, the companies use their own Radius servers to centrally enforce security policy and provide administration of user profiles.

Separately, the companies have already begun partnering with antivirus software and networking vendors. Cisco announced last week that it has added Computer Associates and IBM as partners. Cisco and Microsoft also have pledged to make some of their technology available to other companies so that they could connect into their architecture.

As part of this new partnership, they also are pledging to work together with standards groups to develop specifications that will allow software and hardware products from any vendor to be used with their own.

A consortium of vendors called the Trusted Computing Group is already working on an architecture that will use open standards. The companies said they also will work with other organizations, such as the Institute of Electrical and Electronics Engineers and the Internet Engineering Task Force, on standards.

"We plan to work together to drive industry standards and promote a broad ecosystem of integrated solutions from a wide variety of players, including those that we have each enlisted on our own," Palmer said.

Microsoft is already partnering with several of Cisco's competitors including Juniper Networks and Enterasys. Cisco's Palmer said the company is committed to eventually opening up its technology to competitors through the standards process.
Source : http://news.zdnet.com/2100-1009_22-5412415.html?tag=nl