Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
Smoothly adding a second Exchange server to your organization
We had a single Exchange server that forwarded outbound email to a smarthost. We've just added another Exchange server to our organization and moved some user mailboxes to it. Let's call this new server Server B, and our old server is Server A. Now ... Continue Reading
Changing the IP address of your Exchange server
Learn how to change the IP address of your Exchange server in this expert response. Continue Reading
Existing user account names: Don't rename them, migrate them
Rather than rename a user account that's been in use for some time, it's better to create a new user profile with the proper name and migrate the old profile into the new one. Continue Reading
-
Global catalog server best practices for Exchange Server
Learn how global catalog servers work with Exchange Server and best practices for deploying them in your network infrastructure. Continue Reading
Discover the 'hidden' user control panel in Windows XP
Find out about the features of a hidden control panel in Windows XP which provides user options that normally aren't available. Continue Reading
Winmail Opener: How to read TNEF-encoded email messages
Microsoft Outlook and Exchange Server often store and transport messages in TNEF, a proprietary format Microsoft uses to encapsulate email messages. A non-Microsoft email client that doesn't know how to interpret TNEF will simply display the message...Continue Reading
Network isolation: When to pull the plug
When security comes up, there is always a discussion of isolating a sensitive server, but this is often impractical. Contributor Serdar Yegulalp discusses four ways to isolate sensitive servers and their data.Continue Reading
Quick Tips: Determine the installation date of Windows
The following command helps you to determine the installation date and time of a Windows XP/2003 computer.Continue Reading
Troubleshooting Outlook Web Access user login issues
Discover a three-tier approach to troubleshooting why a user is able to access his Exchange Server mailbox via Microsoft Outlook, but can't log in through Outlook Web Access.Continue Reading
Setting up workstations with Remote Installation Services
In larger companies, there are two popular options for streamlining the task of manually setting up workstations: disk imaging and Microsoft's Remote Installation Services (RIS).Continue Reading
-
Using Safe Mode to resolve Windows Server 2003 startup issues
You can often resolve startup issues in Windows by using Safe Mode to recover or troubleshoot system problems. Find out how to start a system in Safe Mode in this tip.Continue Reading
Troubleshooting Exchange Server global catalog issues
Exchange Server relies on global catalog servers in a domain to perform user lookups in Active Directory. Learn about the Exchange-related repercussions of an unreachable global catalog server and discover options for troubleshooting this issue.Continue Reading
Moving DHCP database to a new server
Follow the steps in this tip to configure a new DHCP server and move the current DHCP database from the old server to the new server.Continue Reading
Exchange Server Standard Maintenance Checklist
Microsoft MVP Brien Posey provides this checklist to help you keep your Exchange servers running like well-oiled machines.Continue Reading
OWA authentication issues when using a proxy server
Outlook Web Access can work on a server directly available from the Internet or a server concealed by a proxy. If you have the latter setup, you need to watch out for potential OWA authentication issues.Continue Reading
Remote authentication: Four tips for improving security
Your network boundary has crumbled and ensuring secure remote authentication is an essential duty for any administrator. RADIUS expert Jonathan Hassell provides four tips for improving the security and administration of remote access to your network.Continue Reading
Use Microsoft's Windows Memory Diagnostic to test for bad computer memory
Bad memory is one of the main reasons for random system failures. Microsoft now offers its own tool to test for memory problems.Continue Reading
Proper patching for both front-end and back-end Exchange Server setups
If you improperly or inconsistently update your front-end and back-end Exchange servers, your Outlook Web Access users could suffer with performance and availability problems.Continue Reading
Exchange Admin 101: An introduction to RAID for Exchange Server
SearchExchange.com contributor Marc Grote explains how RAID works, and provides tips and tools that will help you implement and manage RAID storage in your Exchange Server environment.Continue Reading
Checking access permissions with Server Share Check
Windows Server security permissions can get confusing. Contributor Brien M. Posey explains why NTFS permissions are better than share level permission and how to check permissions with Server Share Check.Continue Reading
Quick Tips: Removing thumbs.db files
When viewing a folder with the Thumbnail view, WindowsXP creates a thumbs.db file. Find out how to turn this feature off.Continue Reading
Creating an administrator password reset disk
As an administrator, it's a good idea to create a password reset disk in case you forget your password. This tip explains how to do this.Continue Reading
How to recover data from corrupt NTFS boot sectors
If the NTFS boot sector is corrupt, it can not only cause boot problems, it can also make the data on the volume inaccessible. So it's good to know techniques for repairing a corrupt NTFS boot sector.Continue Reading
How to move Exchange Server transaction logs and databases to a new hard drive
SearchExchange expert Brad Dinerman explains how to free up C drive space by moving transaction logs and Exchange databases to another drive.Continue Reading
How to automatically clear the forms cache in Microsoft Outlook
If you use custom forms in Outlook 2003, you may experience the error message: "Outlook cannot open this form." This issue is typically caused by a polluted Microsoft Outlook forms cache. In this tip, SearchExchange.com contributor explains how to ...Continue Reading
Rebuild TCP/IP stack in Windows XP when all else fails
Find out how to rebuild the TCP/IP stack to the pristine condition that it was in on a clean install using the NetShell utiltiy.Continue Reading
Domain controller penetration testing
Domain controllers are the backbone of your Active Directory network. They require special care when testing their security. Contributor and penetration testing expert Kevin Beaver recommends some tactics and tools for testing DC security.Continue Reading
Mastering the LDAP search filter, Part 2
LDIFDE is a powerful command line tool that with a little practice, can easily extract specific information about AD objects. Expert Gary Olsen explains how to limit your search by way of an object class LDAP filter.Continue Reading
Moving SBS and Exchange to new hardware using the 'swing migration' technique
SearchExchange.com expert Brad Dinerman explains how to move a Small Business Server 2003 installation to new hardware -- including all the Exchange Server and Active Directory data -- using the simple "swing migration" technique.Continue Reading
Microsoft Rights Management Services: An introduction
Don't be confused or apprehensive about RMS. Contributor Serdar Yegulalp explains the technology, what you'll need, how to use it and its limitations.Continue Reading
Open the command prompt from right-click menu
Save time and add an option to your right-click context menu that will open a command prompt at your current folder.Continue Reading
Troubleshoot Microsoft Outlook offline address books (.OAB files) with the OABInteg tool
If you have problems generating or synchronizing offline address books (.OAB files) when using Microsoft Outlook in cached mode, you can use the free command-line utility, OABInteg, to troubleshoot.Continue Reading
How disk cluster size affects data recovery processes
In this tip, you'll learn how to calculate a cluster size, and how disk cluster size affects data recovery processes.Continue Reading
Automatically moving Microsoft Outlook sent items to a specified folder
SearchExchange.com expert Brad Dinerman offers a workaround for those looking for a built-in Microsoft Outlook rule to move sent messages rather than copy them.Continue Reading
How to create a boot disk to run Norton Disk Editor
Running Norton's Disk Editor can help recover data on a Windows system. However you'll need to create a boot disk before running the utility. This tip explains how to complete this process.Continue Reading
How to recover deleted files on FAT via Disk Editor
Recovering deleted files via Norton's Disk Editor on a FAT system is a four-step process. Learn them here.Continue Reading
hMailServer: Free open-source SMTP/POP3 email for Windows
SearchExchange.com contributor Serdar Yegulalp discusses a free open-source SMTP/POP3 email server for Small Business Server 2003 shops that don't necessarily need a full Exchange Server installation.Continue Reading
How do you automatically delete sent email in the Sent Items folder?
SearchExchange.com expert Brad Dinerman explains two options for automatically deleting email in a Microsoft Outlook Sent Items folder that is older than a specified date.Continue Reading
Mastering the LDAP search filter
Expert Gary Olsen breaks down the principles of the LDAP search filter, making it easy for an admin to formulate whatever search he or she wants in Active Directory.Continue Reading
Problems receiving and sending email in Outlook
SearchExchange.com expert Brad Dinerman helps an Exchange administrator troubleshoot a user's inability to send or receive email messages in Microsoft Outlook, and explains why the likely culprit is an antivirus scanner or other egregious software ...Continue Reading
Can you create a .PST file in Outlook Web Access?
SearchExchange.com expert Brad Dinerman offers an alternative to creating .PST files in Outlook Web Access, since it is unsupported if users are not connected to the Exchange server through Microsoft Outlook.Continue Reading
AccessChk utility audits user access to files and directories
To maintain security, administrators often need to know what kind of accesses specific users or groups have to resources, including files, directories and registry keys. A tool called AccessChk can help answer those questions.Continue Reading
Four ways to secure SMTP servers and improve performance
Weaknesses in your SMTP configuration can pave the way for DoS attacks and spammers. Discover four ways to secure SMTP services and limit spam.Continue Reading
Leave spread spectrum clocking disabled
Many PC devices, most notably motherboards, hard drives and controllers, have spread spectrum clocking (SSC) functions to control how much electromagnetic interference (EMI) they put out. It's best to leave this feature disabled. Turning on SSC may ...Continue Reading
Active Directory LDAP scripting made simple
It is important for every admin to have an understanding of LDAP when searching for information in Active Directory. Expert Laura E. Hunter breaks down the syntax into its component pieces and provides some essential tips for Active Directory ...Continue Reading
Does XP support multiple processor cores?
Does Windows XP Home support multiple processor cores in a single physical processor? A look at Intel's Hyper-Threading technology and AMD's X2 dual core series may resolve the question.Continue Reading
Use Terminal Services Manager to manage users, sessions, processes
If users are accessing servers using the Remote Desktop connection, the utility Terminal Services Manager can help you check which user is connected to a particular server and which processes he has started.Continue Reading
Certifications: The benefits of Microsoft and CompTIA certs
In this series, expert Ed Tittel helps readers prepare for MCP exams and discusses what being certified with CompTIA and Microsoft can do for their careers.Continue Reading
Windows security update may cause shell extensions to fail
Shell extensions in Windows can cause problems. Microsoft's MS06-015 security update includes a system component, VERCLSID.EXE, that validates shell extensions before they are installed. Unfortunately some shell extensions cause VERCLSID.EXE to ...Continue Reading
Best practices for running ForestPrep and DomainPrep
ForestPrep and DomainPrep can be run either manually before Exchange Server is installed, or automatically during the Setup.exe process. Which option is right for you depends on the size and administrative security parameters of your organization.Continue Reading
How to change the Windows XP Product Activation Key Code
Find out how to check if your Windows XP systems are using a leaked key, and how to change the product activation key if they are.Continue Reading
Optimize Exchange Server 2003 database maintenance
Exchange Server 2003 automatically performs regular database maintenance by default, but you may need to manually adjust a few settings to achieve optimal results.Continue Reading
Terminal Services: Multiple time zones and only one terminal server
In this series, Expert Christa Anderson helps readers solve USB printer issues with Terminal Services, as well as configuring Remote Desktop Web for access through ISA.Continue Reading
Disabling guest accounts
Intended for temporary users, guest accounts are an easy point of entry for hackers. Find out how to permanently disable them.Continue Reading
Free tool review: AccessChk permissions checker
Administrators typically go to great lengths to make sure that network servers are secure. Mistakes do happen though. It is not uncommon for security groups to have overlapping or even contradictory permissions. Contributor Brien Posey reviews a ...Continue Reading
Microsoft Outlook without Exchange Server -- an option for small businesses
Using Microsoft Outlook with a POP3/SMTP Internet Service Provider (ISP) service is a cost-effective approach for small shops, but you do sacrifice helpful Exchange Server features like shared mail folders, contacts and calendars. Learn how you can ...Continue Reading
Allow outsiders to send to an Exchange public folder email address
Find out how you can allow external accounts -- such as Yahoo and Hotmail addresses -- to send email to a domain's Exchange public folder email address.Continue Reading
Extracting Active Directory info quickly and easily with LDIFDE
Gathering data in Active Directory can be a simple task if you know the right commands. Expert Gary Olsen offers a few helpful scripting tips for LDIFDE.Continue Reading
How to manually (and safely) purge Exchange Server transaction logs
Learn how you can reclaim disk space by selectively -- and safely -- deleting Exchange Server transaction logs that are no longer needed for restore operations.Continue Reading
Using the new DFS in Windows Server 2003 R2
The R2 release of Windows Server 2003 now features a new replication engine for the Distributed File System (DFS). Expert Gary Olsen offers a few helpful pointers and outlines the key feature that make the upgrade worth your while.Continue Reading
Recover from failed quorum disk in WinServer 2003 cluster
If the quorum disk fails in a Windows Server 2003 cluster, and a server fails, you're in trouble -- unless you know some of the ways to deal with the problem.Continue Reading
Microsoft Outlook folder deletion and synchronization problems
Users who run Exchange Server offline mode (i.e., using an .OST file) can sometimes experience a strange problem where certain Microsoft Outlook folders cannot be deleted. In this tip, SearchExchange.com contributor Serdar Yegulalp explains why and...Continue Reading
Protecting servers with Data Protection Manager
You've learned how to perform the initial configuration of Microsoft System Center Data Protection Manager and how to deploy the agents to the servers that you want to protect, now learn how to protect those servers.Continue Reading
Is it possible to implement a shared Outlook calendar without Exchange?
Explore your options for creating a shared calendar for Outlook 2003 users who receive outsourced POP3 email, and have no Exchange Server running.Continue Reading
Best practices for backing up Windows server clusters
When it comes to backup, a Windows server cluster environment is very different from standalone systems.Continue Reading
The pros and cons of 'catch-all' Exchange Server mailboxes
SearchExchange.com contributor Serdar Yegulalp explains what a catch-all Exchange Server mailbox is and the pros and cons of using one. He also shares a script that can automate the catch-all process for a given domain.Continue Reading
How to view when a mailbox or public folder was last accessed
When was an Exchange Server mailbox or Exchange Server public folder last accessed? Learn how to display this information using Exchange System Manager in Exchange Server 2003.Continue Reading
Verifying Data Protection Manager status
The first step in troubleshooting most problems related to Microsoft System Center Data Protection Manager is to verify that it is actually operating.Continue Reading
How do I remove a single icon from the system tray?
How do I remove a single icon from the system tray? Also, I'd like to know how to stop an icon from reappearing on my desktop. When I delete it and log off, the icon does not return when I log back on, but returns when I restart the system.Continue Reading
As far as Windows XP is concerned, not all floppy drives are created equal
Only three floppy disk drives will be recognized when you try to install mass storage devices during XP installation.Continue Reading
Copying long file names or directory paths to CDs
Administrators routinely use CDs and DVDs to back up files and folders from systems. But any administrator who does this with directory structures that have long file names or extremely deep paths that exceed 180 characters may run into problems. ...Continue Reading
The effects of GPO version numbers on Group Policy replication
The relationship of the version numbers for the Group Policy Template and Group Policy Console of each GPO are important for proper Group Policy replication. Expert Derek Melber discusses this relationship and explains why the numbers don't always ...Continue Reading
Set up read-only access for all Exchange Server calendars with the SetPerm utility
How to set up centrally shared Exchange Server calendars for all Active Directory users.Continue Reading
Mass-enabling or disabling Outlook Mobile Access permissions
In Exchange Server 2003, Outlook Mobile Access is enabled by default for all users. If you're in a large organization, you probably want to be more selective about who is allowed to use OMA, but making mass changes to AD user accounts can be ...Continue Reading
Installing and configuring Data Protection Manager
Although Microsoft has automated much of the DPM installation process, there are things you need to know to prepare for installation, not to mention the post-installation configuration.Continue Reading
Project management capability now available in freeware
Gantt-charting software has traditionally been expensive, but now there's a freeware tool that can perform project management.Continue Reading
How to determine if you're the target of a 'reverse NDR attack'
SearchExchange.com expert Bharat Suneja outlines the symptoms of a 'reverse NDR attack' and provides instructions on how to clean up your Exchange queues if your server's been targeted.Continue Reading
Fine-tuning the deployment process for apps published via Group Policy
These tips will help you fine-tune the deployment process for applications that have been assigned or published via Group Policy.Continue Reading
Why Data Protection Manager is replacing disk-to-tape backups
Microsoft System Center Data Protection Manager (DPM) disk-to-disk-to-tape backup product is replacing traditional disk-to-tape backup in many companies. Here's why.Continue Reading
Active Directory: Trouble starting AD Users and Computers
In this series, Expert Laura E. Hunter helps readers with such Active Directory issues as authorizing the DHCP, resetting the AD Restore Mode password and starting AD Users and Computers.Continue Reading
How to create your own MSI file to deploy applications
Using Group Policy settings to deploy applications throughout your organization works well if the app you're deploying includes an installation package in MSI format. But it if doesn't, try creating your own MSI file.Continue Reading
Recovering files from a corrupted cache for offline files
With the number of users who are using offline file synchronization to take work on the road with them, the offline files cache often becomes corrupted.Continue Reading
Demote Exchange from domain controller to member server
SearchExchange.com expert David Sengupta offers advice on demoting an Exchange server from being a domain controller to simply a member server.Continue Reading
Should you turn off your network's outbound SMTP (port 25)?
If you have an Exchange server that's allowed to open outbound SMTP connections in your network, should you block port 25 everywhere else in your network, since it's not really needed? The short answer is yes, and here are some good justifications:Continue Reading
Troubleshooting Data Protection Manager warning message
The "disk threshold exceeded" warning message in Microsoft System Center Data Protection Manager examine it's parameters to figure out why it is gobbling up storage space in the first place.Continue Reading
Step 3: Domain controller communications
Domain controllers control the keys to your Windows kingdom. They need to be even more secure than your other servers. Ensure their security by following these steps from Active Directory expert Derek Melber.Continue Reading
Quick fix for a non-replicating DC
While it doesn't come up every day, one of the most frustrating experiences for an AD administrator is to try to fix a non-replicating DC. Expert Gary Olsen breaks down the process step-by-step to make troubleshooting your next non-replicating DC a ...Continue Reading
Running ESEUTIL to compact an information store without installing Exchange Server
SearchExchange.com expert Bharat Suneja explains how you to run ESEUTIL to reclaim disk space for an offline defragmentation.Continue Reading
Viewing mailbox size and setting mailbox notifications/quotas in Exchange 5.5
How to view mailbox size and set mailbox notifications and quotas in Microsoft Exchange Server 5.5.Continue Reading
Allocate disk space properly for Microsoft Data Protection Manager
Data Protection Manager (DPM), Microsoft's answer to the need for fast recovery of deleted or damaged files, requires two kinds of storage space for the data entities that it uses. If the disk space is not properly allocated, DPM won't work properly.Continue Reading
Troubleshooting Exchange Server error messages
When Exchange Server returns a cryptic numerical error message, do you know what to do? This tip explains a three-tier approach to deciphering and troubleshooting Exchange error codes.Continue Reading
Exporting Exchange public folder contacts to Microsoft Excel
SearchExchange.com expert David Sengupta gives step-by-step instructions on how to export Exchange Server public folder contacts to a Microsoft Excel spreadsheet.Continue Reading
Can a MCSA get you an IT job without experience?
Expert Ed Tittel helps shows a reader how he can make the most out of a MCSA certifiaction.Continue Reading
Error: An existing connection was forcibly closed by the remote host
Find out what to do if you receive an error that an existing connection was forcibly closed by the remote host.Continue Reading
Preventing DNS registration of certain SRV records
If you have performance issues or bandwidth restrictions, you can force authentication requests to only go to certain domain controllers by preventing DNS registration of certain Service Locator (SRV) records.Continue Reading
Deploying apps via Group Policy -- cost-effective, but risky
You can deploy applications using Group Policy. But without the proper planning, this is a good way to shoot yourself in the foot.Continue Reading
How to display IMF's Spam Confidence Level (SCL) rankings in Microsoft Outlook
Learn how to create a custom Microsoft Outlook form that exposes Exchange Server Intelligent Message Filter's Spam Confidence Level (SCL) rankings for all incoming e-mail.Continue Reading
Simultaneously add telephone numbers to Active Directory
You don't have to add a large group of numbers to Active Directory one by one. SearchEchange.com expert David Sengupta shows you the tool you need to get the job done in one sweep.Continue Reading
Limiting user and admin access
In this set of questions and answers, Windows network security expert Wes Noonan shares with you how to selectively limit server access from users and admins alike.
You can view ...Continue Reading
Clearing the confusion around Exchange Server circular logging
Circular logging recommendations have changed over the years based on Exchange version changes, so there's a lot of contradictory information out there.Continue Reading