Windows
 
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... >  |  Displaying page 1 of 27, items 1 to 30 of 794.
Windows 8 : Introducing Storage Spaces - Creating storage spaces
Storage Spaces is the new storage virtualization and management technology Microsoft has developed. The concept of Storage Spaces has been around for quite some time; Windows Home Server used Drive Extender to make external storage manageable within Windows Home Server, and Storage Spaces takes a cue from this technology.
Windows 8 : Working with file systems (part 5) - Working with quotas, Working with quotas for user accounts
Working with disk quotas can provide a way to ensure that certain volumes allow each person using the computer to use only a predetermined amount of space. Consider the following example.
Windows 8 : Working with file systems (part 4) - Understanding Encrypting File System, BitLocker
Windows and NTFS provide a method for each person using a computer to encrypt his or her files, folders, and drives. Encrypting File System (EFS) is a method used to encrypt files and determine who can access the files.
Windows 8 : Working with file systems (part 3) - Auditing access to securable objects by using SACLs
After the security of discretionary access lists is in place, NTFS allows only those user accounts or groups with the correct permissions to access objects. However, others within an environment might attempt to access files or folders.
Windows 8 : Working with file systems (part 2) - Inheritance and cumulative effectiveness
The combinations of permissions are complex. Before you consider them, think about the inheritance of permissions and the fact that permissions for user accounts and groups have a cumulative effect. This alone can be confusing.
Windows 8 : Working with file systems (part 1) - Security within the file system
One of the primary focuses of the NTFS file system is security. People who use Windows have at one time or another tried to open a file on the network and received an Access Denied message for that particular file.
Windows 8 : Managing disks and storage (part 5) - Using Microsoft Drive Optimizer to organize data - The DiskPart utility
This section looks at the DiskPart utility in more detail, explaining the options available with DiskPart and how it might be used when performing maintenance on or troubleshooting a computer. The DiskPart utility and commands are designed to work directly with disks, volumes, and partitions.
Windows 8 : Managing disks and storage (part 4) - Using Microsoft Drive Optimizer to organize data - Check Disk (chkdsk)
The disk optimizer and Disk Cleanup utilities provide methods to handle poorly performing disks within a computer; chkdsk (pronounced “check disk”) performs disk repair to help correct problems with the drives themselves.
Windows 8 : Managing disks and storage (part 3) - Using Microsoft Drive Optimizer to organize data
Disk Defragmentation doesn’t clean up files and folders on a computer as much as organize them into a more efficient layout on the disk. It does this by consolidating free space at the end of the disk and by ensuring that system files and similar files are grouped together.
Windows 8 : Managing disks and storage (part 2) - Disk Defragmenter and Disk Cleanup
Files become fragmented as they are used; as a result, they are not optimally placed on the disks within a computer as they are read and written.
Windows 8 : Managing disks and storage (part 1) - Using disk management
The concept of disk management has been useful in understanding how disks are used for several versions of Microsoft Windows, and Windows 8 is no exception.
Windows 8 : Sharing printers - Configuring shared printers, Configuring printing permissions
Sharing printers on the network is an easy task that doesn’t take much time. You just need to think about whom you want to access your printer and which permissions are available.
Windows 8 : Sharing files and folders (part 6) - Understanding NTFS permissions - Identifying permissions, Taking ownership of a resource
With this permission sleight of hand, you might wonder how you can discover who has permissions to what. As you move deeper into the folder hierarchy and as permission inheritance is blocked at different levels, it can become confusing.
Windows 8 : Sharing files and folders (part 5) - Understanding NTFS permissions - Creating advanced security settings
NTFS permissions can get confusing because of the way they work. What you just saw was straightforward information—apply a permission, and it takes effect. However, as you investigate further, additional complexity becomes apparent.
Windows 8 : Sharing files and folders (part 4) - Understanding NTFS permissions - Modifying file or folder permissions
In addition to the permissions that you can set when you share a folder, Windows includes a second, more comprehensive set of permissions. Called NTFS permissions, these can allow or deny permissions on a per-file or per-folder basis on the Windows 8–based computer.
Windows 8 : Sharing files and folders (part 3) - Sharing a folder
By using the simple method, you can’t control the name of the share; it will always assume the name of the folder you’re sharing. Although you will want to do this in some instances, it won’t always be the case.
Windows 8 : Sharing files and folders (part 2) - Enabling folder sharing using the Windows 8 interface, Enabling folder sharing using the traditional interface
The ability to share files and folders remains one of the most basic reasons that organizations deploy networks in the workplace and why more people are deploying networks in their homes.
Windows 8 : Sharing files and folders (part 1) - Configuring the Network and Sharing Center
The Network and Sharing Center has been the primary location for managing networks in Windows for quite some time and remains available in Windows 8. This tool includes some high-level options for how sharing options operate in Windows 8.
Windows 8 : Configuring virtual machine networking and storage (part 3) - Assigning a virtual switch to a virtual machine , Assigning storage to a virtual machine
Virtual machines can have multiple network adapters and exist on multiple virtual switches. A number of additional features, such as bandwidth management, MAC address assignment (if an address other than the 00-15-5D-xx-xx-xx format is required), and VLAN identification, can be set as properties of the virtual machine.
Windows 8 : Configuring virtual machine networking and storage (part 2) - Hyper-V virtual switch
As mentioned previously, the Hyper-V virtual switch can operate three modes: external, internal, and private. Each of these switch modes has different characteristics that need to be considered before placing VMs on them.
Windows 8 : Configuring virtual machine networking and storage (part 1) - Introducing storage and networking for Hyper-V
The key concept for both storage and networking for Hyper-V is that, in both situations, the virtualized devices are communicating on behalf of the Windows 8 connectivity technologies. Both the Hyper-V virtual switch and Virtual Fibre Channel technologies have an underlying address scheme.
Windows 8 : Customizing the Lock Screen - Customizing the Lock Screen Background,Controlling the Apps Displayed on the Lock Screen, Disabling the Lock Screen
The Lock screen is the screen that appears before you sign on to Windows 8 (or, if your PC has multiple user accounts, it’s the screen that appears before you select which account to sign on).
Windows 8 for Business : Features Exclusive to Windows 8 Enterprise,Windows RT and Business
Microsoft is providing a unique set of features for users of the Windows 8 Enterprise edition. This high-end Windows 8 product edition is available only to corporate customers that subscribe to Microsoft’s Software Assurance volume licensing program.
Windows 8 for Business : Virtualization (part 4) - VHD Shell Integration,Remote Desktop and Remote Desktop Host
Windows 8 now offers direct shell integration with VHD files, letting you seamlessly “mount” them as if they were physical disks and then browse through them using File Explorer.
Windows 8 for Business : Virtualization (part 3) - Using Hyper-V Virtual Machine Connection
Hyper-V is a one-stop shop for creating and managing virtual machines and other virtual resources, but sometimes all you need to do is connect to a virtual machine, which can be found on your own PC or in a Hyper-V install on a different PC or server in your environment.
Windows 8 for Business : Virtualization (part 2) - Using Hyper-V Manager
Hyper-V Manager is the Hyper-V management console and the exact same utility that is provided with Windows Server 2012 and the Remote Server Administration Tools (RSAT) for Windows Server 2012.
Windows 8 for Business : Virtualization (part 1) - Client Hyper-V
Client Hyper-V, as Microsoft calls the Windows 8 version of Hyper-V, has been added to the OS for two primary reasons. One is for software developers who need to test applications and web apps on a variety of operating system and browser combinations.
Windows Server 2012 : Deploying Dynamic Access Control (part 4) - Validating the Configuration
If DAC is configured correctly, Betty should have no access to the Payroll share. In the properties of the Payroll share, click the Advanced button under Security. As we expected, the effective permissions of Betty’s account show she has no access to Payroll.
Windows Server 2012 : Deploying Dynamic Access Control (part 3) - Adding a Resource Property to the Global Resource Property List, Creating a New Central Access Rule
Every resource property has to be added to a resource property list. These lists make the resource property available to file servers. DAC resources can have individual lists target specific file servers, but for our purposes here, we are going to add the resource property to the Global Resource Property List.
Windows Server 2012 : Deploying Dynamic Access Control (part 2) - Configuring Resource Property for Files
To create a new resource property, from the ADAC click Resource Properties, New, and then Resource Property.
 
 
Most View
 
- Configuring Active Directory Server Roles : Administering Active Directory - Planning the OU Structure (part 1) - Logical Grouping of Resources
- Microsoft Lync Server 2013 Front End Server : Installation - Lync Server 2013 Topology Builder
- Application Lifecycle Management in SharePoint 2013 : Planning Your SharePoint Team Environments (part 1) - Virtualized Dedicated Environments
- EXchange Server 2013 : Using and managing Exchange services (part 1) - Working with Exchange services, Checking required services
- SQL Server 2012 : Configuration Options (part 4) - Processor-Configuration Properties
- Microsoft Lync Server 2013 Edge Server : Edge Server Installation (part 2) - Edit the Topology, Deploying a Single Edge Server Pool
- Exchange Server 2013 : Defining a Highly Available Messaging Solution - Defining Terms for Availability
- SQL Server 2012 : Using XML Data - FOR XML (part 2) - Raw
- Windows 7 : Working with Files - Select a File
- Windows 8 Explorer : Properties
 
 
Top 10
 
- Securing an Exchange Server 2007 Environment : Securing Outlook Web Access
- Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 2) - Filtering Junk Mail
- Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 2) - Filtering Junk Mail
- Securing an Exchange Server 2007 Environment : Protecting Against Spam (part 1) - Protecting Against Web Beaconing
- Securing an Exchange Server 2007 Environment : Securing Outlook 2007 (part 2) - Encrypting Communications Between Outlook and Exchange , Blocking Attachments
- Securing an Exchange Server 2007 Environment : Securing Outlook 2007 (part 1) - Outlook Anywhere
- Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 3) - Keeping Up with Security Patches and Updates
- Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 2) - Utilizing Security Templates
- Securing an Exchange Server 2007 Environment : Securing Your Windows Environment (part 1) - Windows Server 2003 Security Improvements , Windows Vista Security Improvements
- Securing an Exchange Server 2007 Environment : Client-Level Secured Messaging - Exchange Server 2007 Client-Level Security Enhancements