In this Ask the Admin, Russell Smith explains why SCM was killed off and how the Security Compliance Toolkit stacks up in comparison.
Need to rein in your admins? Learn how to search for local admins on a network in this easy how-to article.
As storage becomes more defined and controlled by software, how will processes adapt? Learn more in this post!
In this Ask the Admin, Russell Smith looks at what you need to take into consideration when planning access to privileged AD groups.
Last Update: Jun 25, 2023
MC280914 – Updated December 02, 2021: Microsoft has updated the rollout timeline below. Thank you for your patience. This new feature (preview), Adaptive policy scopes, will allow data administrators to scope retention policies and retention label policies to a dynamic set of users, SharePoint sites, or Microsoft 365 Groups. This is enabled by using the properties…
Last Update: Jun 26, 2023
MC280914 – Updated October 14, 2021: Microsoft has updated the rollout timeline below. Thank you for your patience. This new feature (preview), Adaptive policy scopes, will allow data administrators to scope retention policies and retention label policies to a dynamic set of users, SharePoint sites, or Microsoft 365 Groups. This is enabled by using the properties…
This post will explain what DDoS protection is offered in Azure and how to deploy Standard tier protection in a virtual network.
In Windows Server 2003, functional levels were an extension of the older mixed/native mode concept introduced in Windows 2000. In Windows Server 2008 this was further extended to include new features and benefits, and are used to activate new Active Directory features after all the Domain Controllers (DCs) in the domain or forest are running…
Last Update: Jun 27, 2023
MC254894 – Microsoft is releasing a new assistant for admins who want to configure Internet Explorer mode (IE mode) for Microsoft Edge. To detect the sites that need to use IE mode, many admins follow the Enterprise Site Discovery process. In this step-by-step assistant, you’ll get scripts to automate configuration of Enterprise Site Discovery, get IE…
In this second part of Tom Finnis’ article on deploying printers on your network he explains how to assign your printers to specific users and computers using Group Policy and the Active Directory. He also covers in depth how to avoid the most common problem encountered, the lack of built-in support for GPO printer deployment in Windows XP