Free eBooks for Windows administrators [updated]

Microsoft Press released the second edition of the free eBook Microsoft System Center – Building a Virtualized Network Solution. The book targets cloud fabric administrators working with Hyper-V and Virtual Machine Manager.

Michael PietroforteMVP By Michael Pietroforte - Fri, August 14, 2015 - 30 comments google+ icon

Michael Pietroforte is the founder and editor of 4sysops. He is a Microsoft Most Valuable Professional (MVP) with more than 30 years of experience in system administration.

Poll results: When will your organization upgrade to Windows 10?

The poll results are quite amazing. Only 11 percent of voters who responded are thinking of skipping Windows 10. Of the remaining 89 percent who are planning to deploy Windows 10, a whopping 54 percent will upgrade to Windows 10 within one year.

Michael PietroforteMVP By Michael Pietroforte - Thu, August 13, 2015 - 0 comments google+ icon

Michael Pietroforte is the founder and editor of 4sysops. He is a Microsoft Most Valuable Professional (MVP) with more than 30 years of experience in system administration.

Storage Spaces Direct in Windows Server 2016

After spending the last few years spruiking the message that disaggregated, non-converged storage was the way to go for server virtualization, Microsoft recently changed tack with the introduction of Storage Spaces Direct (“S2D” and no, that’s not a typo).

Paul Schnackenburg By Paul Schnackenburg - Wed, August 12, 2015 - 0 comments

Paul Schnackenburg works part time as an IT teacher as well as running his own business in Australia. He has MCSE, MCT, MCTS and MCITP certifications. Follow his blog TellITasITis.

Using CredSSP for second-hop PowerShell remoting

Credential Security Support Provider (CredSSP) allows you to delegate user credentials across multiple remote computers. In PowerShell you sometimes need CredSSP for second-hop remoting,

Timothy Warner By Timothy Warner - Tue, August 11, 2015 - 0 comments

Timothy Warner is a Windows systems administrator, software developer, author, and technical trainer based in Nashville, TN. His new book Windows PowerShell in 24 Hours is now available for pre-order.

Best practices for securing desktop and laptop endpoints

One of the most vulnerable parts of your infrastructure is the desktop and laptop computers that your end users use. These devices can be responsible for bringing in viruses or malware or causing your organization to lose sensitive data that can subject your organization to all sorts of headaches. In this guide, I’ll cover the practices I use when securing end user desktop and laptop systems.

Kyle Beckman By Kyle Beckman - Mon, August 10, 2015 - 7 comments

Kyle Beckman works as a systems administrator in Higher Education in the Southeast United States and has 15+ years of systems administration experience. You can follow him on Twitter or his blog, trekker.net.

Login

Lost your password?