Tips
Tips
-
Time management strategies for the IT pro
How effective are you at managing your time? IT expert Kevin Beaver offers up some time-management best practices to help you get the most out of your workday. Continue Reading
-
Free Microsoft tool accesses Exchange, Outlook MAPI stores
What started as one Microsoft engineer tinkering with MAPI became a full-blown tool. See how MCFMAPI can access stores via a graphical user interface, helping you solve MAPI problems. Continue Reading
-
How vulnerable is Microsoft IIS 7.5 to attacks?
While version 7.5 is more secure out of the box than past IIS releases, it doesn't guarantee 100% protection. Continue Reading
-
Step-by-step: Building a Windows Server instance in the cloud
Setting up a cloud-based instance of Windows Server might be easier than you think -- especially when the hosting provider does most of the work for you. Continue Reading
-
Outlook 2010 and Exchange 2007 connection error workaround
Stumped by a 0x80070057 error when trying to connect Outlook 2010 to Exchange 2007? The cause might surprise you. Continue Reading
-
The real price of Exchange Server in the cloud
Do you think moving Exchange to the cloud is a good fiscal decision? Run the numbers again. What you save on an initial investment may cost you down the road—in more than simple dollars and cents. Continue Reading
-
Best practice for Dynamic Memory allocation with Hyper-V R2 SP1
Windows Server 2008 R2 SP1 will finally add the ability to over-allocate memory with Hyper-V. The next step? Learning to optimize the feature for peak performance. Continue Reading
-
DCs at sea: Configuring mobile Active Directory domain infrastructures
It’s common for admins to deal with mobile users, but what if the domain itself moves? See how basic AD principles always apply -- no matter what the situation is. Continue Reading
-
Registry hack lets OWA users reset their passwords
All it takes is this simple registry hack to give users with expired passwords access to their OWA accounts. Continue Reading
-
Tracking system resources with free WinObj utility from Sysinternals
Mark Russinovich and company did Microsoft one better with the WinObj tool for tracking Windows system resources, though there’s still room for improvement. Continue Reading
-
Manually move Exchange public folder data to SharePoint
For years Microsoft has urged Exchange admins to migrate public folder content to SharePoint -- without supplying any tools to do it. Save money on third-party tools by doing it manually. Continue Reading
-
Pros and cons of Windows Server drive encryption
Despite the drawbacks of server-based drive encryption, tools like BitLocker can be invaluable protection against data breaches and other external threats. Continue Reading
-
Limiting bandwidth use during Outlook offline address book syncs
If you're using a newer version of Exchange with a legacy version of Outlook, you'll want to understand your bandwidth consumption and how to control it during OAB synchronization. Continue Reading
-
Not sure what's running in a virtual machine? Use a batch file
Not all programs perform as expected in virtual machines. These tips will help you quickly find what’s virtual and what’s not using batch files or Windows PowerShell. Continue Reading
-
Managed service accounts boost server security in R2
Microsoft introduced the managed service accounts feature with Windows Server 2008 R2 to help make the management of apps like Exchange more secure. So how does it work? Continue Reading
-
Setting PowerShell execution policies in Exchange 2010
Exchange 2010 doesn’t inherently trust PowerShell scripts. Admins can set different execution policies to control when scripts run. Determine which policy is best for your organization. Continue Reading
-
Repair client access server issues to restore OWA and ActiveSync
A corrupt client access server can bring ActiveSync and OWA to a halt. Our expert explains how to fix your most stubborn CAS problems. Continue Reading
-
Core Configurator 2.0 puts the GUI back in Server Core
Admins can implement Server Core faster with the latest version of Core Configurator, a GUI-based open source tool for Windows Server 2008 R2. Continue Reading
-
Simplifying RBAC management in Exchange Server 2010
The new RBAC permission model in Exchange 2010 can be a difficult concept to understand. Breaking it down per-level can be even more confusing. These free tools facilitate RBAC management. Continue Reading
-
Controlling the output of Windows PowerShell commands
Windows PowerShell features several cmdlets for writing data. Knowing which commands do what can help control the output of your functions and keep your pipelines clean. Continue Reading
-
Exposing SMTP and IMAP’s security vulnerabilities in Exchange Server
Even though SMTP and IMAP have built-in features to protect Exchange’s external mail transmissions, both protocols are still susceptible to security vulnerabilities. See how easily both can be compromised. Continue Reading
-
Weighing MBSA against paid vulnerability scanners
If you’re only looking for the vulnerabilities Microsoft deems most important, then MBSA is your tool. If you need more, you’re better off assessing other commercial vulnerability scanners. Continue Reading
-
Override default OWA message attachment filters
Is OWA filtering HTML attachments from your users' email messages? Don’t worry -- there’s an easy workaround to this security annoyance. Continue Reading
-
Potential coexistence troubles during Exchange 2010 migrations
Coexistence issues are a natural part of Exchange 2010 migrations, so keep an eye on client access servers and mailbox databases during the entire upgrade. Continue Reading
-
Auditing AD administrators with Windows 2008 R2's Event Viewer
When it comes to admin rights, knowing who you can trust is not always easy. But while auditing limitations won’t do you any favors, new features in R2’s Event Viewer can help. Continue Reading
-
Changing file attributes in bulk with free utility
The updated BulkFileChanger tool gives Windows admins the power to modify files en masse. As for renaming files? Stay tuned. Continue Reading
-
Error handling with Windows PowerShell
The ability to deal with errors is critical to writing quality PowerShell functions. Here you'll find basic tips for detecting errors and figuring out what went wrong. Continue Reading
-
Preparing for the inevitable move off Exchange 2010 public folders
Even you're even considering migrating public folders off of Exchange Server, pulling data reports will help you understand which folders are most important and which ones are just wasting space. Continue Reading
-
Securing Exchange Server communications via SMTP and IMAP
IMAP and SMTP have built-in security features to protect Exchange Server's external mail transmissions. Do these legacy protocols offer enough protection? Continue Reading
-
How to separate primary and archive mailboxes in Exchange 2010 SP1
If you've already deployed personal archive mailboxes in your Exchange organization, our expert explains how to move them to a separate database in Exchange 2010 SP1. Continue Reading
-
API Monitor utility traces application performance for Windows
Admins can use updated API monitoring software to hook into API calls and get an inside look at application mechanisms for improved tracking capabilities. Continue Reading
-
Building an automated permissions management solution with Icacls
Using basic Icacls syntax, admins can create an automated solution to ensure correct network file permissions at all times. Continue Reading
-
Your BitLocker To Go Active Directory policy options
In the second installment of his two part series, Phil Cox reviews recommended BitLocker To Go settings that should be configured in your organization. Continue Reading
-
Troubleshooting Jet session issues for Active Directory databases
Unbeknownst to some admins, issues related to Jet sessions can cause Active Directory database performance problems. Learn what to look for -- and how to fix what you find. Continue Reading
-
Understanding Active Directory operations: The Jet database
Unlock the secrets of how the Jet database engine works within Active Directory and learn to troubleshoot database-related issues. Continue Reading
-
Free Outlook add-on a must in the developer's toolbox
Whether you're a Outlook development newbie or a seasoned extended MAPI whiz, this free tool shows you the nuts and bolts of MAPI and gives you access to Outlook Object Model objects. Continue Reading
-
Sysinternals RAMMap utility sheds new light on Windows memory usage
RAMMap, one of the latest offerings from Sysinternals, provides an in-depth overview of server memory usage that can't be matched by native Windows programs. Continue Reading
-
Role group management commands for Exchange Server 2010
Role group management has changed in Exchange Server 2010. Take a look at which EMS commands you'll need to use to create role groups, add and remove members and more. Continue Reading
-
Flash Memory Toolkit offers diagnostics, repair tools for USB drives
As USB drives become more popular, so do utilities designed specifically for USB flash drives. The Flash Memory Toolkit includes helpful tools for troubleshooting and repairing USB flash drives. Continue Reading
-
Uncovering the hidden meeting workspace feature in Outlook 2010
SharePoint meeting workspaces haven't disappeared from Outlook 2010 -- they're hidden. Our Exchange Server expert tells how to find and install this feature. Continue Reading
-
Configuring VLANs for a flexible Hyper-V environment
With Hyper-V deployments, admins tend to focus mostly on the server, but paying equal attention to the network can minimize issues with scalability and security later on. Continue Reading
-
Top tools for fixing Windows NTFS corruption issues
There are several utilities out there designed to salvage NTFS data and restore your hard disk, but even the best ones have pros and cons. Continue Reading
-
Exchange ActiveSync explained
Exchange ActiveSync brings control and security to mobile environments, while providing ease of use to employees. The numerous benefits of EAS are discussed in the first installment of our "Exchange explained" series. Continue Reading
-
Adding risk management analysis to a disaster recovery plan
Incorporating risk management techniques within your disaster recovery plan will help identify critical business needs as well as other DR solutions. Continue Reading
-
Using DavMail to access Exchange’s Outlook Web Access from any POP3/IMAP-compatible mail client
You can connect mail clients other than Outlook to an Exchange server using DavMail, a free open source application. Learn what settings need to be tweaked to be operational on Exchange in a Thunderbird or other open source mail client environment. Continue Reading
-
Resolving Adprep duplicate Link ID errors for Windows Server 2008
Admins need to run the Adprep utility to avoid failure when adding a Windows 2008 DC to a down-level domain. But what if Adrpep itself fails? Continue Reading
-
Icacls syntax basics: Automating Windows file permissions
Believe it or not, the Icacls tool in Windows can be used to create a fully-automated permissions management solution – once you understand the basic syntax. Continue Reading
-
Open source distributed file system (DFS) solutions go beyond Windows
Even though DFS is commonly linked to Windows Server, there are several other non-Microsoft options out there as well – and they're free. Continue Reading
-
Alternative PowerShell commands for Active Directory management
While Microsoft has added many new cmdlets for PowerShell 2.0, admins can also use additional options from Quest Software and other outlets when working with Active Directory. Continue Reading
-
Create Outlook 2007 rules to organize email
Creating rules in Outlook 2007 will help Exchange Server administrators and users organize inboxes. This tip explains how to create and define different rules. Continue Reading
-
HWiNFO utility provides free Windows hardware scans and reports
Administrators can find in-depth server hardware information and generate reports with HWiNFO, an updated freeware utility for Windows systems. Continue Reading
-
Exchange unified messaging setup: From start to finish
Setting up an Exchange 2010 unified messaging server in a lab lets you test new UM features before putting them into production. One expert explains a quick and cost-effective approach to this sometimes cumbersome process. Continue Reading
-
Six ways to improve identity and access management (IAM) for Windows
The evolution of the enterprise has put a huge emphasis on identity management. These steps will help you take control of IAM – before it takes control of you. Continue Reading
-
Inside the new PowerShell 2.0 commands for Active Directory
Windows Server 2008 R2 comes with a bevy of new PowerShell cmdlets for managing AD. Here is a rundown of the key commands, with details on how they work and when to use them. Continue Reading
-
How to create an Exchange message-tracking report
Discover the Exchange Management Shell commands you can use to create custom message tracking reports. Continue Reading
-
Diagnose Exchange Server mail flow failures
Exchange Server is mature and generally stable, but delivery problems can and do occur. Microsoft offers a few tools, including its Message Tracking tool, to get to the bottom of some of the peskiest mail flow problems. Continue Reading
-
Configuring applications in Windows with Group Policy preferences
Application behaviors can be tweaked and pushed out to your network via a logon script or Group Policy preference. See why choosing the latter could make your life a lot easier. Continue Reading
-
What's so great about R2's new AD Administrative Center?
Microsoft revamped the way admins manage certain tasks with the ADAC in Windows Server 2008 R2. See how it compares to the AD Users and Computers snap-in from past releases. Continue Reading
-
The very best Sysinternals tools for Windows server security
Admins can save themselves a lot of aggravation by taking advantage of Microsoft's free Sysinternals toolset. Here are some of the top security utilities available. Continue Reading
-
A look at Microsoft's Outlook Social Connector
Outlook Social Connector is a new feature in Outlook 2010 that aggregates information from social networking sites and displays it alongside email messages from Outlook contacts. Continue Reading
-
AD Rights Management Services and the protection within
For IT pros, the days of simply securing the perimeter are long gone. AD Rights Management Services is just one of many solutions designed to help protect data from the inside. Continue Reading
-
Create hundreds of Exchange 2010 mailboxes for real-world lab testing
Setting up users in a test lab can be a good way to demonstrate various tasks. But what if you want to create hundreds of users? Using a PowerShell script and these instructions, you can create hundreds of users with mailboxes in Exchange Server ... Continue Reading
-
Free WSUS utility offers on-the-fly patch management for Windows
A new app improves on the process of automated Windows updates – without the need for a WSUS server. Continue Reading
-
Key considerations for Hyper-V virtual machine deployments
When it comes to server virtualization with Hyper-V, there are certain factors that simply can't be ignored, such as processor needs and storage I/O. Continue Reading
-
RMS setup tips for multiple Active Directory domains
Phil Cox reviews how to offer rights-protected documents when you have more than one Active Directory domain, including a DMZ. Continue Reading
-
Say goodbye to Windows logon scripts with Group Policy preferences
In certain scenarios, Group Policy preferences can help admins overcome the challenges and limitations of basic logon scripts. See what you might be missing in this tip. Continue Reading
-
Fixing certificate mismatch errors in Outlook 2007
When acquiring X.509 certificates to use ActiveSync and OWA on your Exchange 2007 Server, you need to include the correct details in your request. If you don't, certificate mismatches can occur. This tip explains how to troubleshoot those errors. Continue Reading
-
AD Rights Management Services: How to allow remote user access
Phil Cox reviews how to allow your remote users to access RMS-protected documents. Continue Reading
-
Monitoring Windows DFS health with diagnostic reports
Windows Server 2008 features new reporting capabilities to help admins stay one step ahead of potential DFS replication problems. Continue Reading
-
Properly analyzing your Windows server vulnerability scan results
Not everything picked up by a vulnerability scan is as critical as some would have you believe. In fact, a lot of it can be taken with a big grain of salt. Continue Reading
-
Five mistakes to avoid when deploying Hyper-V virtual machines
While Hyper-V is relatively simple to set up, there are still plenty of gotchas to consider. Here are some of the most common configuration blunders that can trip you up. Continue Reading
-
Benefits of using email-enabled SharePoint document libraries
By email-enabling document libraries in SharePoint, you can share information with co-workers for a set period of time. Continue Reading
-
Using Group Policy preferences for immediate and scheduled tasks
The scheduling tools in Group Policy preferences let you run a command across an entire infrastructure quickly and easily. Continue Reading
-
Exchange Server 2007 clustering explained
Read this tip to learn about cluster continuous replication (CCR), standby continuous replication (SCR), local continuous replication (LCR) and other clustering methods in Exchange Server 2007. Continue Reading
-
Why is Microsoft Outlook blocking attachments?
Microsoft Outlook blocks email attachments to protect the Exchange Server organization from malware and viruses. This can be frustrating if it blocks safe attachments. Here are two workarounds you can use to make sure users can open safe attachments... Continue Reading
-
Five Group Policy preferences you must implement right now
GPPs have a lot to offer the Windows domain, but not everyone takes advantage of them as much as they could. Continue Reading
-
Troubleshooting KDC 7 event errors when no one else can
Finding the cause of errors logged as Event ID: 7 Source: KDC can be tricky business, especially when the error leads you down the wrong path. These steps will help you find the real cause – and fix it. Continue Reading
-
Is DirectAccess a threat to Windows security?
DirectAccess may be connectivity nirvana for remote users, but some admins have questions about the security risks involved. Continue Reading
-
How Exchange Server 2010 Shadow Redundancy prevents message loss
Hub transport servers are more resilient in Exchange Server 2010 because of Shadow Redundancy. See how this feature protects you from message loss – even during a hub transport server failure. Continue Reading
-
Standalone versus domain-based namespaces in Windows DFS
When setting up namespaces in Windows DFS, be aware that the popular choice may not be the best fit for your environment. Continue Reading
-
Active Directory Web Services brings new power to R2
Admins running Windows 2008 R2 might be interested in Active Directory Web Services, a new interface for accessing Active Directory and AD Lightweight Directory Services. Continue Reading
-
How to perform an Active Directory health check
Once your Active Directory is up and running, you do need to perform regular maintenance on it. Expert Joel Snyder reveals some of his best AD tricks. Continue Reading
-
Backing up SharePoint-related SQL Server databases
Find out exactly which database backup and recovery models you'll need for a full backup and restore of a SharePoint-associated SQL Server database. Continue Reading
-
Planning for disaster recovery with Microsoft Hyper-V
Virtualization is supposed to simplify disaster recovery, but is Microsoft's Hyper-V up to the task? It can be – if you plan accordingly. Continue Reading
-
Windows management tips: How to backup and restore Active Directory
If you lose your Active Directory, you lose everything. Expert Joel Snyder lays out a plan to help you backup and restore AD. Continue Reading
-
Grant users access to another user's Outlook 2007 mailbox
A situation may arise in which you need to delegate one Outlook 2007 user access to open another user's mailbox. Or you may want to monitor a user's mailbox without that user's knowledge. Read this tip to find out how. Continue Reading
-
Security testing: Finding the best method for your Windows servers
The type of testing you choose can dramatically impact the security of your servers. See which approach is right for your environment. Continue Reading
-
Windows PowerShell: What you absolutely need to know
You won't get far with PowerShell unless you know the basics. This article breaks down the key components and terminology to get you started. Continue Reading
-
Three technical skills every IT admin should have
If you're an IT administrator lacking in a technical background, learn all you can about these three fundamental principles. It will make all the difference in your career. Continue Reading
-
The anatomy of a Distributed File System namespace
Namespaces in DFS present users with a centralized view of file server resources. This article dissects the basic components of a DFS namespace. Continue Reading
-
Crash course on Microsoft Outlook 2007 calendar sharing
Microsoft Outlook 2007's calendar is a great way to keep tabs on your schedule and let co-workers know when you're free. Learn how to share your calendar and access other user's calendars. Continue Reading
-
Active Directory in R2: Features to care about, others to ignore
From the ADAC to managed service accounts, Active Directory in Windows 2008 R2 has several new capabilities. See the ones worth checking out -- and those that probably aren't. Continue Reading
-
Nine Exchange Server risks you shouldn't overlook
Missing patches, inadequate malware protection and OWA weaknesses can set up your Exchange Server for attacks. What security measures have you overlooked? Continue Reading
-
What's new in Microsoft Outlook 2010?
Microsoft upped the ante with Outlook 2010 by adding new features to help users increase productivity and become less reliant on the Help Desk. Continue Reading
-
Disaster prevention strategies for Active Directory forests
While the need to restore an entire AD forest is rare, having a solid forest recovery plan in place can ensure that smaller components like objects and DCs are recovered quickly. Continue Reading
-
Fixing lingering object problems in complex Active Directory forests
Lingering objects can provide an inconsistent view of the Active Directory and confuse administrators. Learn how to find and remove them in complex forests. Continue Reading
-
How Windows servers get hacked
Server hacking usually isn't as complex as it sounds. Knowing how easily an attacker can hack into your system can provide you with the tools to protect your servers ahead of time. Continue Reading
-
How to find and remove lingering objects in Active Directory
Don't you hate when deleted objects continue to pop up in Active Directory? Learn to troubleshoot the issue with a little AD housecleaning. Continue Reading
-
Perfmon made easy with PAL utility
Performance Monitor in Windows is a great troubleshooting tool, but analyzing logs can be tedious. Learn to use the free PAL utility to take the time out of troubleshooting. Continue Reading
-
Working with Active Directory snapshots in Windows Server 2008
Taking snapshots of your Active Directory is a good idea if you plan on making any major changes. This tip walks you through the process of creating and managing snapshots in AD. Continue Reading