This tool allows you to do various things using different rights/credentials.
- By Danielle Ruest and Nelson Ruest
- 06/01/2004
Microsoft’s next Service Pack for Windows XP is almost totally about improved security. And it shows.
- By Bill Boswell
- 06/01/2004
Find out how to import Contacts and User Objects into Active Directory, as well as modify batched objects.
Group policy can make your life as an administrator blissful or stressful.
Learn from one expert’s experiences what works with group policies, and what doesn’t.
- By Jeremy Moskowitz
- 06/01/2004
Boot-up is a dangerous time for your systems, a time before security policies to protect them may be active. Avoid danger with persistent policies.
- By Roberta Bragg
- 06/01/2004
Microsoft's password complexity filter: what's wrong with it and why you might need something better.
- By Bill Boswell
- 05/04/2004
Microsoft Volume Shadow Copy Services and Undelete 4.0 are a potent one-two punch.
- By Danielle Ruest and Nelson Ruest
- 05/01/2004
This business owner’s thin-client Windows network was impregnable. Or so he thought, until he met Bob…
You can give ordinary users NT and WMI administrative rights for routine tasks—to a degree.
- By Chris Brooke
- 05/01/2004
MBSA offers much more than updates to your network.
Executive Software's Diskeeper 8.0 can restore speed lost to scattered files.
- By Michael Morgan
- 05/01/2004
Microsoft, MeasureUp team up to provide desktop support assessments.
- By Michael Domingo
- 04/22/2004
Who gave this reader the silly idea that Windows 2000 and Windows 2003 can't live within the same domain?
- By Bill Boswell
- 04/20/2004
Software Restriction Policies is a terrific new security tool—if you know what it can’t do, as well as what it can.
- By Roberta Bragg
- 04/01/2004
Knowing what’s in your Event Logs is a key to knowing what your servers are doing. Here’s how to make sense of them.
- By Derek Melber
- 04/01/2004