Problem solve
Get help with specific problems with your technologies, process and projects.
Windows systems and network management
Terminal Services: Multiple time zones and only one terminal server
In this series, Expert Christa Anderson helps readers solve USB printer issues with Terminal Services, as well as configuring Remote Desktop Web for access through ISA. Continue Reading
The effects of GPO version numbers on Group Policy replication
The relationship of the version numbers for the Group Policy Template and Group Policy Console of each GPO are important for proper Group Policy replication. Expert Derek Melber discusses this relationship and explains why the numbers don't always ... Continue Reading
Project management capability now available in freeware
Gantt-charting software has traditionally been expensive, but now there's a freeware tool that can perform project management. Continue Reading
-
Fine-tuning the deployment process for apps published via Group Policy
These tips will help you fine-tune the deployment process for applications that have been assigned or published via Group Policy. Continue Reading
How to create your own MSI file to deploy applications
Using Group Policy settings to deploy applications throughout your organization works well if the app you're deploying includes an installation package in MSI format. But it if doesn't, try creating your own MSI file. Continue Reading
Step 3: Domain controller communications
Domain controllers control the keys to your Windows kingdom. They need to be even more secure than your other servers. Ensure their security by following these steps from Active Directory expert Derek Melber.Continue Reading
Preventing DNS registration of certain SRV records
If you have performance issues or bandwidth restrictions, you can force authentication requests to only go to certain domain controllers by preventing DNS registration of certain Service Locator (SRV) records.Continue Reading
Deploying apps via Group Policy -- cost-effective, but risky
You can deploy applications using Group Policy. But without the proper planning, this is a good way to shoot yourself in the foot.Continue Reading
IE toolbar displays HTTP headers of received pages
Sometimes an admin needs to see the HTTP header information. A toolbar for Internet Explorer is now available that lets admins view the exact HTTP headers for all documents downloaded by IE. It also shows SSL traffic.Continue Reading
Active Directory user rights for Windows domain controllers and servers
Some Active Directory user rights are more critical than others because they control key aspects of the server that an attacker could exploit. This tip reviews the differences between some critical user rights settings for domain controllers versus ...Continue Reading
-
How to find the MAC address of a remote computer
GetMAC provides a quick method for obtaining the MAC layer address and binding order for a computer running Windows 2000, locally or across a network.Continue Reading
Feature in XP and Windows Server 2003 stores passwords for servers
The Stored User Names and Passwords feature in Windows XP and the Windows Server 2003 family stores user names and passwords for servers.Continue Reading
Viewing advanced settings in Active Directory Users and Computers
There is no getting around it; everyone who uses Active Directory needs to access advanced settings within their enterprises. Expert Derek Melber explains how to use the Active Directory Users and Computers (ADUC) feature as a means of supporting ...Continue Reading
Why can't Windows 98 SE access shared folders?
An admin has four servers that all have shared folders, and are authenticated through Active Domain Controller. Three of the servers have no problem being accessed through 98 or XP, but one server allows only Windows XP clients to access its shared ...Continue Reading
Understanding GPT Replication
It's important to know that Group Policy Objects are split into two parts: the Group Policy Template and the Group Policy Container. Expert Derek Melber gives an overview of the GPT and breaks down the replication process.Continue Reading
Controlling Access-based Enumeration with Group Policy
The addition of Access-based Enumeration to the latest Windows Server 2003 server pack shows that Microsoft has finally jumped on the security bandwagon. Expert Derek Melber explains how the feature can be controlled using Group Policy.Continue Reading
How do I prevent users in an Active Directory domain from logging on to multiple clients at once?
Expert Laura E. Hunter explains how to use of the "LimitLogon" utility in Active Directory to prevent it from logging on to multiple clients at once.Continue Reading
Can SQL queries access and update Active Directory?
Is possible to run SQL queries to gather information and update Active Directory?Continue Reading
Tools to automate Group Policy Object management tasks
Group Policies are handy, but using them often leads to a lot of repetitive tasks. Fortunately there are tools that can automate many of these Group Policy Object management tasks. Learn about them here.Continue Reading
How to change the date format in a regional setting
I'm trying to a create a policy to be able control the date format in a regional setting. I haven't seen anything in AD about this. Is this possible without creating some complex script?Continue Reading
Group Policy: Pushing out software through Active Directory
Check out this collection of expert responses to real reader questions from Group Policy expert Jeremy Moskowitz.Continue Reading
Tools for quick recovery of deleted Active Directory objects
Everyone makes mistakes; even experienced system administrators. So what do you do when you accidentally delete information in Active Directory? Expert Gary Olsen outlines an easy tool that can be used to reanimate deleted objects.Continue Reading
Understanding the GPC for Group Policy
Understanding the structure of object and object properties is an important part of dealing with Group Policy issues. Expert Derek Melber clarifies the responsibilities of the Group Policy Container (GPC).Continue Reading
AD security: Group Policy inheritance and application
Group policy can be confusing. According to Microsoft MVP Derek Melber, understanding some key Group Policy concepts can ensure better security implementation.Continue Reading
When multi-master isn't quite so: Managing FSMO roles
IT administrators can use Flexible Single Master Operations (FSMO) to manage Active Directory forest and domain controllers. In Part I of a two-part series, expert Laura E. Hunter explains how to use FSMO to your advantage.Continue Reading
Find out which DC a system has used to log in
Determine which DC a system has used to log in - Tip2Continue Reading
Securing domain controllers
Domain controllers are essential to keeping Active Directory running. Contributor Derek Melber recommends these Group Policy settings to lock down your DC.Continue Reading
New DNS server tool can help assess your environment
In a complex network, it can be difficult to keep track of changes to your domains. In this article, Gary Olsen breaks down a new tool that can help maintain the health of your DNS environment.Continue Reading
WSUS vs. commercial software: Which is the better choice?
Microsoft's Windows Server Update Services, or WSUS, boasts a variety of new features. Should you go with WSUS, or one of the third-party products that are available?Continue Reading
Control your Group Policy, don't let it control you
Expert Laura E. Hunter breaks down the use of Group Policy Objects (GPO) within Active Directory.Continue Reading
Active Directory-integrated DNS zones and the case of the disappearing zones!
If you've had zones disappear in your Active Directory-integrated DNS, you know the frustration of trying to find them again. Expert Gary Olsen gives you guidance on how to fix the problem or avoid it entirely.Continue Reading
Command-line tool checks file integrity
Microsoft's free command-line tool, File Checksum Integrity Verifier, can create cryptographic hashes or "fingerprints" for files. Learn what else you can do with FCIV in this tip.Continue Reading
DNS Primer: Tips for understanding Active Directory integrated zone design and configuration
Microsoft's development of the Active Directory integrated (ADI) primary DNS zone has some useful benefits for administrators. Gary Olsen's article defines ADI and tells you how to maximize its benefits.Continue Reading
Create a bootable USB flash drive -- in a flash!
Making a USB flash drive into a bootable USB device requires some fancy footwork.Continue Reading
Step-by-Step on creating a trust between two AD domains' two-way trust
Our expert provides the steps to set up an Active Directory (AD) domain trust when DNS records need to be created before the trust.Continue Reading
Enforcing Group Policy Object settings
Ensure that your settings are getting to the target object -- and sticking.Continue Reading
Create a custom GUI for Windows PE
Creating custom Windows PE images with this applet is easy -- but don't ignore the last two directives.Continue Reading
Hardening Windows School: Group Policy design checklist for intermediate levels
When it comes to Group Policy design, many administrators make simple configuration mistakes or they get stuck trying to match GPOs with an Active Directory layout. Get help here.Continue Reading
How can I use a GPO or script to remove VNC software?
Modify registry to control AutoComplete
Try these simple registry medications and you have three options available to you concerning AutoComplete.Continue Reading
Checklist: What to do when your server crashes
If your server crashes you need to get it back online as quickly as possible. This checklist will help you do just that.Continue Reading
Protecting against anonymous connections using Group Policy Objects
How to use Group Policy Objects (GPO) to protect your Windows computers from insecure anonymous connections.Continue Reading
LSrunasE tool encrypts passwords to protect Admin privileges
Microsoft created the RUNAS command-line function to deal with the problems involved with escalated privileges in user accounts. But since RUNAS requires a password to be provided, this defeats the point. In response, substitutes for RUNAS were ...Continue Reading
How to use Install from Media to restore a domain controller
In this final installment of "Disaster Recovery Planning for Active Directory," Gary Olsen explains how to use install from Media feature to restore a domain controller.Continue Reading
Creating a PerfMon Web page
This tip explains how to convert MMC performance counters to create a live Web page.Continue Reading
Checklist: Preparing to deploy Active Directory
Brien M. Posey, MVP and technology consultant, provides this preparation checklist to help you plan for a trouble-free Active Directory deployment.Continue Reading
Moving DHCP without interruption during an Active Directory migration
In a recent migration project, the need arose to move DHCP services from the original domain to the newly created domain. Here are the lessons learned.Continue Reading
Network firewall profile uses Standard profile
Purpose of child domains and additional controllers
Creating custom Group Policy templates
Tips on using Group Policy to create custom policy templates to deploy features missing in Windows NT, such as Automatic Windows Updates or Windows Firewall settings.Continue Reading
AD problems after 2000 to 2003 migration
Is it necessary to rename the default first site?
Local administrative rights to all computers in organizational unit
Problems pushing Group Policy over a VPN tunnel
Moving logon scripts out of the domain controller netlogon share
PsPasswd: A free password-changing utility
A free password-changing utility.Continue Reading
Deleting a domain controller from NTDS settings
Avoiding single points of failure in Active Directory
Learn important precautions you can use to protect Active Directory from a single point of failure.Continue Reading
What is RSoP for Windows Group Policy?
Details and definition of RSoP (Resultant Set of Policy) for Windows 2000 Server and Windows Server 2003, as well as info on the meanig of RSoP to Group Policy.Continue Reading
Group Policies' order of application
When security policies are being applied at the Group level, the order in which they are applied can be tricky. This tip provides a way to remember the order.Continue Reading
Hiding or revealing user names in the Windows XP logon screen
How to hide or reveal user names at the Windows XP logon screen with a registry hack.Continue Reading
Checklist: Tighten default settings to prevent unauthorized access
Roberta Bragg explains the importance of turning off system defaults, beginning with unnecessary network connections, to keep your Windows systems secure.Continue Reading
Active Directory migration from Windows 2000 Server to Windows Server 2003
How to make sure you have full access to the forest improvements of Windows Server 2003 after an Active Directory migration.Continue Reading
Enforcing SID filtering over external trusts in Active Directory
SID filtering keeps your security identifiers from being passed to untrusted domains, this explains how to make sure it is turned on.Continue Reading
Best practices for OU design
A short list of best practices for designing organizational units in Active Directory.Continue Reading
Disable System Restore through group policy
Active Directory tasks: To delegate or not to delegate?
While some Active Directory tasks can be performed by non-admin personnel, there are some that should never, ever be delegated.Continue Reading
DNS aging and scavenging simplified
Introduced in Windows 2000, Dynamic DNS brought a process with it called DNS scavenging where it would not be needed in a perfect world -- but who lives in a perfect world?Continue Reading
Restoring to a server that's not a domain controller
Is there a way to use Group Policy to disable Internet access?
How to remove a child domain
Speeding up a slow login process
Improving the default domain controller Group Policy Objects
When Windows Server 2003 is used to establish an Active Directory-based network, there are two default GPOs: the default domain GPO and the default domain controller GPO. This article recommends several ways to improve upon the default settings in ...Continue Reading
The importance of physical security for domain controllers
Your logical and technical security will be wasted if you do not physically secure your DC. This tip will put you on the right path.Continue Reading
How can I check my virtual memory and RAM usage on Windows XP?
Does the DNS server have to be installed on the domain controller?
Establishing secure Active Directory boundaries - Part 1
Part one on choosing the best boundaries for your Microsoft Active Directory implementation.Continue Reading
Designing Active Directory security through risk analysis
A look at some of the security threats that Active Directory faces, and some of the ways to protect it.Continue Reading
Can Active Directory also be used as a Patch Management Solution?
Error message: "unable to establish connection to global catalog server"
How can I solve this 'cannot find DHCP server' error?
How do you ping an IP address using VB.NET?
What's the difference between physical and logical topologies?
Basic DNS records for Active Directory DCs
Be careful with the Active Directory Wizard, it may generate incorrect entries. This tip tells you what to look for to make sure your DNS records are correct.Continue Reading
Active Directory replication failing? Check the topology
Learn why automatic replication can sometimes fail in Active Directory and what admins can do to troubleshoot the problem.Continue Reading
Can I change a SCSI controller without reinstalling the OS?
Applying permissions to an Active Directory OU
Learn to troubleshoot issues with assigning permissions to groups in an organizational unit.Continue Reading
Preventative maintenance checklist
A helpful checklist of preventative maintenace instructions.Continue Reading
Changing the IP address on a domain controller
Step-by-step instructions for changing the IP address on an AD domain controller, as well as a method to make sure it is resolving properly after the change.Continue Reading
Quick Tips: Exporting AD account information to a spreadsheet
Learn how to export Active Directory account information like email addresses, last name, etc., into a spreadsheet.Continue Reading
Active Directory migration planning checklist
Planning an Active Directory upgrade or migration? This checklist provides all the key factors to be aware of before you begin.Continue Reading
How can I use "Logon Workstations" in AD without WINS?
Lock down HOSTS files
Placing name/address pairs in HOSTS allows the system to default to the IP address for that network name at all times -- saving DNS lookup time and traffic to the DNS server.Continue Reading
Force domain changes in Microsoft Active Directory
you make a change to your domain, you don't have to wait for AD's replication schedule to occur before having that change replicate to all of your other DCs.Continue Reading
Set up split-brain DNS in Active Directory
How and why you should deploy two sets of DNS servers in Microsoft Active Directory environments.Continue Reading
What to expect during and after DCPROMO
What's the best way to move from an old WINS server to a new one?
How do I change a NetBIOS domain name?
How can I set up a Linux DNS server to work with AD?
Active Directory and IntelliMirror
Learn the basics of IntelliMirror, a Windows feature designed to enhance the management of user environments and profiles.Continue Reading