February 2009In the first part of a two-part series on the standard procedures and tools for maintaining SharePoint security accounts, Pav Cherny explores the architectural details and the complicated process of accomplishing password changes.
Category: Microsoft Technet
Microsoft Monthly Technet Utility Spotlight
Utility Spotlight: Visual Round Trip Analyzer
February 2009The Visual Round-trip Analyzer utility can help you to discover the reasons why your Web pages may be slow to load, and what you can do to make the pages load faster.
Utility Spotlight: Web Page Error Toolkit
February 2009Discover how you can use the free Web Page Error Toolkit from Microsoft to replace the generic 404 page with a custom error pages, providing useful details for site visitors who bump into trouble.
SQL Q&A: Backup Compression, Client Redirection with Mirroring, and More
February 2009Should you enable Backup Compression? How can you avoid dropped application connections during a failover? Paul Randal answers these questions and more in the latest installment of SQL Q&A.
Toolbox: New Products for IT Pros
February 2009Greg Steen discusses using HTTP Debugger Pro to view and analyze HTTP data, using switcher to switch between applications, launching your applications with RocketDock, backing up your databases with SQLsafe, and performing fast recoveries …
Letters: Readers Speak Out
February 2009Letters: Readers Speak Out
From the Editor: Transform Information into Intelligence
February 2009From the Editor: Transform Information into Intelligence
From the Editor: Transform Information into Intelligence
February 2009From the Editor: Transform Information into Intelligence
Virtualization: Automating Virtual Machine Host Deployment
February 2009Hyper-V-based environments are relatively easy to automate, making it a trivial task to deploy and redeploy entire test environments with just a few clicks. Here’s what you need to know to start deploying Hyper-V servers, virtual machine…
Virtualization: Automating Virtual Machine Host Deployment
February 2009Hyper-V-based environments are relatively easy to automate, making it a trivial task to deploy and redeploy entire test environments with just a few clicks. Here’s what you need to know to start deploying Hyper-V servers, virtual machine…
Utility Spotlight: SyncToy 2.0
December 2008 This column describes what’s new in version 2 of SyncToy, a utility that helps you keep your files in sync across computers and external drives. Microsoft Download Link…
Utility Spotlight: Microsoft Remote Server Administration Tools for Windows Vista
January 2009 This column describes the Microsoft Remote Server Administration Tools, which allow administrators to remotely manage roles and features in Windows Server 2008 and Windows Server 2003 from a computer running Windows Vista SP1. Microsoft Download Link…
Utility Spotlight: USB Flash Drive Manager
January 2009 See how the free Microsoft USB Flash Drive Manager can help you easily copy, delete, and back up files from a flash drive, as well as perform other useful tasks. If your users are increasingly relying on USB flash drives for storing all or many of the files they use in the course… Continue reading Utility Spotlight: USB Flash Drive Manager
Utility Spotlight: Change Analysis Diagnostic
December 2008 See how the Change Analysis Diagnostic tool can help users discover system changes on their computers (from updates, new software, and changed hardware) and resolve problems they may encounter due to these changes. Change Analysis Diagnostic scans for six distinct categories of changes: Software Programs—installed applications, such as those listed in Add/Remove Programs… Continue reading Utility Spotlight: Change Analysis Diagnostic
Utility Spotlight: Internet Explorer Developer Toolbar
November 2008 Whether you develop Web content or simply support a webmaster, here’s a free Microsoft utility that will make your job easier. See how the Internet Explorer Developer Toolbar can help you explore and troubleshoot Web pages. Microsoft Download Link…
Security Watch: Revisiting the 10 Immutable Laws of Security, Part 2
November 2008It’s been about 8 years since “The 10 Immutable Laws of Security” were first published, and a lot has changed since then. In this installment, Jesper Johansson continues his analysis of the the immutable laws to see if they still hold true…
Security Watch: Revisiting the 10 Immutable Laws of Security, Part 2
November 2008It’s been about 8 years since “The 10 Immutable Laws of Security” were first published, and a lot has changed since then. In this installment, Jesper Johansson continues his analysis of the the immutable laws to see if they still hold true…
Security Watch: Revisiting the 10 Immutable Laws of Security, Part 2
November 2008It’s been about 8 years since “The 10 Immutable Laws of Security” were first published, and a lot has changed since then. In this installment, Jesper Johansson continues his analysis of the the immutable laws to see if they still hold true…
Inside SharePoint: Extending Office Applications with Web Services
November 2008Web services are fundamental building blocks of distributed business applications. Here’s an overview of how you can use Web services in a SharePoint environment to extend Microsoft Office applications.
System Center: Using Configuration Manager with Windows Server 2008
November 2008The release of System Center Configuration Manager SP1 added full support for managing Windows Server 2008 systems, including such new features as server core. Get a quick overview of deploying the ConfigMgr agent and using ConfigMgr to ma…