Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows 7
Change page: < 1 2 3 4 >  |  Displaying page 1 of 4, items 1 to 50 of 155.
Windows Server 2012 : Software and User Account Control Administration (part 5) - Maintaining application integrity - Configuring run levels
By default, only applications running with a user’s administrator access token run in elevated mode. Sometimes, you’ll want an application running with a user’s standard access token to be in elevated mode.
Windows Server 2012 : Software and User Account Control Administration (part 4) - Maintaining application integrity - Application access tokens
Applications are said to be either compliant or legacy. Any application written specifically for Windows Server 2008 or later is considered to be a compliant application. Any application written for an earlier version of Microsoft Windows or not certified as compliant is considered to be a legacy application.
Windows Server 2012 : Software and User Account Control Administration (part 3) - Mastering User Account Control - Configuring UAC and Admin Approval Mode
In Group Policy under Local Policies\Security Options, five security settings determine how Admin Approval Mode and elevation prompting works. Table 1 summarizes these security settings
Windows Server 2012 : Software and User Account Control Administration (part 2) - Mastering User Account Control - Elevation, prompts, and the secure desktop
Unlike Windows XP and early releases of Windows, current releases of Windows make it easy to determine which tasks standard users can perform and which tasks administrators can perform.
Windows Server 2012 : Software and User Account Control Administration (part 1) - Software installation essentials
Windows does not include an Add/Remove Programs utility. Instead, Windows relies completely on the software itself to provide the necessary installation features through a related setup program.
Managing Windows Server 2012 Systems : Managing the Registry (part 8) - Securing the registry - Auditing registry access
Access to the registry can be audited, as can access to files and other areas of the operating system. Auditing allows you to track which users access the registry and what they’re doing
Managing Windows Server 2012 Systems : Managing the Registry (part 7) - Securing the registry - Preventing access to the registry utilities, Applying permissions to registry keys
The registry is a critical area of the operating system. It has some limited built-in security to reduce the risk of settings being inadvertently changed or deleted.
Managing Windows Server 2012 Systems : Managing the Registry (part 6) - Backing up and restoring the registry, Maintaining the registry
Backing up and restoring the registry normally isn’t done from within Registry Editor, however. It is handled through the Windows Server Backup utility or through your preferred third-party backup software.
Managing Windows Server 2012 Systems : Managing the Registry (part 5) - Registry administration - Importing and exporting registry data
Sometimes you might find that it is necessary or useful to copy all or part of the registry to a file. For example, if you’ve installed a service or component that requires extensive configuration, you might want to use it on another computer without having to go through the whole configuration process again
Managing Windows Server 2012 Systems : Managing the Registry (part 4) - Registry administration - Modifying the registry
When you want to work with keys and values in the registry, you typically are working with subkeys of a particular key. This allows you to add a subkey and define its values and to remove subkeys and their values.
Managing Windows Server 2012 Systems : Managing the Registry (part 3) - Registry data: How it is stored and used
Now that you know more about the registry’s structure, let’s take a look at the actual data within the registry. Understanding how registry data is stored and used is just as important as understanding the registry structure.
Managing Windows Server 2012 Systems : Managing the Registry (part 2) - Registry root keys
The registry is organized into a hierarchy of keys, subkeys, and value entries. The root keys are at the top of the hierarchy and form the primary branches, or subtrees, of registry information.
Managing Windows Server 2012 Systems : Managing the Registry (part 1) - Introducing the registry, Understanding the registry structure
Many administrative tools are little more than friendly user interfaces for managing the registry, especially when it comes to Control Panel.
Windows Server 2012 : Enhancing DHCP Reliability - Windows Server 2012 DHCP Failover
Windows Server 2012 DHCP includes a failover scope feature. The benefit of this feature is that leases and reservations are synchronized across the DHCP server and a failover cluster is not required.
Windows Server 2012 : Enhancing DHCP Reliability - Implementing Redundant DHCP Services
DHCP is a critical network service and should be treated as such. Building redundancy into DHCP services has been a challenge for years, and with each release of Windows Server, DHCP redundancy options get better.
Windows Server 2012 : Enhancing DHCP Reliability - DHCP Network Access Protection Integration
The Windows Server 2012 DHCP server service can interact with the Network Access Protection (NAP) service. NAP consists of administrator-defined policies that include specific criteria to be met before a system is allowed to communicate on the network
Windows Server 2012 : Enhancing DHCP Reliability - DHCP Name Protection, DHCP and Dynamic DNS Configuration
If you want to avoid DNS registration issues, you can configure this account to have the password never expire. As a best practice, however, you should change the service account password in Active Directory and in the DHCP server settings as frequently as defined in the standard user password policy.
Windows Server 2012 : Enhancing DHCP Reliability - Link-Layer Filtering, DHCP Reservations
Link-layer filtering or MAC address filtering is a feature of the Windows Server 2012 DHCP service that can be enabled to provide a higher level of security to DHCP leases.
Exploring DHCP Changes in Windows Server 2012 : Migrating DHCP Services from 2008 R2 to Windows Server 2012, derstanding DHCP Client Alternate Network Capability
Aside from the export and import process, after the export is completed on the source server, the source server IP address must be changed, and the original source server IP address must be added to the destination server for the import and DHCP operation to be seamless.
Exploring DHCP Changes in Windows Server 2012 : Migrating DHCP Servers Using Windows Server Migration Tools
The Windows Server 2012 Window Server Migration Tools are a set of tools designed to aid administrators with the migration of not only DHCP scope information, but also the current leases, reservations, and scope options.
Managing Windows Server 2012 Systems : Configuring Roles, Role Services, and Features (part 6) - Tracking installed roles, role services, and features
As discussed previously, you can determine the roles, roles services, and features that are installed on a server by typing get-windowsfeature at a PowerShell prompt.
Managing Windows Server 2012 Systems : Configuring Roles, Role Services, and Features (part 5) - Installing components at the prompt
When you want to manage server configuration at a prompt or in a script, you’ll use Windows PowerShell and the ServerManager module.
Managing Windows Server 2012 Systems : Configuring Roles, Role Services, and Features (part 4) - Managing server binaries
If you want to remove binaries, you use Windows PowerShell to do this and not Server Manager. The ServerManager module for Windows PowerShell is the command-line counterpart of Server Manager.
Managing Windows Server 2012 Systems : Configuring Roles, Role Services, and Features (part 3) - Adding server roles and features
When you select All Servers in Server Manager, the Roles And Features pane provides details on the current roles and features that are installed on all managed servers.
Managing Windows Server 2012 Systems : Configuring Roles, Role Services, and Features (part 2) - Installing components with Server Manager - Viewing configured roles and role services
Server Manager automatically creates server groups based on the roles of managed servers. When you select a role-based group in the left pane, the Servers panel shows the managed servers that have this role.
Managing Windows Server 2012 Systems : Configuring Roles, Role Services, and Features (part 1) - Using roles, role services, and features
Although you typically want to combine complementary roles, doing so increases the workload on the server, so you need to optimize the server hardware accordingly.
Windows Server 2012 : Configuring IPsec (part 7) - Configuring connection security rules - Monitoring IPsec
After you create and configure connection security rules, you can use both the Windows Firewall with Advanced Security snap-in and Windows PowerShell to monitor IPsec communications between the local computer and other computers on the network.
Windows Server 2012 : Configuring IPsec (part 6) - Configuring connection security rules - Creating a custom rule, Configuring authenticated bypass
One of the configuration options in that wizard was deferred until later because it had to do with how firewall rules interact with IPsec. That setting is the Allow The Connection If It Is Secure option on the Action page.
Windows Server 2012 : Configuring IPsec (part 5) - Configuring connection security rules - Creating an authentication exemption rule, Creating a server-to-server rule, Creating a tunnel rule
The following steps can be used to create a new authentication exemption rule using the Windows Firewall with Advanced Security snap-in
Windows Server 2012 : Configuring IPsec (part 4) - Configuring connection security rules - Types of connection security rules, Creating an isolation rule
Connection security rules can be created using the New Connection Security Rule Wizard. As Figure 7 shows, Windows Firewall with Advanced Security supports five types of connection security rules
Windows Server 2012 : Configuring IPsec (part 3) - Configuring IPsec settings - Customizing IPsec tunnel authorizations, Configuring IPsec settings using Windows PowerShell
If IPsec tunnel connections will be allowed with the computer, you can use the Customize IPsec Tunnel Authorizations dialog box shown in Figure 6 to configure this. Using this dialog box, you can specify
Windows Server 2012 : Configuring IPsec (part 2) - Configuring IPsec settings - Customizing IPsec defaults
As described in the previous section, the Customize IPsec Defaults dialog box shown in Figure 2 is used to configure the default IPsec settings that the local computer will use when attempting to establish secure connections with other IPsec-enabled computers
Windows Server 2012 : Configuring IPsec (part 1) - Understanding connection security
IPsec can be implemented using Windows Firewall with Advanced Security by creating and configuring connection security rules.
Windows Server 2012 : Administering Active Directory using Windows PowerShell (part 3) - Performing an advanced Active Directory administration task
Finally, opening the Active Directory Sites And Services MMC console shows the expected configuration of sites, site links, and domain controllers.
Windows Server 2012 : Administering Active Directory using Windows PowerShell (part 2) - Finding Active Directory administration cmdlets
The Get-Command cmdlet, which is new in Windows PowerShell 3.0, can be helpful when you need to find cmdlets to perform some administration task on Active Directory.
Windows Server 2012 : Administering Active Directory using Windows PowerShell (part 1) - Managing user accounts with Windows PowerShell
Creating and managing user accounts is a common Active Directory administration task. Windows PowerShell provides considerable flexibility in how this can be done on the Windows Server 2012 platform.
Windows Server 2012 : Enabling advanced features using ADAC (part 3) - Creating fine-grained password policies
Before you can create fine-grained password policies for a domain, you must ensure that the domain functional level is Windows Server 2008 or newer. This can be done using either ADAC or Windows PowerShell as described in the previous topic in this lesson.
Windows Server 2012 : Enabling advanced features using ADAC (part 2) - Configuring fine-grained password policies
In Windows Server 2003 and earlier, you could have only a single password policy and account lockout policy governing all user accounts in a domain.
Windows Server 2012 : Enabling advanced features using ADAC (part 1) - Enabling and using the Active Directory Recycle Bin
Administrators of Active Directory environments sometimes make mistakes—for example, deleting the user account for a user who still needs access to the corporate network. The effects of such mistakes can range from lost end-user productivity to broken network functionality.
Windows Server 2012 : Simplifying the Datacenter (part 4) - Managing Windows 2012 with Performance and Reliability Monitoring Tools, Leveraging the Best Practice Analyzer
Windows Server 2012 continues to extend the support for viewing, identifying, reporting on, and assisting in the monitoring of the Windows-based environment.
Windows Server 2012 : Simplifying the Datacenter (part 3) - Improvements in Group Policy Management, IP Address Management
In Windows Server 2012, the basic functions of Group Policy haven’t changed, so the Group Policy Management Console is the same, but with more options and settings available.
Windows Server 2012 : Simplifying the Datacenter (part 2) - Active Directory Administrative Center
Newly updated in Windows Server 2012 and built on PowerShell v3.0, the Active Directory Administrative Center is a customizable console that an organization can create for specific administrators in the organization.
Windows Server 2012 : Simplifying the Datacenter (part 1) - New Server Manager Tool
A tool that has been completely redone for Windows Server 2012 is the Server Manager console, shown in Figure 1. Server Manager consolidates all the server configuration tasks into a single unified management tool.
Windows Server 2012 : Enabling Users to Work Anywhere (part 2) - RDS Web Access
Also new to Windows Server 2008 and extended in Windows Server 2012 RDS is a role called RDS Web Access. RDS Web Access allows a remote client to access an RDS session without having to launch the RDP client, but instead connect to a web page, similar to that shown in Figure 1, that then allows the user to log on and access his or her session off the web page.
Windows Server 2012 : Enabling Users to Work Anywhere (part 1) - Windows Server 2012 DirectAccess
One of the significant remote-access enhancements in Windows Server 2008 R2 was the DirectAccess technology, which has been further enhanced in Windows Server 2012.
Windows Server 2012 : Enhancements for Flexible Identity and Security (part 2) - Active Directory Unification for Various Directory Services
Active Directory in Windows Server 2012 hasn’t changed to the point where organizations with solid AD structures have to make changes to their directory environment. Forests, domains, sites, organizational units, groups, and users all remain the same.
Windows Server 2012 : Enhancements for Flexible Identity and Security (part 1) - Dynamic Access Control
Dynamic Access Control in Windows Server 2012 is a great addition to file system security, something that has been a challenge for organizations for years.
Windows Server 2012 : DHCP,IPv6 and IPAM - Exploring DHCP (part 3) - Creating IPv4 DHCP Scopes
Before a DHCP server can be useful, it must be authorized, and a scope must be created and activated. DHCP authorization can be performed using the DHCP Post-Install Wizard or it can be performed from within the DHCP server console.
Windows Server 2012 : DHCP,IPv6 and IPAM - Exploring DHCP (part 2) - Installing DHCP Server and Server Tools
The DHCP role can be installed on a Windows Server 2012 system at any time using the Server Manager console. If the DHCP server tools are required on the local DHCP server, they can be selected for installation during the role installation or at a later time.
Windows Server 2012 : DHCP,IPv6 and IPAM - Exploring DHCP (part 1)
Before the DHCP service was developed, two predecessors provided the first implementations of automated IP addressing. The first was the Reverse Address Resolution Protocol (RARP), and the second was the Bootstrap Protocol (BOOTP).
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server