Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
Studs and duds in the Windows Server 2008 R2 feature set
R2 made a feature-savvy entrance when it was released almost two years ago, but not every enhancement has lived up to the hype. Continue Reading
Testing top Microsoft support tools for Windows 2008 compatibility
For years Microsoft has worked to expand its slate of troubleshooting tools for admins. But with no Support Tools to download for the latest OS, do the same utilities still apply? Continue Reading
Fighting off Microsoft Hyper-V security hacks
Although hypervisors are built with security in mind, a sloppy Hyper-V host configuration can still open up your servers to a wide range of exploits. Continue Reading
-
What does ASLR really mean for Windows security?
While address space layout randomization may be a mouthful, the added protection could be critical to Windows security. But will ASLR really stop malware in its tracks? Continue Reading
An introduction to Exchange 2010 ActiveSync throttling
ActiveSync throttling policies are beneficial to Exchange 2010. They can protect a client access server from overload and can keep mobile device users from meddling with settings. Continue Reading
What Server App-V means for applications in the cloud
Microsoft is close to extending its application virtualization technology to the server. The question is, will it encourage more companies to invest in Azure?Continue Reading
Applying regular expressions (regex) to Windows PowerShell
It may seem daunting at first, but the combination of regular expressions (regex) with PowerShell can be an admin’s best friend when it comes to certain complex tasks.Continue Reading
How a CAS array can protect Exchange Server 2010 from failure
Exchange 2010 connects to clients via the client access server. Creating a CAS array can prevent the server from becoming a single point of failure. Here’s how to do it.Continue Reading
Microsoft Xperf tutorial: New ways to monitor Windows performance
Part of the Windows Performance Toolkit, Microsoft's Xperf utility easily trumps the monitoring capabilities of older admin tools like Perfmon. So how does it work?Continue Reading
A closer look at the Ntdsutil command-line tools for Active Directory
Dig into the slew of Ntdsutil commands in Windows Server 2008 and R2 that provide admins with improved Active Directory management.Continue Reading
-
Living dangerously with Ntdsutil commands in Windows Server 2008
While the Ntdsutil utility for Active Directory has been around since the days of Windows 2000, new functionality in Windows Server 2008 and R2 gives admins even more to work with.Continue Reading
Five Quick Links: Windows Server troubleshooting
Check out these quick-hit links for debugging Windows Server crashes and hangs, with details on the best (free) recovery tools for administrators.Continue Reading
Do IIS Web servers make sense for virtualization?
Web servers like IIS can be a good fit for virtualization, so long as all the key considerations are taken into account ahead of time.Continue Reading
Isapi Rewrite Filter: A free URL rewriting utility for IIS 7
Though Microsoft finally offers a URL rewriting add-on for IIS, admins might look to take advantage of the Isapi Rewrite Filter’s extended functionality.Continue Reading
Monitor SharePoint with Outlook 2010 email alerts
If you're an Exchange admin who’s been tasked with overseeing SharePoint, you can use a familiar tool -- Outlook 2010 -- to manage alerts.Continue Reading
Making sense of Windows Azure's VM role
The new VM role for Windows Azure should be a boon for organizations looking to host their virtual machines in the cloud, but it’s not ideal for all situations.Continue Reading
Windows PowerShell and the .NET Framework: Connecting the dots
You don’t have to be a developer to understand how .NET integrates with Windows PowerShell. By learning just a few basic concepts, admins can help put .NET within reach.Continue Reading
How to use managed folders for Exchange 2010 message retention
Managed folders are most often used to control message retention. Before you use them, you need to become familiar with the cmdlets and parameters to configure managed folders.Continue Reading
What admins need to know about Windows Azure services
Much has been said about what Microsoft's cloud platform means for developers. As for admins? It could be a case of the more things change, the more they stay the same.Continue Reading
Is turning off User Account Control in Windows a good idea?
Old-school admins might be tempted to turn off User Account Control for the sake of their legacy programs, but the practice could easily do more harm than good.Continue Reading
Step up your Outlook Web App setup
When Outlook Web App’s default settings just won’t do, it’s time to tweak. Certain configuration changes will help OWA run more efficiently and securely.Continue Reading
Event Tracing for Windows: A fresh look at an old tool
Though over a decade old, the Event Tracing for Windows utility might be the best troubleshooting tool that many admins have never heard of.Continue Reading
Free Outlook tool fixes AutoComplete list annoyance
Outlook's AutoComplete function is helpful, but doesn’t allow you to edit existing entries. This free download lets you edit, repair and track .nk2 files.Continue Reading
Virtual Machine Manager 2008 R2: Four features you wish it supported
While Microsoft has made strides with its current virtualization management software, some still find it lacking in certain areas.Continue Reading
Moving public folder calendars and tasks to SharePoint 2010
Manually migrating calendar, contact and task data from Exchange public folders to SharePoint 2010 may seem daunting. These steps make it seem painless.Continue Reading
Controlling IIS log file growth with IISLogs 2.0 utility
With IISLogs 2.0 admins can manage, archive and compress log files on their own time, eliminating the need for custom scripts.Continue Reading
Rebuilding an Exchange client access server in five steps
According to Exchange Server documentation, you don’t need to back up a client access server. But you should know how to rebuild it. Get the steps.Continue Reading
Top three Windows server crashes (and how to avoid them)
Why wait until a server crashes to start the troubleshooting process? Admins can squash potential outages ahead of time by zeroing on the most likely culprits.Continue Reading
How to use WMI with Windows PowerShell scripts
With PowerShell, admins can harness the power of WMI to find all sorts of system and network information. The best part? It’s probably a lot easier than you think.Continue Reading
Checklist for new Exchange Server administrators
Are you a new Exchange admin who walked into an oddly configured server infrastructure? This checklist can help you make sense of the mess.Continue Reading
How DNS devolution works in Windows Server 2008 R2
Windows 7 and Server 2008 R2 ship with built-in changes to the DNS name devolution process that help boost security and simplify client access to network resources.Continue Reading
NFS role eases account mapping across Unix and Windows
Admins can keep closer tabs on user permissions over networks running various server platforms via a new service for Windows Server 2008 R2.Continue Reading
Dissecting ActiveSync logs in Exchange Server 2010
ActiveSync logging information is valuable to Exchange 2010 admins for several reasons. We explore how to find and decipher the data.Continue Reading
Link Shell Extension simplifies hard link creation for Windows NTFS
Looking for a better way to build hard links and junctions for NTFS volumes? Link Shell Extension moves the process out of the command line and into Windows Explorer.Continue Reading
Time management strategies for the IT pro
How effective are you at managing your time? IT expert Kevin Beaver offers up some time-management best practices to help you get the most out of your workday.Continue Reading
Free Microsoft tool accesses Exchange, Outlook MAPI stores
What started as one Microsoft engineer tinkering with MAPI became a full-blown tool. See how MCFMAPI can access stores via a graphical user interface, helping you solve MAPI problems.Continue Reading
How vulnerable is Microsoft IIS 7.5 to attacks?
While version 7.5 is more secure out of the box than past IIS releases, it doesn't guarantee 100% protection.Continue Reading
Step-by-step: Building a Windows Server instance in the cloud
Setting up a cloud-based instance of Windows Server might be easier than you think -- especially when the hosting provider does most of the work for you.Continue Reading
Outlook 2010 and Exchange 2007 connection error workaround
Stumped by a 0x80070057 error when trying to connect Outlook 2010 to Exchange 2007? The cause might surprise you.Continue Reading
The real price of Exchange Server in the cloud
Do you think moving Exchange to the cloud is a good fiscal decision? Run the numbers again. What you save on an initial investment may cost you down the road—in more than simple dollars and cents.Continue Reading
Best practice for Dynamic Memory allocation with Hyper-V R2 SP1
Windows Server 2008 R2 SP1 will finally add the ability to over-allocate memory with Hyper-V. The next step? Learning to optimize the feature for peak performance.Continue Reading
DCs at sea: Configuring mobile Active Directory domain infrastructures
It’s common for admins to deal with mobile users, but what if the domain itself moves? See how basic AD principles always apply -- no matter what the situation is.Continue Reading
Registry hack lets OWA users reset their passwords
All it takes is this simple registry hack to give users with expired passwords access to their OWA accounts.Continue Reading
Tracking system resources with free WinObj utility from Sysinternals
Mark Russinovich and company did Microsoft one better with the WinObj tool for tracking Windows system resources, though there’s still room for improvement.Continue Reading
Manually move Exchange public folder data to SharePoint
For years Microsoft has urged Exchange admins to migrate public folder content to SharePoint -- without supplying any tools to do it. Save money on third-party tools by doing it manually.Continue Reading
Pros and cons of Windows Server drive encryption
Despite the drawbacks of server-based drive encryption, tools like BitLocker can be invaluable protection against data breaches and other external threats.Continue Reading
Limiting bandwidth use during Outlook offline address book syncs
If you're using a newer version of Exchange with a legacy version of Outlook, you'll want to understand your bandwidth consumption and how to control it during OAB synchronization.Continue Reading
Not sure what's running in a virtual machine? Use a batch file
Not all programs perform as expected in virtual machines. These tips will help you quickly find what’s virtual and what’s not using batch files or Windows PowerShell.Continue Reading
Managed service accounts boost server security in R2
Microsoft introduced the managed service accounts feature with Windows Server 2008 R2 to help make the management of apps like Exchange more secure. So how does it work?Continue Reading
Setting PowerShell execution policies in Exchange 2010
Exchange 2010 doesn’t inherently trust PowerShell scripts. Admins can set different execution policies to control when scripts run. Determine which policy is best for your organization.Continue Reading
Repair client access server issues to restore OWA and ActiveSync
A corrupt client access server can bring ActiveSync and OWA to a halt. Our expert explains how to fix your most stubborn CAS problems.Continue Reading
Core Configurator 2.0 puts the GUI back in Server Core
Admins can implement Server Core faster with the latest version of Core Configurator, a GUI-based open source tool for Windows Server 2008 R2.Continue Reading
Simplifying RBAC management in Exchange Server 2010
The new RBAC permission model in Exchange 2010 can be a difficult concept to understand. Breaking it down per-level can be even more confusing. These free tools facilitate RBAC management.Continue Reading
Controlling the output of Windows PowerShell commands
Windows PowerShell features several cmdlets for writing data. Knowing which commands do what can help control the output of your functions and keep your pipelines clean.Continue Reading
Troubleshooting OWA login problems
In the latest edition of the Exchange mailbag, our expert helps a few admins get to the bottom of their peskiest OWA logon problems.Continue Reading
Exposing SMTP and IMAP’s security vulnerabilities in Exchange Server
Even though SMTP and IMAP have built-in features to protect Exchange’s external mail transmissions, both protocols are still susceptible to security vulnerabilities. See how easily both can be compromised.Continue Reading
Weighing MBSA against paid vulnerability scanners
If you’re only looking for the vulnerabilities Microsoft deems most important, then MBSA is your tool. If you need more, you’re better off assessing other commercial vulnerability scanners.Continue Reading
Override default OWA message attachment filters
Is OWA filtering HTML attachments from your users' email messages? Don’t worry -- there’s an easy workaround to this security annoyance.Continue Reading
Potential coexistence troubles during Exchange 2010 migrations
Coexistence issues are a natural part of Exchange 2010 migrations, so keep an eye on client access servers and mailbox databases during the entire upgrade.Continue Reading
Auditing AD administrators with Windows 2008 R2's Event Viewer
When it comes to admin rights, knowing who you can trust is not always easy. But while auditing limitations won’t do you any favors, new features in R2’s Event Viewer can help.Continue Reading
Changing file attributes in bulk with free utility
The updated BulkFileChanger tool gives Windows admins the power to modify files en masse. As for renaming files? Stay tuned.Continue Reading
Error handling with Windows PowerShell
The ability to deal with errors is critical to writing quality PowerShell functions. Here you'll find basic tips for detecting errors and figuring out what went wrong.Continue Reading
Preparing for the inevitable move off Exchange 2010 public folders
Even you're even considering migrating public folders off of Exchange Server, pulling data reports will help you understand which folders are most important and which ones are just wasting space.Continue Reading
Securing Exchange Server communications via SMTP and IMAP
IMAP and SMTP have built-in security features to protect Exchange Server's external mail transmissions. Do these legacy protocols offer enough protection?Continue Reading
How to separate primary and archive mailboxes in Exchange 2010 SP1
If you've already deployed personal archive mailboxes in your Exchange organization, our expert explains how to move them to a separate database in Exchange 2010 SP1.Continue Reading
API Monitor utility traces application performance for Windows
Admins can use updated API monitoring software to hook into API calls and get an inside look at application mechanisms for improved tracking capabilities.Continue Reading
Building an automated permissions management solution with Icacls
Using basic Icacls syntax, admins can create an automated solution to ensure correct network file permissions at all times.Continue Reading
Your BitLocker To Go Active Directory policy options
In the second installment of his two part series, Phil Cox reviews recommended BitLocker To Go settings that should be configured in your organization.Continue Reading
Troubleshooting Jet session issues for Active Directory databases
Unbeknownst to some admins, issues related to Jet sessions can cause Active Directory database performance problems. Learn what to look for -- and how to fix what you find.Continue Reading
Understanding Active Directory operations: The Jet database
Unlock the secrets of how the Jet database engine works within Active Directory and learn to troubleshoot database-related issues.Continue Reading
Free Outlook add-on a must in the developer's toolbox
Whether you're a Outlook development newbie or a seasoned extended MAPI whiz, this free tool shows you the nuts and bolts of MAPI and gives you access to Outlook Object Model objects.Continue Reading
Sysinternals RAMMap utility sheds new light on Windows memory usage
RAMMap, one of the latest offerings from Sysinternals, provides an in-depth overview of server memory usage that can't be matched by native Windows programs.Continue Reading
Role group management commands for Exchange Server 2010
Role group management has changed in Exchange Server 2010. Take a look at which EMS commands you'll need to use to create role groups, add and remove members and more.Continue Reading
Flash Memory Toolkit offers diagnostics, repair tools for USB drives
As USB drives become more popular, so do utilities designed specifically for USB flash drives. The Flash Memory Toolkit includes helpful tools for troubleshooting and repairing USB flash drives.Continue Reading
Uncovering the hidden meeting workspace feature in Outlook 2010
SharePoint meeting workspaces haven't disappeared from Outlook 2010 -- they're hidden. Our Exchange Server expert tells how to find and install this feature.Continue Reading
Configuring VLANs for a flexible Hyper-V environment
With Hyper-V deployments, admins tend to focus mostly on the server, but paying equal attention to the network can minimize issues with scalability and security later on.Continue Reading
Top tools for fixing Windows NTFS corruption issues
There are several utilities out there designed to salvage NTFS data and restore your hard disk, but even the best ones have pros and cons.Continue Reading
Exchange ActiveSync explained
Exchange ActiveSync brings control and security to mobile environments, while providing ease of use to employees. The numerous benefits of EAS are discussed in the first installment of our "Exchange explained" series.Continue Reading
Adding risk management analysis to a disaster recovery plan
Incorporating risk management techniques within your disaster recovery plan will help identify critical business needs as well as other DR solutions.Continue Reading
Using DavMail to access Exchange’s Outlook Web Access from any POP3/IMAP-compatible mail client
You can connect mail clients other than Outlook to an Exchange server using DavMail, a free open source application. Learn what settings need to be tweaked to be operational on Exchange in a Thunderbird or other open source mail client environment.Continue Reading
Resolving Adprep duplicate Link ID errors for Windows Server 2008
Admins need to run the Adprep utility to avoid failure when adding a Windows 2008 DC to a down-level domain. But what if Adrpep itself fails?Continue Reading
Icacls syntax basics: Automating Windows file permissions
Believe it or not, the Icacls tool in Windows can be used to create a fully-automated permissions management solution – once you understand the basic syntax.Continue Reading
Open source distributed file system (DFS) solutions go beyond Windows
Even though DFS is commonly linked to Windows Server, there are several other non-Microsoft options out there as well – and they're free.Continue Reading
Alternative PowerShell commands for Active Directory management
While Microsoft has added many new cmdlets for PowerShell 2.0, admins can also use additional options from Quest Software and other outlets when working with Active Directory.Continue Reading
Create Outlook 2007 rules to organize email
Creating rules in Outlook 2007 will help Exchange Server administrators and users organize inboxes. This tip explains how to create and define different rules.Continue Reading
HWiNFO utility provides free Windows hardware scans and reports
Administrators can find in-depth server hardware information and generate reports with HWiNFO, an updated freeware utility for Windows systems.Continue Reading
Hackers' guide to Windows file server security
Many network hacks can quickly happen right under your nose. Learn to test your file servers from common attacks by taking on the mindset of a hacker.Continue Reading
Exchange unified messaging setup: From start to finish
Setting up an Exchange 2010 unified messaging server in a lab lets you test new UM features before putting them into production. One expert explains a quick and cost-effective approach to this sometimes cumbersome process.Continue Reading
Six ways to improve identity and access management (IAM) for Windows
The evolution of the enterprise has put a huge emphasis on identity management. These steps will help you take control of IAM – before it takes control of you.Continue Reading
Inside the new PowerShell 2.0 commands for Active Directory
Windows Server 2008 R2 comes with a bevy of new PowerShell cmdlets for managing AD. Here is a rundown of the key commands, with details on how they work and when to use them.Continue Reading
How to create an Exchange message-tracking report
Discover the Exchange Management Shell commands you can use to create custom message tracking reports.Continue Reading
Diagnose Exchange Server mail flow failures
Exchange Server is mature and generally stable, but delivery problems can and do occur. Microsoft offers a few tools, including its Message Tracking tool, to get to the bottom of some of the peskiest mail flow problems.Continue Reading
Configuring applications in Windows with Group Policy preferences
Application behaviors can be tweaked and pushed out to your network via a logon script or Group Policy preference. See why choosing the latter could make your life a lot easier.Continue Reading
What's so great about R2's new AD Administrative Center?
Microsoft revamped the way admins manage certain tasks with the ADAC in Windows Server 2008 R2. See how it compares to the AD Users and Computers snap-in from past releases.Continue Reading
The very best Sysinternals tools for Windows server security
Admins can save themselves a lot of aggravation by taking advantage of Microsoft's free Sysinternals toolset. Here are some of the top security utilities available.Continue Reading
A look at Microsoft's Outlook Social Connector
Outlook Social Connector is a new feature in Outlook 2010 that aggregates information from social networking sites and displays it alongside email messages from Outlook contacts.Continue Reading
AD Rights Management Services and the protection within
For IT pros, the days of simply securing the perimeter are long gone. AD Rights Management Services is just one of many solutions designed to help protect data from the inside.Continue Reading
Create hundreds of Exchange 2010 mailboxes for real-world lab testing
Setting up users in a test lab can be a good way to demonstrate various tasks. But what if you want to create hundreds of users? Using a PowerShell script and these instructions, you can create hundreds of users with mailboxes in Exchange Server ...Continue Reading
Free WSUS utility offers on-the-fly patch management for Windows
A new app improves on the process of automated Windows updates – without the need for a WSUS server.Continue Reading
Key considerations for Hyper-V virtual machine deployments
When it comes to server virtualization with Hyper-V, there are certain factors that simply can't be ignored, such as processor needs and storage I/O.Continue Reading