Exchange 2007 uses SAN certificates, which allow you to mix several different server names in a single certificate. Generating a certificate can be a problem, as the PowerShell command needed to generate the certificate signing request can be long, and unwieldy – and it’s easy enough to make a mistake when typing in part of a long command.
Move anti-spam settings from one server to another with the Exchange 2007 Anti Spam Migration tool, from Microsoft www.microsoft.com/do.. Run it on the SBS 2003 system to create a PowerShell script that you can run on your Exchange 2007 server to import the appropriate settings.
The best thing about Spacemonger (www.sixty-five.cc/sm, $24.95) isn’t that its intuitive display of how space is used on a hard drive allows you to pinpoint what’s taking up the space on your hard drives in a matter of seconds. The screen area shows a colour-coded and hierarchical treemap where the size of the box for each directory or file is in proportion to the space it takes on the drive. Hover the mouse over any element to see a popup with more detail, and scroll the mouse wheel to zoom down to level of individual files.
Unless your clients have just returned from a stint on Mars, there is every chance they will already have used VoIP, though they may not call it that. VoIP, or Internet telephony, has been one of the undoubted technology success stories of the last few years. Skype alone claims 200 million users, many of whom work in small and mid-sized businesses.
Microsoft Support Lifecycle
When a new service pack is released, Microsoft will provide either 24 months of support for the previous service pack (for Windows) or 12 months for all other products. Keep an eye on what will need updating when, to stay in support.
Hackers are finding increasingly inventive ways of exploiting holes in Acrobat.
Security back at the top of the exec agenda
In the wake of the recent Sony Playstation hack, Amazon EC2 outage and Epsilon data theft, information security is once again back in the news – for all the wrong reasons.
Many organisations need help expanding their data security policies to embrace virtual IT environments
Subscribe and get the magazine in the post before it's online
Subscribe and get access to all of the back issues
To read a sample eMagazine - March 2010