Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
What is System Center Configuration Manager?
Check out this brief overview of Microsoft's Configuration Manager product, with details on the latest features for R2, R3 and the upcoming v.Next. Continue Reading
What is System Center Operations Manager?
Microsoft's System Center Operations Manager is an IT monitoring device designed to keep administrators in tune with the health of their environments. Continue Reading
What is System Center Virtual Machine Manager?
Flexibility and consolidation are two of the focuses of System Center Virtual Machine Manager, Microsoft's virtualization management solution. Continue Reading
-
What is System Center Service Manager?
Microsoft's knowledge-based System Center Service Manager is the company's premiere help desk product that hit the market earlier this year – despite a few bumps in the road. Continue Reading
What is System Center Data Protection Manager?
System Center Data Protection Manager aims to improve the way Windows admins do backup and recovery with enhanced virtualization capabilities and cloud backup support. Continue Reading
How to connect an iPhone to OWA
Discover how easy it is to connect an iPhone to OWA on Exchange Server 2007 and Exchange 2010. You'll also learn how to retire your Windows Mobile device in favor of an iPhoneContinue Reading
Why throttling PowerShell in Exchange 2010 is a good idea
Did you know that you can restrict PowerShell use in Exchange 2010 to improve server performance? Get the details on setting PowerShell limits in your environment.Continue Reading
Building an automated permissions management solution with Icacls
Using basic Icacls syntax, admins can create an automated solution to ensure correct network file permissions at all times.Continue Reading
Q&A: What's new with Microsoft identity and access management?
Microsoft's Brjann Brekkan discusses what to expect from identity and access management releases like Forefront Identity Manager 2010 and AD Federation Services 2.0.Continue Reading
Adding risk management analysis to a disaster recovery plan
Incorporating risk management techniques within your disaster recovery plan will help identify critical business needs as well as other DR solutions.Continue Reading
-
Alternative PowerShell commands for Active Directory management
While Microsoft has added many new cmdlets for PowerShell 2.0, admins can also use additional options from Quest Software and other outlets when working with Active Directory.Continue Reading
Windows server management guides and learning resources
Check out our collection of guides, tutorials, FAQs and more covering a wide array of Windows server administration topics and technologies.Continue Reading
The Mail Tips feature in Outlook 2010
Outlook 2010's Mail Tips lets users avoid common mistakes like emailing a large group of people or sending a message to someone who's out of the office.Continue Reading
Six ways to improve identity and access management (IAM) for Windows
The evolution of the enterprise has put a huge emphasis on identity management. These steps will help you take control of IAM – before it takes control of you.Continue Reading
How to mount a recovery database in Exchange Server 2010
Because of architectural changes, you'll need to create and mount a database to recover items in Exchange Server 2010. Follow these steps for mailbox recovery and get some command-line switches that will refine the scope of recovered items.Continue Reading
Lessen your client access server burden via throttling policies
Users can connect to Exchange Server 2010 using several different methods, which can overwork a client access server. Setting up client-throttling policies via the Exchange Management Shell will evenly distribute Exchange Server resources.Continue Reading
How to create an Exchange message-tracking report
Discover the Exchange Management Shell commands you can use to create custom message tracking reports.Continue Reading
Analyzing Exchange Server security risks and vulnerabilities
Knowing which security risks and threats can harm your Exchange Server environment is great, but having a plan in place to combat them is even better.Continue Reading
Best practices for SAN configuration and administration
Storage headaches tend to get worse over time, but following the proper configuration and management steps can be the perfect remedy for your SAN-related woes.Continue Reading
AD Rights Management Services and the protection within
For IT pros, the days of simply securing the perimeter are long gone. AD Rights Management Services is just one of many solutions designed to help protect data from the inside.Continue Reading
Free WSUS utility offers on-the-fly patch management for Windows
A new app improves on the process of automated Windows updates – without the need for a WSUS server.Continue Reading
AD Rights Management Services: How to allow remote user access
Phil Cox reviews how to allow your remote users to access RMS-protected documents.Continue Reading
How to customize your Windows PowerShell environment
With scripting environments, one size does not fit all. See how profiles, functions and modules can help you personalize -- and extend the functionality of -- Windows PowerShell.Continue Reading
Planning for disaster recovery with Microsoft Hyper-V
Virtualization is supposed to simplify disaster recovery, but is Microsoft's Hyper-V up to the task? It can be – if you plan accordingly.Continue Reading
Windows management tips: How to backup and restore Active Directory
If you lose your Active Directory, you lose everything. Expert Joel Snyder lays out a plan to help you backup and restore AD.Continue Reading
Three technical skills every IT admin should have
If you're an IT administrator lacking in a technical background, learn all you can about these three fundamental principles. It will make all the difference in your career.Continue Reading
Event logs shed light on Exchange Server DSAccess issues
Exchange Server 2003 uses DSAccess to communicate with Active Directory. However, the distributed nature of Active Directory may make it difficult to get to the root cause of DSAccess issues. Begin the process by analyzing Event 2080 data.Continue Reading
Server hardware upgrades vs. technology refreshes
Should you upgrade your aging equipment or purchase a new system? Understanding the benefits and pitfalls of each is key to making the right decision for your organization.Continue Reading
How to create multiple instances of OWA
Creating multiple instances of OWA is a great way to assign varying sets of features to different OWA users. It can also provide users with file share access. These steps explain how to create multiple instances of OWA no matter which version of ...Continue Reading
PowerShell Scripting School 2.0
Get an inside look at the world of PowerShell, including news and resources for Windows admins.Continue Reading
Set-ExchangeServer cmdlet can ease domain controller workloads
Exchange Server can distribute workloads evenly among domain controllers, but external factors can cause them to become overworked . Executing Exchange Management Shell's Set-ExchangeServer command can help lessen domain controller workloads.Continue Reading
Effects of excessive mailbox size and storage on Outlook performance
So you applied the February 2009 cumulative update or Microsoft Office 2007 SP2, but Outlook is still performing poorly. Why? Maybe it's time to check how much data is being stored in your users Exchange mailboxes.Continue Reading
Block Web beacons and protect OWA users from spam
Web beacons confirm the validity of email addresses and confirm that spam has made it through a user's filter. Outlook blocks Web beacons by default, but OWA doesn't. Learn more about Web beacons and how to protect your users from spam with EMS ...Continue Reading
Remove Exchange 2003 from Active Directory to install Exchange 2010
A clean Active Directory is vital for an Exchange Server 2010 migration. If you still have Exchange 2003 remnants hanging around, use the ADSI Edit tool to remove them.Continue Reading
How to find and remove lingering objects in Active Directory
Don't you hate when deleted objects continue to pop up in Active Directory? Learn to troubleshoot the issue with a little AD housecleaning.Continue Reading
Outlook 2007 shut-down problems and fixes
Several issues can cause errors when Microsoft Outlook 2007 shuts down. Finding and diagnosing the root cause should be your first line of defense in preventing future problems. Check the add-in applications that use Outlook's data files to see if ...Continue Reading
Microsoft Outlook and SharePoint calendar dos and don'ts
Improperly linking and labeling calendar entries from Microsoft Outlook can confuse other SharePoint team members. Here are some dos and don'ts for copying an event from one calendar to another.Continue Reading
Two useful tools for documenting an Exchange Server installation
Exchange BPA and ExchDump tools let you collect data about your Exchange installation, including settings and server configuration information. Learn how to translate this data and include it into your installation documentation.Continue Reading
Should you disable IE ESC, or manage it in Windows servers?
Internet Explorer Enhanced Security Configuration (IE ESC) locks down IE on Windows servers, but admins often disable it.Continue Reading
Lock down direct file access and protect OWA users
Built-in OWA security features may not be enough to secure direct file access. If you can't disable the feature, what's the next best security measure?Continue Reading
Creating Windows taskpad views for Active Directory management
Large enterprises can't get by with just one Active Directory admin. Learn to use taskpads in Windows to help delegate responsibilities in AD.Continue Reading
How to configure backups and perform restores in Windows Server 2008
Discover tips on backing up your Windows Server 2008 operating system and data as well as info on performing restores in this chapter excerpt from "Windows Server 2008 How-To".Continue Reading
Fix Outlook 2007 and SharePoint synchronization breaks
The .pst file that is created when synchronizing Outlook and SharePoint is linked to a user's profile. However, synchronization can break if roaming profiles are being used. There are a couple of settings you can enable to work around this ...Continue Reading
How to monitor your SharePoint environment
SharePoint's services are tightly integrated, so creating a multidimensional monitoring strategy is a must to ensure the entire system's availability.Continue Reading
An introduction to the Exchange Remote Connectivity Analyzer tool
A beta version of Microsoft's Exchange Remote Connectivity Analyzer tool assists administrators with remote end-to-end validation and diagnostics. Use this free tool perform a variety of connectivity tests for everything from Outlook to Exchange Web...Continue Reading
Custom error message redirects OWA users
If SSL encryption is required and your Outlook Web Access users forget to type the HTTPS:// prefix, they may receive an error message. Set up a custom error message to redirect OWA users to the correct site using this HTML code.Continue Reading
Exchange admins: Is it time to rethink your email address policy?
How can an email address policy setting affect your Exchange Server organization's overall security? And is it time to change that policy? Let's find out.Continue Reading
Troubleshoot Microsoft Outlook Web Access problems
When logging on to Microsoft Outlook Web Access (OWA), unexpected problems can occur. This tutorial explains how to diagnose some tricky OWA problems and login issues, gives tips on how to fix IIS metabase corruption and more.Continue Reading
Using Active Directory to manage Macs in a Windows environment
He's a Mac, she's a PC, and you're a Windows admin. Learn to integrate Mac OS X clients into your Windows environment without causing AD headaches.Continue Reading
Control Outlook 2007 in cached mode settings with group policies
Enabling or disabling Cached Exchange mode can affect Exchange Server performance. You can control these settings using a centralized group policy. Get an introduction to some policy settings that can help Microsoft Outlook 2007 in cached mode ...Continue Reading
Exchange Performance Monitor tracks domain controller communication
Using Performance Monitor counters is an effective way to keep an eye on Exchange Server health. Learn which Performance Monitor counters you should watch to ensure that your Exchange Servers are communicating effectively with your domain ...Continue Reading
Performing advanced search queries in Microsoft Outlook 2007
Trying to locate an email in Microsoft Outlook 2007 can be an arduous process, but some commands let you narrow down search results. In this tip, Microsoft Exchange expert Brien Posey explains a few Microsoft Outlook 2007 commands to help you ...Continue Reading
Group policy settings for Outlook 2007 in cached mode
Using Outlook 2007 in cached mode allows mobile users to access mailboxes while not connected to Exchange Server. This tip explains some different .OST file group policy settings you can use to control how Outlook 2007 operates in cached mode.Continue Reading
Which ActiveSync authentication method is best for your mobile device?
When securing ActiveSync mobile devices in Exchange 2007, there are several authentication methods, including basic authentication, certificate-based authentication and token-based authentication. Read about the differences of each ActiveSync ...Continue Reading
Using the Export-Mailbox command in Exchange Server 2007
Get an overview of how to use the Export-Mailbox command to migrate Exchange Server 2007 mailbox content. Get an overview of how this command differs from ExMerge and the Move Mailbox Wizards, some of its limitations, compatibility issues and more.Continue Reading
Previewing SharePoint document libraries in Microsoft Outlook
Microsoft Outlook's reading pane allows users to preview SharePoint document libraries without having to open them or check them out. This can be a big timesaver when viewing Microsoft Word documents or PowerPoint presentations. But Outlook's ...Continue Reading
Configuring ActiveSync authentication in Exchange Server 2007
ActiveSync authentication is a process in which a mobile device and the Exchange 2007 Client Access Server confirm each other's identities. Confirmation takes place in different ways, depending on how ActiveSync has been configured. Learn how to ...Continue Reading
Fix 'Service unavailable' errors and other common OWA login problems
Common Outlook Web Access (OWA) logon errors involve unavailable service or inheritance errors. Causes for these errors can range from the use of mismatched ASP.NET versions on an OWA Server to incorrect user permissions. This tip explains why users...Continue Reading
How to keep IIS logs from filling up your server hard drives
IIS log files can take up a lot of space on your servers' hard drives if you don't clean them up regularly. But who has time for that? Check out this simple script to automatically delete IIS logs and clear space on your Windows servers.Continue Reading
Understand data file storage in Outlook 2007 Roaming and Local folders
Microsoft Outlook 2007 has several data and customization files, making it easy to forget which files do what. Get an explanation of the various files within Outlook 2007's Roaming and Local folders and learn how they're used.Continue Reading
A seven-step disaster recovery planning checklist for Windows
This disaster recovery planning checklist will help Windows shops build a solid DRP to avoid data loss and comply with a wide range of laws and industry standards.Continue Reading
How to install the Change Request Management template in MOSS 2007
Integrating change management into SharePoint 2007's document library can be a little easier if admins install the change request management template.Continue Reading
Self-healing NTFS keeps admins one step ahead of data corruption
While it's not perfect, the new self-healing NTFS has several benefits over past Windows file systems. Learn to avoid data corruption with this new feature in Windows Server 2008.Continue Reading
Troubleshooting Microsoft Outlook Web Access logon issues
Are you experiencing problems logging into Microsoft Outlook Web Access (OWA)? Although OWA isn't the most complicated application, its numerous deployment options can cause problems. In this tip, Exchange Server expert Brien Posey explains ...Continue Reading
Quest Software Access Manager
Quest Access Manager provides a single console that identifies the files, folders, shares and other entitlements that users and groups can access throughout the enterprise. It is designed to help organizations meet security and compliance ...Continue Reading
Defining system stability helps improve change management processes
Keeping track of changes made to Windows can be difficult, especially if there's no way to determine the system's stability. Fortunately, there are guidelines IT managers can use to define policies, practices and procedures to proactively ensure ...Continue Reading
Implementing change management in the Windows server environment
Creating a baseline server configuration and documenting all updates thereafter are two techniques admins can use to implement change management in their Windows server environment. Learn the steps involved in creating a standard server ...Continue Reading
Mailbox policy configuration for Unified Messaging
In this excerpt from "Microsoft Exchange Server 2007: The Complete Reference," discover how to create a mailbox policy, along with the best settings and configurations on a Unified Messaging server in Exchange Server 2007.Continue Reading
A quick guide to Server Manager for Windows Server 2008
New to Windows Server 2008, the Server Manager feature can be a huge benefit to admins – once they figure out where to find everything. This article gives you a crash course on everything Server Manager has to offer.Continue Reading
Windows server cluster management
This short learning center provides links to cluster management resources covering the facts you need to know before implementing a server cluster, as well as details on the best Windows tools for administering them.Continue Reading
Deleting and reconnecting Exchange Server 2007 mailboxes
There's a subtle difference between a deleted Exchange Server 2007 mailbox and a disconnected mailbox. Learn how to reconnect a deleted Exchange mailbox.Continue Reading
How to create and configure Exchange Server 2007 distribution groups
Learn how to create Exchange Server 2007 distribution groups and dynamic distribution groups or mail-enable an existing security group in Active Directory.Continue Reading
How to custom-configure a Microsoft Outlook 2007 install using OCT
Installing and configuring Microsoft Outlook in an identical fashion throughout your organization gives users a uniform experience when accessing a workstation. Unfortunately, Microsoft's installation wizard doesn't provide many customization ...Continue Reading
Software Update Services
Windows Server Update Services (WSUS), also called Windows Update Services (WUS), is a free add-on for managing patches and updates to the Microsoft Windows XP, Windows Server 2000, and Windows Server 2003 operating systems... (Continued)Continue Reading
Windows Server Update Services
Windows Server Update Services (WSUS), also called Windows Update Services (WUS), is a free add-on for managing patches and updates to the Microsoft Windows XP, Windows Server 2000, and Windows Server 2003 operating systems... (Continued)Continue Reading
Windows Update Services
Windows Server Update Services (WSUS), also called Windows Update Services (WUS), is a free add-on for managing patches and updates to the Microsoft Windows XP, Windows Server 2000, and Windows Server 2003 operating systems... (Continued)Continue Reading
Windows Server Update Services (WSUS)
Windows Server Update Services (WSUS), also called Windows Update Services (WUS), is a free add-on for managing patches and updates to the Microsoft Windows XP, Windows Server 2000, and Windows Server 2003 operating systems... (Continued)Continue Reading
How to protect an Exchange journaling mailbox from email spoofing
In pure Exchange Server 2007 environments, traffic that flows between the hub transport servers and the mailbox servers is encrypted. This makes man-in-the-middle attacks unlikely against an Exchange journaling system, but not impossible. Get the ...Continue Reading
problem management
Problem management, in information technology, is a process aimed at resolving incidents and problems caused by end-user errors or IT infrastructure issues, and preventing recurrence of such incidents.Continue Reading
Migrating .PST files to an Exchange Server information store
The first step to migrate .PST files to an Exchange Server information store is to get Microsoft Outlook users to save .PST data to their Outlook mailboxes.Continue Reading
How to export Global Address List data to Microsoft Office Access
Exporting an Exchange Server Global Address List into a Microsoft Office Access database can help administrators filter through GAL data easily.Continue Reading
Create a group policy to prevent .PST file storage in Exchange 2007
Use the Group Policy Object Editor in Active Directory to prevent users from storing new data in .PST files on Exchange 2007 and Microsoft Outlook 2007.Continue Reading
How Microsoft Operations Framework 4.0 enhances IT service management
The push to combine Microsoft Operations Framework 4.0 with a set of integrated tools that adhere to the IT service management lifecycle is just what the doctor ordered.Continue Reading
Tips for Windows domain controller optimization
Learn to use Performance Monitor counters in Windows to optimize domain controllers for maximum system and database performance.Continue Reading
Why are .PST files a security threat to Exchange Server mailboxes?
The use of .PST files can threaten mailbox security in an Exchange Server organization. Learn why these files are so problematic and how to disable them.Continue Reading
Use the free Windows Mobile emulator to test mobility on Exchange
Learn how the free Windows Mobile emulator can test mobile device connections to Exchange Server before spending money on infrastructure and hardware.Continue Reading
Backing up management packs in System Center Operations Manager 2007
This excerpt from "System Center Operations Manager 2007 Unleashed" guides you through the process of backing up management packs as separate objects in SCOM 2007, which allows you to restore a specific management pack rather than the entire ...Continue Reading
How to access SharePoint sites through Microsoft Outlook
If you have both Microsoft Exchange Server and SharePoint, you can easily access SharePoint sites directly from Microsoft Outlook. Here's how.Continue Reading
Database grooming for System Center Operations Manager 2007
This excerpt from "System Center Operations Manager 2007 Unleashed" takes you through the process of grooming your operational, data warehouse and ACS databases in SCOM 2007Continue Reading
How to verify Exchange Server email forwarding
Find out how to verify Exchange Server email forwarding to both internal and external email accounts.Continue Reading
Roles of key System Center Operations Manager files and databases
This excerpt from "System Center Operations Manager 2007 Unleashed" takes a look at the different databases and files that should be a part of your backup strategy for SCOM 2007.Continue Reading
Cost Management Analysis Guide
When creating a cost management analysis, the first thing IT managers should do is create a common desktop environment to keep costs down in a well managed Windows environment.Continue Reading
How to install Windows Server 2003 patches when offline
In this thread from our IT Knowledge Exchange (ITKE), learn how you can keep your Windows Server 2003 system up to date with the latest security patches without even being connected to the Internet.Continue Reading
Free security tools that can improve IIS security
Get a glimpse at what security expert Kevin Beaver is calling his top 10 list of free security tools for Internet Information Services (IIS).Continue Reading
How to test Exchange Management Shell commands
Understand how to use the Exchange Management Shell parameters WhatIf and ValidateOnly in Exchange 2007 to preview and test EMS commands before executing them.Continue Reading
How to reduce the risk from Windows automatic updates
Every change to a system represents a risk. To minimize crashes after a Windows update, administrators should standardize and test computers.Continue Reading
Managing user profile properties on SharePoint Server 2007
My Site functionality in SharePoint Server 2007 has added more clarity to the portal definition as a personalized and individually controlled way of managing content.Continue Reading
How to use Exchange Management Shell's Filter command
Learn how to use the Filter command and operators in Exchange Server 2007's Exchange Management Shell to obtain more granular search results.Continue Reading
How to improve Outlook Web Access (OWA) security
Two big Outlook Web Access security issues are email attachments and OWA user authentication. Get tips on how to improve Outlook Web Access security here.Continue Reading
How to use the Exchange Management Shell command syntax
Learn the basic syntax of Exchange Management Shell commands in Exchange Server 2007 and how to use the Get-Mailbox command to retrieve a list of mailboxes.Continue Reading