IT operations and infrastructure management
Find tips related to deploying and maintaining the Microsoft-based infrastructure, such as Windows file servers, printers and VPN. Learn how to use PowerShell to automate deployment and troubleshooting tasks and perform bulk operations in the Windows environment.
Top Stories
-
Tip
26 Dec 2024
How to connect Windows 10 desktops to a print server
There are many ways to manage Windows 10 and 11 printers, but a print server can be the best approach -- especially for enterprise organizations -- due to its centralization. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Tip
12 Dec 2024
See what's new in Desired State Configuration v3
Avoid unexpected surprises, and learn how to bring consistency to your on-premises infrastructure and cloud resources with the overhauled configuration management tool. Continue Reading
-
Definition
20 Oct 2017
Microsoft Exchange Mailbox Replication Service (MRS)
The Microsoft Exchange Mailbox Replication Service (MRS) is a feature that handles mailbox import, export, migration and restoration requests on Exchange Server. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Definition
27 Sep 2017
Microsoft Nano Server
Microsoft Nano Server is a lightweight version of the Windows Server operating system that was introduced with Windows Server 2016 for use as an OS layer for virtualized container instances. Continue Reading
By- Katie Terrell Hanna
- Stephen J. Bigelow, Senior Technology Editor
-
Definition
21 Sep 2017
Microsoft Office 365 Advanced Threat Protection
Microsoft Office 365 Advanced Threat Protection (ATP) is Microsoft's optional cloud-based service that scans and filters email to protect subscribers from malware in attachments and hyperlinks to malicious websites. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Definition
20 Jul 2017
Microsoft Office 365 Admin Center
The Microsoft Office 365 Admin Center is the web-based portal administrators use to manage user accounts and configuration settings for the Office 365 subscription services, including Exchange Online and SharePoint Online. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Definition
28 Feb 2017
Microsoft Network Device Enrollment Service (NDES)
Microsoft Network Device Enrollment Service (NDES) is a security feature in Windows Server 2008 R2 and later Windows Server operating versions. NDES provides and manages certificates used to authenticate traffic and implement secure network communication with devices that might not otherwise possess valid domain credentials. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Definition
10 Jan 2017
Microsoft Online Services Sign-In Assistant
The Microsoft Online Services Sign-In Assistant is a software application that provides common sign-on capabilities for a suite of Microsoft online services, such as Office 365. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Definition
30 Nov 2016
Microsoft Windows Features on Demand
Microsoft Windows Features on Demand is a feature that allows system administrators to add or remove roles and features in Windows 8 and Windows Server 2012, and later versions of the client and server operating system to alter the file size of those operating systems. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Definition
29 Feb 2016
Microsoft Hyper-V Shielded VM
A Microsoft Hyper-V Shielded VM is a security feature of Windows Server 2016 that protects a Hyper-V second-generation virtual machine (VM) from access or tampering by using a combination of Secure Boot, BitLocker encryption, virtual Trusted Platform Module (TPM) and the Host Guardian Service. Continue Reading
By- Tom Walat, Site Editor
-
Definition
30 Nov 2015
Microsoft Scale-Out File Server
Microsoft Scale-Out File Server is an active-active clustered file server feature based on Server Message Block (SMB) 3.0 to provide continuous availability of file shares in Windows Server. Continue Reading
By- Tom Walat, Site Editor
-
Definition
19 May 2015
MCITP (Microsoft Certified IT Professional)
An MCITP (Microsoft Certified IT Professional) is a credential that proves that an individual has a complete set of skills required to perform a particular IT job role, such as enterprise or virtualization administrator. Continue Reading
By- Tayla Holman, Site Editor
-
Definition
31 Mar 2015
Microsoft Network Policy and Access Services (Microsoft NPAS)
Microsoft Network Policy and Access Services (Microsoft NPAS) is a server role in Windows 2008 and Windows Server 2012 that allows administrators to provide local and remote network access. Continue Reading
By- Tayla Holman, Site Editor
-
Definition
23 Jan 2015
Microsoft System Center Operations Manager Management Pack (Microsoft SCOM Management Pack)
A System Center Operations Manager (SCOM) Management Pack is a pre-fabricated rule set intended to extend and configure SCOM for specific services or applications. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
Definition
20 Mar 2013
OAB (offline address book)
An Offline Address Book is a downloaded copy of a Microsoft Outlook user's address list which allows the user access to email addresses when disconnected from Exchange Server. Continue Reading
By- Matt Gervais, TechTarget
-
Definition
25 Feb 2013
Remoting (PowerShell Remoting)
PowerShell Remoting is a feature in PowerShell that lets admins run commands on remote systems. Continue Reading
By- Toni Boger, TechTarget
-
Definition
25 Feb 2013
Microsoft Exchange RBAC (Role Based Access Control)
Microsoft Exchange RBAC is a permissions model used in Exchange Server 2010 and Exchange Server 2013. Continue Reading
By- Matt Gervais, TechTarget
-
Definition
18 Feb 2013
Microsoft iSCSI Initiator
Microsoft iSCSI Initiator is a tool that connects external iSCSI-based storage to host computers with an Ethernet network adapter. Continue Reading
By- Toni Boger, TechTarget
-
Definition
08 Feb 2013
CHKDSK (check disk)
CHKDSK (pronounced check disk) is a command that displays a status report for a volume, such as a disk, and can correct any errors found in that volume. Continue Reading
By- Toni Boger, TechTarget
-
Definition
04 Feb 2013
backup domain controller (Windows NT)
A backup domain controller (BDC) is a role a Windows NT computer takes on to help manage access to network resources. Continue Reading
By- Toni Boger, TechTarget
-
Definition
15 Jan 2013
Microsoft Exchange Control Panel
The Exchange Control Panel (ECP) is a Web-based management interface introduced in Exchange Server 2010. Continue Reading
By- Matt Gervais, TechTarget
-
Definition
15 Jan 2013
Exchange Autodiscover service
The Exchange Autodiscover service helps Exchange administrators set up and sustain server settings for computers that run Microsoft Outlook, as well as settings for supported mobile devices. Continue Reading
By- Matt Gervais, TechTarget
-
Definition
14 Dec 2012
Microsoft Cluster Service (MSCS)
Microsoft Cluster Service (MSCS) is a service that provides high availability (HA) for applications such as databases, messaging and file and print services. Continue Reading
By- Toni Boger, TechTarget
-
Definition
10 Dec 2012
peer-to-peer network (P2P network)
A peer-to-peer (P2P) network is a network in which each computer functions as a client or server for other computers in the network. Continue Reading
By- Toni Boger, TechTarget
-
Definition
07 Nov 2012
Group Policy Editor (GP Editor)
Group Policy Editor is a tool that helps administrators manage policy settings in Microsoft Management Console (MMC) snap-ins. Continue Reading
By- Toni Boger, TechTarget
-
Definition
02 Nov 2012
Windows Process Activation Service (WPAS)
Windows Process Activation Service (WAS) is a tool for managing worker processes that contain applications that host Windows Communication Foundation (WCF) services. Worker processes handle requests that are sent to a Web Server for specific application pools. Each application pool sets boundaries for the applications it contains. Continue Reading
By- Toni Boger, TechTarget
-
Definition
22 Oct 2012
Windows Server 2012 (WS 2012)
Windows Server 2012, formerly codenamed Windows Server 8, is the latest version of Windows Server. Continue Reading
By- Toni Boger, TechTarget
-
Definition
16 Oct 2012
Microsoft Exchange Management Shell (EMS)
Microsoft Exchange Management Shell (EMS) is a scripting platform that enables administrators to manage Exchange Server. EMS is is built on top of Microsoft PowerShell, a command line shell that allows administrators to perform administrative tasks with simple noun-verb commands called cmdlets. Continue Reading
By- Matt Gervais, TechTarget
-
Definition
09 Aug 2012
Exchange Administration Center (EAC)
The Exchange Administration Center (EAC) is a Web-based management console for managing Exchange Server 2013 environments. Continue Reading
By- Matt Gervais, TechTarget
-
Definition
02 Jul 2012
transitive trust
Transitive trust is a two-way relationship automatically created between parent and child domains in a Microsoft Active Directory forest. Continue Reading
By- Ben Rubenstein, Senior Manager, Social Media and Online Community
-
Definition
22 Jun 2012
CSV (Cluster Shared Volumes)
CSV (Cluster Shared Volumes) is a feature in Windows Server in which shared disks are concurrently accessible to all nodes within a failover cluster. Continue Reading
By- Ben Rubenstein, Senior Manager, Social Media and Online Community
-
Definition
15 May 2012
gpresult
Gpresult is a command-line tool that shows the RSoP (Resultant Set of Policy) for a user or computer based on applied Group Policy settings. Continue Reading
By- Ben Rubenstein, Senior Manager, Social Media and Online Community
-
Definition
15 May 2012
Group Policy Preferences
Group Policy Preferences are a set of extensions, introduced in Windows Server 2008, that increase the functionality of Group Policy Objects. Continue Reading
By- Ben Rubenstein, Senior Manager, Social Media and Online Community
-
Definition
17 Feb 2012
Microsoft System Center 2012
Microsoft System Center 2012 is a bundled suite of systems management products that offers tools to monitor and automate virtualized environments, including private clouds based on Microsoft Hyper-V. Continue Reading
By- Ben Rubenstein, Senior Manager, Social Media and Online Community
-
Tip
07 Jun 2011
Troubleshoot Windows boot problems with Xbootmgr
By working with the Xperf tool, Xbootmgr helps admins pinpoint the real cause of slow boot issues in Windows Server. Continue Reading
By -
Answer
02 Jun 2011
Why mssphtb.dll was disabled in Outlook 2010
Exchange admins wonder why Microsoft disabled the mssphtb.dll utility in Outlook 2010. Our expert clears the air on this misunderstood search component. Continue Reading
-
Tip
22 Feb 2011
A closer look at the Ntdsutil command-line tools for Active Directory
Dig into the slew of Ntdsutil commands in Windows Server 2008 and R2 that provide admins with improved Active Directory management. Continue Reading
By -
Tip
11 Jan 2011
Top three Windows server crashes (and how to avoid them)
Why wait until a server crashes to start the troubleshooting process? Admins can squash potential outages ahead of time by zeroing on the most likely culprits. Continue Reading
By -
Tip
10 Jan 2011
How to use WMI with Windows PowerShell scripts
With PowerShell, admins can harness the power of WMI to find all sorts of system and network information. The best part? It’s probably a lot easier than you think. Continue Reading
-
Tip
09 Dec 2010
How vulnerable is Microsoft IIS 7.5 to attacks?
While version 7.5 is more secure out of the box than past IIS releases, it doesn't guarantee 100% protection. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Tip
18 Nov 2010
Tracking system resources with free WinObj utility from Sysinternals
Mark Russinovich and company did Microsoft one better with the WinObj tool for tracking Windows system resources, though there’s still room for improvement. Continue Reading
-
Tip
14 Oct 2010
Controlling the output of Windows PowerShell commands
Windows PowerShell features several cmdlets for writing data. Knowing which commands do what can help control the output of your functions and keep your pipelines clean. Continue Reading
-
Feature
16 Sep 2010
Ten cool iPhone apps for Windows admins
Are you an admin on the go? Check out some of the best iPhone apps available for Windows server and network management. Continue Reading
-
Answer
27 Apr 2010
Reconfiguring .pst file home locations on Exchange
Find out how to set home default locations and autoarchive your .pst files. Continue Reading
-
Tip
30 Mar 2010
Using Group Policy preferences for immediate and scheduled tasks
The scheduling tools in Group Policy preferences let you run a command across an entire infrastructure quickly and easily. Continue Reading
By- Greg Shields, Concentrated Technology
-
Tip
18 Mar 2010
Why is Microsoft Outlook blocking attachments?
Microsoft Outlook blocks email attachments to protect the Exchange Server organization from malware and viruses. This can be frustrating if it blocks safe attachments. Here are two workarounds you can use to make sure users can open safe attachments without opening the system up to threats. Continue Reading
By -
Tip
03 Mar 2010
Active Directory Web Services brings new power to R2
Admins running Windows 2008 R2 might be interested in Active Directory Web Services, a new interface for accessing Active Directory and AD Lightweight Directory Services. Continue Reading
By -
Definition
18 Feb 2010
social computing
Social computing is the collaborative and interactive nature of online behavior. Since the 1990s, computing has increasingly been assumed to be online; simultaneously, online behavior has become increasingly social. Continue Reading
-
Feature
15 Feb 2010
Recovering an Active Directory root domain in a multiple domain forest
Imagine your entire forest root domain failed. What would you do? This case study explores the steps taken in such a situation. Continue Reading
-
Answer
08 Feb 2010
Defining the relationship between Outlook, AD and Exchange Server
Find out how Outlook, AD and Exchange are connected and the roles each play for users. Continue Reading
-
Tip
14 Dec 2009
Fixing lingering object problems in complex Active Directory forests
Lingering objects can provide an inconsistent view of the Active Directory and confuse administrators. Learn how to find and remove them in complex forests. Continue Reading
By -
Answer
12 Aug 2009
Microsoft Outlook error message: 'Mailbox Size Limit exceeded'
An Exchange administrator keeps receiving an error message stating 'Mailbox Size Limit exceeded.' See what to check before taking action. Continue Reading
-
Tip
21 Jul 2009
Debugging Windows client logon delays: Narrowing the scope
There are several potential causes of slow client logons. The question is, once you find the source, how do you fix it? Continue Reading
By -
Answer
15 Jun 2009
Sending poll questions through Exchange to non-Outlook users
Learn if you can send out polling questions through Exchange Server to recipients who don't use Microsoft Outlook. Continue Reading
By- Bradley Dinerman, National Information Security Group
-
Tutorial
10 Jun 2009
Exchange Performance Monitor tracks domain controller communication
Using Performance Monitor counters is an effective way to keep an eye on Exchange Server health. Learn which Performance Monitor counters you should watch to ensure that your Exchange Servers are communicating effectively with your domain controllers. Continue Reading
-
Tutorial
28 Apr 2009
Windows Distributed File System (DFS) Tutorial
This short guide breaks down Microsoft's Distributed File System, with tips, articles and how-tos on topics ranging from DFS Namespace and DFS Replication to migration, we've got all the resources Windows admins need. Continue Reading
-
Feature
27 Mar 2009
Windows Distributed File System (DFS) Namespace primer
This excerpt from "The Complete Guide to Windows Server 2008" goes over the basics of Distributed File System Namespace (DFSN). Learn the applications, components and mechanics of DFSN, as well as what's new with Windows Server 2008. Continue Reading
-
Feature
24 Feb 2009
Quest Authentication Services
Quest Authentication Services allows organizations to extend Active Directory (AD) to Unix, Linux and Mac platforms and enterprise applications. It enables the unification of identities and directories for simplified identity and access management. Continue Reading
-
Definition
27 Oct 2008
Microsoft Office SharePoint Server (MOSS)
Microsoft Office SharePoint Server (MOSS) is the full version of a portal-based platform for collaboratively creating, managing and sharing documents and Web services. MOSS enables users to create "Sharepoint Portals" that include shared workspaces, applications, blogs, wikis and other documents accessible through a Web browser. The free version, Windows SharePoint Server (WSS), usually referred to as simply "Sharepoint," is available as a free download included with every Windows Server license. (Continued...) Continue Reading
-
Tutorial
20 Oct 2008
Microsoft Group Policy Tutorial
This guide introduces you to Group Policy. From the basics of using GP to run your environment to the changes you can expect after migrating to Windows Vista, we've got all the tips, article and how-to's administrators need to know. Continue Reading
-
Answer
12 Sep 2008
Why can't I grant users permissions to an Exchange public folder?
Exchange Server public folder permissions can be complex. Get troubleshooting advice on delegating permissions to Exchange Server public folders here. Continue Reading
By- Richard Luckett, Learn IT Solution Group LLC
-
Tip
05 Sep 2008
Troubleshooting Active Directory database errors
While database errors in Active Directory can crop up occasionally, they are usually simple to fix. Check out these troubleshooting tips for when you think your AD database might be corrupted. Continue Reading
By -
Feature
01 Sep 2008
Downloading and Installing Windows PowerShell
In this excerpt from "Essential PowerShell" you'll learn the steps and procedures for downloading and installing Windows PowerShell. You'll also go over the process of taking WPS for a test run in interactive mode and script mode. Continue Reading
-
Definition
18 Aug 2008
Windows Sharepoint Services (WSS)
Windows Sharepoint Services (WSS) is a portal-based platform for creating, managing and sharing documents and customized Web services. WSS is available as a free download included with every Windows Server license. Continue Reading
-
Tip
24 Jun 2008
How to access SharePoint sites through Microsoft Outlook
If you have both Microsoft Exchange Server and SharePoint, you can easily access SharePoint sites directly from Microsoft Outlook. Here's how. Continue Reading
By -
Feature
09 Jun 2008
Database grooming for System Center Operations Manager 2007
This excerpt from "System Center Operations Manager 2007 Unleashed" takes you through the process of grooming your operational, data warehouse and ACS databases in SCOM 2007 Continue Reading
-
Tutorial
21 May 2008
How to test Exchange Management Shell commands
Understand how to use the Exchange Management Shell parameters WhatIf and ValidateOnly in Exchange 2007 to preview and test EMS commands before executing them. Continue Reading
-
Tip
29 Apr 2008
Tracking a deleted Active Directory object's replication status
Learn how to track a deleted Active Directory object's replication status and how to determine if the object has been replicated throughout the DC forest. Continue Reading
By -
Tip
06 Feb 2008
Optimizing NTFS file system performance
The hard disk can sometimes become a bottleneck in overall system performance. While not much can be done to overcome hardware-related limitations, admins can optimize the NTFS file system for better performance. Continue Reading
By -
Tip
03 Jan 2008
How to use RACI charts to define service desk roles and responsibilities
Using a management tool called RACI charting can help IT managers simplify the daunting task of clarifying the roles and responsibilities of the service desk. Continue Reading
By- Stuart Galup, Contributor
-
Tip
19 Dec 2007
Best practices for using Outlook .PST files on portable USB drives
You can save Microsoft Outlook email data in a .PST file to a portable USB storage drive, but make sure you understand these best practices first. Continue Reading
-
Answer
06 Dec 2007
Troubleshoot Outlook Web Access (OWA) login error: 'Access denied'
Learn how to troubleshoot Outlook Web Access (OWA) login errors that prevent OWA users from accessing their email. Continue Reading
By- Bradley Dinerman, National Information Security Group
-
Answer
05 Dec 2007
Set Outlook calendar permissions for group to view private meetings
Learn how to grant Microsoft Outlook calendar permissions, including access to private Microsoft Outlook calendar meetings, to a select group of users. Continue Reading
By- Bradley Dinerman, National Information Security Group
-
Tip
27 Nov 2007
How the DC locator works in Active Directory
The DC locator depends heavily on DNS to not only locate a domain controller with the right role but also to locate one that will be efficient. Continue Reading
By -
Tip
19 Nov 2007
When and how to use worker process recycling with IIS
Configuring Internet Information Services to automatically reset worker processes can solve a lot of Web application issues, but it should only be used in certain situations. Continue Reading
By -
Tutorial
15 Oct 2007
How to use Microsoft's IIS Diagnostics Toolkit
In this resource guide, contributor Tim Fenner offers an overview of the seven utilities in the IIS Diagnostics Toolkit and provides instructions on how to download and use them. Continue Reading
-
Tutorial
15 Oct 2007
How to use Debug Diagnostics to troubleshoot IIS issues
Learn how to use the IIS Diagnostic Toolkit's Debug Diagnostics utility to troubleshoot performance issues in any Win32 user-mode process. Continue Reading
-
Tutorial
15 Oct 2007
How to install the Microsoft IIS Diagnostics Toolkit
In this excerpt from "Inside the IIS Diagnostic Toolkit," contributor Tim Fenner explains the ways Windows admins can install the Toolkit so they can use it to tackle IIS-related issues. Continue Reading
-
Answer
27 Sep 2007
OWA users can't open PDF attachments in Web browser
Some Outlook Web Access users can't open PDF attachments in the Web browser, but they can save them. Find out how to enable users to view PDF attachments. Continue Reading
By- Bradley Dinerman, National Information Security Group
-
Feature
25 Sep 2007
Exchange Server and Microsoft Internet Information Services (IIS)
Learn to install, configure and secure Microsoft Internet Information Services (IIS) for Exchange Server email communications with these tips, tools, and tutorials. Continue Reading
-
Tip
17 Sep 2007
Sysinternals TCPView monitors network connections on Windows systems
Learn how to use Sysinternals TCPView 2.51, the network monitoring tool from Mark Russinovich that keeps track of endpoint connections and processes on your Windows desktop and server systems. Continue Reading
-
Tutorial
06 Sep 2007
How to use SMTP queues to troubleshoot mail flow
Find out how you can use SMTP queues to diagnose and troubleshoot Exchange Server mail flow and email performance issues. Continue Reading
-
Tip
23 Aug 2007
How to create a network printer pool
You can avoid congestion on a network printer by creating a printer pool -- a group of printers attached to a common print queue, so multiple documents can be printed simultaneously. Here's how to create a printer pool in a Windows Server 2003 environment. Continue Reading
By -
Tip
07 Aug 2007
Microsoft Office's CiceroUIWndFrame component crashes Outlook
A Microsoft Office component called CiceroUIWndFrame can crash Microsoft Outlook. Find out how to fix the CiceroUIWndFrame issue with these steps. Continue Reading
-
Feature
06 Aug 2007
How to get process information with Windows PowerShell
In this column, Christa Anderson explains how to use Windows PowerShell's get-process cmdlet to retrieve information about the processes on your computer and how to kill the unnecessary ones. Continue Reading
By- Christa Anderson, Microsoft
-
Tip
01 Aug 2007
Can freezing a hard drive that's crashed restore it to life?
You may be able to bring a hard drive that has crashed or cannot mount back to life by leaving it in the freezer overnight. Not every hard drive having problems responds to this treatment, but in some cases it does seem to work. But why? Here's the technical truth behind this digital urban legend. Continue Reading
-
Definition
30 Jul 2007
CNAME
A CNAME specifies an alias or nickname for a canonical name record in a domain name system (DNS) database. (Continued...) Continue Reading
-
Tip
24 Jul 2007
Troubleshooting Microsoft Outlook toolbar problems
Microsoft Outlook toolbar buttons will stop working correctly if the OUTCMD.DAT file becomes corrupted. Find out why third-party add-ins are often the culprit and learn how to fix the problem. Continue Reading
-
News
17 Jul 2007
Cracking the TPM chip – is it possible?
The integrity of the TPM chip is vital to the future of computer security and the value of Windows Vista's BitLocker technology. Cracking it could turn the IT industry on its ear. Continue Reading
By- Eileen Kennedy, News Writer
-
Tutorial
05 Jul 2007
Active Directory Replication Guide
This guide provides tips and resources on Active Directory replication, including info on replication basics, topology design and troubleshooting replication issues. Continue Reading
-
Tutorial
27 Jun 2007
Step 3: Create an Edge Subscription
An Edge Transport server needs an Edge Subscription to access Active Directory data. Learn how to set one up and caveats you need to watch out for before deploying. Continue Reading
-
Feature
27 Jun 2007
Hacking for Dummies: Test your firewall rules
Before someone else hacks your firewall, test your firewall rules during the self-hacking process to test your network's security. Learn about the tools involved in this excerpt from Chapter 9, "Network Infrastructure," from, Hacking for Dummies, 2nd edition. Continue Reading
-
Tip
25 Jun 2007
Multi-core systems vs. multi-CPU systems
Can you get better performance from a dual-core system or a dual-processor system? This article evaluates the two configurations and determines that multi-core chips tend to be more efficient than multi-CPU systems. Continue Reading
By -
Tip
20 Jun 2007
How to detect data corruption in files and folders
Data corruption that occurs within a file or folder will usually go unnoticed if you're simply backing up the data and testing the backup by restoring it elsewhere. If the files or folders that have been corrupted are used infrequently, you may never even notice the problem until Windows generates a warning message. Continue Reading
By -
Answer
20 Jun 2007
Not receiving email messages that have file attachments
Discover options to explore if you're not receiving email messages that have file attachments and the sender isn't receiving non-delivery reports (NDRs) for the undelivered messages. Continue Reading
By- Bharat Suneja, Microsoft
-
Answer
06 Jun 2007
New Active Directory account not showing up in Exchange Global Address List
If you can't find names in an Exchange Server Global Address List after entering them as new accounts in Active Directory, here's what you need to check. Continue Reading
By- Bradley Dinerman, National Information Security Group
-
Answer
29 May 2007
How to recover email in a specific date range from a .PST file
Get step-by-step instructions on how to recover email that falls within a specific data range from a Microsoft Outlook 2003 .PST file. Continue Reading
By- Bradley Dinerman, National Information Security Group
-
Tip
21 May 2007
AGDLP reduces account management, permissions management headaches
AGDLP is a practice that can greatly reduce your administrative headaches related to account management and permissions management. Continue Reading
By -
Feature
14 May 2007
Filtering output from Windows PowerShell
With PowerShell, it's pretty simple to browse Windows Management Instrumentation classes without cheating by filtering the content -- all it takes is a new cmdlet and working with variables. Continue Reading
-
Tip
10 May 2007
Daisy-chaining SCSI devices
With SCSI, you can daisy-chain (physically wire) multiple devices together. However, if you're considering daisy-chaining multiple SCSI devices together, you should know the SCSI bus will only support a certain number of devices. Continue Reading
By -
Tutorial
02 May 2007
An overview of Microsoft Outlook email security features
In the following tip from "8 tips in 8 minutes: A Microsoft Outlook email security tutorial," you'll gain an in-depth overview of Microsoft Outlook's email security features including security zone changes, the Outlook security update, S/MIME security, Information Rights Management and RPC over HTTPS. Continue Reading
-
Tip
30 Apr 2007
Create and manage hardware profiles
Hardware profiles, which are set by a systems administrator, describe which pieces of hardware are enabled or disabled when a system is booted under a given profile. They eliminate the process of Windows having to redetect hardware. This tip will show you how to create and manage hardware profiles. Continue Reading
By- Rahul Shah, Contributor