Tips
Tips
-
Troubleshooting a cross-forest trust in Active Directory
When checking for errors in a cross-forest trust, the first place to look is DNS. Continue Reading
-
Create a global Safe Senders List in Exchange 2007 to filter spam
Find out how to create a global, aggregate Safe Senders List in Exchange Server 2007 and Microsoft Outlook 2007 to manage spam and junk email filtering. Continue Reading
-
An alternate strategy for DNS server backup
While Microsoft recommends performing a system state backup when backing up a DNS, it's an all-or-nothing proposition. Using alternative methods such as backing up Active Directory integrated zones is a better strategy for admins who want to back up... Continue Reading
-
Install the Outlook Connector to use Hotmail in Microsoft Outlook
Install and configure the Microsoft Outlook Connector to access and send MSN Hotmail email messages through Outlook in an Exchange Server environment. Continue Reading
-
How to create a cross-forest trust in Active Directory
Building a cross-forest trust in Active Directory allows a trust to be created between the root domain of two forests. Continue Reading
-
How to format NTFS: More tricks to improve file system performance
The best security features are the ones that protect a system without slowing down the NTFS. Microsoft MVP Brien Posey offers some suggestions for finding the right balance between NTFS performance and system security. Continue Reading
-
Manage Exchange 2007 public folders from Exchange Management Console
Find out how to add and use public folder management functionality in the Exchange Management Console after installing Microsoft Exchange Server 2007 SP1. Continue Reading
-
Remove Exchange 2007 public folder stores from a Mailbox Server role
You must delete and remove public folder stores from Exchange 2007 SP1 before you can uninstall the Mailbox Server role. This tip explains how to do it. Continue Reading
-
Validating Windows server clusters with ClusPrep
Microsoft designed the final steps in its server cluster configuration wizard to ensure that server clusters are set up correctly and functioning properly. Continue Reading
-
Deny access to Windows system properties with GPOs
Windows networking security expert Brad Dinerman tells you how to prevent your users from accessing and altering unwanted settings and properties using Group Policy Objects (GPOs). Continue Reading
-
Windows scripting secrets for disk quota management
Despite improvements made to disk quota management, Windows Server 2003 does not include any built-in reporting tools. Fortunately, admins can use a simple script to create reports on disk space usage. Continue Reading
-
Fix Exchange Server 2007 Setup failures using the registry
Find out how to fix Exchange Server 2007 Setup failures and freezes and troubleshoot server role installation problems by editing specific registry keys. Continue Reading
-
Bad external time source stops Active Directory replication
Not all time sources are created equal. Here's a way to avoid problems when synching to an external time source. Continue Reading
-
Microsoft tool simplifies Windows server cluster configuration
Cluster configuration manager, commonly called ClusPrep, is a free Microsoft tool for determining if servers are properly configured to support clustering. Continue Reading
-
Security tools that limit user logon in Windows
Security expert Kevin Beaver describes the pros and cons of some free security tools -- and commercial ones -- for monitoring Windows network login activity. In addition, he outlines the steps for creating network security workarounds with a more ... Continue Reading
-
Optimizing NTFS file system performance
The hard disk can sometimes become a bottleneck in overall system performance. While not much can be done to overcome hardware-related limitations, admins can optimize the NTFS file system for better performance. Continue Reading
-
Control Microsoft Outlook .PST file size and usage via the registry
Learn how to control and prevent Microsoft Outlook .PST problems by implementing registry keys that manage ANSI- and Unicode-based .PST file size and usage. Continue Reading
-
Debugging Userenv issues using Windows new event viewer
The event viewer will be a powerful debugging tool in Windows Server 2008 and Windows Vista. Continue Reading
-
Preview PDF files from Microsoft Outlook 2007 and Windows Vista
Discover a free PDF preview handler for Microsoft Outlook 2007 and Windows Vista that allows PDF file previews without downloading Adobe Acrobat Reader. Continue Reading
-
How to set up Remote Desktop for Exchange Server administration
Learn how to use the Remote Desktop Protocol (RDP) to manage and troubleshoot Microsoft Exchange Server from a distance via a terminal service session. Continue Reading
-
Time stamps change with daylight-saving time
Think DST glitches in Windows are gone? Think again. Time zone changes can modify the time stamp on files and events in the log. Continue Reading
-
The new Microsoft System Center: What happened to SMS and MOM?
Microsoft MVP Gary Olsen looks at Microsoft System Center and describes the things administrators should know about the new enterprise server product suite. Continue Reading
-
How to use RACI charts to define service desk roles and responsibilities
Using a management tool called RACI charting can help IT managers simplify the daunting task of clarifying the roles and responsibilities of the service desk. Continue Reading
-
How to configure ActiveSync and manage mobile devices in Exchange 2007
Find out how to configure ActiveSync in Exchange Server 2007, set up mailbox policies and partner with mobile devices to determine their status and health. Continue Reading
-
Best practices for using Outlook .PST files on portable USB drives
You can save Microsoft Outlook email data in a .PST file to a portable USB storage drive, but make sure you understand these best practices first. Continue Reading
-
Configuring Edge Transport server redundancy and load balancing
Learn how to configure redundancy and load balancing on Edge Transport servers to ensure high availability of your Exchange 2007 email environment. Continue Reading
-
DNS troubleshooting tips for Active Directory
Take a look at some tools and tests that will keep DNS performing well. Continue Reading
-
Disaster recovery for Windows: Four critical success factors
Improve your confidence in the entire disaster recovery process, from planning to implementation, by following these valuable Windows tips. Continue Reading
-
Be careful when copying Outlook Web Access (OWA) hyperlinks
Find out why hyperlinks copied from an Outlook Web Access (OWA) message don't work for some email recipients and learn two workarounds for this problem. Continue Reading
-
How the DC locator works in Active Directory
The DC locator depends heavily on DNS to not only locate a domain controller with the right role but also to locate one that will be efficient. Continue Reading
-
When and how to use worker process recycling with IIS
Configuring Internet Information Services to automatically reset worker processes can solve a lot of Web application issues, but it should only be used in certain situations. Continue Reading
-
Avoid DC restoration problems with authoritative restore
Restoring a domain controller can be tricky business, but by performing an authoritative restore, administrators can sidestep most problems. Continue Reading
-
LocalSystem account in the AD forest is risky business
Beware of the Windows LocalSystem account. It has total control over the computer and cannot be locked out or denied of any privilege. Continue Reading
-
How to manage and troubleshoot Microsoft Outlook rules
Find out how to manage multiple Microsoft Outlook rules using the Outlook Rules Wizard to prevent potential email message processing conflicts. Continue Reading
-
Kerberos authentication for network login on non-Windows networks
Windows can be configured to use Kerberos authentication for network login on non-Windows networks. Find out how in this tip. Continue Reading
-
Exploring the Windows Server 2003 Resource Kit: Compress.exe and Expand.exe
Have you ever had to make a compressed copy of a file via a script or the command line? We demystify the tools in the Windows Server 2003 Resource Kit -- namely, Compress.exe and Expand.exe -- to make such tasks less tedious. Continue Reading
-
Managing Microsoft Outlook search folder functionality
Discover the pros and cons of using Microsoft Outlook search folders and learn how to configure group policies that control search folder usage. Continue Reading
-
Exploring the Windows Server 2003 Resource Kit: Clusterrecovery.exe
The free Clusterrecovery.exe tool from Microsoft helps restore server cluster resources, replace failed disks, recover from disk signature changes and migrate data to a different disk on the shared bus. Continue Reading
-
Windows Process Activation Service in IIS 7.0
In this excerpt from Introducing Windows Server 2008, read about WPAS, which manages application pool configuration and worker processes. Continue Reading
-
Configure Windows Mobile devices to local wipe after failed logons
Learn how to configure security policies on a Windows Mobile device to local wipe Exchange Server data after several failed logon attempts have occurred. Continue Reading
-
For Active Directory performance gains, delegate the _MSDCS DNS zone
Directory services expert Gary Olsen explains how to delegate the _MSDCS zone, which contains the CName records and GC records, to ensure better Active Directory performance. Continue Reading
-
Unwinding USN rollback when faced with AD replication failure
No matter what the cause, solving Active Directory replication failure can be a difficult task. When USN rollback is involved, however, it presents even more of a challenge. Continue Reading
-
When to use third-party tools in place of NTBACKUP
NTBACKUP can be unreliable when you need to perform a restore or large-scale backup operation. Learn about the the third-party backup software programs, Like Backup Assist, that admins can use instead of NTBACKUP. Continue Reading
-
Solving Active Directory replication failure
Every now and then, admins are faced with unintentional replication failure. While fixing the error is critical, knowing how to find the cause of the failure can be just as important. Continue Reading
-
Accessing a Microsoft Outlook mailbox from multiple machines
Users can access a Microsoft Outlook mailbox from multiple machines, but problems may arise if they're using different versions of the Outlook email client. Continue Reading
-
Avoid print queue overload with priority printing
What Microsoft Windows admin hasn't dealt with the issue of printer queue overload caused by frivolous end users who tie up network resources for hours on end with large and non-essential print jobs? Here's a simple workaround to this perennial ... Continue Reading
-
Automatically save Microsoft Outlook email attachments to disk
Learn about a customizable Outlook VBA script that automatically saves email attachments from Microsoft Outlook folders to disk. Continue Reading
-
Use SLAs to assign help desk incident priorities
Service-level agreements help service desks categorize and prioritize IT incidents according to an organization's strategic plan. Continue Reading
-
Access contacts in an LDAP or X.500 directory from OWA
Access contacts in an LDAP or X.500 directory from Outlook Web Access with a third-party OWA add-in called MasterKey.net. Continue Reading
-
How to automate Windows Server 2003 defrag
Learn how to set up Windows Server 2003's DEFRAG command-line tool so it runs without the need for manual administrative maintenance. Continue Reading
-
Sysinternals TCPView monitors network connections on Windows systems
Learn how to use Sysinternals TCPView 2.51, the network monitoring tool from Mark Russinovich that keeps track of endpoint connections and processes on your Windows desktop and server systems. Continue Reading
-
Why detective controls are important in change management
Change is a way of life in Windows IT shops. By using detective controls, Windows managers can minimize the risks associated with changes to production services. Continue Reading
-
How to set up an SSL certificate to encrypt OWA and ActiveSync traffic
Learn step-by-step how to set up Windows 2003 as a certificate authority, create an SSL certificate and encrypt email traffic for OWA and Exchange ActiveSync. Continue Reading
-
How to reverse NTFS object ownership from administrators to object's creator -- and why
When an admin adds their personal user account to the Administrators group and then creates an NTFS object, Windows sets the object's owner to the administrators and not to its creator's account. By completing these six simple steps, admins can ... Continue Reading
-
Troubleshooting account lockouts in Group Policy
While the account lockout setting in Group Policy is designed to protect systems from attackers, it can also be an inconvenience to users. Directory services expert Gary Olsen explains how to troubleshoot account lockout issues and offers tips for ... Continue Reading
-
Manage folder permissions in Windows networks
Learn how to prevent users from creating and deleting folders, and improve folder management and file management for Windows network security. Continue Reading
-
Error: 'The name of the security certificate is invalid or does not match the name of the site'
When Microsoft Outlook 2007 users connect to an Exchange 2007 server, they may experience the error: The name of the security certificate is invalid or does not match the name of the site. Find out the cause of this problem and how to fix it. Continue Reading
-
Unlocking Group Policy account lockout secrets
While Microsoft designed the account lockout settings to protect your environment from attackers, they can also be a real inconvenience for users. Directory services expert Gary Olsen explains how to get the security you want from the Account ... Continue Reading
-
How to create a network printer pool
You can avoid congestion on a network printer by creating a printer pool -- a group of printers attached to a common print queue, so multiple documents can be printed simultaneously. Here's how to create a printer pool in a Windows Server 2003 ... Continue Reading
-
Demystifying the AutoExNT tool in the Windows Server 2003 Resource Kit
The Windows Server 2003 tool AutoExNT lets admins start batch files or tasks in a certain order before they log on. Continue Reading
-
Tracking help desk tickets: Policies and procedures
Your help desk gets a lot of requests, so how should you keep track of what's coming in and what gets the highest priority? Learn how to analyze data to create and implement a finely tuned help desk policy. Continue Reading
-
Turn any non-PostScript printer into a PostScript printer
You can give any non-PostScript printer a PostScript front end from a Windows computer. You'll need to download three free utilities: Ghostscript, GSview and RedMon. Continue Reading
-
ReplMon still tops for troubleshooting Active Directory replication
Though it's been around for nearly seven years, ReplMon is still a very powerful tool for monitoring and troubleshooting all aspects of Active Directory replication. Continue Reading
-
How to repair damaged Master Boot Records and boot sectors
Boot problems can be relatively easy to fix and do not require reinstalling Windows. But you should understand how the boot process works in order to recognize circumstances that will cause problems. Continue Reading
-
Remotely manage Exchange Server 2007 from a 32-bit client
Did you know that you can remotely manage Exchange Server 2007 from a 32-bit client? Learn about the 32-bit version of Exchange 2007's management tools and get the download here. Continue Reading
-
Building a Windows Server 2008 virtual test lab
When it comes to preparing for a Windows Server 2008 migration, there is nothing like hands-on experience with the new server. Directory services expert Gary Olsen explains the quirks of creating a virtual test environment for Windows Server 2008. Continue Reading
-
Microsoft Office's CiceroUIWndFrame component crashes Outlook
A Microsoft Office component called CiceroUIWndFrame can crash Microsoft Outlook. Find out how to fix the CiceroUIWndFrame issue with these steps. Continue Reading
-
Problems accessing encrypted files on remote servers
If you use EFS, it's possible you could run into a situation where you are having trouble accessing encrypted files on a remote server. This tip outlines several troubleshooting steps to take, helping you to find out where the problem lies. Continue Reading
-
A guide to the Microsoft Windows Server 2003 Resource Kit Tools
Microsoft's oft-ignored Windows Server 2003 Resource Kit Tools can help administrators deal with issues such as troubleshooting operating system issues, managing Active Directory, configuring networking and security features and automating ... Continue Reading
-
Configuring a Windows virtual test lab on a budget
Creating a test environment with virtual machines can be a valuable asset when configuring your Windows environment. Directory services expert Gary Olsen walks through the step-by-step process of creating a virtual test lab. Continue Reading
-
Can freezing a hard drive that's crashed restore it to life?
You may be able to bring a hard drive that has crashed or cannot mount back to life by leaving it in the freezer overnight. Not every hard drive having problems responds to this treatment, but in some cases it does seem to work. But why? Here's the ... Continue Reading
-
Synchronizing multiple Exchange email accounts on one smartphone
Is it possible to synchronize one smartphone with two different Exchange Server email accounts? The short answer is no, but there are a few workarounds you can consider. Continue Reading
-
Create batch file to log chkdsk results
You can use the AT command in Windows to schedule chkdsk to automatically run on a daily basis. The problem with this technique is that chkdsk results are quickly flashed on the screen, then disappear. If you're not sitting at the server console ... Continue Reading
-
Limiting LDAP searches with MaxPageSize
Directory services MVP Gary Olsen explains why modifying the MaxPageSize attribute can cause problems for Active Directory and suggests some tools for troubleshooting those issues. Continue Reading
-
Troubleshooting Microsoft Outlook toolbar problems
Microsoft Outlook toolbar buttons will stop working correctly if the OUTCMD.DAT file becomes corrupted. Find out why third-party add-ins are often the culprit and learn how to fix the problem. Continue Reading
-
How to properly authenticate a Linux client in a Windows domain
MVP Gary Olsen describes the step-by-step process of configuring a Red Hat Fedora client into a Windows Server 2003 domain. Continue Reading
-
Create custom boot sector manually with Boot Build utility
Most of the time, a boot sector is created automatically when we format a disk, but at times it's useful to create one manually. A specialized utility called Boot Build allows you to do this by offering a blank template for a boot sector that you ... Continue Reading
-
Guide to using chkdsk to detect file and folder corruption
Follow these steps for configuring Windows to periodically run the chkdsk tool against a volume in order to detect file and folder corruption. Continue Reading
-
IT communication builds incident management successes
The key to successful incident management is a strong connection among the incident management, service desk and problem management staffs. If a disconnect between them exists, you can make things better, says expert Stuart Galup. Continue Reading
-
FireDaemon runs app as service, shows or suppresses GUI
Several tools allow you to take a Windows executable and run it as a system service rather than a console or desktop application. A tool called FireDaemon takes this one step further by allowing an application's GUI to be shown or suppressed ... Continue Reading
-
Locate removable device IDs for Group Policy settings
Brien Posey, MCSE, discusses how you can locate the different device IDs required in order to restrict removable device usage in Group Policy settings. This is the third tip in a three-part series on preventing the use of removable storage devices. Continue Reading
-
Case Study: Troubleshooting Distributed File System Replication
One of the difficulties with DFSR is that many admins still try to troubleshoot it using FRS methods. MVP Gary Olsen offers a case study to exemplify the proper techniques for debugging DFSR. Continue Reading
-
Let users update their own AD information with the Active Directory Update tool
Learn about a third-party utility called the Active Directory Update tool that lets end users update their own Active Directory attributes via a Web page. Continue Reading
-
Getting to know the read-only domain controller for Windows Server 2008
One of the most common questions surrounding the new Active Directory technologies for Windows Server 2008 involves the read-only domain controller. Active Directory expert Laura E. Hunter breaks down the key details of the RODC and how it can ... Continue Reading
-
Use RAID to increase write performance on three-drive arrays
On many small servers with RAID 5, you'll see the minimum three-drive array. Although read access on a three-drive array is faster than on a single drive, write performance is abysmal. If price is a consideration, a simple RAID 1 (i.e., ... Continue Reading
-
Multi-core systems vs. multi-CPU systems
Can you get better performance from a dual-core system or a dual-processor system? This article evaluates the two configurations and determines that multi-core chips tend to be more efficient than multi-CPU systems. Continue Reading
-
Prevent removable device usage with Group Policy settings
Secure your Windows system even more by preventing the use of removable storage devices with these Group Policy Object settings. This is the second tip in a series on this topic. Continue Reading
-
How to detect data corruption in files and folders
Data corruption that occurs within a file or folder will usually go unnoticed if you're simply backing up the data and testing the backup by restoring it elsewhere. If the files or folders that have been corrupted are used infrequently, you may ... Continue Reading
-
Understanding DFSR for easy configuration of Active Directory replication groups
Though Microsoft DFSR is clearly better than FRS, many admins still don't know how to properly deploy it. Directory services expert Gary Olsen explains how to use DFSR to configure replication groups for backing up remote sites. Continue Reading
-
Incident management made easier with Microsoft Service Desk
Expert Stuart Galup gives the skinny on Microsoft's help desk software, called Service Desk, and explains why help desk software and automated incident management can make your life a lot easier. Continue Reading
-
Why are email attachments zero-byte files on OWA and mobile devices?
Email attachments can sometimes arrive in Outlook Web Access (OWA) or on mobile devices as zero-byte files. Find out why this problem happens and how to fix it. Continue Reading
-
SLAs and service-level management: What does it mean for Windows managers?
Windows service-level management is a business process for managing Windows user service requirements in an IT environment. A key component of a Windows service-level management plan is a service-level agreement (SLA). Expert Harris Kern explains ... Continue Reading
-
Distributed File System feature prioritizes target servers in Active Directory
DFS target prioritization is a helpful feature that has slipped under the radar for some IT admins. Directory services expert Gary Olsen breaks down how to use (and not use) this tool to its full effectiveness. Continue Reading
-
How to terminate SCSI devices
Termination is the practice of placing a terminator at the end of a chain of SCSI devices. The terminator prevents an echo, which disrupts communications along the SCSI bus. Continue Reading
-
How to use Microsoft Outlook 2007's Quick Parts feature
Discover how to use Microsoft Outlook 2007's Quick Parts feature (formerly known as AutoText) to save fragments of text in a gallery for repeated use in email. Continue Reading
-
How to retrieve lost files using Group Policy folder redirection
Learn how to combat many file and folder disasters using the 'Redirect My Documents' option via Group Policy in the Windows domain. Continue Reading
-
Use RunAsDate freeware to set system time and date for programs
RunAsDate freeware allows systems administrators to run any program as though the system time and date were set to a different clock. Continue Reading
-
Universal ATA controller driver serves as alternative to Windows generic driver
If you're trying to get a system running and don't have the manufacturer-specific parallel ATA driver for a given controller, you can fall back on Windows' generic PATA/IDE device driver, which runs most hard drives and CD-ROM drives. Or you may ... Continue Reading
-
Secure removable storage devices via Group Policy in Vista
While disabling or "gluing" a USB drive can help to prevent serious threats from entering your network, there is always a workaround. However, Vista allows you to disable such drives using Group Policy. Find out how it works in this tip. Continue Reading
-
Watch out for a Microsoft Outlook 2007 indexing issue in Windows Vista
Windows Vista's built-in indexer sometimes freezes when attempting to index Microsoft Outlook 2007 content. Fortunately, there is a workaround that will fix the indexing issue. Continue Reading