Forefront Endpoint Protection demo

The key thing to save the endpoint management and protection cost and increase agility is to combine them into one. Forefront Endpoint Protection can now be managed directly from the SCCM (and SCOM) console. There will be no separate Forefront Endpoint Protection console. Demo PPT deck download: 01. FEP – client agent deployment02. FEP –…

0

System Center 2012 information

* System Center 2012 overview slide deck download (9M) * Private Cloud demo video download (6M) * Register and download to try 14 scenarios of Microsoft Private Cloud.   * Private Cloud (with approval activity) demo video download (7M) * Windows Server 2012 Hyper-V demo video download (2M), including Hyper-V replica and Shared-nothing Live Migration….

0

Using script with AD database

Courtesy: Nguyen Quoc Dung. Use these scripts if you want to list and execute all AD objects that are inactive for more than 60 days and count all Computers in AD grouped by OS, so you can know how many percentages of computers running XP or Windows 7. These information is extracted from AD Database…

0

Windows 8 overview

 * Windows Server 8 Overview webcast on Channel9 Getting Started with Windows 8 – Windows Key (): switch to Home screen – Home screen, then type some characters: search for Apps (and Settings and Files as well) – Home screen: right click a Tile to see the Advanced button in the Taskbar – Ctrl-Alt-Del: Restart…

0

Making a Wireless Connection Accessible to a Hyper-V Virtual Machine (VM)

There are a number of resources regarding this that I’ve seen on the Web in various blogs but I’m documenting my approach as much for me so I can remember it as for you as well. There have been a number of conferences that I have arrived at expecting to have a hard-wired connection to…

0

Deploying Active Directory Rights Management Services at Microsoft

At Microsoft, sensitive business information in e-mail and business documents was at risk of exposure to unauthorized users. Microsoft IT implemented AD DS so that authors could use Microsoft Office and SharePoint Server to restrict access to confidential data. Click here for the Technical White Paper   Products & Technologies Windows Server 2008 R2 with…

0

DPM 2010 requirement and deployment

* From Microsoft TechNet: We have tested DPM 2010 running in a Hyper-V Virtual environment and it is fully supported considering the following limitations, requirements. 1) The DPM storage pool disks cannot be .vhd’s – they must be either iSCSI attached disks or Pass thru disks. The following 4 types of disk configuration are supported…

0

Volume activation at University of Wisconsin-Madison

Source: http://kb.wisc.edu/page.php?id=5294 These are some of the important characteristics of Volume Activation 2.0 as implemented at the  UW-Madison. In November 2006, Microsoft rolled out their new volume license activation scheme, Volume Activation 2.0 (VA2). Windows desktop (Vista) was the first software released using VA2, but other Microsoft volume-licensed software will eventually follow. As of late…

0