Admin Tips

Last Updated on 25 Aug. 2008, Total: 280 Knowledge Base Tips

13 Active Directory
3 Administrator
13 Applications
19 DHCP and DNS
12 Domain
16 Email
9 Event log
15 Exchange
11 File Systems
12 IIS
10 Installation
8 Migration
29 Miscellaneous
29 Network
7 Replication
13 RFCs
26 Security
25 TroubleShooting
8 Updates
1 Virtual Platforms
  1. Being Paranoid About DHCP Server Availability

    If DHCP is absolutely critical to your network, be paranoid and keep a hot-spare DHCP server available... Read More

  2. Ensuring DHCP Server Availability

    Forget the 80/20 rule for DHCP server availability and use 50/50 instead... Read More

  3. Disk Quota Tricks

    Want a quick hard-copy report of quota usage on a volume?... Read More

  4. Mount/Dismount/Delete a Mailbox Store from the Command Line

    This is a VBScript which I wrote. It allows you to mount/dismount/delete a store at the command line, so you can do an offline defrag, etc... Read More

  5. Still More Disk Quota "Gotchas"

    Understanding the default quota notification time interval can help you interpret disk quota Event log messages... Read More

  6. More Disk Quota "Gotchas"

    Users need to know how the Recycle Bin applies to quota-enabled volumes... Read More

  7. Disk Quota "Gotchas"

    Some things to watch out for when configuring disk quotas on Windows servers... Read More

  8. Foreign characters appear as question marks when sent from OWA

    Exchange 2003 supports OWA interface in different languages. When using Internet Explorer 5 and above, the Language settings of Internet Explorer is sent to the OWA server which is turn changes the OWA interface to the matching language... Read More

  9. Remove Administrative Shares

    Windows creates hidden Administrative Shares at the root of each drive and to the system root folder to allow administrators to remotely access the data. If a server or workstation will not be administered remotely or has no need for the Administrative Shares though, they should be removed so that they don't provide a potential attack vector for a hacker... Read More

  10. Windows 2000 ERD and Recovery Console

Featured Links