Although, Public wireless hotspots or networks are very convenient, but they present many risks if not properly secured. Whenever possible, only connect to wireless networks that require a network security key or have some other form of security, such as a certificate.
By default, Windows 7 suspends an inactive network connection to a shared folder residing on a server after 15 minutes however; you can modify this setting through Group Policy settings. When a session is suspended and the client computer resumes its activity the network connection is automatically re-established. Still, some users find it annoying to see red marks on mapped network drives in Windows Explorer.
Some of the major investments in Windows Server 2012 have been in the areas of failover clustering, virtualization and file services. Microsoft is increasingly interested in cloud computing and providing an operating system that cloud service providers will be interested in adopting, or that consumers of the cloud service will be able to deploy in a cloud environment.
Microsoft has released the Remote Desktop Protocol (RDP) 8.0 update. This update which enables users to use the new Remote Desktop Services features is applicable for clients running Windows 7 Service Pack 1 (SP1) or Windows Server 2008 R2 Service Pack 1 (SP1).
Among the various Group Policy settings you can configure for Remote Desktop Services, there is one particular setting which allows you to disable compression for RDP traffic. In certain network environments where compression is handled by third-party devices, double compression can sometimes cause problems to your remote session environment.
The network shell (Netsh) command line utility allows local or remote configuration of network devices such as wireless interfaces. Using the Netsh wlan option you can create filters that block users from connecting to specific wireless networks which may pose a risk to the security of your environment. Users connecting to unsecure open wireless networks increase the risks of their computers being compromised.
In corporate networks you can use Differentiated Services Code Point (DSCP) values to prioritize traffic for best performance of the most important traffic. However, if you manage a small network and your perimeter devices do not support DSCP, there is an alternative method known as traffic throttling which allows you to specify the amount of bandwidth a specific application can consume. Traffic throttling does not have any network infrastructure requirements.