Who gave this reader the silly idea that Windows 2000 and Windows 2003 can't live within the same domain?
- By Bill Boswell
- April 20, 2004
Software Restriction Policies is a terrific new security tool—if you know what it can’t do, as well as what it can.
- By Roberta Bragg
- April 01, 2004
Using the Active Directory Connector is an effective way to move your legacy Exchange environment to a new Exchange 2003 setup.
- By Bill Boswell
- April 01, 2004
Knowing what’s in your Event Logs is a key to knowing what your servers are doing. Here’s how to make sense of them.
- By Derek Melber
- April 01, 2004
This script allows logoff and shut down of remote users.
- By Don Jones
- April 01, 2004
Sure, you can do Knowledge Base searches online. But there’s plenty more that TechNet offers.
- By Al Valvano
- April 01, 2004
Simple IIS backup techniques
- By Don Jones
- March 26, 2004
A slap-dash solution for transferring profiles in toto. Anyone with a more elegant method?
- By Bill Boswell
- March 16, 2004
The File Replication Service (FRS) has a justifiably bad reputation for bugginess and indecipherable logs. But recent changes from Redmond make it worth another look.
- By Gary Olsen
- March 01, 2004
Buying new servers and more direct-attached disks solves short-term storage issues but creates a bigger problem—the storage management nightmare. Network attached storage, which separates disks from servers, is one answer. We evaluate three top NAS solutions running Windows Storage Server.
- By Chris Wolf
- March 01, 2004
Learn how to properly manage admin accounts.
- By Don Jones
- March 01, 2004
New security features promise more secure desktops, says Microsoft chairman at RSA Conference 2004.
- By Keith Ward
- February 24, 2004
It’s a truism in IT that various parts of your network—servers, hard drives, video cards, that mission-critical software program—will grind to a halt eventually. Here we present four disaster-recovery scenarios and how to recover from each.
- By Derek Melber
- February 01, 2004
Cull unused or deleted accounts using the LDIFDE tool and some scripting trickery.
- By Bill Boswell
- February 01, 2004
Many security-related tasks can be tedious—and, therefore, overlooked. Using these 10 scripts can make your life easier, while simultaneously locking down your network.
- By Don Jones
- February 01, 2004