November2008November 2008

System Center:Monitoring Windows Server 2008 with OpsMgr 2007

As you deploy Windows Server 2008 into your environment, you’ll need a way to manage and monitor its health, performance, and availability. Fortunately, you can use the existing System Center tools you are already familiar with. See how you can use OpsMgr 2007 to manage your Windows Server 2008 assets. Pete Zerger

System Center:Using Configuration Manager with Windows Server 2008

The release of System Center Configuration Manager SP1 added full support for managing Windows Server 2008 systems, including such new features as server core. Get a quick overview of deploying the ConfigMgr agent and using ConfigMgr to manage Windows Server 2008 systems throughout your organization. Cameron Fuller

System Center:Granular Targeting in Operations Manager 2007

For every monitoring object you build, you must also decide what target to use. Choosing the correct target is critical, but knowing how to go about choosing the correct target is not always clear. Steve Rachui explores various options for correct targeting in OpsMgr and provides guidance for choosing the appropriate method for each scenario. Steve Rachui

Windows Server 2008:Presentation Virtualization with Enhanced Terminal Services

Virtualization isn’t limited to virtual machines and the virtualization of operating systems. Terminal Services has been abstracting the presentation layer of remotely run applications and desktops for years. Take a close look at key improvements to Terminal Services in Windows Server 2008 and get some tips for using these new features. Joshua Schnoll

SQL Server 2008:Tracking Changes in Your Enterprise Database

SQL Server 2008 introduces two new features that allow you to track changes more easily and efficiently. Paul Randal examines the new Change Tracking and Change Data Capture features and discusses the implications these features will have for database administrators. Paul S. Randal

https://technet.microsoft.com/en-us/library/bb978519(v=msdn.10)
https://technet.microsoft.com/en-us/library/cc135917(v=msdn.10)

Columns

From the Editor:Now What?
Joshua Hoffman
Letters:Readers Speak Out
Toolbox:New Products for IT Pros
Greg Steen
Exchange Queue & A:Outlook Anywhere and IPv6, the Remote Connectivity Analyzer, and More
Have Exchange questions? We've got answers. This month, Henrik Walther looks at configuring Windows Server 2008 to work with Outlook Anywhere, testing remote connectivity, deploying standby continuous replication, and more.Henrik Walther
Utility Spotlight:Internet Explorer Developer Toolbar
Whether you develop Web content or simply support a webmaster, here’s a free Microsoft utility that will make your job easier. See how the Internet Explorer Developer Toolbar can help you explore and troubleshoot Web pages.Lance Whitney
Inside SharePoint:Extending Office Applications with Web Services
Web services are fundamental building blocks of distributed business applications. Here's an overview of how you can use Web services in a SharePoint environment to extend Microsoft Office applications.Pav Cherny
Windows PowerShell:Building Your Own Software Inventory Tool
Don Jones demonstrates a Windows PowerShell-based inventory tool and guides you through the process that goes into building such a solution.Don Jones
Hey, Scripting Guy!:Probing the Depths of WMI
This month, The Scripting Guys take a close look at the WMI infrastructure. Along the way, they provide some helpful scripts that can serve as a starting point for learning more and accomplishing useful administrative tasks.The Microsoft Scripting Guys
The Desktop Files:Data Loss Prevention with Enterprise Rights Management
Enterprise rights management is effectively the only way to protect confidential information from being leaked. Discover how the Microsoft rights management solution can protect your organization's information from unauthorized access and use.Wes Miller
Security Watch:Revisiting the 10 Immutable Laws of Security, Part 2
It's been about 8 years since "The 10 Immutable Laws of Security" were first published, and a lot has changed since then. In this installment, Jesper Johansson continues his analysis of the the immutable laws to see if they still hold true after 8 years.Jesper M. Johansson
Field Notes:Old Wine in New Bottles
Romi Mahajan reflects on how technology has dramatically impacted community, but explains why there will always be a need for in-person meetings and events.Romi Mahajan
Windows Confidential:Windows Can but Won’t
Raymond Chen explains why Windows can but chooses not to replace a file that is currently in use.Raymond Chen