Tutorials

Tutorials

  • Tutorial: How to set up a front-end Exchange Server cluster

    Front-end Exchange servers can become overloaded if too many users attempt to use Outlook Web Access simultaneously. In this tutorial, I explain how you can configure a Network Load Balancing Service cluster or DNS-based round-robin cluster to ...  Continue Reading

  • Fast Guide: Group Policy

    Group Policy can be complicated. Make sure you understand how to implement it and how it affects security. Brush up on your Group Policy knowledge with this Fast Guide. This guide uses tips, webcasts and book excerpts to cover Group Policy design, ...  Continue Reading

  • Securing Windows domain controllers

    Domain controllers control the keys to your Windows kingdom. They need to be even more secure than your other servers. Ensure their security by following these steps from Active Directory expert Derek Melber.  Continue Reading

  • Phishing exposed -- 10 tips in 10 minutes

    A must read for programmers and administrators responsible for system security, this collection of 10 tips from Phishing Exposed, by Lance James, will teach you how to prepare for and defend against phishers and spammers. You'll learn tricks ...  Continue Reading

  • Step 1: Physical access

    Domain controllers control the keys to your Windows kingdom. They need to be even more secure than your other servers. Ensure their security by following these steps from Active Directory expert Derek Melber.  Continue Reading

  • Exchange Server Backup and Recovery Learning Guide

    In today's business world, e-mail is a mission-critical application for almost every company. With increased business continuance standards and compliance regulations, downtime or lost e-mail is no longer an option. This SearchExchange.com learning ...  Continue Reading

  • Step 3: The "block the nexus" approach: P2P

    In the wrong hands IM and P2P file sharing can be too much of a risk for your organization. There are many ways to block this traffic, but some are more elegant -- with less adverse effects -- than others. Contributor Serdar Yegulalp details this ...  Continue Reading

  • Step 2: The "block the nexus" approach: IM

    In the wrong hands IM and P2P file sharing can be too much of a risk for your organization. There are many ways to block this traffic, but some are more elegant -- with less adverse effects -- than others. Contributor Serdar Yegulalp details this ...  Continue Reading

  • Step 1: The "easy, but stupid" approach

    In the wrong hands IM and P2P file sharing can be too much of a risk for your organization. There are many ways to block this traffic, but some are more elegant -- with less adverse effects -- than others. Contributor Serdar Yegulalp details this ...  Continue Reading

-ADS BY GOOGLE

SearchServerVirtualization

SearchCloudComputing

SearchSQLServer

SearchEnterpriseDesktop

SearchVirtualDesktop

Close