Topics
Content Types
About 35 results
-
10 things to keep in mind when purchasing a new server
If you're in the market for a new server, you need to evaluate your choices carefully to make sure the one you buy will meet your needs. Brien Posey reviews 10 key aspects of a net...
-
Five tips for learning how to use Server Core
Deploying and managing Server Core can be tricky. These pointers will help you overcome some common configuration and management challenges.
-
Five tips for deciding whether to virtualize a server
Not all servers are suited for virtualization. Be sure you consider these possible deal-killers before you try to virtualize a particular server.
-
10 issues to consider during virtualization planning
Virtualizing your servers offers significant advantages, but effective planning is crucial to your success. Make sure you have satisfactory answers to these key questions before yo...
-
10 common network security design flaws
Solid planning and design can help reduce the potential for security breaches. Here are some security design missteps to watch out for.
-
Configuring Exchange 2007 to be an Edge Transport Server
One of the new server roles that was introduced in Exchange 2007 was that of an edge transport server. An edge transport server is a specialized server, running a hardened version ...
-
Things to consider when planning server clusters
By clustering servers on your network, you can go a long way to preserving data integrity and reliability on your network. However, wrongly designed, a server cluster can be a wast...
-
SolutionBase: Increase reliability and performance of your Exchange-based e-mail system with clustering
Does your network have a lone server to handle a heavy amount of e-mail traffic? You probably can't afford to have e-mail down for even a minute. Clustering can come in handy in th...
-
5 Exchange Server security tips
Obviously there are many different things that you can do to secure an Exchange server. Some of the security techniques are naturally more important than others. Here is a list of ...
-
Microsoft Virtual Server 2005 R2 Screenshots
As a free download, Microsoft Virtual Server 2005 R2 provides can provide cost-effective server virtualization. This gallery's 20 images show you how to download and configure Virt...
-
SolutionBase: Verifying the performance of your Exchange server's disk subsystem with Jetstress
Can your new Exchange server handle the amount of e-mail you want it to? How do you know? Here's how you can use Jetstress to test your Exchange Server.
-
SolutionBase: Developing a secure Exchange 2003 organization
E-mail is one of the most important functions on a network. If your Exchange server isn't secure, your organization isn't secure. These tips can help you beef up Exchange 2003 secu...
-
SolutionBase: Monitor Exchange using built-in tools
Do you know what your Exchange server is doing right now? Or if it had errors last night? Here's how to monitor your Exchange server using built-in tools to ensure everything's ru...
-
SolutionBase: Discover what's slowing down Windows Server 2003 with Server Performance Advisor
With scarce budgetary resources, you probably can't afford to throw hardware at performance problems. Here's how to use Microsoft's Server Performance Advisor to discover what's sl...
-
Workarounds for hiding your Web server's identity from hackers
Find out how to disguise your Web server from hackers.
-
Prevent Web servers from identifying themselves
Help prevent intrusions by concealing a Web server's identity.
-
Best Practices: Windows Server 2003
Learn what steps you can take to harden Windows 2003 Server security
-
The pros and cons of server virtualization
Server virtualization combines many Web sites onto one server. This article looks at situations in which server virtualization is best used and discusses the benefits and potential...
-
Why group policy and legacy login scripts may not matter anymore
Network administrators have long used login scripts to control end users' environments. With Windows 2000 and Windows Server 2003, they're less useful. Find out why you may no long...
-
Lock IT Down: Avoid these ISA Server and Proxy Server configurations
Configure ISA Server and Proxy Server properly