Tips
Tips
Windows systems and network management
-
Conserve svchost.exe memory by disabling Automatic Updates
If your svchost.exe process seems to be consuming an inordinate amount of RAM and/or virtual memory, the culprit may be Windows Automatic Updates. Continue Reading
-
Turn off Desktop Cleanup Wizard via Group Policy
Are your users missing icons on their desktops that used to be there? The problem may be the Desktop Cleanup Wizard. Find out how to easily disable the DCW via your Group Policy. Continue Reading
-
GPO replication: Understanding the ins and outs
Replication services for Group Policy Objects are key to the stability of a GPO. Expert Derek Melber breaks down the process for GPO replication, and explains how to ensure a more stable environment. Continue Reading
-
Bad capacitors – how to recognize and replace them
Capacitors, components found on many motherboards, are prone to failure. Here's a look at what causes bad caps in motherboards and what you can do when that happens. Continue Reading
-
Active Directory tools ease import/export of data
Expert Gary Olsen explains how to use LDIFDE import and CSVDE export features to better manage your Active Directory architecture. Continue Reading
-
Existing user account names: Don't rename them, migrate them
Rather than rename a user account that's been in use for some time, it's better to create a new user profile with the proper name and migrate the old profile into the new one. Continue Reading
-
Discover the 'hidden' user control panel in Windows XP
Find out about the features of a hidden control panel in Windows XP which provides user options that normally aren't available. Continue Reading
-
Quick Tips: Determine the installation date of Windows
The following command helps you to determine the installation date and time of a Windows XP/2003 computer. Continue Reading
-
Setting up workstations with Remote Installation Services
In larger companies, there are two popular options for streamlining the task of manually setting up workstations: disk imaging and Microsoft's Remote Installation Services (RIS). Continue Reading
-
Moving DHCP database to a new server
Follow the steps in this tip to configure a new DHCP server and move the current DHCP database from the old server to the new server. Continue Reading
-
Use Microsoft's Windows Memory Diagnostic to test for bad computer memory
Bad memory is one of the main reasons for random system failures. Microsoft now offers its own tool to test for memory problems. Continue Reading
-
Checking access permissions with Server Share Check
Windows Server security permissions can get confusing. Contributor Brien M. Posey explains why NTFS permissions are better than share level permission and how to check permissions with Server Share Check. Continue Reading
-
Creating an administrator password reset disk
As an administrator, it's a good idea to create a password reset disk in case you forget your password. This tip explains how to do this. Continue Reading
-
Rebuild TCP/IP stack in Windows XP when all else fails
Find out how to rebuild the TCP/IP stack to the pristine condition that it was in on a clean install using the NetShell utiltiy. Continue Reading
-
Mastering the LDAP search filter, Part 2
LDIFDE is a powerful command line tool that with a little practice, can easily extract specific information about AD objects. Expert Gary Olsen explains how to limit your search by way of an object class LDAP filter. Continue Reading
-
Open the command prompt from right-click menu
Save time and add an option to your right-click context menu that will open a command prompt at your current folder. Continue Reading
-
Mastering the LDAP search filter
Expert Gary Olsen breaks down the principles of the LDAP search filter, making it easy for an admin to formulate whatever search he or she wants in Active Directory. Continue Reading
-
AccessChk utility audits user access to files and directories
To maintain security, administrators often need to know what kind of accesses specific users or groups have to resources, including files, directories and registry keys. A tool called AccessChk can help answer those questions. Continue Reading
-
Leave spread spectrum clocking disabled
Many PC devices, most notably motherboards, hard drives and controllers, have spread spectrum clocking (SSC) functions to control how much electromagnetic interference (EMI) they put out. It's best to leave this feature disabled. Turning on SSC may ... Continue Reading
-
Active Directory LDAP scripting made simple
It is important for every admin to have an understanding of LDAP when searching for information in Active Directory. Expert Laura E. Hunter breaks down the syntax into its component pieces and provides some essential tips for Active Directory ... Continue Reading
-
Does XP support multiple processor cores?
Does Windows XP Home support multiple processor cores in a single physical processor? A look at Intel's Hyper-Threading technology and AMD's X2 dual core series may resolve the question. Continue Reading
-
Use Terminal Services Manager to manage users, sessions, processes
If users are accessing servers using the Remote Desktop connection, the utility Terminal Services Manager can help you check which user is connected to a particular server and which processes he has started. Continue Reading
-
How to change the Windows XP Product Activation Key Code
Find out how to check if your Windows XP systems are using a leaked key, and how to change the product activation key if they are. Continue Reading
-
Terminal Services: Multiple time zones and only one terminal server
In this series, Expert Christa Anderson helps readers solve USB printer issues with Terminal Services, as well as configuring Remote Desktop Web for access through ISA. Continue Reading
-
Extracting Active Directory info quickly and easily with LDIFDE
Gathering data in Active Directory can be a simple task if you know the right commands. Expert Gary Olsen offers a few helpful scripting tips for LDIFDE. Continue Reading
-
The effects of GPO version numbers on Group Policy replication
The relationship of the version numbers for the Group Policy Template and Group Policy Console of each GPO are important for proper Group Policy replication. Expert Derek Melber discusses this relationship and explains why the numbers don't always ... Continue Reading
-
Project management capability now available in freeware
Gantt-charting software has traditionally been expensive, but now there's a freeware tool that can perform project management. Continue Reading
-
Fine-tuning the deployment process for apps published via Group Policy
These tips will help you fine-tune the deployment process for applications that have been assigned or published via Group Policy. Continue Reading
-
Active Directory: Trouble starting AD Users and Computers
In this series, Expert Laura E. Hunter helps readers with such Active Directory issues as authorizing the DHCP, resetting the AD Restore Mode password and starting AD Users and Computers. Continue Reading
-
How to create your own MSI file to deploy applications
Using Group Policy settings to deploy applications throughout your organization works well if the app you're deploying includes an installation package in MSI format. But it if doesn't, try creating your own MSI file. Continue Reading
-
Recovering files from a corrupted cache for offline files
With the number of users who are using offline file synchronization to take work on the road with them, the offline files cache often becomes corrupted. Continue Reading
-
Quick fix for a non-replicating DC
While it doesn't come up every day, one of the most frustrating experiences for an AD administrator is to try to fix a non-replicating DC. Expert Gary Olsen breaks down the process step-by-step to make troubleshooting your next non-replicating DC a ... Continue Reading
-
Preventing DNS registration of certain SRV records
If you have performance issues or bandwidth restrictions, you can force authentication requests to only go to certain domain controllers by preventing DNS registration of certain Service Locator (SRV) records. Continue Reading
-
Deploying apps via Group Policy -- cost-effective, but risky
You can deploy applications using Group Policy. But without the proper planning, this is a good way to shoot yourself in the foot. Continue Reading
-
Avoid system freeze-ups when installing Windows XP
When installing Windows XP with SP1, your system may freeze with 34 minutes of the installation process remaining. At this point, the USB drivers are being installed. Continue Reading
-
IE toolbar displays HTTP headers of received pages
Sometimes an admin needs to see the HTTP header information. A toolbar for Internet Explorer is now available that lets admins view the exact HTTP headers for all documents downloaded by IE. It also shows SSL traffic. Continue Reading
-
Active Directory user rights for Windows domain controllers and servers
Some Active Directory user rights are more critical than others because they control key aspects of the server that an attacker could exploit. This tip reviews the differences between some critical user rights settings for domain controllers versus ... Continue Reading
-
Use command line tools to monitor Active Directory
Monitoring Replication is critical to maintaining Active Directory health. Repadmin is a powerful, but often overlooked, Windows Support Tool that can make AD monitoring a much easier process. Continue Reading
-
How to find the MAC address of a remote computer
GetMAC provides a quick method for obtaining the MAC layer address and binding order for a computer running Windows 2000, locally or across a network. Continue Reading
-
Feature in XP and Windows Server 2003 stores passwords for servers
The Stored User Names and Passwords feature in Windows XP and the Windows Server 2003 family stores user names and passwords for servers. Continue Reading
-
Viewing advanced settings in Active Directory Users and Computers
There is no getting around it; everyone who uses Active Directory needs to access advanced settings within their enterprises. Expert Derek Melber explains how to use the Active Directory Users and Computers (ADUC) feature as a means of supporting ... Continue Reading
-
RegDelNull deletes undeletable Windows Registry keys
REGEDIT is a useful tool for making one quick change to the Windows Registry. But if you have to delete a Registry key with an embedded null character in its name, you'll want to check out the RegDelNull utility. Continue Reading
-
Understanding GPT Replication
It's important to know that Group Policy Objects are split into two parts: the Group Policy Template and the Group Policy Container. Expert Derek Melber gives an overview of the GPT and breaks down the replication process. Continue Reading
-
Controlling Access-based Enumeration with Group Policy
The addition of Access-based Enumeration to the latest Windows Server 2003 server pack shows that Microsoft has finally jumped on the security bandwagon. Expert Derek Melber explains how the feature can be controlled using Group Policy. Continue Reading
-
Connect to multiple 802.11 networks through one WiFi adapter
New software from Microsoft enables connecting to more than one wireless network at the same time. Continue Reading
-
How to automate advanced Windows desktop tasks using scripts and macros
You can use scripting languages and macro tools to automate advanced Windows desktop tasks . Continue Reading
-
Tools to automate Group Policy Object management tasks
Group Policies are handy, but using them often leads to a lot of repetitive tasks. Fortunately there are tools that can automate many of these Group Policy Object management tasks. Learn about them here. Continue Reading
-
Tools to automate Active Directory maintenance
Dealing with Active Directory operations in bulk can drive any Windows administrator crazy. Thankfully, there are many third-party tools that can automate Active Directory maintenance tasks. Learn more about them here. Continue Reading
-
Free hotkey program supports multimedia keyboards
Hotkey shortcuts can make life a little simpler when you're in a hurry. A free utility called HoeKey lets you assign key combinations to many different actions in Windows, including actions involving specific applications. Continue Reading
-
CCleaner: Tips for cleaner workstations and servers
Use CCleaner to neaten the data in your workstations or servers. Here's how you can get the most out of this free tool. Continue Reading
-
Creating batch files using the DOS 'Copy Con' command
Microsoft Windows users may find it convenient to create a batch file on-the fly, without having to open up an ASCII text editor. Here's how. Continue Reading
-
Group Policy: Pushing out software through Active Directory
Check out this collection of expert responses to real reader questions from Group Policy expert Jeremy Moskowitz. Continue Reading
-
Tools for quick recovery of deleted Active Directory objects
Everyone makes mistakes; even experienced system administrators. So what do you do when you accidentally delete information in Active Directory? Expert Gary Olsen outlines an easy tool that can be used to reanimate deleted objects. Continue Reading
-
Understanding the GPC for Group Policy
Understanding the structure of object and object properties is an important part of dealing with Group Policy issues. Expert Derek Melber clarifies the responsibilities of the Group Policy Container (GPC). Continue Reading
-
AD security: Group Policy inheritance and application
Group policy can be confusing. According to Microsoft MVP Derek Melber, understanding some key Group Policy concepts can ensure better security implementation. Continue Reading
-
When multi-master isn't quite so: Managing FSMO roles
IT administrators can use Flexible Single Master Operations (FSMO) to manage Active Directory forest and domain controllers. In Part I of a two-part series, expert Laura E. Hunter explains how to use FSMO to your advantage. Continue Reading
-
Find out which DC a system has used to log in
Determine which DC a system has used to log in - Tip2 Continue Reading
-
Securing domain controllers
Domain controllers are essential to keeping Active Directory running. Contributor Derek Melber recommends these Group Policy settings to lock down your DC. Continue Reading
-
New DNS server tool can help assess your environment
In a complex network, it can be difficult to keep track of changes to your domains. In this article, Gary Olsen breaks down a new tool that can help maintain the health of your DNS environment. Continue Reading
-
WSUS vs. commercial software: Which is the better choice?
Microsoft's Windows Server Update Services, or WSUS, boasts a variety of new features. Should you go with WSUS, or one of the third-party products that are available? Continue Reading
-
Checklist: Ten steps to troubleshooting SAN/NAS performance problems
Learn how to isolate the cause of performance problems in your storage system, fix what's broken and learn from your mistakes. Continue Reading
-
Hyena simplifies Windows management tasks
Using the built-in Windows administration tools to manage a medium to large Windows NT or Windows 2000/2003 network can be a challenge. Hyena simplifies and centralizes day-to-day management tasks, while providing new capabilities for systems ... Continue Reading
-
Control your Group Policy, don't let it control you
Expert Laura E. Hunter breaks down the use of Group Policy Objects (GPO) within Active Directory. Continue Reading
-
Weak passwords can make your company vulnerable
Passwords can make your company vulnerable to hackers. By using passphrases, instead of passwords, you can tighten up the security of your infrastructure. Expert Derek Melber tells you how to do it. Continue Reading
-
Change the product key by deactivating Windows XP
Find out how to enable re-entry/change of product key by deactivating Windows XP SP1 or SP2. Continue Reading
-
Active Directory-integrated DNS zones and the case of the disappearing zones!
If you've had zones disappear in your Active Directory-integrated DNS, you know the frustration of trying to find them again. Expert Gary Olsen gives you guidance on how to fix the problem or avoid it entirely. Continue Reading
-
Command-line tool checks file integrity
Microsoft's free command-line tool, File Checksum Integrity Verifier, can create cryptographic hashes or "fingerprints" for files. Learn what else you can do with FCIV in this tip. Continue Reading
-
DNS Primer: Tips for understanding Active Directory integrated zone design and configuration
Microsoft's development of the Active Directory integrated (ADI) primary DNS zone has some useful benefits for administrators. Gary Olsen's article defines ADI and tells you how to maximize its benefits. Continue Reading
-
Resolve 'The Error Log File is Corrupt' error
How to resolve 'The Error Log File is Corrupt' error message when trying to access the system event log from event viewer in Win2003 Server. Continue Reading
-
Create a bootable USB flash drive -- in a flash!
Making a USB flash drive into a bootable USB device requires some fancy footwork. Continue Reading
-
Add or modify the registry via Group Policy
Freeware allows admins to create a Group Policy Object and send a registry key and its settings. Continue Reading
-
Why batch files are still useful
Reusing old batch file commands saves time and gets the job done just as well as scripting. Continue Reading
-
Enforcing Group Policy Object settings
Ensure that your settings are getting to the target object -- and sticking. Continue Reading
-
Create a custom GUI for Windows PE
Creating custom Windows PE images with this applet is easy -- but don't ignore the last two directives. Continue Reading
-
Hardening Windows School: Group Policy design checklist for intermediate levels
When it comes to Group Policy design, many administrators make simple configuration mistakes or they get stuck trying to match GPOs with an Active Directory layout. Get help here. Continue Reading
-
Modify registry to control AutoComplete
Try these simple registry medications and you have three options available to you concerning AutoComplete. Continue Reading
-
Make Office repairs using command line
A simple command-line method of repair will become an important addition to your toolbelt if Office 2000 or Office XP installations become corrupted. Continue Reading
-
Checklist: What to do when your server crashes
If your server crashes you need to get it back online as quickly as possible. This checklist will help you do just that. Continue Reading
-
Run Netsh in a graphics mode
The Netsh command-line utility has a GUI interface for those who don't like to use command prompt. Continue Reading
-
Start Windows Explorer as administrator in a user account
Start Windows Explorer as administrator in a user account. Continue Reading
-
Dcpromo using an unattended answer file
Not many administrators realize that they can run Dcpromo from an unattended answer file and eliminate all those cute little Wizard prompts. Here's how. Continue Reading
-
Crack CMOS' memory space
A computer configured using its BIOS has its options written to CMOS. If the BIOS is password protected and stored in CMOS, there used to be no easy way to get at it. Continue Reading
-
Protecting against anonymous connections using Group Policy Objects
How to use Group Policy Objects (GPO) to protect your Windows computers from insecure anonymous connections. Continue Reading
-
LSrunasE tool encrypts passwords to protect Admin privileges
Microsoft created the RUNAS command-line function to deal with the problems involved with escalated privileges in user accounts. But since RUNAS requires a password to be provided, this defeats the point. In response, substitutes for RUNAS were ... Continue Reading
-
How to use Install from Media to restore a domain controller
In this final installment of "Disaster Recovery Planning for Active Directory," Gary Olsen explains how to use install from Media feature to restore a domain controller. Continue Reading
-
Checklist: Establishing a data replication strategy
Once you decide to replicate your data, the real planning begins. Answer the questions on this checklist, and you'll be well on your way! Continue Reading
-
Quick! Which specific SQL Server user is logged into which database?
Sysprocesses -- one of the tables in SQL Server's master database can be used to track which SQL Server users are currently logged in and which database(s) they are accessing. Continue Reading
-
Active Directory replication convergence
A change to one domain controller is not an instantaneous change to all other domain controllers. A single change to one DC could take up to many hours to get to all others. Continue Reading
-
Creating a PerfMon Web page
This tip explains how to convert MMC performance counters to create a live Web page. Continue Reading
-
Choose SCSI over SATA for enterprise servers
SATA's lower cost and new features make it attractive, but SCSI remains a standard for enterprise server hardware. Continue Reading
-
How to restore a domain controller from backup in Active Directory
Part three of this Disaster Recovery Planning for Active Directory tutorial examines how to restore a domain controller from backup in AD in the event of single DC failure. Continue Reading
-
Prevent Internet Explorer from remembering passwords
Find out how to prevent Internet Explorer from remembering user names and passwords on shared machines. Continue Reading
-
Registry's troubles hunting source files solved
Sometimes the Registry setting in Windows 2000, XP and 2003 can't find the installation files it needs for a few different reasons. This tip explains what to do. Continue Reading
-
Checklist: Preparing to deploy Active Directory
Brien M. Posey, MVP and technology consultant, provides this preparation checklist to help you plan for a trouble-free Active Directory deployment. Continue Reading
-
Moving DHCP without interruption during an Active Directory migration
In a recent migration project, the need arose to move DHCP services from the original domain to the newly created domain. Here are the lessons learned. Continue Reading
-
Dealing with a 'full' security log
If you have ever received a 'full' security log error message then you need to read this tip to remedy the problem from here on in. Continue Reading
-
Creating custom Group Policy templates
Tips on using Group Policy to create custom policy templates to deploy features missing in Windows NT, such as Automatic Windows Updates or Windows Firewall settings. Continue Reading
-
Easily add printers without using the Add Printer Wizard
Users often add printers using the Add Printer Wizard. While Microsoft has done a good job with this tool, there are other options. Continue Reading
-
8 common causes for 'delayed write failed' errors
The delayed writing operation in Windows can improve system performance -- when it works properly. Continue Reading
-
Shadow copies influence server performance
Shadow copies can save you time, but is there a cost in terms of server performance? There can be. Here is some advice on how you can monitor your server. Continue Reading