Boot-up is a dangerous time for your systems, a time before security policies to protect them may be active. Avoid danger with persistent policies.
- By Roberta Bragg
- 06/01/2004
Microsoft's password complexity filter: what's wrong with it and why you might need something better.
- By Bill Boswell
- 05/04/2004
Microsoft Volume Shadow Copy Services and Undelete 4.0 are a potent one-two punch.
- By Danielle Ruest and Nelson Ruest
- 05/01/2004
This business owner’s thin-client Windows network was impregnable. Or so he thought, until he met Bob…
You can give ordinary users NT and WMI administrative rights for routine tasks—to a degree.
- By Chris Brooke
- 05/01/2004
MBSA offers much more than updates to your network.
Executive Software's Diskeeper 8.0 can restore speed lost to scattered files.
- By Michael Morgan
- 05/01/2004
Microsoft, MeasureUp team up to provide desktop support assessments.
- By Michael Domingo
- 04/22/2004
Who gave this reader the silly idea that Windows 2000 and Windows 2003 can't live within the same domain?
- By Bill Boswell
- 04/20/2004
Software Restriction Policies is a terrific new security tool—if you know what it can’t do, as well as what it can.
- By Roberta Bragg
- 04/01/2004
Knowing what’s in your Event Logs is a key to knowing what your servers are doing. Here’s how to make sense of them.
- By Derek Melber
- 04/01/2004
Sure, you can do Knowledge Base searches online. But there’s plenty more that TechNet offers.
Using the Active Directory Connector is an effective way to move your legacy Exchange environment to a new Exchange 2003 setup.
- By Bill Boswell
- 04/01/2004
This script allows logoff and shut down of remote users.
Simple IIS backup techniques