This documentation is archived and is not being maintained.
Geek of All Trades: Simple Clustering with Hyper-V
Greg Shields - April 2009
Struggling to keep computers running with a minimum of resources and a shrinking budget is a challenge. One thing you can do is increase the availability of your servers with Hyper-V and failover clustering. Find out how.
Virtualization: Automating Virtual Machine Host Deployment
Fergus Strachan - February 2009
Hyper-V-based environments are relatively easy to automate, making it a trivial task to deploy and redeploy entire test environments with just a few clicks. Here’s what you need to know to start deploying Hyper-V servers, virtual machines, guest operating systems, and server applications with no need for administrator interaction.
Geek of All Trades: Making Sense of Server Core
Greg Shields - February 2009
In the world of IT publications, the needs of the jack-of-all-trades IT professionals tend to be neglected. Do you work in a small environment where you are responsible for managing everything from network routing to changing toner cartridges? If so, this new column is dedicated to you. In this first installment, Greg Shields discusses using Windows Server 2008 Server Core in a small environment.
Windows Administration: Deploying Applications with Terminal Services
Greg Shields - January 2009
Without too much effort, you can deploy a terminal server to host the applications you need in your environment. But there are some important decisions you’ll need to make to ensure your implementation meets user expectations. Greg Shields discusses the various options you have and explains how they will affect you.
Active Directory: Understanding Proxy Authentication in AD LDS
Ken St. Cyr - December 2008
Proxy authentication lets users perform a simple bind to an Active Directory Lightweight Directory Services instance but still have an association to an Active Directory account. This can be very useful: it gives developers full access to a user object without giving them access to the Active Directory account, and it allows products that require the X.500 format to be used with Active Directory. Here’s what you need to know about proxy authentication.
Virtualization: An Introduction to Hyper-V in Windows Server 2008
Rajiv Arunkundram - October 2008
The introduction of Hyper-V makes virtualization an even more compelling solution for IT environments. Get an overview of today’s virtualization market and see how Hyper-V improves the manageability, reliability, and security of virtualization
Virtualization: Achieving High Availability for Hyper-V
Steven Ekren - October 2008
Consolidating servers onto fewer physical machines has many advantages, but it is extremely important that you plan for your systems to be highly available. Here’s a guide to using Windows Server 2008 Failover Clustering to bring high availability to your Hyper-V virtual machines.
Virtualization: Backup and Disaster Recovery for Server Virtualization
Adam Fazio - October 2008
Virtualization brings significant changes to disaster recovery. Here’s an introduction to how the Microsoft virtualization platform factors into your disaster recovery plan, as well as a deeper look into backup and restore options and considerations for Windows Server 2008 Hyper-V.
The Desktop Files: Customizing Windows Deployment Services
Wes Miller - October 2008
Wes Miller delves into Windows Deployment Services, showing you how you can customize and configure WDS to meet the needs of your organization.
ISA Server: Enhance TS Gateway Security with ISA Server 2006
Dr. Thomas W. Shinder and Yuri Diogenes - September 2008
Using the new TS Gateway feature, Windows Server 2008 enables users to access their desktops from anywhere, without using a VPN. Find out how you can publish the TS Gateway through ISA Server 2006 and extend the ISA Server 2006 publishing scenario to include client health enforcement.
IIS 7.0: Top 10 Performance Improvements in IIS 7.0
Mike Volodarsky - September 2008
The latest release of IIS introduces a modular and extensible platform with improved support for common deployment and management scenarios, enabling significant performance improvements. Here’s a look at 10 key areas in IIS 7.0 that provide these improvements.
The Desktop Files: Advanced Functionality in WDS
Wes Miller - September 2008
In his third installment on Windows Deployment Services, Wes Miller explores features that enhance performance and scalability, logging, and command-line automation.
IIS: Going Live with IIS 7.0
Fergus Strachan - July 2008
The release of Internet Information Services 7.0 sets new standards, offers fundamental improvements, and brings new capabilities for consolidating Web environments. Explore the most important enhancements and get an in-depth guide to testing, staging, and migrating your Web apps to IIS 7.0.
Windows Administration: Introducing Windows Server 2008 Failover Clustering
Chuck Timon - July 2008
Users have complained for years that clustering in Windows Server is too complicated. With the release of Windows Server 2008, clustering received a complete facelift. Explore some of the most significant advancements found in the new Failover Clustering, and see how this new implementation makes clusters much easier to set up and maintain.
Windows Administration: Active Directory Backup and Restore in Windows Server 2008
Gil Kirkpatrick - May 2008
Windows Server 2008 and the new Windows Server Backup utility bring many changes and welcome enhancements to backing up. Here is an in-depth guide to backing up and restoring Active Directory in the new server OS.
Special Coverage: Windows Server 2008: Inside Windows Server 2008 Kernel Changes
Mark Russinovich - March 2008
Dive in to our detailed tour of key changes in the Windows Server 2008 kernel that improve reliability, performance, and scalability. Find out how Windows Server 2008 makes better use of thread pools, streamlines recovery from hardware failures, improves virtualization with Hyper-V, and more.
Special Coverage: Windows Server 2008: What's New in Active Directory Domain Services
Gil Kirkpatrick - March 2008
Windows Server 2008 introduces some substantial enhancements to Active Directory Domain Services. Take a close look at how read-only domain controllers and Windows Server Core improve security in your environment, how the new Server Manager and revamped backup simplify management, and how the new auditing tools help ensure compliance.
Special Coverage: Windows Server 2008: Getting Started with IIS 7.0
Isaac Roybal - March 2008
IIS 7.0 is packed with new features—too many to include in a single article. The new version builds on the solid, securityfocused design you got with IIS 6.0, providing enhancements that greatly improve the manageability and extensibility of the platform. Get an overview of some of the most important changes in IIS 7.0.
Special Coverage: Windows Server 2008: Policy-Driven Network Access with Windows Server 2008
Ian Hameroff and Amith Krishnan - March 2008
How do you allow network access to those who need it without sacrificing security? See how new technologies in Windows Server 2008, such as Windows Firewall with Advanced Security and Network Access Protection, let you implement a policy-based approach to help you achieve this goal. Ian Hameroff and Amith Krishnan 62 Configuring Roles with Server Manager A DNS server need not be a print server. One approach Windows Server 2008 takes to improve security and manageability is to simplify server roles so you can easily install only the tools and services you need, and nothing more. Here's an introduction to using Server Manager for configuring roles and simplifying deployments.
Special Coverage: Windows Server 2008: Configuring Roles with Server Manager
Byron Hynes - March 2008
A DNS server need not be a print server. One approach Windows Server 2008 takes to improve security and manageability is to simplify server roles so you can easily install only the tools and services you need, and nothing more. Here's an introduction to using Server Manager for configuring roles and simplifying deployments.
Special Coverage: Windows Server 2008: Deploying Windows Server 2008 with System Center
Tim Mintner - March 2008
It used to be that server administrators would install Windows Server manually using the CD or DVD and then spend several hours configuring the server. With the release of System Center Configuration Manager 2007 and the new Microsoft Deployment Toolkit, server administrators can now use the same tools that desktop administrators have been using for years to automate deployments.
Special Coverage: Windows Server 2008: Auditing and Compliance in Windows Server 2008
Rob Campbell and Joel Yoker - March 2008
Auditing change is now a core responsibility for IT departments. It is an essential part of understanding and managing systems and data in a distributed environment. This article discusses common challenges, the landscape of compliance and regulation, some of the basics of auditing, and how you can create a comprehensive auditing strategy.
Security Watch: Using SCW on Windows Server 2008
Jesper M. Johansson - March 2008
You've heard about the new Server Manager tool in Windows Server 2008. But the Security Configuration Wizard (SCW) is still available, as well. Find out why you will still want to use SCW.
The Cable Guy: Wireless Single Sign-On
Joseph Davies - November 2007
Single Sign On offers many advantages for both end users and administrators. Here's a look at how Single Sign On can simplify implementation of wireless authentication for your network.
Security Watch: Secure Access Anywhere
John Morello - November 2007
Explore network and security design considerations for an anywhere-access solution using Terminal Service components, and learn some practical methods and best practices for creating a solution with Windows Server 2008.
The Cable Guy: The Authenticated Internet Protocol
Joseph Davies - October 2007
The Internet Key Exchange protocol and Authenticated Internet Protocol are both used to determine keying material and negotiate security parameters for IPsec-protected communications. Get an in-depth look at how they work.
Security Watch: PKI Enhancements in Windows
John Morello - August 2007
In Windows Vista and Windows Server 2008, the Windows PKI platform offers support for advanced algorithms, real time validity checking, and better manageability. Check out the new PKI features and see how they can be used to lower costs while improving security.
The Cable Guy: The Secure Socket Tunneling Protocol
Joseph Davies - June 2007
The VPN protocols in Windows XP and Windows Server 2003 don’t work for some configurations. Get an in depth look at the various issues and see how Windows Server “Longhorn” and Windows Vista with Service Pack 1 will use the Secure Socket Tunneling Protocol to solve these problems.
The Cable Guy: EAPHost in Windows
Joseph Davies - May 2007
The Extensible Authentication Protocol, which is a framework that enables extensibility for authentication methods, has had certain limitations on previous Windows platforms. Examine how the EAPHost architecture in Windows Vista and Windows Server “Longhorn” addresses these limitations.
Security Watch: Network Access Protection
John Morello - May 2007
Rogue devices being used behind the network perimeter pose a serious security risk. Microsoft Network Access Protection provides a flexible architecture for organizations of all sizes to protect themselves from non-compliant computers brought on to the network by employees, vendors, and visitors.
The Cable Guy: The DHCPv6 Protocol
Joseph Davies - March 2007
With an IPv6 network, you don't actually need DHCP to configure addresses, but there can be good reasons to use it. Find out why, and learn how to use DHCPv6 in your environment.
The Future Of Windows: Directory Services in Windows Server "Longhorn"
Byron Hynes - November 2006
A number of improvements in Active Directory will come your way with the next version of Windows Server. These new Active Directory features will solve a number of problems you previously had to try to work around or simply live with.