Windows Server 2012/2008/2003/2000/XP/NT Administrator Knowledge Base

Last Updated on 1 Nov. 2016, Total: 3132 Knowledge Base Tips

449 Windows 2000
280 Admin Tips
73 Registry Tips
96 User Tips
367 Windows 2003
361 Admin Tips
4 Registry Tips
2 User Tips
275 Windows 7
230 Admin Tips
21 Registry Tips
24 User Tips
75 Windows 8
71 Admin Tips
1 Registry Tips
3 User Tips
845 Windows NT
480 Admin Tips
296 Registry Tips
69 User Tips
304 Windows Server 2008
300 Admin Tips
3 Registry Tips
1 User Tips
219 Windows Server 2012
217 Admin Tips
153 Windows Vista
116 Admin Tips
3 Registry Tips
34 User Tips
444 Windows XP
233 Admin Tips
76 Registry Tips
135 User Tips
  1. Prevent Ordinary Users From Installing Devices

    Enhance security by preventing ordinary users from being able to install devices... Read More

  2. Being Paranoid About DHCP Server Availability

    If DHCP is absolutely critical to your network, be paranoid and keep a hot-spare DHCP server available... Read More

  3. Map Your Network For Better Protection and Incident Response

    It is difficult to protect devices that you don't even know exist. In larger enterprises it is very easy to lose track of the asset inventory which leads to complacency about rogue devices. In order to effectively protect the network and to respond to incidents efficiently, an updated asset inventory and network map should always be handy... Read More

  4. Ensuring DHCP Server Availability

    Forget the 80/20 rule for DHCP server availability and use 50/50 instead... Read More

  5. Use a Larger Pagefile for Better Performance

    The default pagefile size isn't always enough for best performance, especially when you're running memory-hungry server apps... Read More

  6. Using Reservations to Ensure DHCP Server Availability and Security

    In high security environments you can use Reservations to ensure the security and availability of DHCP servers... Read More

  7. Protect Wireless Access Using MAC Address Filters

    Wireless networks add a significant level of convenience for many users. The ability to roam at will and access the network without adding wires is quite useful. But, you need to do so securely. There are a number of basic steps you should take to protect your wireless network and filtering MAC addresses is one more way to secure it... Read More

  8. Disabling the RunAs Command

    To enhance security you can prevent users from using the RunAs command... Read More

  9. Disk Quota Tricks

    Want a quick hard-copy report of quota usage on a volume?... Read More

  10. Mount/Dismount/Delete a Mailbox Store from the Command Line

    This is a VBScript which I wrote. It allows you to mount/dismount/delete a store at the command line, so you can do an offline defrag, etc... Read More

Featured Links