• Streamlining the backup process with Microsoft’s Data Protection Server 12 Oct. 2004 Brien M. Posey

    Although it is extremely common for organizations to back data up to tape each night, the technology behind tape backups is over twenty years old. At the same time, network administrators are being asked to back up more and more data in less and less time and to be able to perform nearly instant restore operations. The old tape backup technology is having a hard time keeping pace with such demands. Fortunately, Microsoft is about to release a new, disk based, backup solution called Data Protection Server that is designed to solve all of these problems. In this article I will tell you all about it.

  • What Can You Expect From Windows Server 2003 "R2" 6 Oct. 2004 Brien M. Posey

    Microsoft has announced a new version of Windows Server 2003 that will be released late in 2005. Although details about this new release, code named R2, are sketchy, R2 promises to greatly enhance the Windows Server platform. In this article, I will attempt to separate fact from rumor and explain what you can expect from R2.

  • Customizing Unattended Setup 29 Sept. 2004 Mitch Tulloch

    This article walks you through the steps of using Setup Manager to create an answer file for unattended installation of Windows XP. The article also covers how to use Setup Manager to set up distribution folders on your network and how to customize these folders for special purposes such as branding your system and updating device drivers.

  • Monitoring and Troubleshooting Using Event Logs 14 Sept. 2004 Mitch Tulloch

    This article reviews best practices for working with Windows event logs including how to interpret event messages, how to configure event logs, how to search and filter events, how to view events on remote systems, and how to use EventCombMT.exe and other tools to monitor events on multiple systems.

  • Using Software Restriction Policies To Keep Games Off Of Your Network 1 Sept. 2004 Brien M. Posey

    Unauthorized software such as computer games decreases productivity, robs your network of resources, and jeopardizes your network’s security. However, you can preserve your network’s integrity by using software restriction policies to control what software users are and are not allowed to run.

Show More