active directory

Replicating Active Directory

This is one of the easiest systems to add redundancy to. Active Directory contains all the information about your customer’s users and machines. If this fails, and you have no backup, they have a problem.

 

Specifying and supporting disk encryption

Encryption is at the top of the business agenda following a spate of embarrassing data breaches. How can you design and implement encryption systems to suit your customers’ needs without making life harder all round?

Macs in a Windows world

Helping your Apple users become full-time network citizens – without doing a lot of extra work

 

We IT professionals are seeing more and more Apple Mac computers on our comfortably Windows-based networks. In the past, it’s been easy to ignore them – after all, in many cases they belonged to just one or two users, none of whom tended to be an influential manager or executive. But today it’s just as likely to be the boss with a new Mac.

Failover, not fall over - how to keep running when the hardware fails

Failure is not an option in business and redundancy is the solution. You can offer customers systems that keep running when the hardware fails.

Server failure used to mean widespread panic and a scramble to find backup tapes and a spare server to restore onto. Inevitably this meant business interruption, user frustration and even data loss. Recovering from a backup can take hours; even planned maintenance can take the server down during business hours leaving users unable to work. Today there is no excuse for this situation.

Get better security with Vista by implementing best practices for using User Account Control - UAC

Operating your PC when you’re logged in with an Administrator account is an inherently insecure thing to do. If you’re a user with highly-elevated privileges across multiple machines or an entire Active Directory domain, running your everyday processing with these privileges can be dangerous to the point of negligence.

Setting up Blackberry Enterprise Server BES with Exchange 2007

Getting BlackBerry Enterprise Server up and running needn’t be complex, but it can be tedious: here’s how to get BES working with Exchange 2007 in a Windows network.

Managing Skype in business

Skype means free or cheap calls but it’s based on peer-to-peer file sharing principles. How can you tame consumer VoIP tools for use in a business network?

GPO for IE8

If you’re using Active Directory and Group Policies to administer computers on customer networks, suggest they adopt Internet Explorer 8 to get more than 100 new Group Policies that you can use to maintain a stable configuration.

Managing Mobile Devices: Anywhere, Anytime

Remote support is one of those bugbears that is never going to go away. At least with PCs and laptops you know where you are, and remote desktop tools make it easy to log in and take control of a user’s PC. You can grab logs, check files, and see just what your users see.

Application control with Windows Group Policy Preferences

Get total application control with Windows Group Policy Preferences.

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

Need to script file uploads to a SharePoint site? DavCopy is a command-line tool with a rich set of options including whether files get overwritten, whether they trigger the New file notification in SharePoint and what user credentials to upload them with. http://www.bluedoglimited.com/Downloads/default.aspx read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS