News

News

  • November 14, 2005 14 Nov'05

    Using WSH Controller

    You can save substantial time by running a script that connects to remote computers by name or as part of an Active Directory domain. This month's scripting column explains how.

  • November 14, 2005 14 Nov'05

    Taking computer names as arguments

    You can save substantial time by running a script that connects to remote computers by name or as part of an Active Directory domain. This month's scripting column explains how.

  • November 14, 2005 14 Nov'05

    VSS for Exchange

    Learn the process of VSS backup for Exchange and and the pros and cons of using it to obtain point-in-time copies of Exchange Server data.

  • November 14, 2005 14 Nov'05

    Scripting School: Connect scripts to remote computers

    You can save substantial time by running a script that connects to remote computers by name or as part of an Active Directory domain. This month's scripting column explains how.

  • November 14, 2005 14 Nov'05

    Exchange Server replication

    Discover how Exchange server replication solutions work and the pros and cons of hardware versus software and synchronous versus asynchronous.

  • Sponsored News

    View All Sponsored News
  • November 14, 2005 14 Nov'05

    Exchange design choices and issues

    Learn the best choices and changes to make to your Exchange design to ensure the best disaster recovery capabilities.

  • November 14, 2005 14 Nov'05

    Scripts that connect to remote computers

    You can save substantial time by running a script that connects to remote computers by name or as part of an Active Directory domain. This month's scripting column explains how.

  • November 14, 2005 14 Nov'05

    Online vs. offline Exchange Server backups

    Learn the process of Exchange online backup and offline backup and discover the pros and cons of using these backup options.

  • November 14, 2005 14 Nov'05

    Reading computer names from a file

    You can save substantial time by running a script that connects to remote computers by name or as part of an Active Directory domain. This month's scripting column explains how.

  • November 14, 2005 14 Nov'05

    How Exchange backs up data

    Discover your choices for online Server backup, including Extensible Storage Engine (ESE) and Volume Shadow Copy Service (VSS), and options for offline Exchange Server backup.

  • November 14, 2005 14 Nov'05

    Exchange disaster recovery planning

    Discover the must-have components to formulating a successful Exchange disaster recovery plan.

  • November 14, 2005 14 Nov'05

    Defining Exchange disaster recovery

    Clarify your Exchange disaster recovery definition and introduce yourself to the common metrics for successful Exchange recovery.

  • November 14, 2005 14 Nov'05

    Choosing a backup type for Exchange

    Learn to calculate your recovery time objective (RTO) and how to pick the Exchange Server backup types that allows you to meet your RTO and fit your organization's backup hardware.

  • November 14, 2005 14 Nov'05

    Connect scripts to remote computers: Summary

    You can save substantial time by running a script that connects to remote computers by name or as part of an Active Directory domain. This month's scripting column explains how.

  • November 09, 2005 09 Nov'05

    Free download expands features for SQL Server 2005

    The November SQL Server 2005 feature pack from Microsoft provides interoperability and backward-compatibility tools.

  • October 27, 2005 27 Oct'05

    Best Practice #1: Understanding Exchange databases

    Best Practices Checklist: Exchange Server disaster recovery planning , Best Practice #1: Understanding Exchange databases.

  • October 27, 2005 27 Oct'05

    Best Practice #6: Simulating a disaster

    Best Practices Checklist: Exchange Server disaster recovery planning, Best Practice #6: Simulating a disaster.

  • October 27, 2005 27 Oct'05

    Best Practice #7: Learning from others' mistakes and successes

    Best Practices Checklist: Exchange Server disaster recovery planning, Best Practice #7: Learning from others' mistakes and successes.

  • October 27, 2005 27 Oct'05

    Best Practice #9: Familiarizing yourself with the right resources

    Best Practices Checklist: Exchange Server disaster recovery planning, Best Practice #9: Familiarizing yourself with the right resources.

  • October 27, 2005 27 Oct'05

    Best Practice #2: Building your plan around the technology at hand

    Best Practices Checklist: Exchange Server disaster recovery planning, Best Practice #2: Building your plan around the technology at hand.

  • October 27, 2005 27 Oct'05

    Best Practice #8: Considering offsite storage and remote recovery

    Best Practices Checklist: Exchange Server disaster recovery planning, Best Practice #8: Considering offsite storage and remote recovery.

  • October 27, 2005 27 Oct'05

    Best Practice #5: Configuring Exchange for disaster recovery

    Best Practices Checklist: Exchange Server disaster recovery planning, Best Practice #5: Configuring Exchange for disaster recovery.

  • October 27, 2005 27 Oct'05

    With Active Directory, interoperability is a must

    Many networks today do work within a non-Windows environment. Expert Laura E. Hunter says it is here where Active Directory integration and interoperability is vital.

  • October 27, 2005 27 Oct'05

    Best Practice #3: Keeping e-mail in perspective

    Best Practices Checklist: Exchange Server disaster recovery planning, Best Practice #3: Keeping e-mail in perspective.

  • October 27, 2005 27 Oct'05

    Best Practice #4: Configuring server hardware for disaster recovery

    Best Practices Checklist: Exchange Server disaster recovery planning, Best Practice #4: Configuring server hardware for disaster recovery.

  • October 25, 2005 25 Oct'05

    New certifications, same old doubts

    Microsoft unveils the first entries in its revamped credentials program today, with offerings based on SQL Server 2005, Visual Studio 2005 and BizTalk Server 2006. The new program will certify technology specialists in specific product areas and ...

  • October 19, 2005 19 Oct'05

    SQL Server 2005: Users will upgrade … eventually

    Big enterprise users want the security enhancements of SQL Server 2005 and will upgrade sooner; smaller shops worry about new-release glitches, and many say they'll wait for the first service pack.

  • October 13, 2005 13 Oct'05

    Managing Exchange recipient policies

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll learn how to manage Exchange recipient policies, including procedures such as how to change the default SMTP address and how to assign a second SMTP address.

  • October 13, 2005 13 Oct'05

    DSProxy for Exchange

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll discover everything you need to know about the DSProxy service and how it relates to the NSPI (Name Server Provider Interface) in Exchange 2003.

  • October 13, 2005 13 Oct'05

    Managing Exchange group email properties

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll learn to manage group email properties and gain the ability to control the way Exchange distributes mail to members of groups used as distribution lists.

  • October 13, 2005 13 Oct'05

    Learning Guide: Memory basics

    What's the difference between DIMM and SIMM? Do you know how to make the best memory choice for a server versus a workstation? You will after reading our memory guide.

  • October 13, 2005 13 Oct'05

    Restricting mail storage on an Exchange server

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll gain essential knowledge of mail storage on an Exchange server. You'll learn how to set appropriate mailbox sizes, steps to creating new system policies, ...

  • October 13, 2005 13 Oct'05

    Group membership expansion

    In the following tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll learn everything you need to know about the Exchange 2003 group membership expansion process.

  • October 13, 2005 13 Oct'05

    Exchange Recipient Update Service and proxy addresses

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll learn about the primary functions of the Recipient Update Service and how to control the update Interval for a RUS instance.

  • October 13, 2005 13 Oct'05

    Exchange 2003 Query-Based Distribution Groups

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll learn everything you need to know about Query-based groups (QDGs), the new group type introduced by Exchange 2003.

  • October 13, 2005 13 Oct'05

    Exchange mail retention

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll gain essential information on Exchange email retention, saving you a great deal of time. Learn how to recover a deleted mailbox, a deleted user ...

  • October 13, 2005 13 Oct'05

    Group Policy: The final consideration in securing Active Directory

    Group Policy considerations can't be left out of the equation when addressing Active Directory security. Expert Derek Melber gives you an idea of some things to think about when securing Active Directory.

  • October 13, 2005 13 Oct'05

    Exchange security groups

    In the following tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll learn the ins and outs of Exchange security groups: why they're used, how to use them, and issues with mail-enabled Security groups. You'll also ...

  • October 13, 2005 13 Oct'05

    The Exchange server mailbox management service

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll discover the must-have Exchange mailbox management service cleans up users' folders for you. Follow these steps to set up recipient policies and automate ...

  • October 13, 2005 13 Oct'05

    Blocking a user's email access

    In the following tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll learn how to block a user's email access in Exchange including how to disable the user's Active Directory account, remove the user's mailbox and ...

  • October 13, 2005 13 Oct'05

    Managing recipients with system policies

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll strengthen your Exchange administrative skills by learning how to manage Exchange 2003 system policies in the Exchange System Manager.

  • October 13, 2005 13 Oct'05

    Accessing another user's mailbox in Outlook

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll learn how to access another user's Microsoft Outlook mailbox by following this tip showing you how to delegate mailbox access, grant access to another user,...

  • October 13, 2005 13 Oct'05

    Managing recipients with Global Settings

    In the following tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll learn to manage Exchange global settings, including internet messaging, Exchange Rich-Text format, message text word wrap, and mobile services ...

  • October 13, 2005 13 Oct'05

    DSAccess for Exchange

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll discover the importance of the Exchange service DSAccess and how it works with the DNS, Global Catalog servers, and domain controllers.

  • October 12, 2005 12 Oct'05

    Learning guide: Planning and designing your Active Directory

    Active Directory is Microsoft's trademarked directory service. An integral part of the Windows 2000 and Windows Server 2003 architecture, AD will be one of the most challenging aspects of your Windows NT migration. We've gathered a wealth of ...

  • October 10, 2005 10 Oct'05

    Learning guide: Managing your Active Directory

    So, you've designed, tested and rolled out Active Directory. Now what? We've gathered together our best AD administration and management resources. These chapters will help you get the most out of all the new AD features and services.

  • October 05, 2005 05 Oct'05

    Group Policy Learning Guide

    This guide introduces you to how Group Policy works, explains best practices and pitfalls to avoid and provides troubleshooting help and advice. You'll find Group Policy articles, tutorials, tips, tools, white papers, expert advice and more to pump ...

  • October 05, 2005 05 Oct'05

    Tuning the environment with WshShell

    SearchWinSystems.com's monthly scripting column gives valuable advice to both newbies and experienced admins. This month, expert Christa Anderson explains how to read the Registry and record the value of a key in the Event Viewer.

  • October 05, 2005 05 Oct'05

    Securing your Active Directory network

    Derek Melber investigates the security of your Active Directory database and the objects that exist within the database.

  • October 05, 2005 05 Oct'05

    Contents of WshShell

    SearchWinSystems.com's monthly scripting column gives valuable advice to both newbies and experienced admins. This month, expert Christa Anderson explains how to read the Registry and record the value of a key in the Event Viewer.

  • September 29, 2005 29 Sep'05

    Ask Microsoft: Need help installing Server for NFS

    Microsoft Software design engineer Jeff Biseda offers advice on how to allow a Unix server to access NFS shares.

  • September 28, 2005 28 Sep'05

    Readers' Choice admin tool: Belarc Advisor

    We recently asked SearchWinSystems.com readers to tell us what their favorite admin tools are -- the utilities they just couldn't live without. Read about Belarc Advisor.

  • September 28, 2005 28 Sep'05

    Readers' Choice admin tool: Toad for Oracle

    We recently asked SearchWinSystems.com readers to tell us what their favorite admin tools are -- the utilities they just couldn't live without. Read about Toad for Oracle.

  • September 28, 2005 28 Sep'05

    Readers' Choice admin tool: Sam Spade

    We recently asked SearchWinSystems.com readers to tell us what their favorite admin tools are -- the utilities they just couldn't live without. Read about Sam Spade.

  • September 28, 2005 28 Sep'05

    Readers' Choice admin tool: Remote Administrator

    We recently asked SearchWinSystems.com readers to tell us what their favorite admin tools are -- the utilities they just couldn't live without. Read about Remote Administrator.

  • September 28, 2005 28 Sep'05

    Readers' Choice admin tool: Fastpush

    We recently asked SearchWinSystems.com readers to tell us what their favorite admin tools are -- the utilities they just couldn't live without. Read about Fastpush.

  • September 28, 2005 28 Sep'05

    Readers' Choice: 15 admin tools you can't live without!

    We asked our readers to name the one admin tool they couldn't live without. The response was great, and here we share with you the overall winner -- Hyena -- along with 14 other admin tools that our readers cited as their favorites!

  • September 28, 2005 28 Sep'05

    Readers' Choice admin tool: Dameware NT

    We recently asked SearchWinSystems.com readers to tell us what their favorite admin tools are -- the utilities they just couldn't live without. Read about Dameware NT.

  • September 28, 2005 28 Sep'05

    Readers' Choice admin tool: Microsoft Computer Management Tool

    We recently asked SearchWinSystems.com readers to tell us what their favorite admin tools are -- the utilities they just couldn't live without. Read about Microsoft Computer Management Tool.

  • September 28, 2005 28 Sep'05

    Readers' Choice admin tool: CheckIt Pro

    We recently asked SearchWinSystems.com readers to tell us what their favorite admin tools are -- the utilities they just couldn't live without. Read about CheckIt Pro.

  • September 28, 2005 28 Sep'05

    Readers' Choice admin tool winner: Hyena

    We recently asked SearchWinSystems.com readers to tell us what their favorite admin tools are -- the utilities that make their jobs easier and that they just couldn't live without.

  • September 27, 2005 27 Sep'05

    Method 1: RPCDUMP

    Tutorial: How to determine which ports Exchange Server is using, method 1: RPCDUMP.

  • September 27, 2005 27 Sep'05

    Method 3: Tasklist

    Tutorial: How to determine which ports Exchange Server is using, method 3: Tasklist.

  • September 27, 2005 27 Sep'05

    Method 2: Netstat

    Tutorial: How to determine which ports Exchange Server is using, method 2: Netstat.

  • September 21, 2005 21 Sep'05

    Ask Microsoft: How can I increase the capacity of my system volume?

    A Microsoft engineer offers advice on how to expand the system volume on a server running Windows Server 2003 by using the Diskpart utilty.

  • September 20, 2005 20 Sep'05

    Microsoft's Alacris acquisition boosts ID management

    Microsoft hopes to use newly acquired certificate management technology to ease ID administration management and authentication in enterprises.

  • September 13, 2005 13 Sep'05

    Ask Microsoft: How can I decommission an old NT 4.0 domain?

    Microsoft IT Operations Analyst Brad Rutkowski explains how to use logon scripts to decommission an old NT 4.0 domain.

  • September 07, 2005 07 Sep'05

    Background: Arguments in general

    Our scripting column this month explains how to use an important object collection in Windows Script Host: named arguments.

  • September 07, 2005 07 Sep'05

    The value of named arguments

    Our scripting column this month explains how to use an important object collection in Windows Script Host: named arguments.

  • September 07, 2005 07 Sep'05

    Scripting School: Windows Script Host arguments

    How to use an important object collection in Windows Scrpting Host: named arguments.

  • September 07, 2005 07 Sep'05

    Ask Microsoft: How can I make DNS healthy for both clients and servers?

    A Senior System Engineer for Microsoft explains how a tight integration between DNS and Active Directory make for a healthy DNS environment.

  • September 07, 2005 07 Sep'05

    Ask Microsoft: Help with SNMP settings and the registry

    Microsoft Technologist Brian Davies offers advice on managing SNMP settings and registry-based policy settings.

  • September 07, 2005 07 Sep'05

    Windows Script Host arguments: Summary

    Our scripting column this month explains how to use an important object collection in Windows Script Host: named arguments.

  • September 06, 2005 06 Sep'05

    Compliance becomes best practice -- everywhere

    Compliance policies are now driving data retention decisions even in unregulated businesses, analysts say.

  • August 15, 2005 15 Aug'05

    Part 5: Tools

    Crash Course: A tour of Exchange System Manager, part 5: Tools.

  • August 15, 2005 15 Aug'05

    Part 4: Administrative Groups

    Crash Course: A tour of Exchange System Manager, part 4: Administrative Groups.

  • August 15, 2005 15 Aug'05

    Part 3: Recipients

    Crash Course: A tour of Exchange System Manager, part 3: Recipients.

  • August 15, 2005 15 Aug'05

    Part 1: Getting started

    Crash Course: A tour of Exchange System Manager, part 1: Getting started.

  • August 15, 2005 15 Aug'05

    Part 2: Global Settings

    Crash Course: A tour of Exchange System Manager, part 2: Global Settings.

  • August 10, 2005 10 Aug'05

    Best Practice #8: Just be plain

    Checklist: Top 10 best practices for securing e-mail clients, best practice #8.

  • August 10, 2005 10 Aug'05

    Best Practice #5: Don't be a sucker

    Checklist: Top 10 best practices for securing e-mail clients, best practice #5.

  • August 10, 2005 10 Aug'05

    Best Practice # 2: Configure antivirus software to scan your mail client

    Checklist: Top 10 best practices for securing e-mail clients , best practice # 2.

  • August 10, 2005 10 Aug'05

    Best Practice #1: Patch your clients

    Checklist: Top 10 best practices for securing e-mail clients, best practice #1.

  • August 10, 2005 10 Aug'05

    Best Practice #9: Learn to read (e-mail headers that is)

    Checklist: Top 10 best practices for securing e-mail clients, best practice #9.

  • August 10, 2005 10 Aug'05

    Best Practice #10: Digitally sign and encrypt your e-mail

    Checklist: Top 10 best practices for securing e-mail clients, best practice #10.

  • August 10, 2005 10 Aug'05

    Best Practice #6: Disable unsigned macros

    Checklist: Top 10 best practices for securing e-mail clients, best practice #6.

  • August 10, 2005 10 Aug'05

    Best Practice #7: Use Outlook's Junk E-mail filter or install spam-filtering software

    Checklist: Top 10 best practices for securing e-mail clients, best practice #7.

  • August 10, 2005 10 Aug'05

    Best Practice #3: Use anti-malware software

    Checklist: Top 10 best practices for securing e-mail clients , best practice #3.

  • August 10, 2005 10 Aug'05

    Best Practice #4: Quarantine attachments

    Checklist: Top 10 best practices for securing e-mail clients , best practice #4.

  • August 08, 2005 08 Aug'05

    Would a guarantee sway Software Assurance customers?

    What will it take for IT executives and financial managers to stop hating Microsoft's Software Assurance? More assurance would be a good start -- like 24-hour support.

  • July 29, 2005 29 Jul'05

    Running external scripts

    Scripting without objects is very limiting. This month's scripting column introduces you to a sampling of the Windows Scripting Host objects, how they help you perform administrative tasks and work with your environment.

  • July 29, 2005 29 Jul'05

    Scripting School: Find objects with Windows Script Host

    Scripting without objects is very limiting. This sampling of the Windows Script Host objects can help you reduce the time to perform administrative tasks and work with your Windows environment.

  • July 29, 2005 29 Jul'05

    Wscript.Arguments

    Scripting without objects is very limiting. This month's scripting column introduces you to a sampling of the Windows Scripting Host objects, how they help you perform administrative tasks and work with your environment.

  • July 29, 2005 29 Jul'05

    Windows Scripting Host objects

    Scripting without objects is very limiting. This month's scripting column introduces you to a sampling of the Windows Scripting Host objects, how they help you perform administrative tasks and work with your environment.

  • July 20, 2005 20 Jul'05

    Microsoft's free plug-in helps Unix and Windows interoperate

    From file sharing to subsystem functions, Windows Services for Unix is a multitalented tool for managing a combination of Windows and Unix servers.

  • July 20, 2005 20 Jul'05

    Microsoft to acquire spam fighter FrontBridge

    To bolster the security of its Exchange messaging platform, Microsoft plans to buy the California provider of managed security services.

  • July 14, 2005 14 Jul'05

    Making a third-party OS and Active Directory integration a snap

    It's not easy being an Active Directory administrator who's trying to integrate non-Microsoft OSes into an Active Directory DNS. AD expert Laura E. Hunter offers some help.

  • July 12, 2005 12 Jul'05

    Integrating Linux and Active Directory isn't as daunting as you think

    Administrators often must manage both Windows and Linux machines -- and figure out how to get the two to work well together. Expert Laura E. Hunter offers some advice on Active Directory and Linux interoperability.

  • July 08, 2005 08 Jul'05

    What to do before evaluating hardware

    Here's a checklist of actions you should take before evaluating a hardware product for your Windows infrastructure.

  • July 08, 2005 08 Jul'05

    How to evaluate external hardware

    This tip from our "How to Evaluate Hardware Guide," contributor Bernie Klinder teaches you how to evaluate external hardware components for your Windows infrastructure.

-ADS BY GOOGLE

SearchServerVirtualization

SearchCloudComputing

SearchSQLServer

SearchEnterpriseDesktop

SearchVirtualDesktop

Close