November 2008Letters: Readers Speak Out
Windows PowerShell: Building Your Own Software Inventory Tool
November 2008Don Jones demonstrates a Windows PowerShell-based inventory tool and guides you through the process that goes into building such a solution.
From the Editor: Now What?
November 2008From the Editor: Now What?
Utility Spotlight: Internet Explorer Developer Toolbar
November 2008Whether you develop Web content or simply support a webmaster, here’s a free Microsoft utility that will make your job easier. See how the Internet Explorer Developer Toolbar can help you explore and troubleshoot Web pages.
Utility Spotlight: Internet Explorer Developer Toolbar
November 2008Whether you develop Web content or simply support a webmaster, here’s a free Microsoft utility that will make your job easier. See how the Internet Explorer Developer Toolbar can help you explore and troubleshoot Web pages.
SQL Server 2008: Tracking Changes in Your Enterprise Database
November 2008SQL Server 2008 introduces two new features that allow you to track changes more easily and efficiently. Paul Randal examines the new Change Tracking and Change Data Capture features and discusses the implications these features will have …
System Center: Monitoring Windows Server 2008 with OpsMgr 2007
November 2008As you deploy Windows Server 2008 into your environment, you’ll need a way to manage and monitor its health, performance, and availability. Fortunately, you can use the existing System Center tools you are already familiar with. See how …
Windows Server 2008: Presentation Virtualization with Enhanced Terminal Services
November 2008Virtualization isn’t limited to virtual machines and the virtualization of operating systems. Terminal Services has been abstracting the presentation layer of remotely run applications and desktops for years. Take a close look at key imp…
Hey, Scripting Guy!: Probing the Depths of WMI
November 2008This month, The Scripting Guys take a close look at the WMI infrastructure. Along the way, they provide some helpful scripts that can serve as a starting point for learning more and accomplishing useful administrative tasks.
System Center: Granular Targeting in Operations Manager 2007
November 2008For every monitoring object you build, you must also decide what target to use. Choosing the correct target is critical, but knowing how to go about choosing the correct target is not always clear. Steve Rachui explores various options for…
Exchange Queue & A: Outlook Anywhere and IPv6, the Remote Connectivity Analyzer, and More
November 2008Have Exchange questions? We’ve got answers. This month, Henrik Walther looks at configuring Windows Server 2008 to work with Outlook Anywhere, testing remote connectivity, deploying standby continuous replication, and more.
System Center: Using Configuration Manager with Windows Server 2008
November 2008The release of System Center Configuration Manager SP1 added full support for managing Windows Server 2008 systems, including such new features as server core. Get a quick overview of deploying the ConfigMgr agent and using ConfigMgr to ma…
Inside SharePoint: Extending Office Applications with Web Services
November 2008Web services are fundamental building blocks of distributed business applications. Here’s an overview of how you can use Web services in a SharePoint environment to extend Microsoft Office applications.
Security Watch: Revisiting the 10 Immutable Laws of Security, Part 2
November 2008It’s been about 8 years since “The 10 Immutable Laws of Security” were first published, and a lot has changed since then. In this installment, Jesper Johansson continues his analysis of the the immutable laws to see if they still hold true…
Security Watch: Revisiting the 10 Immutable Laws of Security, Part 2
November 2008It’s been about 8 years since “The 10 Immutable Laws of Security” were first published, and a lot has changed since then. In this installment, Jesper Johansson continues his analysis of the the immutable laws to see if they still hold true…
Security Watch: Revisiting the 10 Immutable Laws of Security, Part 2
November 2008It’s been about 8 years since “The 10 Immutable Laws of Security” were first published, and a lot has changed since then. In this installment, Jesper Johansson continues his analysis of the the immutable laws to see if they still hold true…
Utility Spotlight: Offline Virtual Machine Servicing Tool
October 2008 Virtual machines that are stored offline don’t automatically receive the necessary updates to keep them safe and compliant. This, in turn, can pose a risk to your entire IT environment. Find out how the free Offline Virtual Machine Servicing Tool lets you automate the process of updating virtual machines. Microsoft Download Link…
Risk and Health Assessment for MIcrosoft Office SharePoint Server Datasheet
The Risk and Health Assessment Program for Microsoft Office SharePoint Serve has been developed to provide in-depth analysis of your Office SharePoint Server and Windows SharePoint Services configurations, custom code, and operational procedures, uncovering areas that are potential risks to server stability or that do not align with Microsoft best practices. Microsoft Download Link…
Microsoft SQL Server 2008 Books Online (August 2008)
Download the documentation and tutorials for Microsoft SQL Server 2008. Microsoft Download Link…
Exchange Server 2007 Standards Documentation Set
The Exchange Server Standards Documents describe Microsoft Exchange Server 2007 support for standards and RFCs related to iCalendar, IMAP4, and POP3. Microsoft Download Link…