Topics
Content Types
About 35 results
-
10 things to keep in mind when purchasing a new server
If you're in the market for a new server, you need to evaluate your choices carefully to make sure the one you buy will meet your needs. Brien Posey reviews 10 key aspects of a net...
-
Five tips for learning how to use Server Core
Deploying and managing Server Core can be tricky. These pointers will help you overcome some common configuration and management challenges.
-
Five tips for deciding whether to virtualize a server
Not all servers are suited for virtualization. Be sure you consider these possible deal-killers before you try to virtualize a particular server.
-
10 issues to consider during virtualization planning
Virtualizing your servers offers significant advantages, but effective planning is crucial to your success. Make sure you have satisfactory answers to these key questions before yo...
-
10 common network security design flaws
Solid planning and design can help reduce the potential for security breaches. Here are some security design missteps to watch out for.
-
Configuring Exchange 2007 to be an Edge Transport Server
One of the new server roles that was introduced in Exchange 2007 was that of an edge transport server. An edge transport server is a specialized server, running a hardened version ...
-
Things to consider when planning server clusters
By clustering servers on your network, you can go a long way to preserving data integrity and reliability on your network. However, wrongly designed, a server cluster can be a wast...
-
SolutionBase: Increase reliability and performance of your Exchange-based e-mail system with clustering
Does your network have a lone server to handle a heavy amount of e-mail traffic? You probably can't afford to have e-mail down for even a minute. Clustering can come in handy in th...
-
5 Exchange Server security tips
Obviously there are many different things that you can do to secure an Exchange server. Some of the security techniques are naturally more important than others. Here is a list of ...
-
Microsoft Virtual Server 2005 R2 Screenshots
As a free download, Microsoft Virtual Server 2005 R2 provides can provide cost-effective server virtualization. This gallery's 20 images show you how to download and configure Virt...
-
SolutionBase: Verifying the performance of your Exchange server's disk subsystem with Jetstress
Can your new Exchange server handle the amount of e-mail you want it to? How do you know? Here's how you can use Jetstress to test your Exchange Server.
-
SolutionBase: Developing a secure Exchange 2003 organization
E-mail is one of the most important functions on a network. If your Exchange server isn't secure, your organization isn't secure. These tips can help you beef up Exchange 2003 secu...
-
SolutionBase: Monitor Exchange using built-in tools
Do you know what your Exchange server is doing right now? Or if it had errors last night? Here's how to monitor your Exchange server using built-in tools to ensure everything's ru...
-
SolutionBase: Discover what's slowing down Windows Server 2003 with Server Performance Advisor
With scarce budgetary resources, you probably can't afford to throw hardware at performance problems. Here's how to use Microsoft's Server Performance Advisor to discover what's sl...
-
Workarounds for hiding your Web server's identity from hackers
Find out how to disguise your Web server from hackers.
-
Prevent Web servers from identifying themselves
Help prevent intrusions by concealing a Web server's identity.
-
Best Practices: Windows Server 2003
Learn what steps you can take to harden Windows 2003 Server security
-
The pros and cons of server virtualization
Server virtualization combines many Web sites onto one server. This article looks at situations in which server virtualization is best used and discusses the benefits and potential...
-
Why group policy and legacy login scripts may not matter anymore
Network administrators have long used login scripts to control end users' environments. With Windows 2000 and Windows Server 2003, they're less useful. Find out why you may no long...
-
Lock IT Down: Avoid these ISA Server and Proxy Server configurations
Configure ISA Server and Proxy Server properly
-
Get IT Done: Strategies for keeping systems cool during summer heat
Learn how to troubleshoot fan problems, deal with power fluctuations, and solve airflow and dust issues.
-
Get IT Done: Lay the foundation for long-distance clustering
Get an overview of the fundamental elements of long-distance clustering as well as the challenges this design poses.
-
Configure IT Quick: Strengthen your network's host defenses
Improve your networks security by assigning roles to each host on your network and tightening the security for each role.
-
StorageX brings scalable, enterprise-level storage management to Windows
StorageX improves on DFS by providing truly scalable, enterprise-level file virtualization. It supports heterogeneous and geographically dispersed environments and provides automat...
-
Move your Windows 2000/NT installation to a new server
Replacing a server is big job with many potential pitfalls. You must move applications, data, and directory information without losing anything in the process. Brien Posey offers t...
-
Administer older versions of IIS with IIS 5.0
To run a mix of IIS 5.0, 4.0, and 3.0, you don't have to do the same tasks on each version with different tools. Brien Posey shows you how to administer all versions of IIS from II...
-
Troubleshoot IIS connections with Wfetch
If you're having problems getting a particular workstation to connect to your Web site, it might not be the workstation's fault. You can use Wfetch to see if there's a problem on y...
-
Ease your Web site's migration to IIS 5.0 with the help of a wizard
Moving a Web site from one platform to another isn't a simple task. To make matters easier, Microsoft created the IIS Migration Wizard. In this Daily Drill Down, Brien Posey shows ...
-
Get IT Done: Get a quick snapshot of your server's performance with Net Statistics
Learn how to monitor session information, kilobytes, errors, access, and more information about whats going on with your network.
-
Basic strategies for securing Internet Information Server
Learn how to prepare your Windows network for the installation of IIS, guard your administrator accounts, and boost security.