Tips
Tips
Windows systems and network management
-
Use SLAs to assign help desk incident priorities
Service-level agreements help service desks categorize and prioritize IT incidents according to an organization's strategic plan. Continue Reading
-
How to automate Windows Server 2003 defrag
Learn how to set up Windows Server 2003's DEFRAG command-line tool so it runs without the need for manual administrative maintenance. Continue Reading
-
Sysinternals TCPView monitors network connections on Windows systems
Learn how to use Sysinternals TCPView 2.51, the network monitoring tool from Mark Russinovich that keeps track of endpoint connections and processes on your Windows desktop and server systems. Continue Reading
-
Why detective controls are important in change management
Change is a way of life in Windows IT shops. By using detective controls, Windows managers can minimize the risks associated with changes to production services. Continue Reading
-
How to reverse NTFS object ownership from administrators to object's creator -- and why
When an admin adds their personal user account to the Administrators group and then creates an NTFS object, Windows sets the object's owner to the administrators and not to its creator's account. By completing these six simple steps, admins can ... Continue Reading
-
Troubleshooting account lockouts in Group Policy
While the account lockout setting in Group Policy is designed to protect systems from attackers, it can also be an inconvenience to users. Directory services expert Gary Olsen explains how to troubleshoot account lockout issues and offers tips for ... Continue Reading
-
Unlocking Group Policy account lockout secrets
While Microsoft designed the account lockout settings to protect your environment from attackers, they can also be a real inconvenience for users. Directory services expert Gary Olsen explains how to get the security you want from the Account ... Continue Reading
-
Tracking help desk tickets: Policies and procedures
Your help desk gets a lot of requests, so how should you keep track of what's coming in and what gets the highest priority? Learn how to analyze data to create and implement a finely tuned help desk policy. Continue Reading
-
ReplMon still tops for troubleshooting Active Directory replication
Though it's been around for nearly seven years, ReplMon is still a very powerful tool for monitoring and troubleshooting all aspects of Active Directory replication. Continue Reading
-
A guide to the Microsoft Windows Server 2003 Resource Kit Tools
Microsoft's oft-ignored Windows Server 2003 Resource Kit Tools can help administrators deal with issues such as troubleshooting operating system issues, managing Active Directory, configuring networking and security features and automating ... Continue Reading
-
Can freezing a hard drive that's crashed restore it to life?
You may be able to bring a hard drive that has crashed or cannot mount back to life by leaving it in the freezer overnight. Not every hard drive having problems responds to this treatment, but in some cases it does seem to work. But why? Here's the ... Continue Reading
-
Create batch file to log chkdsk results
You can use the AT command in Windows to schedule chkdsk to automatically run on a daily basis. The problem with this technique is that chkdsk results are quickly flashed on the screen, then disappear. If you're not sitting at the server console ... Continue Reading
-
Limiting LDAP searches with MaxPageSize
Directory services MVP Gary Olsen explains why modifying the MaxPageSize attribute can cause problems for Active Directory and suggests some tools for troubleshooting those issues. Continue Reading
-
How to properly authenticate a Linux client in a Windows domain
MVP Gary Olsen describes the step-by-step process of configuring a Red Hat Fedora client into a Windows Server 2003 domain. Continue Reading
-
Locate removable device IDs for Group Policy settings
Brien Posey, MCSE, discusses how you can locate the different device IDs required in order to restrict removable device usage in Group Policy settings. This is the third tip in a three-part series on preventing the use of removable storage devices. Continue Reading
-
Case Study: Troubleshooting Distributed File System Replication
One of the difficulties with DFSR is that many admins still try to troubleshoot it using FRS methods. MVP Gary Olsen offers a case study to exemplify the proper techniques for debugging DFSR. Continue Reading
-
Getting to know the read-only domain controller for Windows Server 2008
One of the most common questions surrounding the new Active Directory technologies for Windows Server 2008 involves the read-only domain controller. Active Directory expert Laura E. Hunter breaks down the key details of the RODC and how it can ... Continue Reading
-
Multi-core systems vs. multi-CPU systems
Can you get better performance from a dual-core system or a dual-processor system? This article evaluates the two configurations and determines that multi-core chips tend to be more efficient than multi-CPU systems. Continue Reading
-
Prevent removable device usage with Group Policy settings
Secure your Windows system even more by preventing the use of removable storage devices with these Group Policy Object settings. This is the second tip in a series on this topic. Continue Reading
-
Understanding DFSR for easy configuration of Active Directory replication groups
Though Microsoft DFSR is clearly better than FRS, many admins still don't know how to properly deploy it. Directory services expert Gary Olsen explains how to use DFSR to configure replication groups for backing up remote sites. Continue Reading
-
Incident management made easier with Microsoft Service Desk
Expert Stuart Galup gives the skinny on Microsoft's help desk software, called Service Desk, and explains why help desk software and automated incident management can make your life a lot easier. Continue Reading
-
SLAs and service-level management: What does it mean for Windows managers?
Windows service-level management is a business process for managing Windows user service requirements in an IT environment. A key component of a Windows service-level management plan is a service-level agreement (SLA). Expert Harris Kern explains ... Continue Reading
-
How to terminate SCSI devices
Termination is the practice of placing a terminator at the end of a chain of SCSI devices. The terminator prevents an echo, which disrupts communications along the SCSI bus. Continue Reading
-
Use RunAsDate freeware to set system time and date for programs
RunAsDate freeware allows systems administrators to run any program as though the system time and date were set to a different clock. Continue Reading
-
Secure removable storage devices via Group Policy in Vista
While disabling or "gluing" a USB drive can help to prevent serious threats from entering your network, there is always a workaround. However, Vista allows you to disable such drives using Group Policy. Find out how it works in this tip. Continue Reading
-
Work around Windows' hidden tooltip issue
Every now and then, the Windows tooltips that show when you hover the mouse over any element in the Taskbar or System Tray inexplicably appear behind the Taskbar. Microsoft has never come out with an official fix, but here are some workarounds. Continue Reading
-
Case Study: How to force immediate Active Directory replication for all core sites
Just how fast can replication take place in your Active Directory network? You might be surprised. Systems software expert Gary Olsen presents a case study on how to use intrasite replication to achieve convergence of all core sites in one Active ... Continue Reading
-
AGDLP reduces account management, permissions management headaches
AGDLP is a practice that can greatly reduce your administrative headaches related to account management and permissions management. Continue Reading
-
Crimping RJ-45 connectors onto CAT6 cable
Crimping RJ-45 connectors onto CAT-6 cable can be particularly frustrating, because CAT-6 is quite a bit thicker than CAT-5 cable. Here are some techniques to make the process of installing RJ-45 connectors easier. Continue Reading
-
Windows Server 2008: A look inside the new features for Active Directory
With the release of beta 3 for Windows Server 2008, code-named Longhorn, interest in Microsoft's new server OS has grown within the Active Directory community. Gary Olsen details some of Windows Server 2008's most important new features for Active ... Continue Reading
-
Remote Desktop Protocol as an alternative to a KVM switch
KVM cables can only be so long. Wireless KVM is expensive. In certain situations, Remote Desktop Protocol is a viable alternative to a KVM switch. Continue Reading
-
Daisy-chaining SCSI devices
With SCSI, you can daisy-chain (physically wire) multiple devices together. However, if you're considering daisy-chaining multiple SCSI devices together, you should know the SCSI bus will only support a certain number of devices. Continue Reading
-
When authentication fails: Troubleshooting Windows time services
Authentication issues caused by time services can result in a lot of problems concerning Active Directory security. Fortunately, they can be easy to fix if you have the right tools. Continue Reading
-
Use System Information reporting tool to view all Windows Vista system settings at once
Once you've deployed Vista, you'll undoubtedly start installing printers, drivers and applications. While many admins currently have to deal with multiple Control Panel windows when locating these devices, Windows Vista's System Information program... Continue Reading
-
You can run Windows XP from an external USB hard drive
Although Microsoft says it's not possible to run Windows XP from an external (USB) hard drive, Ngine Software has created a guide to building an installation of Windows XP that can be booted from an external USB hard drive. Continue Reading
-
Process Monitor tool gets around shortcomings of Microsoft Windows
The Windows operating system does not provide a troubleshooting tool that allows you to clean up a system infected with malware, see how your files have changed or monitor registry processes and threads. Microsoft's new Process Monitor tool does ... Continue Reading
-
Time services: A closer look at Windows authentication
Proper Windows authentication is crucial to maintaining a secure environment. Active Directory expert Gary Olsen explains the important role that time services plays in Kerberos functionality. Continue Reading
-
Group Policy management: Disabling CMD
You can disable CMD in Group Policy in two steps according to Wes Noonan, our Windows-based network infrastructure security design expert. In this tip, he'll tell you how to prevent your network users from enabling CMD. Continue Reading
-
Create and manage hardware profiles
Hardware profiles, which are set by a systems administrator, describe which pieces of hardware are enabled or disabled when a system is booted under a given profile. They eliminate the process of Windows having to redetect hardware. This tip will ... Continue Reading
-
A disciplined approach to the Windows change management process
Change management is a simple concept, but the process can be complex. Expert Harris Kern highlights the IT staff's roles in the Windows change management process. Continue Reading
-
Free up disk space on your C: drive
Do you have a Windows PC with a system disk that is nearing capacity? Or do you just want to reclaim some disk space? These tips may help you to free up space. Continue Reading
-
Kerberos protocol: What every admin should know about Windows authentication
Kerberos can be a difficult protocol to understand for some Active Directory admins, so it's best to start at the beginning. Expert Gary Olsen describes the basics of how Kerberos authentication and authorization works for Windows. Continue Reading
-
Disaster recovery planning: The execution methodology
There are certain methods to creating a solid disaster recovery plan that every IT manager should follow. Expert Russell Olsen breaks down the key steps to proper disaster recovery planning. Continue Reading
-
Case Study: Troubleshooting a logon script problem using Userenv and GPE logging
Understanding the value of Userenv and GPE logs is only half the battle. Software engineer and author Gary Olsen shares a case study to demonstrate how the logs can be used in a real-life situation. Continue Reading
-
Naming workstations on a Windows network
There's no such thing as a perfect naming scheme for every computer on a Windows network. Here are some thoughts on naming network hosts. Continue Reading
-
Remote control of Windows PCs simpler through PsExec than Remote Desktop
The Remote Desktop feature is the most common way to control a Windows box remotely, but sometimes you need something simpler than Remote Desktop. The command-line utility PsExec from Mark Russinovich lets you run a remotely executed command instead... Continue Reading
-
Debugging user profile and GPO problems with Userenv logs
Expert Gary Olsen walks through the basics of the Userenv.log file and shares some useful case studies that illustrate how to use Userenv to debug problems involving the user environment. Continue Reading
-
Multi-core processors: Their implication for Windows
A Windows OS is totally unprepared to handle large numbers of processor cores. So what if Intel does indeed succeed with its plan to mass-produce a tetraflop processor by 2012? Continue Reading
-
Diagnosing non-maskable interrupt signals
While non-maskable interrupt (NMI) error messages are common to the Windows platform, determining what causes them can be difficult. Discover how and why NMI error messages are generated and which Windows hardware issues often cause them. Continue Reading
-
Optimizing server placement in branch offices and WANs
Branch office networking is tricky. Here are some different approaches for establishing a WAN link between the servers in the branch office and those at corporate headquarters. Continue Reading
-
Using Netmon to analyze network traffic in Windows Server 2003
The Network Monitor tool can be considered both a network troubleshooting tool and a packet analysis tool. But the version of Netmon that comes with Windows Server 2003 allows only the capture of frames sent to and from your local server. Continue Reading
-
Fix USB audio problems like sputtering or glitching
USB audio often suffers from sputtering or glitching— playback riddled with clicks and pops. The bitstream is being interrupted, and the cause is hardware-related. Continue Reading
-
Best practices for DNS structure design
The dream of having an efficient Active Directory can live or die with how well DNS is designed. Expert Gary Olsen runs through the basic principles to be aware of when designing the DNS structure. Continue Reading
-
Switch between Remote Admin, App Server modes in Terminal Services
Here are some simple steps that will allow admins to switch between Remote Administration and Application Server modes in Terminal Services. Continue Reading
-
Use System Monitor to find bottlenecks in Windows Server 2003
Windows Server 2003 comes with two performance monitoring tools: System Monitor, and Performance Logs and Alerts. These tools provide information that administrators can use to find bottlenecks and for troubleshooting Windows. This tip tells you ... Continue Reading
-
Finding memory leaks using Performance Monitor
Locating a memory leak in Microsoft Windows often involves watching Performance Monitor counters and interpreting the results. Continue Reading
-
DNS best practices: Making AD rock-solid
Some consider DNS to be the heart of Active Directory, and like any heart, it is important to keep it healthy. Expert Gary Olsen offers his set of best practices for maintaining a secure and properly configured DNS. Continue Reading
-
Simple WMI tricks for AD administrators
Windows Management Instrumentation (WMI) can be a great asset for Active Directory admins. Expert Gary Olsen offers useful WMI tips and tricks for locating and gathering information from objects in an enterprise. Continue Reading
-
Microsoft's daylight-saving time (DST) patch -- Does it matter to AD?
Who would've thought that expanding the dates of daylight-saving time would cause so many problems for IT administrators? Expert Gary Olsen analyzes what the changes mean to Active Directory regarding domain operations. Continue Reading
-
Switch between Remote Desktop windows
Admins who rely on Remote Desktop will often have multiple connections simultaneously. With each one in a separate window, switching between them on the fly can get pretty unwieldy. Now there's a freeware tool to allay this problem. Continue Reading
-
Control users' Internet access
Here's a method of controlling users' Internet access in an Active Directory environment. Continue Reading
-
Remote Desktop Connection tool resolves Vista and XP snafu
When you attempt to connect to Windows XP via Remote Desktop from a Vista machine, you get a warning message. To address the problem, Microsoft just released Remote Desktop Connection 6.0 client tools for Windows Server 2003 and XP. Continue Reading
-
When Active Directory replication fails: Debugging Event ID 1311
Perhaps the most infamous Active Directory replication error is Event ID 1311. But how do you resolve it? Expert Gary Olsen breaks down all of the factors you must consider when troubleshooting the error. Continue Reading
-
Configuring DNS server properties
When followed correctly, DNS is fairly simple to use in Active Directory. However, it's even easier when you understand certain configurations. Expert Gary Olsen breaks down the DNS complexities that every admin should know about. Continue Reading
-
View and manage all connected USB devices
A utility called USBDeview lets admins view all USB devices currently connected to a PC, as well as manage these USB devices more efficiently. Continue Reading
-
StickyKeys: Turning off accessibility keyboard shortcuts
One "hidden" feature in Windows is a series of keyboard commands that turn on accessibility functions for the disabled. People who turn these commands (like StickyKeys) on by accident may think their keyboard is malfunctioning. Here's how to disable... Continue Reading
-
Group Policy: Prevent unwanted software installation
In this series, expert Jeremy Moskowitz shows readers how to designate specific administrators to specific PCs and apply updates to traveling laptops. Continue Reading
-
Replication upgrades make DFS ideal for low-bandwidth branch offices
While DFS has been around since the days of Windows NT 4.0, improvements made to DFS in Windows Server 2003 R2 make it much more attractive for Windows systems administrators. In particular, there have been advances in the areas of replication and ... Continue Reading
-
Using ADFind.exe when LDIFDE fails you
Different Active Directory tools are better suited for different situations. Expert Gary Olsen provides details for how using ADFind is sometimes better than LDIFDE when listing group SIDs in a domain. Continue Reading
-
Maximize Internet Explorer screen
When Internet Explorer opens it can range in size anywhere from that of a postage stamp to almost filling the screen. Find out how to maximize the screen. Continue Reading
-
RAID levels for Windows environments
This tip describes the eight RAID levels, their associated characteristics and the types of applications they can best benefit. Continue Reading
-
Repairing digital signature issues in Windows XP
Microsoft supplies digital signatures for key Windows components to insure that they're genuine, as a way to prevent unauthorized parties from substituting in device drivers or system .DLLs. However, if the subsystem that confirms digital ... Continue Reading
-
Group Policy deployment for server hardening
Learn how to deploy Group Policies to one of the four levels of Active Directory: an Active Directory site, a local computer, an organization unit or a domain. Continue Reading
-
Group Policy: Applying automatic proxy settings and modifying registry keys
In this series, expert Jeremy Moskowitz shows readers how to modify registry keys in Windows XP, confirm that user permissions are correctly configured and more. Continue Reading
-
Three disk defragmentation issues defined
Since fragmentation still exists and remains a problem, admins should defragment regularly. But because defragging can become an obsesssion, balancing it against other actions like buying a larger hard disk drive or more memory would be wise, says ... Continue Reading
-
Disable checksum offloading to resolve network slowdown caused by Windows Firewall
Windows Firewall has an issue with some network adapters that support a hardware feature called checksum offloading. While there's no complete fix, there is a workaround. Continue Reading
-
Restore shadow copies from command line with volrest tool
Volrest, a command-line tool in the Windows Server 2003 Resource Kit, can help administrators search for files on a server while restoring shadow copies. Continue Reading
-
RADIUS simplifies administration of remote access servers
If you have more than one remote access server, the administration of remote access policies can quickly become cumbersome. One way around this is to configure a single computer running Windows Server 2003 and IAS as a RADIUS server and configure ... Continue Reading
-
Active Directory for Windows 2000 and 2003: What's the difference?
A common question among IT admins involves the differences in Active Directory for Windows 2000 Server and Windows Server 2003. Expert Laura E. Hunter breaks down the key changes that took place in Active Directory when the new operating system was ... Continue Reading
-
Create a console to manage remote servers, systems
By creating a custom Microsoft Management Console called the Remote Desktop Console, you'll be able to better manage your systems than with the normal Remote Desktop interface. Continue Reading
-
Fixing Microsoft Word's mysterious tiny cursor
No one is quite sure what causes the "tiny cursor" problem in Microsoft Word, but here are two workarounds. Continue Reading
-
Why .NET Framework process uses 100% CPU
If a .NET Framework process named MSCORSVW.EXE is constantly running at 100% CPU, it is either compiling high priority assemblies, which need to be completed as soon as possible, or else there's something wrong with the .NET installation. Here's how... Continue Reading
-
LUA Buglight utility finds program failures due to limited user account bugs
The utility called LUA Buglight helps systems administrators determine if a program's failure is due to a limited user account bug. Continue Reading
-
Show open documents as separate windows on the taskbar
Some applications don't show your open documents as separate windows on the taskbar, which prevents you from switching to a specific document. This tip explains how you can get quick navigation in Microsoft Word, Excel, and PowerPoint. Continue Reading
-
Using the NETSETUP.log to debug domain join problems in Active Directory
One of the most overlooked features of MPS Reports is the NETSETUP.log. Expet Gary Olsen breaks down the tool and explains its value when troubleshooting Active Directory. Continue Reading
-
Running 32-bit apps in x64 Windows: Registry redirection
When a 32-bit application is run on top of an x64 version of Windows, the WOW64 emulator redirects the Program Files folder and calls to DLL files. But this emulator also redirects certain portions of the Windows registry. This article will show you... Continue Reading
-
How to fix inconsistent time or time-zone settings
If a program inserts a TZ variable into a system's environment variables, the system may report the wrong time zone and the wrong Daytime Savings Time setting. Here's how to remove a TZ variable. Continue Reading
-
Run 32-bit applications on x64 Windows servers
Because most applications are 32-bit, the x64 version of Windows makes use of an emulator known as WOW64 to allow 32-bit applications to run. Continue Reading
-
Netsh Winsock Reset command fixes Windows Firewall error
Admins can use the Netsh Winsock Reset command to resolve the error message that Windows cannot start the Windows Firewall service. Continue Reading
-
A guide to server system interconnects
Interconnects (often referred to as buses) move data (or program instructions) from one place to another on a server. Interconnects are characterized by three key properties: bandwidth, latency and connectivity. Continue Reading
-
Use verbose logging to troubleshoot in Active Directory
Using event logs to troubleshoot in Active Directory is a great trick, but what if you don't have enough data? Expert Gary Olsen discusses the benefits of verbose logging and some diagnostic tools to help troubleshoot your AD environment. Continue Reading
-
Simple Active Directory tricks: Event logs
When troubleshooting a problem, looking through event logs in Active Directory can make you crazy. Read expert Gary Olsen's tricks for making the process less tedious. Continue Reading
-
Automate Active Directory tasks with scripts
Scripting can be very useful in automating Active Directory tasks. This tip provides a consolidated script that demonstrates a number of Active Directory related tasks you can automate using VBScript. Continue Reading
-
Installer hangs when upgrading or removing .NET Framework
A problem is encountered when trying upgrade or remove an edition of Microsoft's .NET Framework. The installer (or uninstaller) hangs when trying to register (or unregister) a number of the .NET .DLLs. Continue Reading
-
Restrict USB pen drive access on XP networks
This tip tells you how to disable the USB Pen Drive installation mechanism on a Windows XP network. Continue Reading
-
Use VBScript to rename mapped drives
Through a bit of simple registry editing or a VBScript, you can easily rename mapped drives to hide share paths or make the drive name user-friendly. Continue Reading
-
Where does your client's security policy actually come from?
Your clients could be getting different domain-enforced security settings than what you defined in your domain policy. Continue Reading
-
When an Active Directory design goes bad -- and how to fix it
Sometimes the best way to learn how to do something right is by examining someone else's mistakes. Expert Gary Olsen presents a poorly designed Active Directory replication topology, and leads the way toward fixing some common design flaws. Continue Reading
-
Best practices for Active Directory replication topology design
A well-designed replication topology is the key to an efficient Active Directory infrastructure. Expert Gary Olsen highlights the most important rules to live by when designing topologies for large, complex networks. Continue Reading
-
Server power consumption: How not to overload a circuit
How many servers and peripherals does it take to overload a circuit? Some simple calculations will save you a lot of trouble. Continue Reading