Windows 2003

Last Updated on 19 July 2011, Total: 367 Knowledge Base Tips

361 Admin Tips 19 July 2011
37 Active Directory 3 Feb. 2010
76 Admin 9 July 2010
9 Applications 7 May 2008
4 Exchange 4 March 2008
11 Migration 5 July 2007
66 Miscellaneous 31 May 2009
62 Network 4 Dec. 2007
77 Security 2 Feb. 2009
12 Terminal Servers and Thin Clients 4 April 2009
7 Virtual Platforms 2 April 2008
4 Registry Tips 18 April 2006
3 Miscellaneous 18 April 2006
2 User Tips 30 June 2005
2 Miscellaneous 30 June 2005
  1. Avoiding Metabase Corruption

    IIS 6 on W2K3 has a new feature that helps prevent metabase corruption... Read More

  2. Back Up Printer Configurations

    Protect your print servers by backing up their printer configurations... Read More

  3. Backing Up DHCP

    There's an important difference in how W2K and W2K3 store DHCP information... Read More

  4. Batch your patches

    One way of minimizing downtime due to patching systems is to batch a bunch of patches together and apply them in one shot... Read More

  5. Be an example

    Want users in your company to follow the security policies and practices you lay down?... Read More

  6. Building in Security for Applications in Windows Server 2003

    388 KB Microsoft Word file - This white paper outlines how the flexible, out-of-the-box security technologies in Windows Server 2003 and the .NET Framework can help prevent malicious code from breaching a corporate firewall. It also offers suggestions for making programs of all kinds more secure and easier to manage... Read More

  7. Can I convert existing PCs to thin clients?

    Yes you can. There is no need to have to buy thin client devices, you can simply convert old (or new) PC's to thin clients. The advantage of doing this is that you will significantly reduce management of these PC's. There are several solutions to convert PC's to thin clients:... Read More

  8. Can't Ping the Server

    Why you can't ping some Windows servers and how to fix it... Read More

  9. Can’t Access Your Shadow Copies?

    If you are unable to access the configuration of the Volume Shadow Copy service remotely, there may be a good reason why... Read More

  10. Caution with Default Domain Policy

    Describes best practice for using the Default Domain Policy... Read More

Featured Links