November 2008
System Center:Monitoring Windows Server 2008 with OpsMgr 2007
As you deploy Windows Server 2008 into your environment, you’ll need a way to manage and monitor its health, performance, and availability. Fortunately, you can use the existing System Center tools you are already familiar with. See how you can use OpsMgr 2007 to manage your Windows Server 2008 assets. Pete Zerger
System Center:Using Configuration Manager with Windows Server 2008
The release of System Center Configuration Manager SP1 added full support for managing Windows Server 2008 systems, including such new features as server core. Get a quick overview of deploying the ConfigMgr agent and using ConfigMgr to manage Windows Server 2008 systems throughout your organization. Cameron Fuller
System Center:Granular Targeting in Operations Manager 2007
For every monitoring object you build, you must also decide what target to use. Choosing the correct target is critical, but knowing how to go about choosing the correct target is not always clear. Steve Rachui explores various options for correct targeting in OpsMgr and provides guidance for choosing the appropriate method for each scenario. Steve Rachui
Windows Server 2008:Presentation Virtualization with Enhanced Terminal Services
Virtualization isn’t limited to virtual machines and the virtualization of operating systems. Terminal Services has been abstracting the presentation layer of remotely run applications and desktops for years. Take a close look at key improvements to Terminal Services in Windows Server 2008 and get some tips for using these new features. Joshua Schnoll
SQL Server 2008:Tracking Changes in Your Enterprise Database
SQL Server 2008 introduces two new features that allow you to track changes more easily and efficiently. Paul Randal examines the new Change Tracking and Change Data Capture features and discusses the implications these features will have for database administrators. Paul S. Randal
https://technet.microsoft.com/en-us/library/bb978519(v=msdn.10)
https://technet.microsoft.com/en-us/library/cc135917(v=msdn.10)
Columns
From the Editor:Now What?
Joshua Hoffman
|
Letters:Readers Speak Out
|
Toolbox:New Products for IT Pros
Greg Steen
|
Exchange Queue & A:Outlook Anywhere and IPv6, the Remote Connectivity Analyzer, and More
Have Exchange questions? We've got answers. This month, Henrik Walther looks at configuring Windows Server 2008 to work with Outlook Anywhere, testing remote connectivity, deploying standby continuous replication, and more.Henrik Walther
|
Utility Spotlight:Internet Explorer Developer Toolbar
Whether you develop Web content or simply support a webmaster, here’s a free Microsoft utility that will make your job easier. See how the Internet Explorer Developer Toolbar can help you explore and troubleshoot Web pages.Lance Whitney
|
Inside SharePoint:Extending Office Applications with Web Services
Web services are fundamental building blocks of distributed business applications. Here's an overview of how you can use Web services in a SharePoint environment to extend Microsoft Office applications.Pav Cherny
|
Windows PowerShell:Building Your Own Software Inventory Tool
Don Jones demonstrates a Windows PowerShell-based inventory tool and guides you through the process that goes into building such a solution.Don Jones
|
Hey, Scripting Guy!:Probing the Depths of WMI
This month, The Scripting Guys take a close look at the WMI infrastructure. Along the way, they provide some helpful scripts that can serve as a starting point for learning more and accomplishing useful administrative tasks.The Microsoft Scripting Guys
|
The Desktop Files:Data Loss Prevention with Enterprise Rights Management
Enterprise rights management is effectively the only way to protect confidential information from being leaked. Discover how the Microsoft rights management solution can protect your organization's information from unauthorized access and use.Wes Miller
|
Security Watch:Revisiting the 10 Immutable Laws of Security, Part 2
It's been about 8 years since "The 10 Immutable Laws of Security" were first published, and a lot has changed since then. In this installment, Jesper Johansson continues his analysis of the the immutable laws to see if they still hold true after 8 years.Jesper M. Johansson
|
Field Notes:Old Wine in New Bottles
Romi Mahajan reflects on how technology has dramatically impacted community, but explains why there will always be a need for in-person meetings and events.Romi Mahajan
|
Windows Confidential:Windows Can but Won’t
Raymond Chen explains why Windows can but chooses not to replace a file that is currently in use.Raymond Chen
|