Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
RMS setup tips for multiple Active Directory domains
Phil Cox reviews how to offer rights-protected documents when you have more than one Active Directory domain, including a DMZ. Continue Reading
Say goodbye to Windows logon scripts with Group Policy preferences
In certain scenarios, Group Policy preferences can help admins overcome the challenges and limitations of basic logon scripts. See what you might be missing in this tip. Continue Reading
Fixing certificate mismatch errors in Outlook 2007
When acquiring X.509 certificates to use ActiveSync and OWA on your Exchange 2007 Server, you need to include the correct details in your request. If you don't, certificate mismatches can occur. This tip explains how to troubleshoot those errors. Continue Reading
-
AD Rights Management Services: How to allow remote user access
Phil Cox reviews how to allow your remote users to access RMS-protected documents. Continue Reading
Monitoring Windows DFS health with diagnostic reports
Windows Server 2008 features new reporting capabilities to help admins stay one step ahead of potential DFS replication problems. Continue Reading
Properly analyzing your Windows server vulnerability scan results
Not everything picked up by a vulnerability scan is as critical as some would have you believe. In fact, a lot of it can be taken with a big grain of salt.Continue Reading
Five mistakes to avoid when deploying Hyper-V virtual machines
While Hyper-V is relatively simple to set up, there are still plenty of gotchas to consider. Here are some of the most common configuration blunders that can trip you up.Continue Reading
Benefits of using email-enabled SharePoint document libraries
By email-enabling document libraries in SharePoint, you can share information with co-workers for a set period of time.Continue Reading
Using Group Policy preferences for immediate and scheduled tasks
The scheduling tools in Group Policy preferences let you run a command across an entire infrastructure quickly and easily.Continue Reading
Exchange Server 2007 clustering explained
Read this tip to learn about cluster continuous replication (CCR), standby continuous replication (SCR), local continuous replication (LCR) and other clustering methods in Exchange Server 2007.Continue Reading
-
Why is Microsoft Outlook blocking attachments?
Microsoft Outlook blocks email attachments to protect the Exchange Server organization from malware and viruses. This can be frustrating if it blocks safe attachments. Here are two workarounds you can use to make sure users can open safe attachments...Continue Reading
Five Group Policy preferences you must implement right now
GPPs have a lot to offer the Windows domain, but not everyone takes advantage of them as much as they could.Continue Reading
Troubleshooting KDC 7 event errors when no one else can
Finding the cause of errors logged as Event ID: 7 Source: KDC can be tricky business, especially when the error leads you down the wrong path. These steps will help you find the real cause – and fix it.Continue Reading
Is DirectAccess a threat to Windows security?
DirectAccess may be connectivity nirvana for remote users, but some admins have questions about the security risks involved.Continue Reading
How Exchange Server 2010 Shadow Redundancy prevents message loss
Hub transport servers are more resilient in Exchange Server 2010 because of Shadow Redundancy. See how this feature protects you from message loss – even during a hub transport server failure.Continue Reading
Standalone versus domain-based namespaces in Windows DFS
When setting up namespaces in Windows DFS, be aware that the popular choice may not be the best fit for your environment.Continue Reading
Active Directory Web Services brings new power to R2
Admins running Windows 2008 R2 might be interested in Active Directory Web Services, a new interface for accessing Active Directory and AD Lightweight Directory Services.Continue Reading
How to perform an Active Directory health check
Once your Active Directory is up and running, you do need to perform regular maintenance on it. Expert Joel Snyder reveals some of his best AD tricks.Continue Reading
Backing up SharePoint-related SQL Server databases
Find out exactly which database backup and recovery models you'll need for a full backup and restore of a SharePoint-associated SQL Server database.Continue Reading
Planning for disaster recovery with Microsoft Hyper-V
Virtualization is supposed to simplify disaster recovery, but is Microsoft's Hyper-V up to the task? It can be – if you plan accordingly.Continue Reading
Windows management tips: How to backup and restore Active Directory
If you lose your Active Directory, you lose everything. Expert Joel Snyder lays out a plan to help you backup and restore AD.Continue Reading
Grant users access to another user's Outlook 2007 mailbox
A situation may arise in which you need to delegate one Outlook 2007 user access to open another user's mailbox. Or you may want to monitor a user's mailbox without that user's knowledge. Read this tip to find out how.Continue Reading
Security testing: Finding the best method for your Windows servers
The type of testing you choose can dramatically impact the security of your servers. See which approach is right for your environment.Continue Reading
Windows PowerShell: What you absolutely need to know
You won't get far with PowerShell unless you know the basics. This article breaks down the key components and terminology to get you started.Continue Reading
Three technical skills every IT admin should have
If you're an IT administrator lacking in a technical background, learn all you can about these three fundamental principles. It will make all the difference in your career.Continue Reading
Defining the relationship between Outlook, AD and Exchange Server
Find out how Outlook, AD and Exchange are connected and the roles each play for users.Continue Reading
The anatomy of a Distributed File System namespace
Namespaces in DFS present users with a centralized view of file server resources. This article dissects the basic components of a DFS namespace.Continue Reading
Crash course on Microsoft Outlook 2007 calendar sharing
Microsoft Outlook 2007's calendar is a great way to keep tabs on your schedule and let co-workers know when you're free. Learn how to share your calendar and access other user's calendars.Continue Reading
Active Directory in R2: Features to care about, others to ignore
From the ADAC to managed service accounts, Active Directory in Windows 2008 R2 has several new capabilities. See the ones worth checking out -- and those that probably aren't.Continue Reading
Nine Exchange Server risks you shouldn't overlook
Missing patches, inadequate malware protection and OWA weaknesses can set up your Exchange Server for attacks. What security measures have you overlooked?Continue Reading
What's new in Microsoft Outlook 2010?
Microsoft upped the ante with Outlook 2010 by adding new features to help users increase productivity and become less reliant on the Help Desk.Continue Reading
Disaster prevention strategies for Active Directory forests
While the need to restore an entire AD forest is rare, having a solid forest recovery plan in place can ensure that smaller components like objects and DCs are recovered quickly.Continue Reading
Web server security practices for Windows environments
Web server security is critical to overall network protection. Learn how to harden a Web server and test the security of your deployment.Continue Reading
What is the difference between a priv1.edb and a pub1.edb file?
Find out how to discern between priv1.edb and pub1.edb files on Exchange Server and the type of backup solution you should be using.Continue Reading
Fixing lingering object problems in complex Active Directory forests
Lingering objects can provide an inconsistent view of the Active Directory and confuse administrators. Learn how to find and remove them in complex forests.Continue Reading
How Windows servers get hacked
Server hacking usually isn't as complex as it sounds. Knowing how easily an attacker can hack into your system can provide you with the tools to protect your servers ahead of time.Continue Reading
Message date and send times showing incorrectly in Outlook and OWA
After an IMAP migration, users' mailboxes are showing messages with the wrong date and time. Find out why this may be happening and how to remedy it.Continue Reading
How to find and remove lingering objects in Active Directory
Don't you hate when deleted objects continue to pop up in Active Directory? Learn to troubleshoot the issue with a little AD housecleaning.Continue Reading
Outlook 2007 shut-down problems and fixes
Several issues can cause errors when Microsoft Outlook 2007 shuts down. Finding and diagnosing the root cause should be your first line of defense in preventing future problems. Check the add-in applications that use Outlook's data files to see if ...Continue Reading
Perfmon made easy with PAL utility
Performance Monitor in Windows is a great troubleshooting tool, but analyzing logs can be tedious. Learn to use the free PAL utility to take the time out of troubleshooting.Continue Reading
Working with Active Directory snapshots in Windows Server 2008
Taking snapshots of your Active Directory is a good idea if you plan on making any major changes. This tip walks you through the process of creating and managing snapshots in AD.Continue Reading
Converting Citrix XenServer source machines to Hyper-V format
Migrating from Citrix XenServer to Microsoft Hyper-V is easier than you think. Check out these two different methods for converting your virtual machines.Continue Reading
Should you disable IE ESC, or manage it in Windows servers?
Internet Explorer Enhanced Security Configuration (IE ESC) locks down IE on Windows servers, but admins often disable it.Continue Reading
Troubleshooting Windows application crashes or hangs
A hanging or failed application can be one of the most challenging problems for admins to resolve. Fortunately, several free tools and techniques can be used to help sort things out.Continue Reading
Creating Windows taskpad views for Active Directory management
Large enterprises can't get by with just one Active Directory admin. Learn to use taskpads in Windows to help delegate responsibilities in AD.Continue Reading
Fix Outlook 2007 and SharePoint synchronization breaks
The .pst file that is created when synchronizing Outlook and SharePoint is linked to a user's profile. However, synchronization can break if roaming profiles are being used. There are a couple of settings you can enable to work around this ...Continue Reading
Preventing duplicate SMTP addresses on Exchange
See our expert's advice for dealing with and removing duplicate SMTP addresses.Continue Reading
Connecting Hyper-V hosts to iSCSI targets in Windows
Creating failover clusters is key to ensuring high availability of your virtual machines. Learn to use iSCSI targets for single-site host clusters.Continue Reading
Understand the pros and cons of Microsoft Windows 7 DirectAccess
Discover how Microsoft's Windows 7 DirectAccess can help midsized companies obtain secure remote end-to-edge and end-to-end access, tunneled through a Windows Server 2008 R2 DirectAccess Server. Plus, examine the advantages and limitations of this ...Continue Reading
Using DFSR for SYSVOL replication in Windows Server 2008
With the release of Windows Server 2008, admins can now use DFSR for SYSVOL replication (instead of FRS). The catch? A tricky migration process when upgrading from Windows Server 2003.Continue Reading
How to monitor your SharePoint environment
SharePoint's services are tightly integrated, so creating a multidimensional monitoring strategy is a must to ensure the entire system's availability.Continue Reading
The most useful SharePoint Web Parts
Applying MOSS 2007 Web Parts can add functions to SharePoint and increase user adoption. And best of all, they don't require administrator intervention to install, maintain and upgrade.Continue Reading
Custom error message redirects OWA users
If SSL encryption is required and your Outlook Web Access users forget to type the HTTPS:// prefix, they may receive an error message. Set up a custom error message to redirect OWA users to the correct site using this HTML code.Continue Reading
Microsoft Outlook error message: 'Mailbox Size Limit exceeded'
An Exchange administrator keeps receiving an error message stating 'Mailbox Size Limit exceeded.' See what to check before taking action.Continue Reading
Obtaining and verifying SSL certificates in Exchange Server
Many security features in Exchange Server rely on SSL. Obtaining trusted certificates can tighten security and boost performance for SSL-based applications, including OWA and Exchange mobile devices.Continue Reading
How SQL Server recovery models impact your SharePoint databases
SharePoint administrators can minimize data loss by selecting the appropriate SQL Server recovery model. But which model is right for your enterprise?Continue Reading
Document version control goes deeper in SharePoint 2007
MOSS 2007 has the ability to differentiate between major and minor versions, but that adds to its complexity.Continue Reading
Migrating virtual machines from Microsoft Virtual Server to Hyper-V
Upgrading from Virtual Server 2005 to a Hyper-V environment? This tip breaks down the steps to converting your old virtual machines to the Microsoft Hyper-V format.Continue Reading
Debugging Windows client logon delays: Narrowing the scope
There are several potential causes of slow client logons. The question is, once you find the source, how do you fix it?Continue Reading
Exchange admins: Is it time to rethink your email address policy?
How can an email address policy setting affect your Exchange Server organization's overall security? And is it time to change that policy? Let's find out.Continue Reading
Common causes of Windows server security vulnerabilities
When it comes to Windows security most organizations are making the same mistakes, but there are ways to avoid these slipups.Continue Reading
Troubleshoot Microsoft Outlook Web Access problems
When logging on to Microsoft Outlook Web Access (OWA), unexpected problems can occur. This tutorial explains how to diagnose some tricky OWA problems and login issues, gives tips on how to fix IIS metabase corruption and more.Continue Reading
Simple tools and techniques for finding Windows memory leaks
Symptoms of a memory leak can show up long before a server fails. Check out these tips for catching a leak early and plugging it up.Continue Reading
File classification the automated way with Windows Server 2008 R2
Windows Server 2008 R2 offers the new File Classification Infrastructure, simplifying the content administration of network files in Windows environments.Continue Reading
Using Active Directory to manage Macs in a Windows environment
He's a Mac, she's a PC, and you're a Windows admin. Learn to integrate Mac OS X clients into your Windows environment without causing AD headaches.Continue Reading
Restore contacts from an Exchange public folder
Learn the best methods to restore contacts that were stored in an Exchange public folder.Continue Reading
Troubleshooting poor Windows logon performance in Active Directory environments
Battling slow client logon times is a common (and frustrating) problem for Windows admins. Find the steps to quickly diagnose and resolve these issues when they crop up.Continue Reading
Sending poll questions through Exchange to non-Outlook users
Learn if you can send out polling questions through Exchange Server to recipients who don't use Microsoft Outlook.Continue Reading
Top Windows server hardening standards and guidelines
Take a look beyond the basics of server hardening and learn about the most common policies and standards for ensuring Windows server security.Continue Reading
Troubleshooting Windows print spooler crashes
Wondering why your print spooler keeps crashing? This tip teaches you to troubleshoot and repair print spooler problems and issues for Windows networks.Continue Reading
Disable ActiveSync in bulk with Exchange Management Shell commands
With this Exchange Management Shell script, you can disable 5,000 or more ActiveSync device users in Exchange Server 2007, securing sensitive data from potential loss.Continue Reading
Troubleshooting your toughest Windows server crashes
Learn to debug some of the toughest Windows server outages by using crash dump analysis and a few simple commands to locate faulty drivers.Continue Reading
Does Microsoft SharePoint make a good email archiving solution?
After overhearing one Exchange Server administrator mention that he was using Microsoft SharePoint for email archiving, contributor Brien Posey wondered if this was a good idea. Read about how one Exchange Server expert set up SharePoint as an email...Continue Reading
Eight steps to accomplishing your IT career goals
Stand out from your colleagues. These eight steps can help you achieve your IT career goals and take control of your career.Continue Reading
Performing a remote wipe on ActiveSync devices in Exchange Server 2007
Exchange Server 2007 natively supports remotely wiping of ActiveSync mobile devices. This capability required an add-on to Exchange Server 2003 and the final result was not nearly as polished and easy to use as it is in Exchange 2007. Learn ...Continue Reading
Fix 'Service unavailable' errors and other common OWA login problems
Common Outlook Web Access (OWA) logon errors involve unavailable service or inheritance errors. Causes for these errors can range from the use of mismatched ASP.NET versions on an OWA Server to incorrect user permissions. This tip explains why users...Continue Reading
How to keep IIS logs from filling up your server hard drives
IIS log files can take up a lot of space on your servers' hard drives if you don't clean them up regularly. But who has time for that? Check out this simple script to automatically delete IIS logs and clear space on your Windows servers.Continue Reading
Will a degree or certification help enhance your IT career?
Before you plunk down tuition fees to enhance your IT career, here's some advice on education options, cost considerations and on keeping your sanity when time constraints rule your world.Continue Reading
A seven-step disaster recovery planning checklist for Windows
This disaster recovery planning checklist will help Windows shops build a solid DRP to avoid data loss and comply with a wide range of laws and industry standards.Continue Reading
How to install the Change Request Management template in MOSS 2007
Integrating change management into SharePoint 2007's document library can be a little easier if admins install the change request management template.Continue Reading
Self-healing NTFS keeps admins one step ahead of data corruption
While it's not perfect, the new self-healing NTFS has several benefits over past Windows file systems. Learn to avoid data corruption with this new feature in Windows Server 2008.Continue Reading
Troubleshooting Microsoft Outlook Web Access logon issues
Are you experiencing problems logging into Microsoft Outlook Web Access (OWA)? Although OWA isn't the most complicated application, its numerous deployment options can cause problems. In this tip, Exchange Server expert Brien Posey explains ...Continue Reading
Defining system stability helps improve change management processes
Keeping track of changes made to Windows can be difficult, especially if there's no way to determine the system's stability. Fortunately, there are guidelines IT managers can use to define policies, practices and procedures to proactively ensure ...Continue Reading
The efficacy of backup-as-a-service solutions
Online backup services can lower costs and help eliminate the administrator's worst nightmare – the lost backup. But is BaaS right for your organization?Continue Reading
Group Policy Object modeling simplifies network security
Group Policy modeling is a great security tool for troubleshooting Group Policy settings and testing GPOs before they are applied with Windows Server 2008.Continue Reading
Implementing change management in the Windows server environment
Creating a baseline server configuration and documenting all updates thereafter are two techniques admins can use to implement change management in their Windows server environment. Learn the steps involved in creating a standard server ...Continue Reading
How to revoke and delete Active Directory user certificates
In this Ask the Expert Q&A, our identity and access management expert examines how to set up Active Directory autoenrollment feature to revoke and delete user certificates on the Certificate Authority (CA) automatically.Continue Reading
Four steps to creating practical SharePoint governance standards
Many of the qualities that make SharePoint accessible can also cause problems for those responsible for governance. To keep their SharePoint environment under control, IT managers should create SharePoint governance standards. Learn how to do so in ...Continue Reading
Using WBAdmin to create backups in Windows Server 2008
Who needs a GUI? Check out how the WBAdmin command allows you to perform Windows Server Backup functions from the command line.Continue Reading
Taming the LSASS.exe process for Active Directory performance and security
Many admins have trouble understanding how the Local Security Authority Subsystem works. This article breaks down the purpose of LSASS and explains why it can sometimes result in network performance problems.Continue Reading
What are the pros and cons of a hosted Exchange Server deployment?
Microsoft offers traditional Exchange Server licenses and cloud computing-based Exchange Server subscriptions. This raises the question of which licensing model makes sense for your enterprise. Is it better to use a traditional Exchange Server ...Continue Reading
Prompt Microsoft Outlook users to save sent email messages
Discover how to program Microsoft Outlook into prompting users to save each of their sent email messages.Continue Reading
A quick guide to Server Manager for Windows Server 2008
New to Windows Server 2008, the Server Manager feature can be a huge benefit to admins – once they figure out where to find everything. This article gives you a crash course on everything Server Manager has to offer.Continue Reading
Restrict access to Outlook Web Access via Exchange System Manager
Learn how to configure Exchange System Manager (ESM) to restrict certain users from accessing Outlook Web Access (OWA), without limiting users' LAN access.Continue Reading
Implementing simple Network Access Protection for Windows Server 2008
The installation process for Network Access Protection in Windows Server 2008 is easier than you think. Learn the basics of implementing NAP in your environment.Continue Reading
Creating a SharePoint site map using out-of-the-box features
Giving SharePoint site owners the power to manage their own part of the SharePoint site map frees up administrators to manage more critical areas of the SharePoint environment.Continue Reading
Can Microsoft Hyper-V meet high availability requirements?
While Hyper-V does not support live migration, admins can rely on Windows Server 2008's internal tools to avoid service interruptions for end users.Continue Reading
Troubleshooting Apple iPhone and Exchange Server integration issues
Find out how to configure Exchange ActiveSync to synchronize Apple iPhone and Exchange Server email, calendars and contacts. You'll also get tips and advice on how to avoid common iPhone and Exchange Server setup issues; how to mitigate iPhone ...Continue Reading
Troubleshooting why some Microsoft Outlook 2007 email disappears
Exchange Server users have reported that their Microsoft Outlook 2007 email messages mysteriously disappear and then reappear later from their Sent Items or Deleted Items folders. Is this due to a configuration issue? Is it a latency issue? In this ...Continue Reading
How to custom-configure a Microsoft Outlook 2007 install using OCT
Installing and configuring Microsoft Outlook in an identical fashion throughout your organization gives users a uniform experience when accessing a workstation. Unfortunately, Microsoft's installation wizard doesn't provide many customization ...Continue Reading