Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
How to build redundancy in Active Directory replication
Building redundancy in Active Directory replication is one way an administrator can ensure AD replication continues even if critical domain controllers fail. Continue Reading
How a cost management analysis affects Windows Server 2008 migration
When creating a cost management analysis, IT managers should pay attention to the technologies they use now and plan to use, like Windows Server 2008. Continue Reading
How to handle file attachment access in OWA
Set email attachment rules in Outlook Web Access to enhance OWA security on public computers and protect systems from malicious files or viruses. Continue Reading
-
Using cascading style sheets to change a color in OWA
Use cascading style sheets (.CSS files) in Exchange 2007 to change Outlook Web Access theme colors, add a legal disclaimer and modify an OWA sign-on screen. Continue Reading
Modifying the look of OWA in Exchange Server 2007
Learn how to customize default Outlook Web Access (OWA) themes, add a company logo or create a custom header in Exchange Server 2007. Continue Reading
Enable user-level segmentation to control OWA components
Learn how to enable user-level OWA segmentation in Exchange Server 2007 to control email components, and get details on functions of different features.Continue Reading
Fix mailbox and Outlook calendar issues during Exchange migration
To avoid Exchange mailbox and Outlook calendar permission issues during a migration, our expert provides an overview of data that cannot be migrated from Exchange 5.5.Continue Reading
How to create a user access management process for Windows
An effective user access management process makes it possible to ensure the confidentiality, integrity and availability of IT services for Windows users.Continue Reading
Using a file share witness with Exchange 2007 CCR
The new MNS quorum model with file share witness is required for using the CCR functionality in Exchange Server 2007. Learn how to configure it here.Continue Reading
Exchange 2007 Cluster Continuous Replication (CCR) setup overview
Refer to this list of Cluster Continuous Replication (CCR) features and facts for a quick overview of an Exchange Server 2007 CCR-based setup.Continue Reading
-
Managing an Exchange 2007 Cluster Continuous Replication (CCR) setup
Get an overview of the Cluster Continuous Replication (CCR) feature in Exchange Server 2007 and learn how to configure and manage a CCR setup.Continue Reading
Monitor mail flow with the Exchange Server 2007 Queue Viewer tool
Learn how to use the Exchange Server 2007 Queue Viewer tool to monitor mail flow and get details on five messaging queues that function as email repositories.Continue Reading
Understanding message queues in Exchange 2007 Queue Viewer
Read how Exchange Server 2007 message queue types guide mail flow through a transport pipeline and learn how to monitor the Queue Viewer to prevent issues.Continue Reading
Using Queue Viewer in Exchange 2007 to prevent mail flow problems
Check mail flow in Exchange Server 2007 with the Exchange Management Console's Queue Viewer to proactively prevent email message delivery problems.Continue Reading
Methods for moving mailboxes and public folders to Exchange 2007
Learn how to migrate older Exchange Server mailboxes and public folders to Exchange 2007 using the Move Mailbox Wizard GUI tool or Exchange Management Shell.Continue Reading
How to create a cross-forest trust in Active Directory
Building a cross-forest trust in Active Directory allows a trust to be created between the root domain of two forests.Continue Reading
How to format NTFS: More tricks to improve file system performance
The best security features are the ones that protect a system without slowing down the NTFS. Microsoft MVP Brien Posey offers some suggestions for finding the right balance between NTFS performance and system security.Continue Reading
The six-layered secret of effective Exchange Server email filtering
Discover the six key message-filtering layers that best block spam and viruses and keep unwanted email out of your Exchange 2003 or Exchange 2007 system.Continue Reading
Managing Local Continuous Replication (LCR) in Exchange 2007
Get an overview of Exchange Server 2007's new Local Continuous Replication (LCR) feature and learn how to manage Local Continuous Replication to provide high availability for Exchange 2007 storage groups.Continue Reading
Windows scripting secrets for disk quota management
Despite improvements made to disk quota management, Windows Server 2003 does not include any built-in reporting tools. Fortunately, admins can use a simple script to create reports on disk space usage.Continue Reading
An extended look at Windows file management with PowerShell
Scripting expert Christa Anderson explains how to use Windows PowerShell to create folders in a temporary directory and populate them from a network share.Continue Reading
Manage Exchange 2007 public folders with the Exchange Management Shell
Find out how to use the Exchange Management Shell to execute command-line scripts and parameters to manage Microsoft Exchange Server 2007 public folders.Continue Reading
Recovery Manager for Active Directory Forest Edition
This tool extends the value of Recovery Manager for Active Directory by allowing restoration of the entire forest to a point-in-time before the directory became corrupt.Continue Reading
Recovery Manager for Active Directory
Recovery Manager from Quest Software can help Windows administrators provide backup and recovery functionality for Active Directory.Continue Reading
How to solve common ActiveSync error messages
Discover how to fix common Exchange ActiveSync errors, including SSL Event ID errors 3029, 3030 and 30031, HTTP, SMTP and 0x80830003 synchronization errors.Continue Reading
How to set up Remote Desktop for Exchange Server administration
Learn how to use the Remote Desktop Protocol (RDP) to manage and troubleshoot Microsoft Exchange Server from a distance via a terminal service session.Continue Reading
How to use RACI charts to define service desk roles and responsibilities
Using a management tool called RACI charting can help IT managers simplify the daunting task of clarifying the roles and responsibilities of the service desk.Continue Reading
How to configure ActiveSync and manage mobile devices in Exchange 2007
Find out how to configure ActiveSync in Exchange Server 2007, set up mailbox policies and partner with mobile devices to determine their status and health.Continue Reading
How to configure Group Policy Objects for Windows Vista
This excerpt from "Microsoft Windows Vista Management and Administration" provides step-by-steps for Group Policy configuration, with tips on how to use the Group Policy Management Console and GPO Editor.Continue Reading
Best practices for using Outlook .PST files on portable USB drives
You can save Microsoft Outlook email data in a .PST file to a portable USB storage drive, but make sure you understand these best practices first.Continue Reading
How to configure DNS records for Exchange Server on Windows SBS 2003
Get instructions on how to configure DNS records for an Exchange Server and Windows Small Business Server 2003 implementation.Continue Reading
DNS troubleshooting tips for Active Directory
Take a look at some tools and tests that will keep DNS performing well.Continue Reading
Moving Microsoft Exchange Server databases and logs to iSCSI SAN LUNs
Discover how to move Microsoft Exchange Server 2003 or Exchange 2007 databases and transaction logs to iSCSI SAN LUNs.Continue Reading
iSCSI SAN storage design options for Microsoft Exchange Server
Discover three storage design approaches for deploying an iSCSI SAN for Microsoft Exchange Server and the pros and cons of each approach.Continue Reading
Connecting Windows Server and Microsoft Exchange to iSCSI SAN LUNs
Learn how to connect Windows Server 2003 to iSCSI SAN target LUNs and the procedure for partitioning and formatting disks on the Exchange Server system.Continue Reading
A basic primer on iSCSI storage architecture
Discover the basic mechanics of iSCSI storage technology and how typical iSCSI standards and components operate, including targets, initiators and LUNs.Continue Reading
When and how to use worker process recycling with IIS
Configuring Internet Information Services to automatically reset worker processes can solve a lot of Web application issues, but it should only be used in certain situations.Continue Reading
How to manage and troubleshoot Microsoft Outlook rules
Find out how to manage multiple Microsoft Outlook rules using the Outlook Rules Wizard to prevent potential email message processing conflicts.Continue Reading
How to uninstall Exchange Server 2007 and individual server roles
Get detailed instructions on how to uninstall Exchange 2007 and its server roles, including the Client Access, Edge Transport, Hub Transport and Mailbox server roles.Continue Reading
Part 4: Security-related and Exchange-specific ESMTP commands
Discover several security-related and Exchange-specific ESMTP commands that offer enhanced email delivery notification, host authentication and encryption.Continue Reading
Part 3: How Extended SMTP works and common ESMTP commands
Learn how Extended STMP (ESMTP) works and discover the functionality of several common ESMTP commands.Continue Reading
Part 2: How to perform a Telnet SMTP session for Exchange Server 2003
Get a demonstration of how to perform an SMTP session via Telnet to send email messages in Exchange Server 2003.Continue Reading
Part 1: SMTP commands and server response codes
Learn how several common SMTP commands work and the meaning of SMTP numeric response codes.Continue Reading
Using the Active Directory Migration Tool in a large environment
Discover why using the Active Directory Migration Tool in a large Exchange Server environment may not be the best option for a successful migration.Continue Reading
How to use SSL Diagnostics 1.0 to identify issues in IIS
Learn how to use the IIS Diagnostic Toolkit's SSL tool to diagnose Secret Socket Layer related IIS issues.Continue Reading
How to use Microsoft's IIS Diagnostics Toolkit
In this resource guide, contributor Tim Fenner offers an overview of the seven utilities in the IIS Diagnostics Toolkit and provides instructions on how to download and use them.Continue Reading
How to use the IIS Diagnostics Toolkit's WFetch 1.4 utility
Learn how to use the IIS Diagnostics Toolkit's WFetch 1.4 utility to troubleshoot connectivity issues between IIS and Web clients.Continue Reading
How to install the Microsoft IIS Diagnostics Toolkit
In this excerpt from "Inside the IIS Diagnostic Toolkit," contributor Tim Fenner explains the ways Windows admins can install the Toolkit so they can use it to tackle IIS-related issues.Continue Reading
How to use SMTP Diagnostics 1.0 to troubleshoot IIS issues
Learn about the IIS Diagnostic Toolkit's SMTP Diagnostics 1.0 utility which admins can use to troubleshoot DNS or SMTP configuration issues .Continue Reading
How to use Trace Diagnostics 1.0 to troubleshoot IIS issues
Learn how to use the IIS Toolkit's Trace Diagnostics 1.0 utility to troubleshoot Internet Information Services (IIS) - related problems.Continue Reading
How to use the IIS Diagnostics Toolkit's Log Parser 2.2. utility
Learn how to use the IIS Diagnostics Toolkit's Log Parser 2.2 utility to troubleshoot IIS Web server issues.Continue Reading
How to use AuthDiag 1.0 to troubleshoot IIS problems
Learn how to use the IIS Diagnostic Toolkit's AuthDiag 1.0 utility to diagnose, check and monitor permission or security problems for Web and FTP requests.Continue Reading
How to use Debug Diagnostics to troubleshoot IIS issues
Learn how to use the IIS Diagnostic Toolkit's Debug Diagnostics utility to troubleshoot performance issues in any Win32 user-mode process.Continue Reading
A Windows administrator's guide to printer management
This guide examines the printer management issues Windows admins commonly encounter and the tools and tactics that can help optimize printer performance.Continue Reading
How to use PowerShell to build a disk cleanup utility
For people interested in how things tick, computers can be a satisfying test medium because the changes you make have an immediate effect. But it's also possible to make changes that can't be reversed or can only be reversed with a lot of pain. ...Continue Reading
How to configure Exchange 2003 as a front-end server
Learn how to configure an Exchange 2003 server to act as a front-end server after a Microsoft Exchange/Windows upgrade and hardware migration.Continue Reading
How to set up Exchange 2007 message classifications
Learn how to set up Exchange 2007 message classifications and transport rules to secure and control the way email is handled and distributed in your organization.Continue Reading
Part 2: Displaying message classifications in Outlook 2007
Exchange 2007 message classifications are hidden from Microsoft Outlook 2007 by default. If a message is classified by a transport rule, Outlook will display the classification. However, Outlook 2007 cannot be used to manually classify a message ...Continue Reading
How to automate Windows Server 2003 defrag
Learn how to set up Windows Server 2003's DEFRAG command-line tool so it runs without the need for manual administrative maintenance.Continue Reading
Why detective controls are important in change management
Change is a way of life in Windows IT shops. By using detective controls, Windows managers can minimize the risks associated with changes to production services.Continue Reading
How to set up an SSL certificate to encrypt OWA and ActiveSync traffic
Learn step-by-step how to set up Windows 2003 as a certificate authority, create an SSL certificate and encrypt email traffic for OWA and Exchange ActiveSync.Continue Reading
How to reverse NTFS object ownership from administrators to object's creator -- and why
When an admin adds their personal user account to the Administrators group and then creates an NTFS object, Windows sets the object's owner to the administrators and not to its creator's account. By completing these six simple steps, admins can ...Continue Reading
Microsoft Exchange Server 2003 Administration Guide
Browse Exchange Server 2003 administration best practices, tips, and tools that will help you manage all aspects of your Microsoft email environment.Continue Reading
How to perform an inter-site replication between two domain controllers
Our server management expert explains how to perform an inter-site replication between two domain controllers.Continue Reading
How to reset a BIOS password
Our systems management expert explains how to reset a BIOS password.Continue Reading
How to disable the Open File Security Warning dialog box
Our server management expert reveals two ways that admins can disable the Open File Security Warning dialog box.Continue Reading
How to use SMTP queues to troubleshoot mail flow
Find out how you can use SMTP queues to diagnose and troubleshoot Exchange Server mail flow and email performance issues.Continue Reading
Manage folder permissions in Windows networks
Learn how to prevent users from creating and deleting folders, and improve folder management and file management for Windows network security.Continue Reading
How to create a network printer pool
You can avoid congestion on a network printer by creating a printer pool -- a group of printers attached to a common print queue, so multiple documents can be printed simultaneously. Here's how to create a printer pool in a Windows Server 2003 ...Continue Reading
How to retrieve email from an SMTP server using POP3
Follow these steps to retrieve email from an SMTP server using POP3 in Microsoft Outlook 2003.Continue Reading
How to repair damaged Master Boot Records and boot sectors
Boot problems can be relatively easy to fix and do not require reinstalling Windows. But you should understand how the boot process works in order to recognize circumstances that will cause problems.Continue Reading
Part 1: How Microsoft Exchange Direct Push technology works
Learn how Microsoft Exchange Direct Push technology works and how it uses HTTPS and "heartbeat messages" to synchronize email to mobile devices.Continue Reading
How to get process information with Windows PowerShell
In this column, Christa Anderson explains how to use Windows PowerShell's get-process cmdlet to retrieve information about the processes on your computer and how to kill the unnecessary ones.Continue Reading
Enabling incoming email functionality in SharePoint
Learn how to install the SMTP service to enable inbound email on Microsoft Office SharePoint Server 2007 from Exchange Server 2007.Continue Reading
How to properly authenticate a Linux client in a Windows domain
MVP Gary Olsen describes the step-by-step process of configuring a Red Hat Fedora client into a Windows Server 2003 domain.Continue Reading
IT communication builds incident management successes
The key to successful incident management is a strong connection among the incident management, service desk and problem management staffs. If a disconnect between them exists, you can make things better, says expert Stuart Galup.Continue Reading
Windows Remote Management
Windows Remote Management (WinRM) is a feature of Windows Vista that allows administrators to remotely run management scripts... (Continued)Continue Reading
Windows Remote Management (WinRM)
Windows Remote Management (WinRM) is a feature of Windows Vista that allows administrators to remotely run management scripts... (Continued)Continue Reading
How to find your Exchange Server store size limit
Learn how to find your Exchange Server store size limit in the event log and what to do if you get an error saying you don't have the correct .DLL files to render an event.Continue Reading
How to install and configure an Edge Transport server for Exchange 2007
Learn how an Edge Transport server for Exchange 2007 works, and get step-by-step instructions on how to install and configure one to filter spam, viruses and unauthorized content from your organization's incoming and outgoing email.Continue Reading
How to detect data corruption in files and folders
Data corruption that occurs within a file or folder will usually go unnoticed if you're simply backing up the data and testing the backup by restoring it elsewhere. If the files or folders that have been corrupted are used infrequently, you may ...Continue Reading
How to set up Microsoft Operations Manager (MOM) for Exchange Server monitoring
Learn how to set up Microsoft Operations Manager (MOM) 2005 to monitor Exchange Server 2003 performance, interpret the results and display them in an easy-to-understand manner.Continue Reading
A Windows administrator's guide to file management
File management in Windows is not just about finding the right places for user data and application data, but also anticipating and planning for changes that may need to be made in how things are stored—all the while, dealing with quirks of ...Continue Reading
Incident management made easier with Microsoft Service Desk
Expert Stuart Galup gives the skinny on Microsoft's help desk software, called Service Desk, and explains why help desk software and automated incident management can make your life a lot easier.Continue Reading
SLAs and service-level management: What does it mean for Windows managers?
Windows service-level management is a business process for managing Windows user service requirements in an IT environment. A key component of a Windows service-level management plan is a service-level agreement (SLA). Expert Harris Kern explains ...Continue Reading
How to save and run scripts with Windows PowerShell
Learn how to save a Windows PowerShell cmdlet and edit Powershell settings so saved scripts will execute.Continue Reading
How to terminate SCSI devices
Termination is the practice of placing a terminator at the end of a chain of SCSI devices. The terminator prevents an echo, which disrupts communications along the SCSI bus.Continue Reading
How to use Microsoft Outlook 2007's Quick Parts feature
Discover how to use Microsoft Outlook 2007's Quick Parts feature (formerly known as AutoText) to save fragments of text in a gallery for repeated use in email.Continue Reading
How to retrieve lost files using Group Policy folder redirection
Learn how to combat many file and folder disasters using the 'Redirect My Documents' option via Group Policy in the Windows domain.Continue Reading
How to recover email in a specific date range from a .PST file
Get step-by-step instructions on how to recover email that falls within a specific data range from a Microsoft Outlook 2003 .PST file.Continue Reading
Case Study: How to force immediate Active Directory replication for all core sites
Just how fast can replication take place in your Active Directory network? You might be surprised. Systems software expert Gary Olsen presents a case study on how to use intrasite replication to achieve convergence of all core sites in one Active ...Continue Reading
AGDLP reduces account management, permissions management headaches
AGDLP is a practice that can greatly reduce your administrative headaches related to account management and permissions management.Continue Reading
Step 1: How to create an ActiveSync Mailbox Policy in Exchange Server 2007
Learn how to create an Exchange 2007 mobile device security policy, called an ActiveSync Mailbox Polilcy, that can password protect mobile devices on a per-user basis.Continue Reading
Part 3: How the SMTP categorizer works in Exchange Server and Active Directory
Learn how the SMTP categorizer, a part of Exchange's message transport engine, performs Active Directory LDAP queries to determine which server contains the recipient's mailbox.Continue Reading
How Exchange Server performs Active Directory LDAP queries
Exchange MVP Brien Posey describes the three services Exchange Server uses to perform Active Directory LDAP queries: DSAccess, DSProxy and the SMTP categorizer.Continue Reading
Part 1: How the DSAccess service works in Exchange Server and Active Directory
DSAccess service is one of three components responsible for Exchange Server's LDAP queries to Active Directory. Find out why DSAccess is considered the most critical.Continue Reading
Part 2: How the DSProxy service works in Exchange Server and Active Directory
DSProxy service, one component responsible for Exchange Server's LDAP queries, helps alleviate communication issues that older and newer versions of Microsoft Outlook encounter.Continue Reading
How to enable Exchange Server public folder logging
SearchExchange.com expert David Sengupta explains how to enable Exchange 2000 Server public folder logging so an administrator can track which users are deleting items from public folders.Continue Reading
Using S/MIME in Microsoft Outlook
In this tip from "8 tips in 8 minutes: A Microsoft Outlook email security tutorial," you'll learn everything you need to know about setting S/MIME options, managing certificates, signing or encrypting a message, and steps to updating the Microsoft ...Continue Reading
An overview of Microsoft Outlook email security features
In the following tip from "8 tips in 8 minutes: A Microsoft Outlook email security tutorial," you'll gain an in-depth overview of Microsoft Outlook's email security features including security zone changes, the Outlook security update, S/MIME ...Continue Reading