• NetBIOS was initially created to allow applications to communicate without understanding the details of the network, including error recovery. It operates at the session layer, layer 5 of the OSI model. As with other legacy technologies, the main reason for disabling NetBIOS is security. There are two ways to achieve this goal: via either DHCP or a registry key.

    0
  • Businesses may be looking to migrate print services from legacy to current versions of Windows Server (2019 or 2022). With the Print Migration Wizard, you can export the core components of the Print and Document Services role, such as print queues, printer settings, and printer ports, and reimport them to the new server.

    0
  • The Windows Server Migration Tools (WSMT) have shipped with Windows Server since version 2003. Admins can use them to transfer roles and features to a newer version of the operating system. Since Microsoft hasn't updated these tools for quite some time, they show some bugs when used with Server 2022. Nevertheless, the WSMT are still a viable option when upgrading Windows Server.

    0
  • When organizations decide to move services from an older Windows Server version to a newer one, there are a few options. Businesses can perform an in-place upgrade of the current server to a more recent Windows Server version. There are also options for migrating roles and services from an older server to a newer one. Windows Server Migration Tools (WSMT) serve this purpose.

    0
  • Microsoft Intune provides fairly robust app deployment features that allow businesses to manage and control applications on remote clients running Windows, macOS, Android, and IOS devices. Let's take a quick look at how companies can deploy Office 365 applications using Microsoft Intune.

    0
  • Microsoft Intune is a cloud-driven service that allows businesses to onboard, provision, and manage devices, no matter where they are located on the Internet. It covers most tasks that admins have to deal with during a PC's lifecycle management. Patch management is one of these tasks; Microsoft Intune is capable of managing updates.

    0
  • When deploying Windows clients or servers, you can use OS images to deploy customized and patched operating system installations in a uniform and seamless way. The challenge comes not from creating images initially, but from servicing them. The PowerShell module OSDBuilder simplifies this task.

    0
  • As workers transition to remote environments, they need to have a mobile device management (MDM) platform uninhibited by connectivity to the corporate network. Microsoft Intune is a cloud-based service that provides effective MDM and mobile application management (MAM).

    0
  • When a new domain controller (DC) is installed remotely, the initial replication traffic for synchronizing all directory objects can be significant. However, bandwidth can still be limited for businesses maintaining remote locations. Using the "install from media" (IFM) option significantly reduces the amount of data replicated after setting up a new DC.

    0
  • Microsoft recently unveiled the Windows 365 platform. It is a new solution that provides a streamlined way for businesses, large and small, to set up a cloud-based Windows PC. It is a fresh take from Microsoft on the concept of VDI and how it is implemented, billed, and serviced.

    0
  • Monitoring and managing remote endpoints and supporting remote users can be challenging. The latest release of Pulseway RMM provides a new client portal to help businesses meet these challenges.

    0
  • Businesses need to migrate from the deprecated SHA-1 to SHA-2 to bolster their cybersecurity posture. They may still be running Active Directory Certificate Services (AD CS) using the SHA-1 cryptographic hash, along with the weaker Cryptographic Service Provider (CSP). In my previous post I discussed considerations when migrating AD certificate services to SHA-2. Let's look at how to replace them with SHA-2 and Key Storage Provider (KSP).

    0
  • Secure Hash Algorithm (SHA) has been around since the mid-90s and is one of the leading cryptographic hash algorithms used to secure digital resources. The initial standard (SHA-1) has now been around long enough that hackers know its weak points and can exploit systems secured with this hash algorithm. Therefore, it is time for organizations to migrate away from SHA-1 in favor of SHA-2.

    0
  • Virtual smart cards provide the benefits of physical smart cards without extra costs or hardware. They are based on a Trusted Platform Module (TPM) and authenticate users with a certificate against Active Directory, like a physical smart card.

    0
  • Running programs as SYSTEM or Trusted Installer may be needed by administrators. We look at a couple of free utilities that make this easy.

    0
  • Traditional email signatures can create challenges for both end users and IT admins. This post looks at features of CodeTwo Email Signatures for Office 365 and how it solves these challenges for Microsoft 365.

    0
  • Windows Autopilot is a cloud-based service from Microsoft that allows enterprises to accelerate the deployment of end user devices from the cloud. It is straightforward to configure and helps to reduce the workload on the IT helpdesk in terms of imaging PCs and tediously installing software before sending the desktops to end users.

    0
  • TPM+PIN decryption with BitLocker requires physical access to the device when the endpoint boots or resumes from sleep. This feature can be a challenge for remote helpdesk technicians attempting to remotely access the endpoint, install software, and perform other tasks using Wake on LAN. For this reason, Microsoft created BitLocker Network Unlock.

    0
  • As businesses look at phasing out legacy Windows Server versions, core services may need to be moved or migrated to new Windows Server versions. One service you may need to move is Active Directory Certificate Services (AD CS). Let's see how to migrate AD CS from Windows Server 2008 R2 to 2019.

    0
  • Load More
© 4sysops 2006 - 2021

CONTACT US

Please ask IT administration questions in the forums. Any other messages are welcome.

Sending

Log in with your credentials

or    

Forgot your details?

Create Account