Forefront Endpoint Protection demo

The key thing to save the endpoint management and protection cost and increase agility is to combine them into one. Forefront Endpoint Protection can now be managed directly from the SCCM (and SCOM) console. There will be no separate Forefront Endpoint Protection console. Demo PPT deck download: 01. FEP – client agent deployment02. FEP –…

0

System Center 2012 information

* System Center 2012 overview slide deck download (9M) * Private Cloud demo video download (6M) * Register and download to try 14 scenarios of Microsoft Private Cloud.   * Private Cloud (with approval activity) demo video download (7M) * Windows Server 2012 Hyper-V demo video download (2M), including Hyper-V replica and Shared-nothing Live Migration….

0

Using script with AD database

Courtesy: Nguyen Quoc Dung. Use these scripts if you want to list and execute all AD objects that are inactive for more than 60 days and count all Computers in AD grouped by OS, so you can know how many percentages of computers running XP or Windows 7. These information is extracted from AD Database…

0

Windows 8 overview

 * Windows Server 8 Overview webcast on Channel9 Getting Started with Windows 8 – Windows Key (): switch to Home screen – Home screen, then type some characters: search for Apps (and Settings and Files as well) – Home screen: right click a Tile to see the Advanced button in the Taskbar – Ctrl-Alt-Del: Restart…

0

Making a Wireless Connection Accessible to a Hyper-V Virtual Machine (VM)

There are a number of resources regarding this that I’ve seen on the Web in various blogs but I’m documenting my approach as much for me so I can remember it as for you as well. There have been a number of conferences that I have arrived at expecting to have a hard-wired connection to…

0

Deploying Active Directory Rights Management Services at Microsoft

At Microsoft, sensitive business information in e-mail and business documents was at risk of exposure to unauthorized users. Microsoft IT implemented AD DS so that authors could use Microsoft Office and SharePoint Server to restrict access to confidential data. Click here for the Technical White Paper   Products & Technologies Windows Server 2008 R2 with…

0