Having issues with domain controllers? Use this native tools to pinpoint exactly where it.
Your organization's security plans are only as good as those that are willing to enforce it.
While the rumor of the major next update did not pan out for this month, Brien Posey argues that big changes for Windows 8 could still be making its way through the pipeline.
The issues could ultimately lead to a system being caught in a crash/reboot loop.
The virtual personal assistant feature in Windows Phone 8.1 would be a perfect fit for the next Microsoft OS -- with some tweaks.
This moth's Security Update addresses a total of 37 flaws.
The Windows Server tool Repadmin can be your best friend when trying to pinpoint and fix Active Directory issues.
Plus: Researchers create unlock key to reverse high-profile ransomware "CryptoLocker."
Here's the what, how and why of the SharePoint deployment tool.
- By Spike Xavier
This week's incident highlights the need for a change in attitudes relating to corporate security.
Will Configuration Manager slowly disappear into obsolete or will it change with the times? The answer could still go either way.
- By Greg Shields
The study took a look at 16 multinational enterprises in the first half of 2014 to map out what the top trouble areas for IT are.
Nearly six months after taking over as the third CEO in Microsoft history, Satya Nadella has started putting his own stamp on the company.
- By Jeffrey Schwartz
The latest version adds two new mitigation features and support for 64-bit systems.
Following with the rest of the company's new mission statement, the Office team has been focused on mobile, cloud and non-Windows platforms.
- By Mary Jo Foley
When it comes to enterprise security, you're not paranoid -- everyone is out to get you.
Now that Microsoft is cancelling TechEd and other conferences, what's to expect from the company's recently announced mega conference?
Here's how to use the Failover Cluster Manager to make virtual machines fault tolerant or to create new virtual machines.
The test sent many security software offerings through a gauntlet to measure protection, useability and performance. Three received a perfect score of 30.
Microsoft is downplaying the disclosure and has offered multiple ways IT can avoid attack.