Get help securing your Windows 2000-based network or system with these how-to articles and step-by-step guides. Information included on prescriptive architecture, configuring a static IP address, and associating disk partitions with physical disk drives.
This paper is a technical step-by-step guide of the capabilities of Group Policy, the central component of the Change and Configuration Management features of Windows 2000.
This guide explains how to view, configure, and analyze local security policy and local security settings using various components of the Security Configuration Tool Set included with Windows 2000.
Create Windows Installer (.msi) packages that install applications on client computers using VERITAS WinINSTALL LE.
This step-by-step guide provides instructions for installing Cluster service on servers running Windows 2000 Advanced Server and Windows 2000 Datacenter Server operating systems. Also describes the installation process for Cluster service on cluster nodes.
This document explains the Distributed File System (Dfs) in Windows 2000. Dfs provides a mechanism for administrators to create logical views of directories and files, regardless those files' physical location in the network.
This guide demonstrates how to set up Simple Mail Transfer Protocol (SMTP)-based replication between two Windows 2000-based domain controllers, each belonging to a different domain.
This guide explains the fastest way to use IPSec to secure application traffic between a client and a server and shows how to enable security using IPSec default policies between two Windows 2000-based systems belonging to a Windows 2000 domain.
Set up Windows 2000 to operate with security services that are based on the MIT Kerberos version 5 reference implementation.
The Microsoft Management Console (MMC) lets system administrators create much more flexible user interfaces and customize administration tools. This step-by-step guide explores some of these new features.
This guide explains basic features related to Public Key Infrastructure (PKI) in Internet Explorer 5.x. Describes how to use public key certificates to perform client authentication over a secure HTTP connection, using TLS 1.0, SSLv2 and SSLv3, or PCT 1.0.
This guide details basic features related to the Public Key Infrastructure (PKI) in Outlook 2000 messaging and collaboration software. Describes how to configure Outlook 2000 to send signed and encrypted e-mail messages using the S/MIME mail standard.
This guide explains basic features related to Public Key Infrastructure (PKI) in Outlook Express messaging and collaboration software 5.0 and above. Describes how to configure Outlook Express to send signed and encrypted e-mail messages using S/MIME.
Remote Installation Services (RIS) uses the Dynamic Host Configuration Protocol (DHCP)-based remote boot technology to help IT staff with deploying Windows 2000 Professional remotely. This document explains how to install, configure, and use RIS.
The procedures in this document detail the installation and use of a smart card reader on the Windows 2000 Professional workstation that is connected to the Windows 2000 domain controller.
This technical step-by-step guide provides examples of using the secondary logon feature, the Run as service, in the Windows 2000 operating system.
This step-by-step guide describes scenarios illustrating User Data Management and User Settings Management benefits. (User Data Management and User Settings Management are part of the new IntelliMirrorTM management technology in Windows 2000.)
This guide contains sample procedures demonstrating how the TAPI IP multicast videoconferencing capabilities work with the Windows 2000 operating system.
This overview guide explains how to use the Software Installation and Maintenance extension of the Group Policy Microsoft Management Console snap-in to specify policy settings for application deployment for groups of users and computers in Windows 2000.