Troubleshoot and Solve Windows Server Problems (original) (raw)

Problem solve

Get help with specific problems with your technologies, process and projects.

Problem solve

Get help with specific problems with your technologies, process and projects.

Exchange admins got a boost from Microsoft when it improved how it handles DMARC authentication failures to help organizations fight back from email-based attacks on their users. Continue Reading

Admins can use the event-driven functionality in Microsoft's serverless offering and build event-driven workflows for a more efficient management approach. Continue Reading

This guide helps admins solve problems on the network by explaining how to work with recorded activity in logs and set up an archival system to examine older incidents. Continue Reading

Admins need all the help they can get, and this Microsoft utility shows IT how to correct security issues and optimize performance in key infrastructure workloads. Continue Reading

A migration to the cloud collaboration platform requires a command of the multiple admin portals available to admins to help the organization make the most of its subscription. Continue Reading

A break-glass account in Microsoft's identity and access management platform helps avoid disruptions in a crisis. Follow these best practices to keep these credentials safe.Continue Reading

Microsoft updated this automated method to manage and back up passwords for local administrator accounts on Windows desktop and server systems. See what's new with Windows LAPS.Continue Reading

Now that Exchange Server 2010 and Exchange 2013 are legacy products, administrators should make the push to migrate to avoid becoming the next ransomware target.Continue Reading

You can jump over the technical barriers that impede automation efforts in your organization by exploring how to deploy a web-based portal that hosts your scripts.Continue Reading

IT pros who manage with PowerShell will run into the double-hop problem and use CredSSP to work around it. This tutorial offers a more streamlined way to avoid that roadblock.Continue Reading

By using the .NET WebClient class and PowerShell, Windows admins can upload and download files to FTP. Review the general process and corresponding examples to get started.Continue Reading

Retrieving content from and modifying content in text files with PowerShell are skills many administrators need to cultivate to aid their automation efforts.Continue Reading

Learn how to check if your machines have pending reboots with a simple PowerShell module to ensure changes to files do not cause stability issues.Continue Reading

A basic administrative skill is checking over logs to find out why something broke. Learn how to build a proper logging mechanism to catch errors for diagnostic purposes.Continue Reading

Parameters in Windows PowerShell can help admins better customize their functions, leading to improved input testing and more extensible commands.Continue Reading

Certain accounts, such as company executives, will draw unwanted attention from hackers. Learn how to catch these targeted attacks by checking Windows event logs.Continue Reading

Active Directory account templates are not difficult to make. But it helps to know how to use certain shortcuts, like variables, to create home directories and roaming profiles.Continue Reading

Windows Server 2022 comes with native security technologies to protect the enterprise. But endpoint detection and response tools can be worth the price of admission.Continue Reading

The security product attempts to ferret out threats that originate from apps and services then assists the enterprise with an automatic response to head off trouble.Continue Reading

With more apps and credentials to juggle, users can get blocked from their accounts after too many login attempts. Learn to use PowerShell to find and fix these issues.Continue Reading

Organizations that were unable to uninstall their last Exchange Server from the on-premises environment can now do so if they fulfill the requirements.Continue Reading

It's possible to get to learn about the features in the latest Microsoft server OS in a cloud environment, but there are a few reasons to stay grounded with this approach.Continue Reading

Group Policy Objects help admins maintain control of the enterprise environment, but it takes some planning to understand how to properly protect and recover GPOs to avoid trouble.Continue Reading

Administrators who manage many users can go one step further toward streamlining license assignments by taking advantage of a new feature from Microsoft.Continue Reading

DNS outages cause connectivity issues that prevent basic tasks from executing properly. Understand how to perform a restore for a DNS zone, which is not always intuitive.Continue Reading

The unique nature of your on-premises Exchange Server makes it an attractive target for threat actors. Take these recommended steps to avoid being the next breach victim.Continue Reading

When you lock down your code to work in specific conditions, your automation efforts can fall flat. Try these techniques to add more versatility to your PowerShell scripts.Continue Reading

In certain instances, a return keyword is a good option to exit the current scope of a function and to reduce the bloat from a PowerShell script.Continue Reading

Data center security tools have little control over the plethora of SaaS apps used in the enterprise. A Microsoft offering attempts to bridge that gap to ward off threats.Continue Reading

A file server deployment must satisfy the needs of both the end user and the IT staff. Tune up Windows Server for a secure and performant repository for your critical data.Continue Reading

A small investment in time to execute these Windows Server performance tuning tips and techniques can optimize server workloads for more satisfactory results.Continue Reading

Microsoft's hosting service for DNS domains is an option for organizations with a heavy Azure investment that want the benefits associated with a cloud service.Continue Reading

The 'Active Directory Administration Cookbook' covers what admins can do in advance to bring the identity and access management platform back online after an attack.Continue Reading

Active Directory runs several key operational duties, such as validating access to resources. Keep the system from breaking down with help from these diagnostic methods.Continue Reading

When replication between domain controllers breaks down, just about everything else will grind to a halt. These utilities can help pinpoint the Active Directory issues.Continue Reading

More users are working from home, which makes them tempting targets for malicious actors. Take the time to fortify your environment by deploying Office 365 protections.Continue Reading

Enterprises that want to wrap up their systems in an extra layer of security have the option for more enhanced protection that integrates with other Microsoft products.Continue Reading

The apps in Office 365 sometimes need a few tweaks to interact in a more seamless fashion. Learn how to combine the functionality of Exchange and Microsoft Teams.Continue Reading

There are literally hundreds of changes coming to the collaboration platform that affect email and other services. Here's what IT can do to help ease the transition for end users.Continue Reading

More remote users are working on their own equipment, which opens an organization to a hack attempt. Office 365 customers can use multifactor authentication to lower this risk.Continue Reading

Every Exchange Server configuration is unique, which makes a move to hosted email in Office 365 a complex undertaking, but some stumbling blocks are more frequent than others.Continue Reading

Learn how to curb the native abilities of the expansive scripting tool in the Windows OS to prevent your users from being unwitting participants in a cyberattack.Continue Reading

Does your current Active Directory permissions setup spark joy? If not, then it's time to unscramble that confusing design into something that's easier to use and maintain.Continue Reading

Microsoft augments the native protection features in its newer Windows Server releases with cloud-based security products to reduce the likelihood of a successful breach attempt.Continue Reading

The BitLocker encryption technology continues to evolve from its roots as a Windows Vista feature to protect resources both in the local data center and in the Azure cloud platform.Continue Reading

Your organization has a few options to migrate from unsupported Windows Server 2008/2008 R2 systems to avoid becoming another cyberattack statistic.Continue Reading

The cloud-based identity and access management service does not come with certain defensive features turned on by default, which administrators should rectify.Continue Reading

If you find your systems locked up from a ransomware attack, what should you prioritize? Before you start your recovery, follow this plan to avoid additional trouble.Continue Reading

Administrators should have a few of these data protection techniques up their sleeves to keep Active Directory from a total breakdown.Continue Reading

Administrators can diagnose and treat a buggy server operating system by using the Windows SFC and DISM utilities for image analysis and repairs.Continue Reading

Ransomware attacks evolve to evade Office 365's integrated protection systems. A third-party security tool can help shore up your defenses.Continue Reading

No one product can prevent every ransomware attack, but there are several defensive practices Windows administrators can take to stop an encryption infection from ruining their day.Continue Reading

Avoid springing a money leak in your Office 365 tenant by keeping closer tabs on several areas and following more frugal practices.Continue Reading

A complex password only goes so far to stop a breach. Implementing multifactor authorization can help, but make sure the product you select fits your current and future needs.Continue Reading

Active Directory is the key component in many organizations to keep tabs on access and identity. If the SYSVOL directory disappears, these steps can get the system fixed.Continue Reading

A move to Exchange Online in the Office 365 platform removes some administrative obligations but does require more work to set up proper email protections.Continue Reading

Virtualization improves hardware use, but the pendulum can swing the other way and result in an overallocation of resources. Here's how to maintain the balance.Continue Reading

When problems with email occur, they can stem from an improper configuration of the Exchange Server system. Here's how to unravel some common messaging platform problems.Continue Reading

IT administrators must be able to identify privileged accounts in Active Directory for a more secure enterprise; two methods can make the task easier.Continue Reading

Exchange Server log files tend to chew up a lot of space, particularly on the later versions. Here's how to keep the mail flowing when a hard drive fills up.Continue Reading

When a Windows Server workload starts to falter, what's the best way to proceed before it keels over? Once upon a time, you would try to fix it, but times have changed.Continue Reading

From streamlining remote sessions to setting up an SSL certificate, these PowerShell tutorials show IT admins how to get more done with the management tool.Continue Reading

Windows Server 2019 cluster sets bring some Azure-like capabilities into the data center, but new features also bring new challenges for administrators.Continue Reading

Microsoft added a number of new software-defined features in Windows Server 2019, but deploying a fully virtualized data center remains a challenge for several reasons.Continue Reading

There are a number of perks for administrators who move to Exchange Online, but there are spots of frustration that will require a few workarounds to ease the transition process.Continue Reading

Check this list of common issues that can occur during an Exchange migration to steer the organization away from potential mishaps during the messaging platform's relocation.Continue Reading

The last thing an overextended admin needs is additional work, but there are certain practices that, once introduced, can curb tech burnout in the long run.Continue Reading

When administrators get reports about an Outlook outage, they must work quickly to identify the affected accounts, research the causes and know where to turn for support.Continue Reading

The arrival of Exchange 2019 also means the end of unified messaging in the on-premises offering. Admins who use voicemail in Outlook should explore their options.Continue Reading

The benefit of PowerShell is its wide-ranging access to Windows systems, but industrious hackers can exploit its abilities to launch attacks from inside your data center.Continue Reading

An expired Exchange 2010 certificate is one of those issues that catches everyone's attention. Check and replace certificates with these basic commands.Continue Reading

Fine-tune virtualized workloads and diagnose performance issues with help from these Windows troubleshooting tools every server administrator should know.Continue Reading

Make your move to Office 365 with help from our experts who explain how to prepare before the transition and provide checklists to make sure the migration goes as planned.Continue Reading

A move from on-premises Exchange to Office 365 also entails determining the best way to transfer legacy archives. This tutorial can help ease migration complications.Continue Reading

Exchange Server's information rights management features put boundaries on messages and documents to avoid the mishandling of restricted content.Continue Reading

Outlook crashes and rendering issues might require an upgrade -- or a downgrade -- for administrators who want to avoid a Band-Aid approach and want a permanent solution.Continue Reading

PowerShell can come to the rescue to restore messages and other items from an Exchange 2016 recovery database when trouble strikes -- or when lawyers make requests.Continue Reading

Exchange administrators can use PowerShell to manage Office 365 compliance, e-discovery and data loss prevention.Continue Reading

An administrator can create functions to support the PowerShell pipeline, which improves upon text-based shells by allowing the scripter to pass objects across the pipe.Continue Reading

Some folders in a mailbox on Exchange Server 2013 are not showing up on the folder list in the OWA virtual directory but do appear in other views.Continue Reading

Is there a way to gain access to multiple users' calendars from the Exchange Management Console in Exchange 2010?Continue Reading

Tricky Office 365 problems are no treat to the IT admin. Fix the nuisances that corrupt your email with these troubleshooting treats.Continue Reading

IT shops with hybrid Office 365 and on-premises Exchange mailboxes need to know how Outlook Autodiscover works when mailboxes haven't migrated.Continue Reading

When end users remain logged in to an RDP session, it consumes valuable resources. Use this PowerShell script to force users to log off.Continue Reading

SR-IOV in Windows Server 2012 R2 supports Hyper-V Live Migration, but system requirements hampered adoption for some cases. Should everyone put PCIe SR-IOV to use?Continue Reading

Windows Server IPAM can only handle one Active Directory forest. Learn about other limitations.Continue Reading

Converting authentication modes is a rare thing admins need to address, but it must be fixed right away when it happens -- and Microsoft's documentation on it is incorrect.Continue Reading

There are several flaws in IIS that can jeopardize the security of Windows servers. Here are some of the top threats and how to solve them.Continue Reading

Our company has users who reside outside the local area network. What's the best way to grant those users access to Outlook Web App?Continue Reading

With Windows Server 2012 R2 and earlier, admins have access to write-back caching, leading to reasonable improvements for mission-critical workloads.Continue Reading

As long as you know how to set it up and install it, ADFS can be a good identity management option for Office 365.Continue Reading

Knowing the settings for the mailbox server and the Client Access server role is the key to customizing ActiveSync virtual directories.Continue Reading

When Group Policy configurations aren't working like they should in Outlook, these five steps can help you figure out what's wrong.Continue Reading

With the introduction of Windows Server 2012 R2, shared virtual disks have capabilities to improve failover clusters in a few ways.Continue Reading

The VHDX format includes performance-enhancing features and capabilities that let virtual servers recover VMs with little to no data loss.Continue Reading

Exchange Server 2013 gives OWA users offline access to features and functionality that had previously only been available to Outlook users.Continue Reading

Put PowerShell cmdlets to work with Windows virtualization by automating setup, maintenance and configuration tasks in your organization.Continue Reading

The Windows Server 2012 R2 release continues to push the trend of faster and less disruptive VM migrations in the data center.Continue Reading

By using Live Migration compression, smaller VM files are transferred more quickly between systems and have fewer resent or dropped packets.Continue Reading

The RDMA feature can use high-throughput, low-latency data exchanges to improve Live Migration's performance in Windows Server 2012 R2.Continue Reading