Applications Server
 
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... >  |  Displaying page 1 of 24, items 1 to 30 of 706.
Sharepoint 2010 : Windows PowerShell Remoting (part 2) - Entering a Remote Session, Running SharePoint 2010 Cmdlets Remotely
This starts an interactive session with a remote computer using CredSSP authentication. During the session, all commands that you type run on the remote host.
Sharepoint 2010 : Windows PowerShell Remoting (part 1)
To run Windows PowerShell remotely, you need to enable Windows Remote Management, which is included in Windows 7 and Windows Server 2008 Release 2. Enabling Windows Remote Management requires administrative privileges.
Sharepoint 2010 : Windows PowerShell Scripts (part 3) - Writing Comment-Based Help Topics in Scripts,Using Functions in Scripts , Customizing Windows PowerShell with Profile Scripts
Cmdlets in Windows PowerShell include a help topic that describes how to use the cmdlets in Windows PowerShell.
Sharepoint 2010 : Windows PowerShell Scripts (part 2) - Executing Scripts, Using Parameters in Scripts
The script starts with a comment, which is preceded by a # sign to indicate it is a comment. Next, it uses the automatic variable $args to display the arguments passed to the script.
Sharepoint 2010 : Windows PowerShell Scripts (part 1) - Setting the Execution Policy
Since there is no User Access Control (UAC) in Windows XP or Windows Server 2003, the Run as Administrator option does not apply to those operating systems.
Sharepoint 2010 : Windows PowerShell Functions
Functions are used in most programming and scripting languages. A function is a named block of code that can be referred to from within Windows PowerShell. When a function’s name is called, the list of statements contained in the function is executed.
Sharepoint 2013 : Security and Policy - SharePoint Users
Most security models assume the existence of users and groups of users. Different users require different sets of permissions to perform their work, depending on the level of access to data in the system.
Sharepoint 2013 : Security and Policy - Permissions and Permission Levels (part 2) - Creating Custom Permission Levels
SharePoint allows site administrators to create their own unique permission levels. For example, perhaps the content owner would like to allow contributor access to items in a list, but prevent deletion of any list item.
Sharepoint 2013 : Security and Policy - Permissions and Permission Levels (part 1)
A single permission in SharePoint is a specific action that a user may take on a securable object. For example—reading the value of a SharePoint list item is a specific permission, often granted to groups of users who need to read lists and their contained items.
Sharepoint 2013 : Security and Policy - Security Administration
The IT department typically played a large role in web site security administration in days of old. For its SharePoint collaboration tool, Microsoft wanted to break this dependency on IT and empower end users—content owners—to have control of the content they create and disseminate to their audience
Installing Exchange Server 2010 : Command-Line Setup (part 2) - Command-Line Server Recovery Options , Command-Line Delegated Server Installation , Installing Language Packs
There may come a time when you have to recover an Exchange server from a backup. This process will involve rebuilding the Windows server, then reinstalling Exchange Server using the Recover Server mode
Installing Exchange Server 2010 : Command-Line Setup (part 1) - Command-Line Installation Options
By and large, the server role installation options are probably the most useful for a typical person installing or configuring Exchange. They are certainly the most numerous.
Installing Exchange Server 2010 : Graphical User Interface Setup
The simplest way to install Exchange Server 2010 is to use the graphical user interface (GUI). The GUI will be sufficient for most Exchange Server installations.
Installing Exchange Server 2010 : Preparing for Exchange 2010 Ahead of Time (part 2) - Preparing the Active Directory Forest,Preparing Additional Domains
To run the forest preparation, you must be logged on with a user who is a member of the Enterprise Admins group. Further, you should run the forest preparation process from a server that is in the same Active Directory site and domain that holds the schema master flexible single master of operations (FSMO) role.
Installing Exchange Server 2010 : Preparing for Exchange 2010 Ahead of Time (part 1) - Existing Exchange Organizations , Preparing the Schema
If you have any Exchange 2003 servers in your organization, you must first prepare each domain so that Exchange Server 2010 can properly communicate with Exchange 2003 and so that Exchange 2003 can access certain newly created attribute sets in Active Directory.
Securing an Exchange Server 2007 Environment : Securing Outlook Web Access
Outlook Web Access (OWA) provides the interface for users to access their mail across the Internet utilizing a web browser. With the implementation of OWA 2003, Microsoft improved the features and performance of the product until it was almost as powerful as the actual Microsoft Outlook client.
Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 2) - Filtering Junk Mail
Both Outlook 2003 and Outlook 2007 allow users to create and manage their own Safe Senders and Blocked Senders. As the name implies, the Safe Senders list is made up of user-defined addresses or domains, and messages from these addresses or domains will never be treated as junk email.
Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 2) - Filtering Junk Mail
This feature has been improved with each new revision and is useful in minimizing the need for end users to configure junk mail filtering options. In fact, junk mail filtering is primarily controlled by Exchange administrators. However, some options can be configured by the users.
Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 1) - Protecting Against Web Beaconing
A common and very popular format for email messages is Hypertext Markup Language, or HTML. This format is so popular because of the rich content that can be presented, including graphics, images, font formatting, and more
Securing an Exchange Server 2007 Environment : Securing Outlook 2007 (part 2) - Encrypting Communications Between Outlook and Exchange , Blocking Attachments
A common and often effective way for viruses and malicious scripts to spread from user to user is through email. When a user receives a message with an attachment, simply opening the attachment can allow the virus to activate and, if proper security measures are not in place, the virus can do damage to the system or spread to other users.
Securing an Exchange Server 2007 Environment : Securing Outlook 2007 (part 1) - Outlook Anywhere
Prior to Exchange Server 2003, Outlook users who needed to connect to Exchange over the Internet had to establish a virtual private network (VPN) connection prior to using Outlook.
Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 3) - Keeping Up with Security Patches and Updates
With Windows Server 2003, Windows Vista, and Windows XP, utilities exist that allow you to automate this process and simplify the distribution of updates. Microsoft has provided several options: Windows Update, Microsoft Update, Microsoft Windows Server Update Services (WSUS), and Microsoft Systems Management Server (SMS)
Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 2) - Utilizing Security Templates
Security templates are a practical and effective means to apply standardized security policies and configurations to multiple systems in an environment.
Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 1) - Windows Server 2003 Security Improvements , Windows Vista Security Improvements
Windows Vista complements Windows Server 2003 from the client perspective by supporting the security features embedded in Windows Server 2003.
Securing an Exchange Server 2007 Environment : Client-Level Secured Messaging - Exchange Server 2007 Client-Level Security Enhancements
As mentioned earlier, Exchange Server 2007 has several improved security features—especially when combined with Outlook 2007.
Microsoft Exchange Server 2010 Requirements : Additional Requirements
In addition to making sure that the hardware and server software can support Exchange Server 2010, there are a few infrastructure requirements that you need to consider.
Microsoft Exchange Server 2010 Requirements : Software Requirements (part 2) - Windows Server Roles and Features
Windows Server 2008 breaks down the additional Windows components into roles and features. Depending on the Exchange 2010 roles, Windows Server 2008 will require additional Windows Server roles and features to be installed.
Microsoft Exchange Server 2010 Requirements : Software Requirements (part 1) - Additional Software
There are a few additional pieces of software that you will need to ensure are installed on Windows Server 2008 SP2 or R2 in addition to Exchange Server 2010:
Microsoft Exchange Server 2010 Requirements : Getting the Right Server Hardware (part 3) - Disk Requirements
When calculating disk requirements for some applications, it is easy to decide that a single 500 GB hard disk will solve your storage needs. You might be tempted to think the same thing about Exchange Server.
Microsoft Exchange Server 2010 Requirements : Getting the Right Server Hardware (part 2) - Memory Recommendations, Network Requirements
As mentioned previously, the advantage that Exchange Server gets out of the x64 architecture is the ability to access more physical memory. Additional physical memory improves caching, reduces the disk I/O profile, and allows for the addition of more features.
 
 
Most View
 
- Windows 8 : Cloud Connections - SkyDrive (part 2) - To open SkyDrive inside Windows Explorer
- Application Lifecycle Management in SharePoint 2013 : Planning your Key Development Phases and Release Model (part 2) - Release Models
- Sharepoint 2013 : Creating and editing discussions (part 1) - Create a new discussion
- Sharepoint 2013 : Customizing a SharePoint Site - Modify a Content Type
- Lync Server 2013 Clients : Mac Client - Navigation and Layout (part 1)
- Sharepoint 2013 : Packaging and distributing apps (part 4) - Installing apps at tenancy scope
- Configuring Active Directory Server 2008 Roles : Active Directory Lightweight Directory Services (part 1) - Installing AD LDS
- : Windows Server 2008 and Windows Vista : Administrative (.adm) Templates (part 1) - Default .adm Templates
- Windows Phone 8 : Working with People - Facebook Integration (part 2) - Viewing a Wall Post, Viewing Comments to Wall Posts
- Windows 7 : Hardware and Software Compatibility (part 3) - Understanding Windows 7 Compatibility Issues
 
 
Top 10
 
- Microsoft Project 2010 : Setting Up Project for Your Use - Defining Custom Fields
- Microsoft Project 2010 : Setting Up Project for Your Use - Defining Calendars (part 2) - Setting Project and Resources Calendar
- Microsoft Project 2010 : Setting Up Project for Your Use - Defining Calendars (part 1) - Calendar Hierarchy , Modifying and Defining Base Calendars
- Windows Phone 8 : Receiving Input with Buttons - Check Box
- Windows Phone 8 : Receiving Input with Buttons - Radio Button
- Windows Phone 8 : Receiving Input with Buttons - Repeat and Toggle Buttons
- Windows Phone 8 : Receiving Input with Buttons - Tap and Click Events, Button Click Mode, Hyperlink Button
- Windows Phone 8 : Receiving Input with Buttons
- Windows Phone 8 : Content Controls - Defining the Default Content Property
- Windows Phone 8 : Control Type Taxonomy - Identifying Controls Not Supported or Absent in Windows Phone