P2V Baby

It just does not get any easier than this.  Mark Russinovich and Bryce Cogswell (Sysinternals gurus extraordinaire) have just published another amazingly useful (and free!) tool: Disk2vhd, which uses the power of Volume Shadow Copy Service(VSS) to turn your running version of Windows into a .vhd file for use with Virtual PC or Hyper-V.  Just…

0

SQL Server 2008 Migration White Papers

Just noticed these pop up on the Microsoft Download Center… some guides on migrating from various databases to SQL Server 2008. Guide to Migrating from MySQL to SQL Server 2008 In this migration guide you will learn the differences between the MySQL and SQL Server 2008 database platforms, and the steps necessary to convert a…

0

Read-Only Domain Controller (RODC) Branch Office Guide Released

If you are involved in a project to plan or upgrade Active Directory in your branch offices, you may have questions such as: What type of domain controller should I use for a given branch office? Does a given branch office even need a Domain Controller? What topology should I use? How do I monitor…

2

SharePoint Lockdown – The Easy Way

If you have been tasked with securing SharePoint, there  are a lot of considerations to take into account.  How do users authenticate? Does part of your farm live in an extranet or DMZ? How do you secure user-to-server communications? How do you secure server-to-server communications?  How do you scan for viruses?  How do you harden…

2

Project Sundance – Managing Your Baseline

If you are in charge of maintaining the security baseline at your company, you know that there are two key problems you face.  First of all, there are a LOT of security settings to tweak within Windows.  The services you harden and lock down on a Domain Controller are very different from those that you…

5

Security within Microsoft's own IT department

In case you are curious what it is like to be in charge of Security for IT at Microsoft, you get to deal with an environment where there are: Approximately 100,000 intrusion attempts each month. Approximately 1 million infected or malicious e-mail messages received each month. Over 5,000 PCs rebuilt every day. Microsoft IT (MSIT)…

1

SharePoint - Searchier!

It looks like we have posted nearly 17 hours of training videos for enterprise search on TechNet. The presentations provide details about key enterprise search capabilities in Microsoft Office SharePoint Server 2007. Module 1: Workshop Overview Module 2: Enterprise Search Overview Module 3: SharePoint Search 2007 Walkthrough Module 4: Search Architecture and Deployment Scenarios Module…

2

Group Policy Documentation Survival Guide

The latest version of the links below can be found here, or download a PDF version here.  Don’t ask me where they got that US-Army-looking-font in the PDF… it probably wouldn’t have been my first choice 😉 Group Policy Documentation Essentials These links help you get started with Group Policy. Learn • Group Policy TechCenter:…

1

The limits of Active Directory

A few years ago, at my first IT job, my manager told me that there was a server at Microsoft, and all day long it created objects in a test Active Directory Domain.  "This server has been running since Windows Server 2000 was released" he said, "and it still has not hit a limit on…

1

February TechNet Magazine is out

And it is all about SharePoint and OCS baby! http://www.microsoft.com/technet/technetmag/ Sharepoint A Smart Approach to Gathering Data in the Enterprise Information is one of the most important assets in an enterprise. But it can be a challenge to manage the mountain of data being gathered through e-mail, Web-based forms, surveys, and other mechanisms. Here’s a…

2