Troubleshoot and Solve Windows Server Problems (original) (raw)
Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
Exchange admins got a boost from Microsoft when it improved how it handles DMARC authentication failures to help organizations fight back from email-based attacks on their users. Continue Reading
Admins can use the event-driven functionality in Microsoft's serverless offering and build event-driven workflows for a more efficient management approach. Continue Reading
This guide helps admins solve problems on the network by explaining how to work with recorded activity in logs and set up an archival system to examine older incidents. Continue Reading
Admins need all the help they can get, and this Microsoft utility shows IT how to correct security issues and optimize performance in key infrastructure workloads. Continue Reading
A migration to the cloud collaboration platform requires a command of the multiple admin portals available to admins to help the organization make the most of its subscription. Continue Reading
A break-glass account in Microsoft's identity and access management platform helps avoid disruptions in a crisis. Follow these best practices to keep these credentials safe.Continue Reading
Microsoft updated this automated method to manage and back up passwords for local administrator accounts on Windows desktop and server systems. See what's new with Windows LAPS.Continue Reading
Now that Exchange Server 2010 and Exchange 2013 are legacy products, administrators should make the push to migrate to avoid becoming the next ransomware target.Continue Reading
You can jump over the technical barriers that impede automation efforts in your organization by exploring how to deploy a web-based portal that hosts your scripts.Continue Reading
IT pros who manage with PowerShell will run into the double-hop problem and use CredSSP to work around it. This tutorial offers a more streamlined way to avoid that roadblock.Continue Reading
By using the .NET WebClient class and PowerShell, Windows admins can upload and download files to FTP. Review the general process and corresponding examples to get started.Continue Reading
Retrieving content from and modifying content in text files with PowerShell are skills many administrators need to cultivate to aid their automation efforts.Continue Reading
Learn how to check if your machines have pending reboots with a simple PowerShell module to ensure changes to files do not cause stability issues.Continue Reading
A basic administrative skill is checking over logs to find out why something broke. Learn how to build a proper logging mechanism to catch errors for diagnostic purposes.Continue Reading
Parameters in Windows PowerShell can help admins better customize their functions, leading to improved input testing and more extensible commands.Continue Reading
Certain accounts, such as company executives, will draw unwanted attention from hackers. Learn how to catch these targeted attacks by checking Windows event logs.Continue Reading
Active Directory account templates are not difficult to make. But it helps to know how to use certain shortcuts, like variables, to create home directories and roaming profiles.Continue Reading
Windows Server 2022 comes with native security technologies to protect the enterprise. But endpoint detection and response tools can be worth the price of admission.Continue Reading
The security product attempts to ferret out threats that originate from apps and services then assists the enterprise with an automatic response to head off trouble.Continue Reading
With more apps and credentials to juggle, users can get blocked from their accounts after too many login attempts. Learn to use PowerShell to find and fix these issues.Continue Reading
Organizations that were unable to uninstall their last Exchange Server from the on-premises environment can now do so if they fulfill the requirements.Continue Reading
It's possible to get to learn about the features in the latest Microsoft server OS in a cloud environment, but there are a few reasons to stay grounded with this approach.Continue Reading
Group Policy Objects help admins maintain control of the enterprise environment, but it takes some planning to understand how to properly protect and recover GPOs to avoid trouble.Continue Reading
Administrators who manage many users can go one step further toward streamlining license assignments by taking advantage of a new feature from Microsoft.Continue Reading
DNS outages cause connectivity issues that prevent basic tasks from executing properly. Understand how to perform a restore for a DNS zone, which is not always intuitive.Continue Reading
The unique nature of your on-premises Exchange Server makes it an attractive target for threat actors. Take these recommended steps to avoid being the next breach victim.Continue Reading
When you lock down your code to work in specific conditions, your automation efforts can fall flat. Try these techniques to add more versatility to your PowerShell scripts.Continue Reading
In certain instances, a return keyword is a good option to exit the current scope of a function and to reduce the bloat from a PowerShell script.Continue Reading
Data center security tools have little control over the plethora of SaaS apps used in the enterprise. A Microsoft offering attempts to bridge that gap to ward off threats.Continue Reading
A file server deployment must satisfy the needs of both the end user and the IT staff. Tune up Windows Server for a secure and performant repository for your critical data.Continue Reading
A small investment in time to execute these Windows Server performance tuning tips and techniques can optimize server workloads for more satisfactory results.Continue Reading
Microsoft's hosting service for DNS domains is an option for organizations with a heavy Azure investment that want the benefits associated with a cloud service.Continue Reading
The 'Active Directory Administration Cookbook' covers what admins can do in advance to bring the identity and access management platform back online after an attack.Continue Reading
Active Directory runs several key operational duties, such as validating access to resources. Keep the system from breaking down with help from these diagnostic methods.Continue Reading
When replication between domain controllers breaks down, just about everything else will grind to a halt. These utilities can help pinpoint the Active Directory issues.Continue Reading
More users are working from home, which makes them tempting targets for malicious actors. Take the time to fortify your environment by deploying Office 365 protections.Continue Reading
Enterprises that want to wrap up their systems in an extra layer of security have the option for more enhanced protection that integrates with other Microsoft products.Continue Reading
The apps in Office 365 sometimes need a few tweaks to interact in a more seamless fashion. Learn how to combine the functionality of Exchange and Microsoft Teams.Continue Reading
There are literally hundreds of changes coming to the collaboration platform that affect email and other services. Here's what IT can do to help ease the transition for end users.Continue Reading
More remote users are working on their own equipment, which opens an organization to a hack attempt. Office 365 customers can use multifactor authentication to lower this risk.Continue Reading
Every Exchange Server configuration is unique, which makes a move to hosted email in Office 365 a complex undertaking, but some stumbling blocks are more frequent than others.Continue Reading
Learn how to curb the native abilities of the expansive scripting tool in the Windows OS to prevent your users from being unwitting participants in a cyberattack.Continue Reading
Does your current Active Directory permissions setup spark joy? If not, then it's time to unscramble that confusing design into something that's easier to use and maintain.Continue Reading
Microsoft augments the native protection features in its newer Windows Server releases with cloud-based security products to reduce the likelihood of a successful breach attempt.Continue Reading
The BitLocker encryption technology continues to evolve from its roots as a Windows Vista feature to protect resources both in the local data center and in the Azure cloud platform.Continue Reading
Your organization has a few options to migrate from unsupported Windows Server 2008/2008 R2 systems to avoid becoming another cyberattack statistic.Continue Reading
The cloud-based identity and access management service does not come with certain defensive features turned on by default, which administrators should rectify.Continue Reading
If you find your systems locked up from a ransomware attack, what should you prioritize? Before you start your recovery, follow this plan to avoid additional trouble.Continue Reading
Administrators should have a few of these data protection techniques up their sleeves to keep Active Directory from a total breakdown.Continue Reading
Administrators can diagnose and treat a buggy server operating system by using the Windows SFC and DISM utilities for image analysis and repairs.Continue Reading
Ransomware attacks evolve to evade Office 365's integrated protection systems. A third-party security tool can help shore up your defenses.Continue Reading
No one product can prevent every ransomware attack, but there are several defensive practices Windows administrators can take to stop an encryption infection from ruining their day.Continue Reading
Avoid springing a money leak in your Office 365 tenant by keeping closer tabs on several areas and following more frugal practices.Continue Reading
A complex password only goes so far to stop a breach. Implementing multifactor authorization can help, but make sure the product you select fits your current and future needs.Continue Reading
Active Directory is the key component in many organizations to keep tabs on access and identity. If the SYSVOL directory disappears, these steps can get the system fixed.Continue Reading
A move to Exchange Online in the Office 365 platform removes some administrative obligations but does require more work to set up proper email protections.Continue Reading
Virtualization improves hardware use, but the pendulum can swing the other way and result in an overallocation of resources. Here's how to maintain the balance.Continue Reading
When problems with email occur, they can stem from an improper configuration of the Exchange Server system. Here's how to unravel some common messaging platform problems.Continue Reading
IT administrators must be able to identify privileged accounts in Active Directory for a more secure enterprise; two methods can make the task easier.Continue Reading
Exchange Server log files tend to chew up a lot of space, particularly on the later versions. Here's how to keep the mail flowing when a hard drive fills up.Continue Reading
When a Windows Server workload starts to falter, what's the best way to proceed before it keels over? Once upon a time, you would try to fix it, but times have changed.Continue Reading
From streamlining remote sessions to setting up an SSL certificate, these PowerShell tutorials show IT admins how to get more done with the management tool.Continue Reading
Windows Server 2019 cluster sets bring some Azure-like capabilities into the data center, but new features also bring new challenges for administrators.Continue Reading
Microsoft added a number of new software-defined features in Windows Server 2019, but deploying a fully virtualized data center remains a challenge for several reasons.Continue Reading
There are a number of perks for administrators who move to Exchange Online, but there are spots of frustration that will require a few workarounds to ease the transition process.Continue Reading
Check this list of common issues that can occur during an Exchange migration to steer the organization away from potential mishaps during the messaging platform's relocation.Continue Reading
The last thing an overextended admin needs is additional work, but there are certain practices that, once introduced, can curb tech burnout in the long run.Continue Reading
When administrators get reports about an Outlook outage, they must work quickly to identify the affected accounts, research the causes and know where to turn for support.Continue Reading
The arrival of Exchange 2019 also means the end of unified messaging in the on-premises offering. Admins who use voicemail in Outlook should explore their options.Continue Reading
The benefit of PowerShell is its wide-ranging access to Windows systems, but industrious hackers can exploit its abilities to launch attacks from inside your data center.Continue Reading
An expired Exchange 2010 certificate is one of those issues that catches everyone's attention. Check and replace certificates with these basic commands.Continue Reading
Fine-tune virtualized workloads and diagnose performance issues with help from these Windows troubleshooting tools every server administrator should know.Continue Reading
Make your move to Office 365 with help from our experts who explain how to prepare before the transition and provide checklists to make sure the migration goes as planned.Continue Reading
A move from on-premises Exchange to Office 365 also entails determining the best way to transfer legacy archives. This tutorial can help ease migration complications.Continue Reading
Exchange Server's information rights management features put boundaries on messages and documents to avoid the mishandling of restricted content.Continue Reading
Outlook crashes and rendering issues might require an upgrade -- or a downgrade -- for administrators who want to avoid a Band-Aid approach and want a permanent solution.Continue Reading
PowerShell can come to the rescue to restore messages and other items from an Exchange 2016 recovery database when trouble strikes -- or when lawyers make requests.Continue Reading
Exchange administrators can use PowerShell to manage Office 365 compliance, e-discovery and data loss prevention.Continue Reading
An administrator can create functions to support the PowerShell pipeline, which improves upon text-based shells by allowing the scripter to pass objects across the pipe.Continue Reading
Some folders in a mailbox on Exchange Server 2013 are not showing up on the folder list in the OWA virtual directory but do appear in other views.Continue Reading
Is there a way to gain access to multiple users' calendars from the Exchange Management Console in Exchange 2010?Continue Reading
Tricky Office 365 problems are no treat to the IT admin. Fix the nuisances that corrupt your email with these troubleshooting treats.Continue Reading
IT shops with hybrid Office 365 and on-premises Exchange mailboxes need to know how Outlook Autodiscover works when mailboxes haven't migrated.Continue Reading
When end users remain logged in to an RDP session, it consumes valuable resources. Use this PowerShell script to force users to log off.Continue Reading
SR-IOV in Windows Server 2012 R2 supports Hyper-V Live Migration, but system requirements hampered adoption for some cases. Should everyone put PCIe SR-IOV to use?Continue Reading
Windows Server IPAM can only handle one Active Directory forest. Learn about other limitations.Continue Reading
Converting authentication modes is a rare thing admins need to address, but it must be fixed right away when it happens -- and Microsoft's documentation on it is incorrect.Continue Reading
There are several flaws in IIS that can jeopardize the security of Windows servers. Here are some of the top threats and how to solve them.Continue Reading
Our company has users who reside outside the local area network. What's the best way to grant those users access to Outlook Web App?Continue Reading
With Windows Server 2012 R2 and earlier, admins have access to write-back caching, leading to reasonable improvements for mission-critical workloads.Continue Reading
As long as you know how to set it up and install it, ADFS can be a good identity management option for Office 365.Continue Reading
Knowing the settings for the mailbox server and the Client Access server role is the key to customizing ActiveSync virtual directories.Continue Reading
When Group Policy configurations aren't working like they should in Outlook, these five steps can help you figure out what's wrong.Continue Reading
With the introduction of Windows Server 2012 R2, shared virtual disks have capabilities to improve failover clusters in a few ways.Continue Reading
The VHDX format includes performance-enhancing features and capabilities that let virtual servers recover VMs with little to no data loss.Continue Reading
Exchange Server 2013 gives OWA users offline access to features and functionality that had previously only been available to Outlook users.Continue Reading
Put PowerShell cmdlets to work with Windows virtualization by automating setup, maintenance and configuration tasks in your organization.Continue Reading
The Windows Server 2012 R2 release continues to push the trend of faster and less disruptive VM migrations in the data center.Continue Reading
By using Live Migration compression, smaller VM files are transferred more quickly between systems and have fewer resent or dropped packets.Continue Reading
The RDMA feature can use high-throughput, low-latency data exchanges to improve Live Migration's performance in Windows Server 2012 R2.Continue Reading