The Windows Server tool Repadmin can be your best friend when trying to pinpoint and fix Active Directory issues.
Plus: Researchers create unlock key to reverse high-profile ransomware "CryptoLocker."
Here's the what, how and why of the SharePoint deployment tool.
- By Spike Xavier
This week's incident highlights the need for a change in attitudes relating to corporate security.
Will Configuration Manager slowly disappear into obsolete or will it change with the times? The answer could still go either way.
- By Greg Shields
The study took a look at 16 multinational enterprises in the first half of 2014 to map out what the top trouble areas for IT are.
Nearly six months after taking over as the third CEO in Microsoft history, Satya Nadella has started putting his own stamp on the company.
- By Jeffrey Schwartz
The latest version adds two new mitigation features and support for 64-bit systems.
Following with the rest of the company's new mission statement, the Office team has been focused on mobile, cloud and non-Windows platforms.
- By Mary Jo Foley
When it comes to enterprise security, you're not paranoid -- everyone is out to get you.
Now that Microsoft is cancelling TechEd and other conferences, what's to expect from the company's recently announced mega conference?
Here's how to use the Failover Cluster Manager to make virtual machines fault tolerant or to create new virtual machines.
The test sent many security software offerings through a gauntlet to measure protection, useability and performance. Three received a perfect score of 30.
Microsoft is downplaying the disclosure and has offered multiple ways IT can avoid attack.
The question leads to an even more important question: do your users care?
- By Denny Cherry
While the InstallShield flaw currently has a limited workaround, there's no word on whether the Dell problem is further being investigated by Microsoft.
Follow these step-by-step instructions and you will be up and running in about 15 minutes.
The update will prevent the spoofed certificates from being used in man-in-the-middle attacks.
This combination may end up being the command-line replacement for System Center Configuration Manager.
- By Greg Shields
The lawyer and journalist responsible for providing many of the details on government surveillance from Edward Snowden conducted an online Q&A on Wednesday.