Tips
Tips
-
How and when to restrict parallelism in SQL Server
Parallelism helps speed up SQL Server query results, unless SQL Server attempts to optimize the query for parallel execution first. Learn how and when to restrict parallelism here. Continue Reading
-
Installing Exchange System Manager on Windows XP
Installing Exchange System Manager on Windows XP can be a little tricky. This article will guide you through the precarious process. Continue Reading
-
Perform bulk Active Directory changes with ADModify
ADModify.NET is a great Active Directory tool that gives admins the ability to mass manipulate just about every property within user, group, contact and public folder objects. Continue Reading
-
The Exchange Best Practices Analyzer tool
Use the Exchange Best Practices Analyzer (BPA) tool to retrieve specific, actionable analysis of your messaging environment. Continue Reading
-
Faster Exchange Server recovery with the Dial Tone Method
A step-by-step guide to using a new Exchange 2003 partial recovery method that will get your mail server up-and-running more quickly. Continue Reading
-
Checklist: Seven steps to properly set account lockout
Is it riskier to set account lockout or not? Weigh the pros and cons of using account lockout at all, and get seven steps for making these settings work to your advantage here. Continue Reading
-
Modifying public folder ACLs
PFDavAdmin is a powerful tool that allows administrators to modify access control lists (ACLs) on Exchange public folders. Continue Reading
-
Troubleshooting OWA problems
This article explains OWA symptoms that point to potential IIS configuration issues and how to resolve them. Continue Reading
-
Using the DumpsterAlwaysOn option in Microsoft Outlook
Learn how to recover hard-deleted items from Microsoft Outlook using the DumpsterAlwaysOn option. Continue Reading
-
Restrict access to prevent insider hacks
Internal security threats often prove to be more malicious than all the people on the Internet. Get help protecting Windows from fellow coworkers and employees in this checklist. Continue Reading
-
Is Delayed Expansion on?
Is Delayed Expansion on? Continue Reading
-
Set storage limits for Exchange public folders
Concerned about your public folder store size outgrowing your Exchange Server? Here are some guidelines for determining how to put a limit on folder size. Continue Reading
-
PsPasswd: A free password-changing utility
A free password-changing utility. Continue Reading
-
Windows needs your current credentials: Fixing the error message
Sometimes Windows XP users get the message: "Windows needs your current credentials. Please lock this computer, then unlock it. . . .." Here's a quick fix for the problem. Continue Reading
-
Disable NetBIOS with care
Many admins want to disable NetBios over TCP/IP for security and other reasons. But you will face a new set of concerns where Exchange 2000 and 2003 are in use. Continue Reading
-
MAPI problems when Exchange Server and Microsoft Outlook share
There are good reasons why Outlook and Exchange should not be installed on the same computer, as this tip explains. Continue Reading
-
Benefiting from an MCSE: Security certification
Getting an MCSE: Security may require more time and money than other certifications, but those who do invest in the senior-level credential are likely to reap the benefits. Continue Reading
-
Avoiding single points of failure in Active Directory
Learn important precautions you can use to protect Active Directory from a single point of failure. Continue Reading
-
Take it back! Recalling an e-mail message
When a potentially damaging e-mail is sent and you are asked to remove it from the database, you have a few options to get the job done. Continue Reading
-
Best practices for implementing IPSec policies
There are several tricks to configuring IPSec effectively, depending on what Windows servers you're using. Find out what they are in this tip by site contributor Brien Posey. Continue Reading
-
Avoid problems related to booting from SAN
Here's some advice to help you solve your 'boot-from SAN' issues, which can result from Windows' limitations when it comes to configuration challenges. Continue Reading
-
Five reasons to deploy IPSec policies on your network
If you need to encrypt the sensitive traffic flowing across an IP-based network, as many organizations do nowadays, consider the benefits of deploying IPSec policies. Continue Reading
-
Correcting a corrupted computer account
Check out this procedure for restoring a domain account for a client computer. Continue Reading
-
ADModify.Net tool aims to please Exchange admins
ADModify.Net tool is useful for Exchange administrators who need to make mass changes to user records. Continue Reading
-
Creating trusts between domains in different forests
Creating interforest trust relationships is easier with Windows Server 2003. Continue Reading
-
How to prevent null session attacks
In the conclusion of his two-part series, site expert Kevin Beaver offers several solutions for preventing null session attacks on Windows NT and 2000 systems. Continue Reading
-
Beware of the apostrophe
Apostrophes in e-mail addresses can cause delivery problems. This tip explains why this happens and what you can do to solve the "501" error message. Continue Reading
-
What is RSoP for Windows Group Policy?
Details and definition of RSoP (Resultant Set of Policy) for Windows 2000 Server and Windows Server 2003, as well as info on the meanig of RSoP to Group Policy. Continue Reading
-
Group Policies' order of application
When security policies are being applied at the Group level, the order in which they are applied can be tricky. This tip provides a way to remember the order. Continue Reading
-
Checklist: Effective software license management
This checklist of tips and best practices can help you save money by efficiently managing your software licenses. Continue Reading
-
Hiding or revealing user names in the Windows XP logon screen
How to hide or reveal user names at the Windows XP logon screen with a registry hack. Continue Reading
-
Install Trivial File Transfer Protocol (TFTP) on Windows 2000
Installing the Microsoft Trivial File Transfer Protocol (TFTP) Service on Windows 2000 Continue Reading
-
Start Windows Explorer with admin privileges in a non-admin account
Start Windows Explorer with admin privileges while using a non-admin account. Continue Reading
-
Working through 'ambiguous' e-mail addresses
If you find you have users with the same e-mail address, this tip explains what measures you can take to avoid the "ambiguous recipient" message Continue Reading
-
A first look at the Group Policy Management Console
This article breaks down the basics of the Group Policy Management Console (GPMC), a free downloadable tool from Microsoft. Continue Reading
-
Don't forget to audit the local SAM
Leave the local Security Accounts Manager (SAM) untouched when auditing Active Directory and leave the door open to attackers. Find out what control points you need to consider. Continue Reading
-
Active Directory migration from Windows 2000 Server to Windows Server 2003
How to make sure you have full access to the forest improvements of Windows Server 2003 after an Active Directory migration. Continue Reading
-
Metabase Explorer for IIS 6.0
Some details on and where to find a tool for editing IIS's metabase. Continue Reading
-
Enforcing SID filtering over external trusts in Active Directory
SID filtering keeps your security identifiers from being passed to untrusted domains, this explains how to make sure it is turned on. Continue Reading
-
Changing the default Administrator account name as a security measure
Changing the default Administrator account name is a common security practices, but for various reasons, it might not be a best practice. Continue Reading
-
Exchange Admin 101: Outlook's group calendars
Outlook's calendar lets you do more than set reminders to yourself. Learn how to manage events for groups and master other advanced calendar functions. Continue Reading
-
Mixed mode vs. native mode: What's the difference?
If you installed Exchange 2000 or 2003 you will see some features are disabled. This tip explains the differences between mixed and native mode and how you can alter the mode. Continue Reading
-
Keyboard switch to USB kills PS/2 support
How to fix keyboard issues when switching to and from PS/2 and USB keyboards. Continue Reading
-
Get a handle on Exchange 'hop counts'
Hop counts help you stop problems with mail loops, and each version of Exchange has a different value. You can, however, raise the default hop count if you want. Continue Reading
-
Best practices for OU design
A short list of best practices for designing organizational units in Active Directory. Continue Reading
-
Taking a screen capture of an active window
Taking a screen capture of an active window Continue Reading
-
Checking and fixing Cryptographic Services
Checking and fixing Cryptographic Services. Continue Reading
-
Avoid using BLOBs to store image data in SQL Server databases
Storing images in SQL Server with BLOBs can cause problems. Continue Reading
-
Turn off your SMTP, Telnet and HTTP banners
Find out how to turn off your SMTP, Telnet and HTTP banners. Continue Reading
-
Keep your BADMAIL good and clean
BadMailAdmin.Exe automatically deletes and archives BADMAIL files. Continue Reading
-
Active Directory tasks: To delegate or not to delegate?
While some Active Directory tasks can be performed by non-admin personnel, there are some that should never, ever be delegated. Continue Reading
-
View printers via a Web browser
Would you like to see all your printers on a Print Server from any location using a Web browser? Here's a tip explaining how to do just that. Continue Reading
-
DNS aging and scavenging simplified
Introduced in Windows 2000, Dynamic DNS brought a process with it called DNS scavenging where it would not be needed in a perfect world -- but who lives in a perfect world? Continue Reading
-
Top 10 database mounting problems -- and how to fix them
If you have ever had problems mounting, or opening, a database volume, this tip tells you the potential causes and their solutions. Continue Reading
-
Restricting cached credentials in Windows
This short tip explains how to improve overall security by restricting cached credentials in Windows 2000 Server and Windows Server 2003. Continue Reading
-
Delete unwanted 'nicknames' in Outlook
Nicknames aren't in your address book or from Active Directory. Learn how you can get rid of the outdated ones before they cause problems. Continue Reading
-
Block attachments in OWA
You can prevent users from sending certain kinds of attachments in OWA. Continue Reading
-
Ping -t command
Ping -t command Continue Reading
-
Hiding service administrator accounts from users
How to hide service administrator accounts from authenticated users without changing the default settings of the self-correction mechanism. Continue Reading
-
Remapping keys in Windows 2000 and XP
How to change the function of keyboard keys. Continue Reading
-
Seven-step plan to clustering Exchange servers
Decided it's a good idea to cluster your Exchange servers? Keep these seven steps handy as you embark on the process. Continue Reading
-
How to fix CD/DVD-ROM issues in Windows 2000 and XP
A particular problem with CD/DVD-ROM devices in Windows 2000 and XP can be fixed with a registry hack. Continue Reading
-
Improving the default domain controller Group Policy Objects
When Windows Server 2003 is used to establish an Active Directory-based network, there are two default GPOs: the default domain GPO and the default domain controller GPO. This article recommends several ways to improve upon the default settings in ... Continue Reading
-
Auditing changes to the registry
How to set up auditing so that changes made to the registry are tracked. Continue Reading
-
Top 10 tasks for new Exchange administrators, part 1
Are you a new Exchange administrator and feeling overwhelmed? Check out this tip for Microsoft's top tasks and our take on their advice. Part 1 of 2-part series. Continue Reading
-
Top 10 tasks for new Exchange administrators, part 2
Are you a new Exchange administrator? Even if you aren't new, check out part 2 of this Tip that tells what Microsoft says are your top tasks and our take on their advice. Continue Reading
-
Further alternatives to using RUNAS
A look at three helpful alternatives to the RUNAS utility. Continue Reading
-
The importance of physical security for domain controllers
Your logical and technical security will be wasted if you do not physically secure your DC. This tip will put you on the right path. Continue Reading
-
Expire the License Logging Service
Long-standing problems with the License Logging Service mean one thing: disable it. Continue Reading
-
Dos and don'ts: Scanning Exchange for viruses
Is it possible to over-protect against viruses and cause your enterprise damage in the process? Yes, but here are some tips on how to avoid that undesirable outcome. Continue Reading
-
System Restore from command prompt
System Restore from command prompt Continue Reading
-
The command-line DISKPART utility in Windows
Some of the do's and don't of the DISKPART utiltiy and a list of the commands used by the utility. Continue Reading
-
Turn off the Internet by releasing the IP address
Turn off the Internet by releasing the IP address Continue Reading
-
Establishing secure Active Directory boundaries - Part 1
Part one on choosing the best boundaries for your Microsoft Active Directory implementation. Continue Reading
-
Build an affordable practice lab at home
install a test network at home and practice everything you can on that network Continue Reading
-
Designing Active Directory security through risk analysis
A look at some of the security threats that Active Directory faces, and some of the ways to protect it. Continue Reading
-
How to use the size column in Outlook to help manage mailbox size
When advising users how to keep their mailbox size under control, a good tip is to add the Size field to their current view in Outlook. Continue Reading
-
Troubleshooting 'Conflicting Credentials' errors between Windows systems
How to solve the problem of 'Conflicting Credentials' errors between Windows systems. Continue Reading
-
Basic DNS records for Active Directory DCs
Be careful with the Active Directory Wizard, it may generate incorrect entries. This tip tells you what to look for to make sure your DNS records are correct. Continue Reading
-
Microsoft Adsizer tool works out your Active Directory domain
Learn about the Active Directory Sizer tool, a Microsoft utility design to determine the hardware requirements for your AD domain. Continue Reading
-
Share your remote desktop session
Stumped by a remote user issue? Get a second opinion from one of your IT colleagues by sharing your remote desktop session. Continue Reading
-
How to use non-Microsoft DNS for AD
You don't have to use Microsoft's DNS to deploy an Active Directory domain. Expert James Michael Stewart explains how. Continue Reading
-
Why can't I create new Active Directory objects?
From time to time, AD administrators may have trouble creating new objects. Fortunately, this is usually quite easy to fix. Continue Reading
-
Active Directory replication failing? Check the topology
Learn why automatic replication can sometimes fail in Active Directory and what admins can do to troubleshoot the problem. Continue Reading
-
Stop a deleted object's reappearance in Active Directory
What you delete from Active Directory doesn't always stay that way. This tip explains why those AD objects reappear, and what admins can do to stop it. Continue Reading
-
View your Kerberos tickets with free Microsoft tool
Learn about a useful utility designed for Windows admins to help with viewing Kerberos tickets in Active Directory. Continue Reading
-
Auto replies? Use a public folder
Why you should, instead of running a copy of Outlook. Continue Reading
-
Easily manage multiple systems using MMC
How to easily manage multiple systems using MMC. Continue Reading
-
System.ced is missing? Probably not
If System.ced is missing, what probably is wrong, and how to fix it. Continue Reading
-
Round-robin DNS with different subnets
Round-robin DNS with different subnets Continue Reading
-
Fixing mismatched Active Directory accounts
Learn to solve issues with mismatched Active Directory accounts and mailboxes after ADC replication Continue Reading
-
Some help with RunAs
Let users run programs with different parameters without making them admins. Continue Reading
-
Preventative maintenance checklist
A helpful checklist of preventative maintenace instructions. Continue Reading
-
The domain account lockout mystery
Disconnected terminal server sessions can cause problems with account lockouts. Continue Reading
-
Creating printer ports and shared printers in a clustered environment
This tip explains how to create printer ports and shared printers programmatically in a clustered environment. Continue Reading
-
Changing the IP address on a domain controller
Step-by-step instructions for changing the IP address on an AD domain controller, as well as a method to make sure it is resolving properly after the change. Continue Reading
-
Quick Tips: Exporting AD account information to a spreadsheet
Learn how to export Active Directory account information like email addresses, last name, etc., into a spreadsheet. Continue Reading
-
Lock down HOSTS files
Placing name/address pairs in HOSTS allows the system to default to the IP address for that network name at all times -- saving DNS lookup time and traffic to the DNS server. Continue Reading
-
Missing domain controller policies? Help!
How to replace without reinstalling Windows. Continue Reading
-
Force domain changes in Microsoft Active Directory
you make a change to your domain, you don't have to wait for AD's replication schedule to occur before having that change replicate to all of your other DCs. Continue Reading