How can I quickly open Windows Explorer in Windows XP? What keyboard shortcuts do you know? In Windows XP, as in other Windows Operating Systems, you can use shortcut keys as an alternative to the mouse. You can open, close, and navigate the Start menu, desktop, menus, dialog boxes, and Web pages using keyboard shortcuts….
In this post, Michael Simmons explains FSMO Roles in Active Directory 2008. Michael covers all 5 roles: Schema Master, Domain Naming Master, Infrastructure Master, Relative ID Master and Primary Domain Controller Emulator. Together, these FSMO Roles help prevent conflicts when making changes within the traditional multi-master model.
How can I block a Windows 2000/XP/2003 computer from surfing on the Internet but still allow it to surf to Intranet sites? As written in the previous article – Block Web Browsing with IPSec, Windows 2000/XP/2003 machines have a built-in IP security mechanism called IPSec (IP Security). IPSec is a protocol that’s designed to protect…
Rights Management and Protection Sensitivity Labels are built using Microsoft Information Protection (MIP) and are available to Office 365 users with E3 or above licenses. When a label protects a file or message with encryption, the ability to decrypt the item to reveal its content is governed by the rights assigned to the recipient as…
In this post, I will show you how to join Windows Server 2022 Core to an Active Directory (AD) domain. So, if you are you looking for more wholesome Windows Server 2022 goodness, you came to the right place! Joining Windows Server Core to an Active Directory domain lets you manage the security of the…
Last Update: Oct 24, 2023
Roaming profiles are a Windows feature that allows user profiles to be used across multiple workstations within a network. A user profile contains personalized application settings, desktop configurations, application preferences, and other user-specific data. In this article, I will show you how to deploy roaming user profiles in your Windows environment so that users have…
Discover what it takes to configure a user profile default location within Windows 8.1 (and other versions of Windows) in this guide.
Communications Compliance is a part of Microsoft 365’s Insider Risk functionality. This is a replacement for Office 365 supervision policies and introduces coverage of new communications and a lot of machine learning, plus a link to Advanced eDiscovery for the really complicated cases. Not every Office 365 tenant will be interested in employee monitoring, but those that need to should look at Communications Compliance.
Last Update: Sep 07, 2023
This is the second article in the Zero Trust Security in Microsoft 365 series. Here you will gain an understanding of the strategies to deploy Zero Trust Identity Security. Managing identity will always be at the forefront of this security model. Environments with proper identity policies are better placed to handle attempts at gaining access…
A review of Train Signal’s Windows 2000/2003 Active Directory Video Lab Training – Product Details. See more details at Train Signal’s website. Comprehensive Instructional Video. Perfect for the novice who needs a crash course in installing and setting up Active Directory in Windows 2000 Server/Advanced Server and/or Windows 2003 Server or for the more experienced administrator…