Advert

Configuring SMS Site Systems

Last edited by . Total of no comments in the discussion.

Configuring SMS Sites Systems A SMS site system is a Windows server that carries out one of multiple SMS roles for the SMS site. When installing SMS, the default configuration is that all SMS roles are installed on an SMS site server. After SMS is installed, you can assign these site system roles to computers: Client access points (CAPs): This is a SMS site system that operates as the exchange point between SMS clients and the SMS site server. At the client access point; inventory, and status information and discovery Read More

Share on:

Windows Registry Hacks

Last edited by . Total of no comments in the discussion.

Windows registry 'hacks' are commands incorporated into the Windows Registry with the aim of improving the system's efficiency, security or communications protocols. Knowing how to 'tweak' the registry can help ensure the security and efficiency of a computer system. What follows is a brief explanation of the system registry and some suggested 'hacks' to make a computer system more secure. What is the Windows Registry? The system registry is, literally, your computer's 'command and control' program. Technically, it is a database that contains the options and settings for the Microsoft Read More

Share on:

Encrypting File System (EFS)

Last edited by . Total of 3 comments in the discussion.

An Overview of EFS Encrypting File System (EFS) enables users to encrypt files and folders, and entire data drives on NTFS formatted volumes. NTFS enables you to set permissions on files and folders on an NTFS formatted volume which controls access to these files and folders. EFS enables you to encrypt files and folders to further enhance the security of these files and folders. Even when an unauthorized person manages to access the files and folders because of incorrectly configured NTFS permissions, the files and folders would be encrypted! Only Read More

Share on:

How to Erase a Hard Drive in Windows

Last edited by . Total of no comments in the discussion.

Erasing a hard drive is relatively straight forward and only takes about an hour to accomplish. There are several ways to erase a hard drive and each method has its own advantages and disadvantages. Below are few methods for reformatting, using disk sanitizing software, or specifically deleting files. Erase a Hard Drive by Reformatting It The simplest way to erase a hard drive in Windows is to reformat it. This method is extremely popular, especially for those users that have had significant problems with their operating system or computer in Read More

Share on:

Understanding Systems Management Server (SMS)

Last edited by . Total of no comments in the discussion.

Systems Management Server (SMS) Overview SMS 2.0 is a Microsoft BackOffice systems management tool that can both operate in and manage an assortment of network environments. Systems Management Server (SMS) enables network environments and network resources to be centrally controlled. The core control point or center of Systems Management Server is the SMS Administrator console. This is a snap-in to the Microsoft Management Console (MMC). The industry standard for Web-Based Enterprise Management (WBEM) is the core of SMS data collection and presentation. The main functions of SMS are listed here: Read More

Share on:

Securing File and Print Servers

Last edited by . Total of no comments in the discussion.

The file server role stores data for network users, and provides access to users for files stored on the file server. File servers enable users to store files in a centralized location and share files with another user. The print server role provides network printing capabilities for the network. Through the print server role, you can configure a server to manage printing functions on the network. The print server is the computer where the print drivers are located that manage printing between printers and client computers. The print servers also Read More

Share on:

UNIX and Windows Server

Last edited by . Total of no comments in the discussion.

Interoperating with UNIX The Unix operating system was developed in 1969, and was the initial operating system written in the C programming language. Unix enabled multiple users to access the system and run programs at the same time, and share resources and files. To date, Unix is regarded as being a robust, stable operating system. It is though considered quite intricate to administer. These days, Unix is available as a number of different solutions that have been customized by vendors to suit their own hardware platforms: AIX; developed by IBM Read More

Share on:

Creating and Managing Forests and Domains

Last edited by . Total of 1 comment in the discussion.

Domains and Forests A domain in Active Directory consists of a set of computers and resources that all share a common directory database. Domains contain all the objects that exist in the network and can store a multitude of objects. Each domain contains information on the objects that they contain. A domain is also a security boundary. Domain trees are created by adding child domains to a parent domain. Domains that are grouped into a domain tree have a hierarchical naming structure and also share a contiguous namespace. A forest Read More

Share on:

Tree and Forest in Active Directory

Last edited by . Total of 17 comments in the discussion.

The Domain is the core unit of logical structure in Active Directory. All objects that share a common directory database and trust relationship with other domain and security policies are known as Domains. Each domain stores information only about the objects that belong to that domain. All security polices and settings, such as administrative rights, security policies, and Access Control Lists (ACLs), do not cross from one domain to another. Thus, a domain administrator has full rights to set policies only within domain they belong to. Domains provide administrative boundaries Read More

Share on:

Remote Server Management

Last edited by . Total of no comments in the discussion.

An Overview on Remote Server Management In enterprises that need a secure environment; servers and desktops are usually managed remotely. Administration is hardly performed by logging on to the local console. Remote management or administration is not a new notion, and is used largely to manage servers and desktops. Windows Server 2003 includes a few technologies which can be used for the administration of remote client computers, and to remotely manage servers. These include: Microsoft Management Console snap-ins can be used to connect to a remote system and manage the Read More

Share on: