Winter 2005 Your IT department is interested in conducting security audits. The group wants to have statistics generated about the usage of access control entries (ACEs) in their domain deployment. They want to be able to run a job every Sunday at 1:00 A. Microsoft Download Link…
Category: Microsoft Technet
Microsoft Monthly Technet Utility Spotlight
Utility Spotlight: Limit Login Attempts With LimitLogin
Spring 2005 Ever needed to limit concurrent user logins in an Active Directory® domain? Ever wanted to keep track of information about every login in a domain? If so, LimitLogin is for you. Microsoft Download Link…
Utility Spotlight: RunUpdates.cmd
November • December 2005 A great deal of time is often invested in determining the best ways to keep an infrastructure current, and rightfully so. In this month’s Utility Spotlight I take a look at a great way to make sure that desktops are as current as possible from the day they are deployed. Microsoft… Continue reading Utility Spotlight: RunUpdates.cmd
Utility Spotlight: WMI Code Creator
January • February 2006 As a systems administrator you’re surely no stranger to Windows®Management Instrumentation (WMI), which gives you access to a wealth of management information and allows you to automate administrative tasks. Microsoft Download Link…
Utility Spotlight: Server Performance Advisor
March • April 2006 Establishing solid configurations that are optimized for a server’s unique environment can often be challenging work, especially in large or complex environments. Once your servers are deployed, keeping an eye on performance to ensure that every server is running in tip-top shape can be a full-time job. Microsoft Download Link…
Utility Spotlight: Automate Device Driver Integration
May • June 2006 When you’re deploying thousands of Windows-based computers, configuring a single system and duplicating its hard drive (or system image) onto other corporate computers can save you a lot of time and free up IT resources. Microsoft Download Link…
Utility Spotlight: The Shared Computer Toolkit
July 2006 One of the most common requests I get at my Group Policy forum, GPanswers. com, is how to take machines and “lock them down. ” People want to ensure their machines can’t be broken by Joe User or Harry Badguy. Microsoft Download Link…
Utility Spotlight: Scripting Trouble-Free Downloads with BITS
August 2006 Utility Spotlight: Scripting Trouble-Free Downloads with BITS Microsoft Download Link…
Utility Spotlight: Access-Based Enumeration
September 2006 As a systems administrator, you’ve probably had users complain that they can’t access certain folders they see in Windows® Explorer. The cause is often simple: the user doesn’t have permission to open those resources. Microsoft Download Link…
Security Watch: Revisiting the 10 Immutable Laws of Security, Part 1
October 2008It’s been about 8 years since “The 10 Immutable Laws of Security” were first published, and a lot has changed since then. This month, Jesper Johansson kicks off a three-part series in which he analyzes the laws from today’s perspective to s…
Utility Spotlight: Offline Virtual Machine Servicing Tool
October 2008Virtual machines that are stored offline don’t automatically receive the necessary updates to keep them safe and compliant. This, in turn, can pose a risk to your entire IT environment. Find out how the free Offline Virtual Machine Servic…
Virtualization: Manage Your Virtual Environments with VMM 2008
October 2008System Center Virtual Machine Manager provides a consolidated interface for managing your virtual infrastructure. The latest version adds support for Windows Server 2008 Hyper-V, as well as for VMware virtual machines. Explore the new featu…
Toolbox: New Products for IT Pros
October 2008Toolbox: New Products for IT Pros
Virtualization: Getting Started with Microsoft Application Virtualization
October 2008Microsoft Application Virtualization (App-V) allows you to deliver virtualized desktops to client systems throughout your organization. This simplifies system management and liberates employees from their desktops. Take a close look at how …
Hey, Scripting Guy!: Famous Last Words
October 2008The Scripting Guys discuss Socrates and revisit the topic of querying an XML file . This time, however, the XML file is structured so that rather than using child nodes, additional property values are configured as attributes.
Virtualization: Achieving High Availability for Hyper-V
October 2008Consolidating servers onto fewer physical machines has many advantages, but it is extremely important that you plan for your systems to be highly available. Here’s a guide to using Windows Server 2008 Failover Clustering to bring high ava…
Virtualization: Achieving High Availability for Hyper-V
October 2008Consolidating servers onto fewer physical machines has many advantages, but it is extremely important that you plan for your systems to be highly available. Here’s a guide to using Windows Server 2008 Failover Clustering to bring high ava…
Virtualization: An Introduction to Hyper-V in Windows Server 2008
October 2008The introduction of Hyper-V makes virtualization an even more compelling solution for IT environments. Get an overview of today’s virtualization market and see how Hyper-V improves the manageability, reliability, and security of virtualiz…
Virtualization: Backup and Disaster Recovery for Server Virtualization
October 2008Virtualization brings significant changes to disaster recovery. Here’s an introduction to how the Microsoft virtualization platform factors into your disaster recovery plan, as well as a deeper look into backup and restore options and con…
SQL Q&A: Large Transaction Logs, When to Use Repair, and More
October 2008In this installment, Paul Randal answers questions about backing up and restoring, looks at the differences between log shipping and database mirroring, and explains why the Repair function should only be used as a last resort.