September 2006

系統管理:破解 MOM 中 WMI 事件的神秘

基本上,幾乎每個值得注意的 Windows 事件都會產生 WMI 事件。瞭解您該如何透過 MOM 監視 WMI 事件,以提供更強大的解決方案來進行系統管理。 Brian Wren

System Management:Zero Touch Installation: Automating Operating Systems Migrations

Get an overview of how SMS 2003 and some powerful new tools can make your next desktop OS deployment a no-touch operation. We’ll take a detailed look at the process involved for three common migration scenarios. Jason Cross

System Management:Gathering WMI Data without Writing a Single Line of Code

WMI is a powerful tool, but writing scripts to harness it can be intimidating. Here’s a hidden command-line interface that makes it easier to take advantage of WMI. Best of all, the tool is already on your system. John Kelbley

系統管理:Windows PE 入門

您在部署作業系統的過程中可能已接觸過 Windows PE。但您知道它也可運用在修復、診斷與維修方面嗎?以下將討論某些您所不瞭解的 Windows PE 相關資訊。 Wes Miller

系統管理:使用 MOM 監視安全性事件

想瞭解如何遵循法規嗎?瞭解如何使用 MOM 管理組件監視安全性事件,以及報告 HIPAA 與沙賓法案所需的資料。 John Orefice

System Management:Essential Tools for MOM Administration

The MOM 2005 Resource Kit was recently refreshed and some handy new tools were added. Here’s a quick overview of some of the best utilities that will help you get a lot more out of MOM. Dave Cristini, Matt Goedtel, and Eric Kamor

System Management:Integrating MOM into Your Existing Infrastructure

A solid monitoring solution must be highly available and it must integrate with existing systems. From fault tolerance to connectors, here’s what you need to know for planning a MOM deployment that meets both of these requirements. Andrzej Lipka

System Management:Customize SMS Using Local Policies

Do you need to override SMS site settings for just a few machines or configure specific settings for only some clients? Find out how SMS 2003 local policies let you configure custom policy on a per-client basis. Jeff Tondt

System Management:Set High Standards: Powerful Tools for Configuration Management

Problems with system configuration can be disastrous. These tools and best practices can help you keep a handle on system configurations throughout your enterprise computing environment. Jeremy Chapman

bb978519(v=msdn.10).mdcc135917(v=msdn.10).md

Columns

From the Editor:cc160926(v=msdn.10).md

Around the time you read this, the United States Senate likely will be considering a communications bill that may or may not contain guarantees of something called "net neutrality. " If you haven’t heard of this yet, now’s the time to look into it because it’s a matter that could change the very nature of the Internet and the broadband apps and services your company uses online.Joshua Trupin

Toolbox:New Products for IT Pros

Greg Steen

Utility Spotlight:Access-Based Enumeration

As a systems administrator, you've probably had users complain that they can't access certain folders they see in Windows® Explorer. The cause is often simple: the user doesn't have permission to open those resources.James D. Silliman

SQL Q+A:Predicates, Stored Procedures, and More

Edited by Nancy Michell

結語:自我服務身分識別及存取管理

Microsoft IT Showcase and Lana Chin

Business of IT:Understanding Regulatory Compliance

Tony Noblett

TechNet Radio:An Interview with Alan Levine of Alcoa

Every week, TechNet Radio covers the latest trends and technologies in the world of IT, and provides interviews with real IT professionals who work in the field. Alan Levine, Chief Security Information Officer for Alcoa Inc.

Hey, Scripting Guy!:Late-Night Scripting

The Microsoft Scripting Guys

Beta Box:System Center Operations Manager 2007

Stewart Cawthray

Inside Microsoft.com:Release Management

Jim Scardelis

Security Watch:Lock Up Your Domain Controllers

Steve Riley

Field Notes:The Job Candidate’s Job

Glenn Wasserman

What is TechNet?:Resources for the IT Professional

Windows Confidential:Why are Shortcuts Files?

Raymond Chen