TechNet Magazine > Home > Topics >  Windows Server: TechNet Magazine Articles
TechNet Magazine: Windows Server rss

All TechNet Magazine Topics
  • Web Infrastructure: ASP.NET Web Cache Spurs Performance and Scalability
    Iqbal Khan - August 2009
    By reducing the number of times that certain Web pages execute, Web-caching solutions can dramatically reduce performance and scalability bottlenecks. This article offers a comprehensive look at ASP.NET Web Cache key features, geographical cache distribution, Web-caching clusters and more.

  • Inside SharePoint: Improving SharePoint Performance
    Pav Cherny - August 2009
    Pav Cherney presents an overview of key SharePoint architecture components, describes how they can lead to common performance issues, and discusses how to resolve and troubleshoot problems.

  • Geek of all Trades: Microsoft's New Certifications: What They Are, Why They Matter
    Greg Shields - August 2009
    With the Microsoft Certified Systems Engineer credential being retired for all iterations but Windows Server 2003, a new certification program has been created. Greg Shields explains how this new certification path helps to better identify where your skills lie.

  • Geek of all Trades: Microsoft's New Certifications: What They Are, Why They Matter
    Greg Shields - August 2009
    With the Microsoft Certified Systems Engineer credential being retired for all iterations but Windows Server 2003, a new certification program has been created. Greg Shields explains how this new certification path helps to better identify where your skills lie.

  • The Cable Guy: Support for IPv6 in Windows Server 2008 R2 and Windows 7
    Joseph Davies - July 2009
    Windows Server 2008 R2 and Windows 7 offer new features that support IPv6 for local and remote connectivity and for simplified management of host settings, as Joseph Davies explains.

  • Group Policy: Automating Group Policy Management with Windows PowerShell
    Darren Mar-Elia - June 2009
    Group Policy is used in almost every environment and relied on by many to secure and their Windows environment. Surprisingly few have introduced automation into the process, however. This article explains how to take advantage of the GPMC APIs and Windows PowerShell to automate management of Group Policy in your organization.

  • Group Policy: Automating Group Policy Management with Windows PowerShell
    Darren Mar-Elia - June 2009
    Group Policy is used in almost every environment and relied on by many to secure and their Windows environment. Surprisingly few have introduced automation into the process, however. This article explains how to take advantage of the GPMC APIs and Windows PowerShell to automate management of Group Policy in your organization.

  • Active Directory: Using Catch-All Subnets in Active Directory
    John Policelli - June 2009
    In an ideal world, users are directed to the appropriate domain controller for Active Directory authentication, but this is not necessarily what happens in most organizations due to IP subnet information not being properly defined in Active Directory. This article presents a solution to ensure users locate the appropriate DC for authentication—a catch-all subnet to catch the authentication from clients on subnets are not defined in Active Directory.

  • Web Infrastructure: Providing Scalability for ASP.NET Applications
    Iqbal Khan - June 2009
    Although Web technology provides an elegant architecture of Web farms and load balancers for ASP.NET applications, data storage technologies have not kept pace, so the applications are unable to scale effectively. The solution is an in-memory storage mechanism that can grow linearly—a distributed cache, as this article discusses.

  • Active Directory: Export, Compare, and Synchronize Active Directory Schemas
    John Policelli - April 2009
    If your organization has multiple Active Directory forests, you need to manage multiple Active Directory schemas and ensure consistency between schemas. Check out our step-by-step guide to comparing and synchronizing Active Directory schemas in multi-forest environments.

  • Windows HPC Server 2008: High Performance Computing in the Real World
    Joshua M. Kunken - April 2009
    Windows HPC Server 2008 was designed specifically for use in compute-intensive environments. See how it is used, along with other Microsoft technologies, in a life science laboratory to provide a solution that enables automated processing of data generated from an imaging device.

  • Inside SharePoint: Security and Compliance with AD RMS
    Pav Cherny - April 2009
    SharePoint integration with AD RMS can be useful for extending security and regulatory compliance solutions beyond the SharePoint environment. But for real security, the SharePoint environment must be secure within itself.

  • Geek of All Trades: Simple Clustering with Hyper-V
    Greg Shields - April 2009
    Struggling to keep computers running with a minimum of resources and a shrinking budget is a challenge. One thing you can do is increase the availability of your servers with Hyper-V and failover clustering. Find out how.

  • Virtualization: Automating Virtual Machine Host Deployment
    Fergus Strachan - February 2009
    Hyper-V-based environments are relatively easy to automate, making it a trivial task to deploy and redeploy entire test environments with just a few clicks. Here’s what you need to know to start deploying Hyper-V servers, virtual machines, guest operating systems, and server applications with no need for administrator interaction.

  • Geek of All Trades: Making Sense of Server Core
    Greg Shields - February 2009
    In the world of IT publications, the needs of the jack-of-all-trades IT professionals tend to be neglected. Do you work in a small environment where you are responsible for managing everything from network routing to changing toner cartridges? If so, this new column is dedicated to you. In this first installment, Greg Shields discusses using Windows Server 2008 Server Core in a small environment.

  • Windows Administration: Expanded Control with Group Policy Preferences
    Derek Melber - January 2009
    The new Group Policy Preferences feature found in Windows Server 2008 and Windows Vista provides more than 3,000 settings, greatly expanding what administrators can do with Group Policy. Here’s a guide to using Group Policy Preferences to manage your environment.

  • Windows Administration: Deploying Applications with Terminal Services
    Greg Shields - January 2009
    Without too much effort, you can deploy a terminal server to host the applications you need in your environment. But there are some important decisions you’ll need to make to ensure your implementation meets user expectations. Greg Shields discusses the various options you have and explains how they will affect you.

  • Interop: Authenticate Linux Clients with Active Directory
    Gil Kirkpatrick - December 2008
    Many IT shops are divided into two camps—the Windows team and the Linux team—but we all have the same ultimate goal of providing high-quality and cost-effective IT services. One way you can do this is by sharing core software infrastructure. Think Windows and Linux don’t mix? See how you can configure Linux machines to use Active Directory for authentication.

  • Interop: Authenticate Linux Clients with Active Directory
    Gil Kirkpatrick - December 2008
    Many IT shops are divided into two camps—the Windows team and the Linux team—but we all have the same ultimate goal of providing high-quality and cost-effective IT services. One way you can do this is by sharing core software infrastructure. Think Windows and Linux don’t mix? See how you can configure Linux machines to use Active Directory for authentication.

  • Interop: Interacting with Windows from a Mac Environment
    Wes Miller - December 2008
    How times have changed! These days it is fairly easy to bring Macs into your Windows network infrastructure. And with a little work you can even integrate some of the operating system services. Learn how to connect Macs to Active Directory, see how you can use Entourage with Exchange, integrate the Messenger for Mac 7 application with your Windows-based communications, and explore how you can bridge the platforms with virtualization.

  • Active Directory: Understanding Proxy Authentication in AD LDS
    Ken St. Cyr - December 2008
    Proxy authentication lets users perform a simple bind to an Active Directory Lightweight Directory Services instance but still have an association to an Active Directory account. This can be very useful: it gives developers full access to a user object without giving them access to the Active Directory account, and it allows products that require the X.500 format to be used with Active Directory. Here’s what you need to know about proxy authentication.

  • Active Directory: Understanding Proxy Authentication in AD LDS
    Ken St. Cyr - December 2008
    Proxy authentication lets users perform a simple bind to an Active Directory Lightweight Directory Services instance but still have an association to an Active Directory account. This can be very useful: it gives developers full access to a user object without giving them access to the Active Directory account, and it allows products that require the X.500 format to be used with Active Directory. Here’s what you need to know about proxy authentication.

  • Virtualization: An Introduction to Hyper-V in Windows Server 2008
    Rajiv Arunkundram - October 2008
    The introduction of Hyper-V makes virtualization an even more compelling solution for IT environments. Get an overview of today’s virtualization market and see how Hyper-V improves the manageability, reliability, and security of virtualization

  • Virtualization: Achieving High Availability for Hyper-V
    Steven Ekren - October 2008
    Consolidating servers onto fewer physical machines has many advantages, but it is extremely important that you plan for your systems to be highly available. Here’s a guide to using Windows Server 2008 Failover Clustering to bring high availability to your Hyper-V virtual machines.

  • Virtualization: Backup and Disaster Recovery for Server Virtualization
    Adam Fazio - October 2008
    Virtualization brings significant changes to disaster recovery. Here’s an introduction to how the Microsoft virtualization platform factors into your disaster recovery plan, as well as a deeper look into backup and restore options and considerations for Windows Server 2008 Hyper-V.

  • The Desktop Files: Customizing Windows Deployment Services
    Wes Miller - October 2008
    Wes Miller delves into Windows Deployment Services, showing you how you can customize and configure WDS to meet the needs of your organization.

  • ISA Server: Enhance TS Gateway Security with ISA Server 2006
    Dr. Thomas W. Shinder and Yuri Diogenes - September 2008
    Using the new TS Gateway feature, Windows Server 2008 enables users to access their desktops from anywhere, without using a VPN. Find out how you can publish the TS Gateway through ISA Server 2006 and extend the ISA Server 2006 publishing scenario to include client health enforcement.

  • IIS 7.0: Top 10 Performance Improvements in IIS 7.0
    Mike Volodarsky - September 2008
    The latest release of IIS introduces a modular and extensible platform with improved support for common deployment and management scenarios, enabling significant performance improvements. Here’s a look at 10 key areas in IIS 7.0 that provide these improvements.

  • The Desktop Files: Advanced Functionality in WDS
    Wes Miller - September 2008
    In his third installment on Windows Deployment Services, Wes Miller explores features that enhance performance and scalability, logging, and command-line automation.

  • Windows Administration: Taking Your Server’s Pulse
    Steven Choy - August 2008
    Your users are complaining that a server is running poorly—do you know where to look to diagnose the problem? PerfMon can be an indispensible tool for this as it has numerous diagnostic capabilities. Get an overview of the key indicators you should use to diagnose a variety of common bottlenecks that can slow down your servers.

  • IIS: Going Live with IIS 7.0
    Fergus Strachan - July 2008
    The release of Internet Information Services 7.0 sets new standards, offers fundamental improvements, and brings new capabilities for consolidating Web environments. Explore the most important enhancements and get an in-depth guide to testing, staging, and migrating your Web apps to IIS 7.0.

  • Windows Administration: Introducing Windows Server 2008 Failover Clustering
    Chuck Timon - July 2008
    Users have complained for years that clustering in Windows Server is too complicated. With the release of Windows Server 2008, clustering received a complete facelift. Explore some of the most significant advancements found in the new Failover Clustering, and see how this new implementation makes clusters much easier to set up and maintain.

  • Security: Application Lockdown with Software Restriction Policies
    Chris Corio and Durga Prasad Sayana - June 2008
    When you want to reduce the total cost of ownership of the desktop machines in your organization, application lockdown can be a great help, letting you limit IT issues related to unsupported applications. See how you can use software restriction policies and Group Policy to control the applications being run throughout your IT infrastructure.

  • Windows Administration: Active Directory Backup and Restore in Windows Server 2008
    Gil Kirkpatrick - May 2008
    Windows Server 2008 and the new Windows Server Backup utility bring many changes and welcome enhancements to backing up. Here is an in-depth guide to backing up and restoring Active Directory in the new server OS.

  • Windows Administration: Active Directory Backup and Restore in Windows Server 2008
    Gil Kirkpatrick - May 2008
    Windows Server 2008 and the new Windows Server Backup utility bring many changes and welcome enhancements to backing up. Here is an in-depth guide to backing up and restoring Active Directory in the new server OS.

  • Windows Administration: Designing OU Structures that Work
    Ken St. Cyr - May 2008
    Too many administrators underestimate the importance of having a well-designed Organizational Unit structure. Find out why having a sound OU strategy is important and determine the best OU structure for your organization.

  • Windows Administration: Extending the Active Directory Schema
    Vikas Malhotra - May 2008
    Many applications that rely on Active Directory define their own changes to the schema. But it's important that these changes don't impact other applications. Get an overview of extending the Active Directory through the classSchema and attributeSchema objects.

  • Sustainable Computing: Conserving Energy with Group Policy
    Mark Aggar, Pat Stemen, and Michael Walsh - May 2008
    Enforcing a power management strategy on the systems throughout your entire organization can add up to substantial savings. And Windows Vista includes 35 power management settings that you can configure and enforce with Group Policy. Here is some guidance for configuring some of the more common settings.

  • Special Coverage: Windows Server 2008: Inside Windows Server 2008 Kernel Changes
    Mark Russinovich - March 2008
    Dive in to our detailed tour of key changes in the Windows Server 2008 kernel that improve reliability, performance, and scalability. Find out how Windows Server 2008 makes better use of thread pools, streamlines recovery from hardware failures, improves virtualization with Hyper-V, and more.

  • Special Coverage: Windows Server 2008: What's New in Active Directory Domain Services
    Gil Kirkpatrick - March 2008
    Windows Server 2008 introduces some substantial enhancements to Active Directory Domain Services. Take a close look at how read-only domain controllers and Windows Server Core improve security in your environment, how the new Server Manager and revamped backup simplify management, and how the new auditing tools help ensure compliance.

  • Special Coverage: Windows Server 2008: What's New in Active Directory Domain Services
    Gil Kirkpatrick - March 2008
    Windows Server 2008 introduces some substantial enhancements to Active Directory Domain Services. Take a close look at how read-only domain controllers and Windows Server Core improve security in your environment, how the new Server Manager and revamped backup simplify management, and how the new auditing tools help ensure compliance.

  • Special Coverage: Windows Server 2008: Getting Started with IIS 7.0
    Isaac Roybal - March 2008
    IIS 7.0 is packed with new features—too many to include in a single article. The new version builds on the solid, securityfocused design you got with IIS 6.0, providing enhancements that greatly improve the manageability and extensibility of the platform. Get an overview of some of the most important changes in IIS 7.0.

  • Special Coverage: Windows Server 2008: Policy-Driven Network Access with Windows Server 2008
    Ian Hameroff and Amith Krishnan - March 2008
    How do you allow network access to those who need it without sacrificing security? See how new technologies in Windows Server 2008, such as Windows Firewall with Advanced Security and Network Access Protection, let you implement a policy-based approach to help you achieve this goal. Ian Hameroff and Amith Krishnan 62 Configuring Roles with Server Manager A DNS server need not be a print server. One approach Windows Server 2008 takes to improve security and manageability is to simplify server roles so you can easily install only the tools and services you need, and nothing more. Here's an introduction to using Server Manager for configuring roles and simplifying deployments.

  • Special Coverage: Windows Server 2008: Configuring Roles with Server Manager
    Byron Hynes - March 2008
    A DNS server need not be a print server. One approach Windows Server 2008 takes to improve security and manageability is to simplify server roles so you can easily install only the tools and services you need, and nothing more. Here's an introduction to using Server Manager for configuring roles and simplifying deployments.

  • Special Coverage: Windows Server 2008: Deploying Windows Server 2008 with System Center
    Tim Mintner - March 2008
    It used to be that server administrators would install Windows Server manually using the CD or DVD and then spend several hours configuring the server. With the release of System Center Configuration Manager 2007 and the new Microsoft Deployment Toolkit, server administrators can now use the same tools that desktop administrators have been using for years to automate deployments.

  • Special Coverage: Windows Server 2008: Auditing and Compliance in Windows Server 2008
    Rob Campbell and Joel Yoker - March 2008
    Auditing change is now a core responsibility for IT departments. It is an essential part of understanding and managing systems and data in a distributed environment. This article discusses common challenges, the landscape of compliance and regulation, some of the basics of auditing, and how you can create a comprehensive auditing strategy.

  • Security Watch: Using SCW on Windows Server 2008
    Jesper M. Johansson - March 2008
    You've heard about the new Server Manager tool in Windows Server 2008. But the Security Configuration Wizard (SCW) is still available, as well. Find out why you will still want to use SCW.

  • High Performance Computing: An Introduction to Windows Compute Cluster Server
    John Kelbley and Doug Lindsey - February 2008
    Rather than relying on large specialized systems, high performance computing uses clusters of smaller, standard systems. Spreading the workload in this fashion offers an economical solution for solving complex problems quickly. Explore the compute cluster functionality and support provided by Windows Compute Cluster Server 2003.

  • Utility Spotlight: ADMX Migrator
    Lance Whitney - February 2008
    With Windows Vista, the format for Group Policy templates has changed to an XML-based structure. The ADMX Migrator utility can convert your legacy ADM files into the new ADMX format, as well as help you easily create your own custom ADMX files.

  • Group Policy: Inside ADM and ADMX Templates for Group Policy
    Jeremy Moskowitz - January 2008
    ADM files are both necessary and often confusing. Don't let this slow your Group Policy efforts. This guided tour will help you better understand what's inside ADM files and the new ADMX format, which tools you can use to handle them, and how you can make the best use of these files.

  • Group Policy: Inside ADM and ADMX Templates for Group Policy
    Jeremy Moskowitz - January 2008
    ADM files are both necessary and often confusing. Don't let this slow your Group Policy efforts. This guided tour will help you better understand what's inside ADM files and the new ADMX format, which tools you can use to handle them, and how you can make the best use of these files.

  • Group Policy: Optimizing Group Policy Performance
    Darren Mar-Elia - January 2008
    All Group Policy is not the same, and knowing the differences between types can help you fine-tune performance on your systems. Explore monolithic and functional GPs, learn how to process Group Policy, and find out what happens when Group Policy changes occur.

  • Group Policy: Optimizing Group Policy Performance
    Darren Mar-Elia - January 2008
    All Group Policy is not the same, and knowing the differences between types can help you fine-tune performance on your systems. Explore monolithic and functional GPs, learn how to process Group Policy, and find out what happens when Group Policy changes occur.

  • Group Policy: Dive into Advanced Group Policy Management
    Derek Melber - January 2008
    AGPM, or Advanced Group Policy Management, is a handy tool that lets you work with Group Policy Objects in ways that other tools don't. And it's now available to members of the Microsoft Software Assurance program. Check out how you can use AGPM to edit GPOs offline, delegate administration, track changes, and more.

  • Group Policy: Dive into Advanced Group Policy Management
    Derek Melber - January 2008
    AGPM, or Advanced Group Policy Management, is a handy tool that lets you work with Group Policy Objects in ways that other tools don't. And it's now available to members of the Microsoft Software Assurance program. Check out how you can use AGPM to edit GPOs offline, delegate administration, track changes, and more.

  • The Cable Guy: Wireless Single Sign-On
    Joseph Davies - November 2007
    Single Sign On offers many advantages for both end users and administrators. Here's a look at how Single Sign On can simplify implementation of wireless authentication for your network.

  • Research Notes: Using High-Performance Computing in the Fight against HIV
    Kristin Firth and Mia Matusow - November 2007
    Take a look at how the eScience team in Microsoft Research is collaborating with medical researchers and using high performance computing to help find a cure for HIV.

  • Security Watch: Secure Access Anywhere
    John Morello - November 2007
    Explore network and security design considerations for an anywhere-access solution using Terminal Service components, and learn some practical methods and best practices for creating a solution with Windows Server 2008.

  • Windows Administration: A Guide to Active Directory Replication
    Laura E. Hunter - October 2007
    Active Directory provides a great deal of flexibility for supporting a large or decentralized environment, but maintaining the integrity of your data can be challenging. Active Directory replication defines how updates are communicated throughout your environment and how conflicts are resolved. Here's what you need to know to meet the challenge.

  • Windows Administration: A Guide to Active Directory Replication
    Laura E. Hunter - October 2007
    Active Directory provides a great deal of flexibility for supporting a large or decentralized environment, but maintaining the integrity of your data can be challenging. Active Directory replication defines how updates are communicated throughout your environment and how conflicts are resolved. Here's what you need to know to meet the challenge.

  • The Cable Guy: The Authenticated Internet Protocol
    Joseph Davies - October 2007
    The Internet Key Exchange protocol and Authenticated Internet Protocol are both used to determine keying material and negotiate security parameters for IPsec-protected communications. Get an in-depth look at how they work.

  • Windows Server: 11 Essential Tools for Managing Active Directory
    Laura E. Hunter - September 2007
    In a large organization, even the most common Active Directory tasks, such as adding and modifying objects, can be tedious and time-consuming. These 11 tools can make Active Directory management a lot easier.

  • Windows Server: 11 Essential Tools for Managing Active Directory
    Laura E. Hunter - September 2007
    In a large organization, even the most common Active Directory tasks, such as adding and modifying objects, can be tedious and time-consuming. These 11 tools can make Active Directory management a lot easier.

  • Windows Server: Reanimating Active Directory Tombstone Objects
    Gil Kirkpatrick - September 2007
    There are a few essential tricks and tools that should be included in every Active Directory disaster-recovery plan. Tombstone reanimation is one of these techniques, offering the only way to recover deleted objects without taking a domain controller off line. Here’s a guide to finding and recovering tombstones in Active Directory.

  • Windows Server: Reanimating Active Directory Tombstone Objects
    Gil Kirkpatrick - September 2007
    There are a few essential tricks and tools that should be included in every Active Directory disaster-recovery plan. Tombstone reanimation is one of these techniques, offering the only way to recover deleted objects without taking a domain controller off line. Here’s a guide to finding and recovering tombstones in Active Directory.

  • Hey, Scripting Guy!: Who Are You?
    The Microsoft Scripting Guys - August 2007
    With Active Directory, users can have a variety of identities, such as givenName, displayName, userPrincipalName, or distinguishedName. As a system administrator, how do you get all this information about a user? With a script, of course.

  • Security Watch: PKI Enhancements in Windows
    John Morello - August 2007
    In Windows Vista and Windows Server 2008, the Windows PKI platform offers support for advanced algorithms, real time validity checking, and better manageability. Check out the new PKI features and see how they can be used to lower costs while improving security.

  • Windows Administration: The ActiveX Installer Service in Windows Vista
    Rob Campbell and Joel Yoker - July 2007
    How do you secure the desktop against malicious ActiveX controls without limiting application compatibility? We’ll take you on a tour of the ActiveX Installer Service (AxIS) in Windows Vista that addresses this issue with a new way to manage ActiveX controls.

  • How IT Works: Troubleshooting RPC Errors
    Zubair Alexander - July 2007
    Ever been confused by cryptic remote procedure call errors? Take a look at some common errors, techniques you can use to identify errors, and solutions to specific problems.

  • Security: Managing Hardware Restrictions via Group Policy
    Jeremy Moskowitz - June 2007
    USB thumb-disk keys and other removable devices can make your personal life easier but your professional life harder. For improved security, you need a way to control what hardware devices your users are installing on their work systems. Now you can use Group Policy to control which devices they can use and which ones they can’t.

  • The Cable Guy: The Secure Socket Tunneling Protocol
    Joseph Davies - June 2007
    The VPN protocols in Windows XP and Windows Server 2003 don’t work for some configurations. Get an in depth look at the various issues and see how Windows Server “Longhorn” and Windows Vista with Service Pack 1 will use the Secure Socket Tunneling Protocol to solve these problems.

  • Windows Administration: Simplify Group Policy Administration with Windows PowerShell
    Thorbjörn Sjövold - May 2007
    Windows PowerShell is set to make your job significantly easier. See how GPMC APIs written for Windows Scripting Host languages can be consumed directly from Windows PowerShell, greatly simplifying the way you manage Group Policy.

  • Windows Administration: Simplify Group Policy Administration with Windows PowerShell
    Thorbjörn Sjövold - May 2007
    Windows PowerShell is set to make your job significantly easier. See how GPMC APIs written for Windows Scripting Host languages can be consumed directly from Windows PowerShell, greatly simplifying the way you manage Group Policy.

  • Windows Administration: A Guide to Deploying Terminal Services
    James D. Silliman - May 2007
    There are numerous advantages to running your organization’s applications centrally, and getting started is now surprisingly easy. Here’s what you need to know in order to enable Terminal Services on Windows Server 2003 and implement Terminal Services throughout your organization.

  • The Cable Guy: EAPHost in Windows
    Joseph Davies - May 2007
    The Extensible Authentication Protocol, which is a framework that enables extensibility for authentication methods, has had certain limitations on previous Windows platforms. Examine how the EAPHost architecture in Windows Vista and Windows Server “Longhorn” addresses these limitations.

  • Security Watch: Network Access Protection
    John Morello - May 2007
    Rogue devices being used behind the network perimeter pose a serious security risk. Microsoft Network Access Protection provides a flexible architecture for organizations of all sizes to protect themselves from non-compliant computers brought on to the network by employees, vendors, and visitors.

  • Windows Administration: Disaster Recovery: Active Directory Users and Groups
    Gil Kirkpatrick - April 2007
    Data recovery in Active Directory can be very complex, yet it’s essential that you have a recovery plan in order. We show you how Active Directory stores, deletes, restores, and replicates objects so you can be prepared the next time a user or group membership is accidentally deleted.

  • Windows Administration: Disaster Recovery: Active Directory Users and Groups
    Gil Kirkpatrick - April 2007
    Data recovery in Active Directory can be very complex, yet it’s essential that you have a recovery plan in order. We show you how Active Directory stores, deletes, restores, and replicates objects so you can be prepared the next time a user or group membership is accidentally deleted.

  • Inside Microsoft.com: Using Active Directory Federation Services
    Jim Guthrie - April 2007
    Microsoft provides an extranet for its business partners, and this extranet requires that each external user have a unique domain account. Find out how Microsoft is planning to use Active Directory Federation Services to make a better user experience while streamlining the management involved.

  • Inside Microsoft.com: Using Active Directory Federation Services
    Jim Guthrie - April 2007
    Microsoft provides an extranet for its business partners, and this extranet requires that each external user have a unique domain account. Find out how Microsoft is planning to use Active Directory Federation Services to make a better user experience while streamlining the management involved.

  • The Cable Guy: The DHCPv6 Protocol
    Joseph Davies - March 2007
    With an IPv6 network, you don't actually need DHCP to configure addresses, but there can be good reasons to use it. Find out why, and learn how to use DHCPv6 in your environment.

  • Windows Administration: Delegating Authority in Active Directory
    Joel Yoker and Rob Campbell - February 2007
    Implementing delegation in Active Directory can enhance security and simplify management tasks, and getting started is easier than you think. Here are some simple delegation models that will work in most IT infrastructures with little modification.

  • Windows Administration: Dig into New Group Policy Templates in Windows Vista
    Darren Mar-Elia - February 2007
    Windows Vista introduces significant changes to Group Policy templates. Find out everything you need to know about the new format, called ADMX, and how these changes will improve the administration of system configurations.

  • Windows Administration: Dig into New Group Policy Templates in Windows Vista
    Darren Mar-Elia - February 2007
    Windows Vista introduces significant changes to Group Policy templates. Find out everything you need to know about the new format, called ADMX, and how these changes will improve the administration of system configurations.

  • Windows Administration: Your Guide to Group Policy Troubleshooting
    Derek Melber - February 2007
    Getting to the bottom of Group Policy issues can be a difficult process, but understanding how Group Policy works, and where problems can arise, makes things easier. This overview will help you troubleshoot Group Policy issues like a guru.

  • Windows Administration: Your Guide to Group Policy Troubleshooting
    Derek Melber - February 2007
    Getting to the bottom of Group Policy issues can be a difficult process, but understanding how Group Policy works, and where problems can arise, makes things easier. This overview will help you troubleshoot Group Policy issues like a guru.

  • Windows Administration: Monitoring Active Directory with MOM
    John Hann - February 2007
    Management packs for Microsoft Operations Manager 2005 allow you to more effectively monitor your IT infrastructure. See how these five management packs can help you keep an eye on the health, security, and reliability of your Active Directory environment.

  • Utility Spotlight: Group Policy Inventory
    Greg Steen - February 2007


  • Windows Vista: More Powerful Group Policy in Windows Vista
    Jeremy Moskowitz - November 2006
    The Group Policy infrastructure has been overhauled, delivering new management features, new policy settings, support for multiple local GPOs, and much more. This article looks under the hood at the many changes Windows Vista brings to Group Policy.

  • The Future Of Windows: Directory Services in Windows Server "Longhorn"
    Byron Hynes - November 2006
    A number of improvements in Active Directory will come your way with the next version of Windows Server. These new Active Directory features will solve a number of problems you previously had to try to work around or simply live with.

  • Inside Microsoft.com: Management and Delegation of ASP.NET
    Jeff Toews - November 2006
    One of the microsoft.com operations team’s challenges is the proper configuration of ASP.NET. Here are some tips they’ve learned.

  • Inside Microsoft.com: Management and Delegation of ASP.NET
    Jeff Toews - November 2006
    One of the microsoft.com operations team’s challenges is the proper configuration of ASP.NET. Here are some tips they’ve learned.

  • Deployment: Make Server Rollouts a Snap with Automated Deployment Services
    John Savill - October 2006
    Intrigued by standardized images, faster rebuilds, and consistent supportability? Automating the deployment of servers offers benefits for any organization—big or small. Here’s what you need to know to get started.

  • Small Business Server: Master Your Domain: Build a Corporate Network at Home
    Matt Clapham and Jesper M. Johansson - October 2006
    Want a home network that’s just as powerful as the one at work? Here’s an affordable solution to bring home secure messaging, shared resources, single sign-on, and everything else you’ve come to expect from your corporate network.

  • Utility Spotlight: File Server Migration Toolkit
    Jeremy Moskowitz - October 2006


  • How IT Works: Windows Rights Management Services
    Randy Muller - October 2006


  • Inside Microsoft.com: Release Management
    Jim Scardelis - September 2006


  • Security Watch: Lock Up Your Domain Controllers
    Steve Riley - September 2006


  • Security Watch: Lock Up Your Domain Controllers
    Steve Riley - September 2006


  • Disaster Recovery: Plan Ahead to Save Your Web
    Chris Adams - August 2006


  • Disaster Recovery: Plan Ahead to Save Your Web
    Chris Adams - August 2006


  • Windows Administration: Manage Printers with New Group Policy Features in Windows Server 2003 R2
    Jeremy Moskowitz - August 2006


  • Windows Administration: Manage Printers with New Group Policy Features in Windows Server 2003 R2
    Jeremy Moskowitz - August 2006


  • How IT Works: Certificate Services
    Randy Muller - August 2006


  • Inside Microsoft.com: Analyze Web Stats with Log Parser
    Jeffrey A. Johnson - August 2006


  • Inside Microsoft.com: Analyze Web Stats with Log Parser
    Jeffrey A. Johnson - August 2006


  • Managing Identity: Automate Active Directory Group Management
    Craig Owen - July 2006
    Group management is central to today's businesses. Groups are commonly used to control access to network resources, computers, buildings, and so on. Simultaneously, they need to grant access to

  • Managing Identity: Simplify Single Sign-on Using ADFS
    Matt Steele - July 2006


  • Managing Identity: Simplify Single Sign-on Using ADFS
    Matt Steele - July 2006


  • Managing Identity: Simplify Single Sign-on Using ADFS
    Matt Steele - July 2006


  • Managing Identity: Create Custom Directories with ADAM
    Brian Redmond - July 2006
    Active Directory Application Mode, also known as ADAM, is often misunderstood. In this article I will demystify ADAM, explain how it can be a useful tool in many organizations, and show you some valuable utilities that make it easier to use.

  • Managing Identity: Create Custom Directories with ADAM
    Brian Redmond - July 2006
    Active Directory Application Mode, also known as ADAM, is often misunderstood. In this article I will demystify ADAM, explain how it can be a useful tool in many organizations, and show you some valuable utilities that make it easier to use.

  • Managing Identity: Create Custom Directories with ADAM
    Brian Redmond - July 2006
    Active Directory Application Mode, also known as ADAM, is often misunderstood. In this article I will demystify ADAM, explain how it can be a useful tool in many organizations, and show you some valuable utilities that make it easier to use.

  • Managing Identity: Extreme VPN Makeover
    David Conrad - July 2006
    Who decided that Virtual Private Networks, or VPNs, were a good idea? With VPNs, we could let armies of mobile workers with "legitimate" business needs connect to our nice corporate

  • Inside Microsoft.com: Managing SQL Server 2005 Peer-to-Peer Replication
    David Lindquist - July 2006
    The Microsoft corporate Web sites rely heavily on databases, which power such high-traffic destinations as Microsoft® Update, Download Center, Communities, TechNet, and MSDN®. Microsoft. com operations has a team of 17 engineers, the SQL Server™ operations team, that manages these database systems.

  • Security: 19 Smart Tips for Securing Active Directory
    Sean Deuby - May • June 2006
    Does Active Directory keep you up at night? One could easily understand why. It is most likely the largest and most critical distributed system in your enterprise. Along with

  • Security: 19 Smart Tips for Securing Active Directory
    Sean Deuby - May • June 2006
    Does Active Directory keep you up at night? One could easily understand why. It is most likely the largest and most critical distributed system in your enterprise. Along with

  • Security: Group Policy: Ins And Outs Of Delegation And Control
    Jeremy Moskowitz - May • June 2006


  • Security: Group Policy: Ins And Outs Of Delegation And Control
    Jeremy Moskowitz - May • June 2006


  • Windows Server 2003 R2: Get Control of File System Resources with Windows Server 2003 R2
    John Savill - May • June 2006


  • Windows Server 2003 R2: Take Back Your Bandwidth With New Replication Features In Windows Server 2003 R2
    Alan von Weltin - May • June 2006


  • Windows Server 2003 R2: Give Your Server An Identity: New Roles In Windows Server 2003 R2
    Derek Melber - May • June 2006


  • How IT Works: Encrypting File System
    Randy Muller - May • June 2006
    Mobile users can be a pain in the neck for the IT pro. The convenience and portability of laptops must be weighed against the potential for data loss and the possible compromise of confidential company information.

  • Inside Microsoft.com: Moving Microsoft Update Downloads to x64
    Deighton Maragh and Mark W. Roellich - May • June 2006
    One of the responsibilities of the Microsoft. com operations team is to manage the infrastructure that supports the Windows Update and Microsoft Update services, which have client bases in the hundreds of millions and growing.

  • Inside Microsoft.com: Moving Microsoft Update Downloads to x64
    Deighton Maragh and Mark W. Roellich - May • June 2006
    One of the responsibilities of the Microsoft. com operations team is to manage the infrastructure that supports the Windows Update and Microsoft Update services, which have client bases in the hundreds of millions and growing.

  • Serving the Web: Nine Tips to Enhance IIS Security
    Brett Hill - May • June 2006
    Securing your IIS 6.0 installation is an important task. The amount of work required can vary greatly depending on the complexity of your application as well as your infrastructure and how these combine with your need to secure content.

  • Serving the Web: Nine Tips to Enhance IIS Security
    Brett Hill - May • June 2006
    Securing your IIS 6.0 installation is an important task. The amount of work required can vary greatly depending on the complexity of your application as well as your infrastructure and how these combine with your need to secure content.

  • Windows Confidential: The Intranet Can Be a Scary Place
    Raymond Chen - May • June 2006
    If you’ve installed Windows Server™ 2003, you’ve probably discovered that Microsoft® Internet Explorer® doesn’t behave quite the same as it used to. You get prompted for your domain password more often, script doesn’t run, downloading from Web Folders is blocked—it’s just not fun.

  • Utility Spotlight: Server Performance Advisor
    Joshua Hoffman - March • April 2006
    Establishing solid configurations that are optimized for a server’s unique environment can often be challenging work, especially in large or complex environments. Once your servers are deployed, keeping an eye on performance to ensure that every server is running in tip-top shape can be a full-time job.

  • Security Watch: Establish a Remote Access Quarantine
    Steve Riley - March • April 2006
    In those good old easy-to-manage pre-mobility days, personal computers presented few actual threats to a network. Sure, there was the occasional virus you’d get from a borrowed floppy disk, but the rate, or at least the speed, of infection was pretty low—limited substantially by the low bandwidth and high latency of "sneakernet" technology.

  • Inside Microsoft.com: Analyzing Denial of Service Attacks
    Paul Wright - March • April 2006
    If you’ve been following this column, you know how big Microsoft. com is. If not, you can probably imagine. On average, the site reaches over 13 million unique users per day, and about 289 million per month.

  • Windows Administration: Rapid Recovery with the Volume Shadow Copy Service
    Dave Field - January • February 2006


  • Serving the Web: Configuring Application Pools in IIS 6.0
    Brett Hill - January • February 2006
    One of the best improvements in IIS 6. 0 over earlier versions was the introduction of Application Pools (often called App Pools for short). When IIS 6. 0 is running in Worker Process Isolation Mode (the default in a new installation of Microsoft® Windows Server™ 2003), every IIS 6.

  • Serving the Web: Configuring Application Pools in IIS 6.0
    Brett Hill - January • February 2006
    One of the best improvements in IIS 6. 0 over earlier versions was the introduction of Application Pools (often called App Pools for short). When IIS 6. 0 is running in Worker Process Isolation Mode (the default in a new installation of Microsoft® Windows Server™ 2003), every IIS 6.

  • Inside Microsoft.com: Making the Move to x64
    Chris St. Amand - January • February 2006
    For many years, one of the biggest challenges faced by the Microsoft. com Web site engineers was the virtual memory limitations of the 32-bit operating system. With hundreds of different applications running on the site, there was often contention for the 2GB address limit that the front-end Web servers had to deal with.

  • Inside Microsoft.com: Making the Move to x64
    Chris St. Amand - January • February 2006
    For many years, one of the biggest challenges faced by the Microsoft. com Web site engineers was the virtual memory limitations of the 32-bit operating system. With hundreds of different applications running on the site, there was often contention for the 2GB address limit that the front-end Web servers had to deal with.

  • Web Administration: Top Ten Ways To Pump Up IIS Performance
    Brien M. Posey - November • December 2005
    If you host one or more Web sites that receive a lot of traffic, IIS performance is important to you. To enhance performance, you could always cluster your IIS servers or buy more bandwidth, but this tends to be a little expensive.

  • Web Administration: Top Ten Ways To Pump Up IIS Performance
    Brien M. Posey - November • December 2005
    If you host one or more Web sites that receive a lot of traffic, IIS performance is important to you. To enhance performance, you could always cluster your IIS servers or buy more bandwidth, but this tends to be a little expensive.

  • Web Administration: Improve Your Web Security With Encryption And Firewall Technologies
    Stephen Lamb - November • December 2005
    If you're like most IT professionals, your work life is an ongoing balancing act in which you aim to adopt the latest technological innovations while keeping your enterprise secure. So you welcome any software that makes the whole

  • Web Administration: Improve Your Web Security With Encryption And Firewall Technologies
    Stephen Lamb - November • December 2005
    If you're like most IT professionals, your work life is an ongoing balancing act in which you aim to adopt the latest technological innovations while keeping your enterprise secure. So you welcome any software that makes the whole

  • Web Administration: How Does Your Web Garden Grow? The ABCs of ASP.NET Deployment
    Dino Esposito - November • December 2005


  • Web Administration: How Does Your Web Garden Grow? The ABCs of ASP.NET Deployment
    Dino Esposito - November • December 2005


  • Web Administration: Discover the IIS Metabase: Unlock the Details of Your Web Server Configuration
    Randy Muller - November • December 2005
    Some of the major changes in IIS 6.0, the latest Web server from Microsoft, are happening in the metabase. In IIS 4.0 and IIS 5.0, the metabase, which functions as a hierarchical storage facility for configuration information and schema,

  • Web Administration: Discover the IIS Metabase: Unlock the Details of Your Web Server Configuration
    Randy Muller - November • December 2005
    Some of the major changes in IIS 6.0, the latest Web server from Microsoft, are happening in the metabase. In IIS 4.0 and IIS 5.0, the metabase, which functions as a hierarchical storage facility for configuration information and schema,

  • Patch Management: Next-Generation Patch Management: Introducing Windows Server Update Services
    Jason Leznek - November • December 2005
    Vulnerability assessment and remediation can be a time-consuming task. However, it’s an important one that every company, big and small, needs to focus attention on. As the

  • Patch Management: A Hands-On Guide to Hands-Off Updates with WSUS
    Jeremy Moskowitz - November • December 2005
    An essential, though sometimes time-consuming, task for protecting your computing environment is to keep systems current with the latest software updates and patches. To help streamline this process, Microsoft recently released

  • Post Mortem: Securing a Government Agency with Smart Cards
    John Morello - November • December 2005
    Homeland Security Presidential Directive 12 (HSPD12) requires Federal government agencies to begin utilizing strong, two-factor authentication for physical and logical access to Federal buildings and computer systems.

  • Security Watch: A guide to Wireless Security
    Kathryn Tewson and Steve Riley - November • December 2005
    Setting up a wireless network is incredibly easy. There’s no cable to pull, no holes to drill; just plug in your wireless access point (AP), let your wireless connection manager auto-associate, and you’re online.

  • Beta Box: First Look at IIS 7.0
    Brett Hill - November • December 2005
    When I saw my first demo of IIS 7. 0, I thought "this changes everything. " The new version changes the application’s architecture and introduces some exciting changes that greatly improve the capabilities of IIS.

  • Beta Box: First Look at IIS 7.0
    Brett Hill - November • December 2005
    When I saw my first demo of IIS 7. 0, I thought "this changes everything. " The new version changes the application’s architecture and introduces some exciting changes that greatly improve the capabilities of IIS.

  • Inside Microsoft.com: Web Site Configuration Management
    The Microsoft.com Operations Team - November • December 2005
    The Microsoft. com operations team is responsible for some of the busiest IIS-based Web sites on the Internet, including Microsoft. com, Windows® Update, MSDN®, TechNet, Microsoft Downloads, and many more.

  • Inside Microsoft.com: Web Site Configuration Management
    The Microsoft.com Operations Team - November • December 2005
    The Microsoft. com operations team is responsible for some of the busiest IIS-based Web sites on the Internet, including Microsoft. com, Windows® Update, MSDN®, TechNet, Microsoft Downloads, and many more.

  • On Site: Is Small Business Server Right For You?
    Jay Shaw - November • December 2005
    I enjoy writing about problems I’ve actually encountered and resolved in my work. It gives me the opportunity to share the benefit of my experience on a particular topic and allows me to grow as a consultant.

  • Windows Administration: Breathe New Life Into Your Server! From Windows NT To Windows Server 2003
    Jonathan Hassell - Spring 2005
    If you're moving up from Windows NT to Windows Server 2003, you'll be pleasantly surprised. But before making the move, find out what you need to consider first and get the best migration strategies for your needs.

  • Windows Administration: Secure Your Desktops With The New Group Policy Settings In SP2
    Jeremy Moskowitz - Spring 2005
    Group Policy lets you control who can access resources across your network and what types of actions users can perform based on their roles. New settings in Windows XP SP2 offer even tighter control so you can regulate more and worry less.

  • Windows Administration: Secure Your Desktops With The New Group Policy Settings In SP2
    Jeremy Moskowitz - Spring 2005
    Group Policy lets you control who can access resources across your network and what types of actions users can perform based on their roles. New settings in Windows XP SP2 offer even tighter control so you can regulate more and worry less.

  • Windows Administration: Redundancy On A Budget: Implementing A RAID File Server
    Robert Walker - Spring 2005
    Did you know that you can implement a fault-tolerant departmental file server on a low-end desktop PC? All you need is RAID, Windows Server 2003, a PC, and an extra hard drive, and you're good to go.

  • Windows Administration: Preserve Your Data With The Backup Tool You Already Have
    Jay Shaw - Spring 2005
    If you're running Windows XP, Windows 2000 Server, or Windows Server 2003, you already have Ntbackup. It's time to dispel some of the myths about how it works so you can get good, efficient backups without blowing your software budget.

  • Utility Spotlight: Limit Login Attempts With LimitLogin
    - Spring 2005
    Ever needed to limit concurrent user logins in an Active Directory® domain? Ever wanted to keep track of information about every login in a domain? If so, LimitLogin is for you.

  • Utility Spotlight: Limit Login Attempts With LimitLogin
    - Spring 2005
    Ever needed to limit concurrent user logins in an Active Directory® domain? Ever wanted to keep track of information about every login in a domain? If so, LimitLogin is for you.

  • Serving the Web: Get It Right The First Time With IIS 6.0
    Chris Adams - Spring 2005
    Server administrators are always on a quest for the secret formula that will solve their performance woes. But no matter what you may have heard, there is no magic pixie dust. Yet the promises keep rolling in, even though few results are delivered.

  • Serving the Web: Get It Right The First Time With IIS 6.0
    Chris Adams - Spring 2005
    Server administrators are always on a quest for the secret formula that will solve their performance woes. But no matter what you may have heard, there is no magic pixie dust. Yet the promises keep rolling in, even though few results are delivered.

  • Resources: IIS 6.0 Performance Tune-Up
    Phil Sherwood - Spring 2005
    By now you've probably gotten to know IIS 6. 0, available in all versions of Windows Server™ 2003, and are taking advantage of much that this Web server offers. It's important to keep an eye on the overall goal of IIS 6.

  • Resources: IIS 6.0 Performance Tune-Up
    Phil Sherwood - Spring 2005
    By now you've probably gotten to know IIS 6. 0, available in all versions of Windows Server™ 2003, and are taking advantage of much that this Web server offers. It's important to keep an eye on the overall goal of IIS 6.

  • Serving the Web: Essential Security Administration For IIS 6.0
    Brett Hill - Winter 2005
    IIS 5. 0 administrators are familiar with the important security-related tasks required to harden and maintain a secure Web services environment. The many new features and capabilities of IIS 6. 0, available with every version of Windows Server™ 2003, renders the previous version obsolete.

  • Serving the Web: Essential Security Administration For IIS 6.0
    Brett Hill - Winter 2005
    IIS 5. 0 administrators are familiar with the important security-related tasks required to harden and maintain a secure Web services environment. The many new features and capabilities of IIS 6. 0, available with every version of Windows Server™ 2003, renders the previous version obsolete.

  • Resources: IIS 6.0 Security
    Phil Sherwood - Winter 2005
    In today's business environment, most organizations are using Web servers to extend products and services to both internal and external customers. At the same time, attackers are increasing their relentlessness and sophistication.

  • Resources: IIS 6.0 Security
    Phil Sherwood - Winter 2005
    In today's business environment, most organizations are using Web servers to extend products and services to both internal and external customers. At the same time, attackers are increasing their relentlessness and sophistication.

Page view tracker