WHOA!!!! I did NOT say it worked with WindowBlinds. (But I will try and check).Don't bother with the "Beta". There have been VERY significant changes between the beta and the release canidate. Also, the only reason I have it installed on work test systems is to research deployment across my enterprise and verify application compatibility. If you're an end user, wait until the final release version. I do not run it on any of my personal machines...yet |

I didn't mean to imply that you'd said it worked with WB...I was saying that worry that it might not was what had put me off trying it.
Like you, I work in an IT support environment, and at some point once it's released we'll have to deploy this to approx 6,000 destops so I ought to be learning it's foibles in advance...at the moment though, I'll leave that to the team who'll be planning that
BTW, I've just been doing a quick hunt to see if I could find any of the hacker sites detailing exploits for SP2 already, and I'm glad to say I didn't find any....yet

Given past form, I wouldn't be surprised if someone finds something that no one has thought of fairly soon after SP2 is released though - I'm sure there are lots of people itching for the kudos of being the one to crack it as soon as it's released.
Anyhow, in searching I found this:
http://blogs.msdn.com/jepling/archive/2004/01/16/59550.aspx
...a blog from one of the people working on SP2, which gives MS a more personal face. I also think that the issues this guy has worked on (mitigating against social engineering 'splots for example) are some of the most promising developments as they convince me that MS is beginning to really understand what security really needs.