Applications Server
 
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... >  |  Displaying page 1 of 24, items 1 to 30 of 719.
Microsoft Sharepoint 2013 : Administering Sharepoint with Windows Powershell - Basic PowerShell Usage (part 3) - Controlling Output
Armed with a basic understanding of the pipeline and its use of objects, this section takes a look at how to control the output of these objects. While the pipeline passes objects around, the input you provide to PowerShell and the output you expect returned at the end is always text.
Microsoft Sharepoint 2013 : Administering Sharepoint with Windows Powershell - Basic PowerShell Usage (part 2) - PowerShell Help , PowerShell Variables
It is virtually impossible to ignore variables, except in the most basic cmdlet usage. The first time you pipe the output (covered in the section “PowerShell Pipeline”) of one command into another command you are already using variables
Microsoft Sharepoint 2013 : Administering Sharepoint with Windows Powershell - Basic PowerShell Usage (part 1) - Listing the SharePoint Commands
The toughest part of using a command-line interface, whether it’s PowerShell, the old Windows CMD prompt, or a Linux bash shell, is determining which commands you can use.
Microsoft Sharepoint 2013 : Administering Sharepoint with Windows Powershell - Commands
PowerShell is powered by commands. Commands get things done. There are four basic types of commands: cmdlets, functions, scripts, and native commands. It is not necessarily important to know the differences between these command types to work with PowerShell and SharePoint, but it doesn’t hurt.
Microsoft Sharepoint 2013 : Microsoft SharePoint 2013 Management Shell and Other Hosts
PowerShell has been a staple of the Windows Server operating system since it came standard in Windows 2008. Windows 2008 R2 began including PowerShell version 2, which was great for SharePoint 2010 because it relied on PowerShell version 2 as a minimum.
Microsoft Lync Server 2013 : Dependent Services and SQL - Server Certificates - Installing Lync Certificates
Lync Server 2013 provides a wizard for requesting, installing, and assigning certificates. For example, the following procedure is used to create an offline SSL certificate request to be sent to a third-party CA for a Front End Server
Microsoft Lync Server 2013 : Dependent Services and SQL - Domain Name System - DNS Load Balancing , Automatic Client Sign-in
Although the sample DNS configurations just shown can be used to meet the minimum requirements for Lync, many organizations rely on the Lync client’s capability to automatically find the Lync pool and sign in the user, an optional but very useful feature.
Microsoft Lync Server 2013 : Dependent Services and SQL - Active Directory (part 2) - Forest Prep, Domain Prep, Lync Server 2013 Security Groups
After the schema has been updated, the Deployment Wizard enables the remaining AD preparation steps. The next step is to prepare the forest for the Lync Server installation, which creates global configuration settings and universal security groups required for the Lync deployment.
Microsoft Lync Server 2013 : Dependent Services and SQL - Active Directory (part 1) - Schema Extensions
To provide the necessary attributes used by Lync Server, it is necessary to extend the AD schema. This process is typically easiest to run on a system that is planned as a Lync Front End Server, and must be run by a user that is currently a member of the Schema Admins group.
Administering Active Directory 2008 : Creating and Managing Active Directory Objects (part 4) - Moving, Renaming, and Deleting Active Directory Objects , Resetting an Existing Computer Account
One of the extremely useful features of the Active Directory Users And Computers tool is its ability to easily move users and resources.
Administering Active Directory 2008 : Creating and Managing Active Directory Objects (part 3) - Understanding Groups, Filtering and Advanced Active Directory Features
Now that you know how to create user accounts, it's time to learn how to create group accounts. As instructors, we are always amazed when students (who work in the IT field) have no idea why they should use groups. This is something every organization should be using.
Administering Active Directory 2008 : Creating and Managing Active Directory Objects (part 2) - Managing Object Properties
Once you've created the necessary Active Directory objects, you'll probably need to make changes to their default properties. In addition to the settings you made when you were creating Active Directory objects, you can configure several more properties
Administering Active Directory 2008 : Creating and Managing Active Directory Objects (part 1) - Overview of Active Directory Objects
When you install and configure a domain controller, Active Directory sets up some organization for you, and you can create and manage several types of objects. This section describes these features.
Sharepoint 2010 : Windows PowerShell Remoting (part 2) - Entering a Remote Session, Running SharePoint 2010 Cmdlets Remotely
This starts an interactive session with a remote computer using CredSSP authentication. During the session, all commands that you type run on the remote host.
Sharepoint 2010 : Windows PowerShell Remoting (part 1)
To run Windows PowerShell remotely, you need to enable Windows Remote Management, which is included in Windows 7 and Windows Server 2008 Release 2. Enabling Windows Remote Management requires administrative privileges.
Sharepoint 2010 : Windows PowerShell Scripts (part 3) - Writing Comment-Based Help Topics in Scripts,Using Functions in Scripts , Customizing Windows PowerShell with Profile Scripts
Cmdlets in Windows PowerShell include a help topic that describes how to use the cmdlets in Windows PowerShell.
Sharepoint 2010 : Windows PowerShell Scripts (part 2) - Executing Scripts, Using Parameters in Scripts
The script starts with a comment, which is preceded by a # sign to indicate it is a comment. Next, it uses the automatic variable $args to display the arguments passed to the script.
Sharepoint 2010 : Windows PowerShell Scripts (part 1) - Setting the Execution Policy
Since there is no User Access Control (UAC) in Windows XP or Windows Server 2003, the Run as Administrator option does not apply to those operating systems.
Sharepoint 2010 : Windows PowerShell Functions
Functions are used in most programming and scripting languages. A function is a named block of code that can be referred to from within Windows PowerShell. When a function’s name is called, the list of statements contained in the function is executed.
Sharepoint 2013 : Security and Policy - SharePoint Users
Most security models assume the existence of users and groups of users. Different users require different sets of permissions to perform their work, depending on the level of access to data in the system.
Sharepoint 2013 : Security and Policy - Permissions and Permission Levels (part 2) - Creating Custom Permission Levels
SharePoint allows site administrators to create their own unique permission levels. For example, perhaps the content owner would like to allow contributor access to items in a list, but prevent deletion of any list item.
Sharepoint 2013 : Security and Policy - Permissions and Permission Levels (part 1)
A single permission in SharePoint is a specific action that a user may take on a securable object. For example—reading the value of a SharePoint list item is a specific permission, often granted to groups of users who need to read lists and their contained items.
Sharepoint 2013 : Security and Policy - Security Administration
The IT department typically played a large role in web site security administration in days of old. For its SharePoint collaboration tool, Microsoft wanted to break this dependency on IT and empower end users—content owners—to have control of the content they create and disseminate to their audience
Installing Exchange Server 2010 : Command-Line Setup (part 2) - Command-Line Server Recovery Options , Command-Line Delegated Server Installation , Installing Language Packs
There may come a time when you have to recover an Exchange server from a backup. This process will involve rebuilding the Windows server, then reinstalling Exchange Server using the Recover Server mode
Installing Exchange Server 2010 : Command-Line Setup (part 1) - Command-Line Installation Options
By and large, the server role installation options are probably the most useful for a typical person installing or configuring Exchange. They are certainly the most numerous.
Installing Exchange Server 2010 : Graphical User Interface Setup
The simplest way to install Exchange Server 2010 is to use the graphical user interface (GUI). The GUI will be sufficient for most Exchange Server installations.
Installing Exchange Server 2010 : Preparing for Exchange 2010 Ahead of Time (part 2) - Preparing the Active Directory Forest,Preparing Additional Domains
To run the forest preparation, you must be logged on with a user who is a member of the Enterprise Admins group. Further, you should run the forest preparation process from a server that is in the same Active Directory site and domain that holds the schema master flexible single master of operations (FSMO) role.
Installing Exchange Server 2010 : Preparing for Exchange 2010 Ahead of Time (part 1) - Existing Exchange Organizations , Preparing the Schema
If you have any Exchange 2003 servers in your organization, you must first prepare each domain so that Exchange Server 2010 can properly communicate with Exchange 2003 and so that Exchange 2003 can access certain newly created attribute sets in Active Directory.
Securing an Exchange Server 2007 Environment : Securing Outlook Web Access
Outlook Web Access (OWA) provides the interface for users to access their mail across the Internet utilizing a web browser. With the implementation of OWA 2003, Microsoft improved the features and performance of the product until it was almost as powerful as the actual Microsoft Outlook client.
Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 2) - Filtering Junk Mail
Both Outlook 2003 and Outlook 2007 allow users to create and manage their own Safe Senders and Blocked Senders. As the name implies, the Safe Senders list is made up of user-defined addresses or domains, and messages from these addresses or domains will never be treated as junk email.
 
 
Most View
 
- Developing, Integrating, and Building Applications in Sharepoint 2013 (part 4) - Events and Logic Integration
- Windows Server 2008 R2 Remote Desktop Services : Installing and Configuring Remote Desktop Services (part 11)
- Windows 7 : Configuring a High-Speed Connection (part 1) - Configuring a PPPoE Broadband Connection, Setting Up Dynamic IP Addressing
- Sharepoint 2013 : Viewing badges and reputation scores for a member
- SQL Server 2012 : Authorizing Securables - Permission Chains, Object Ownership, Securables Permissions
- Windows 8 : Customizing the Start Screen (part 4) - Pinning a Website to the Start Screen,Displaying the Administrative Tools on the Start Screen
- Windows 8 : Sharing and Securing with User Accounts - Logging In and Out of User Accounts
- Exchange Server 2013 administration overview : Getting started with Exchange 2013 and Exchange Online
- Sharepoint 2013 : Installing and Configuring Windows Azure Workflow Server (part 2) - The Install
- Windows Phone 8 : Working with People - Rooms (part 3) - Deleting a Room Member, Choosing a Room Background
 
 
Top 10
 
- Microsoft Sharepoint 2013 : Administering Sharepoint with Windows Powershell - Basic PowerShell Usage (part 3) - Controlling Output
- Microsoft Sharepoint 2013 : Administering Sharepoint with Windows Powershell - Basic PowerShell Usage (part 2) - PowerShell Help , PowerShell Variables
- Microsoft Sharepoint 2013 : Administering Sharepoint with Windows Powershell - Basic PowerShell Usage (part 1) - Listing the SharePoint Commands
- Microsoft Sharepoint 2013 : Administering Sharepoint with Windows Powershell - Commands
- Microsoft Sharepoint 2013 : Microsoft SharePoint 2013 Management Shell and Other Hosts
- Microsoft Word 2010 : Using Advanced Text Features - Addressing Envelopes
- Microsoft Word 2010 : Using WordArt (part 2) - Changing the Format of a WordArt Object
- Microsoft Word 2010 : Using WordArt (part 1) - Inserting WordArt Text
- Microsoft Word 2010 : Creating and Formatting Text Boxes (part 3) - Formatting Text in a Text Box, Linking Text Boxes
- Microsoft Word 2010 : Creating and Formatting Text Boxes (part 2) - Resizing a Text Box , Moving a Text Box