IT tutorials
 
Applications Server
 
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... >  |  Displaying page 3 of 27, items 61 to 90 of 799.
Microsoft Exchange Server 2013 : Designing a Successful Exchange Storage Solution (part 2) - Making Sense of the Exchange Mailbox Server Role Requirements Calculator
The Exchange 2013 Server Role Requirements Calculator, or storage calculator as it used to be known, is basically a complicated Excel spreadsheet that contains the calculations necessary to take your design requirements, and turn them into some storage-specific requirements.
Microsoft Exchange Server 2013 : Designing a Successful Exchange Storage Solution (part 1) - Requirements Gathering
From an Exchange storage design perspective, we are mainly interested in the service level because it drives our high-availability decisions.
Microsoft Exchange Server 2013 : Designing a Successful Exchange Storage Solution - Storage Improvements in Exchange Server 2013
This is the single most important change in Exchange Server 2013. Quite simply, automatic database reseed makes deploying a JBOD storage solution viable for many organizations that found JBOD too difficult to manage in Exchange Server 2010.
Microsoft Exchange Server 2013 : Designing a Successful Exchange Storage Solution - Storage Changes in Exchange 2013
Exchange Server 2013 is a major new release and, as such, the Exchange product group invested in the key development areas that were projected to yield the largest benefits to both customers and the teams that run Exchange Online.
Microsoft Exchange Server 2013 : Designing a Successful Exchange Storage Solution - A Brief History of Exchange Storage
As mentioned, Exchange has been around for quite a while, and it has been adapted to the changing landscape of email.
Microsoft Sharepoint 2013 : Federated Authentication (part 4) - Active Directory Federated Services - Configuring a Relying Party in ADFS
We have now installed and configured ADFS, and we are ready to create a Relying Party. We established in the beginning of this article that a Relying Party is a system or application that permits authenticated user access, but relies on an Issuing Authority (via Secure Token Service) to perform the actual authentication.
Microsoft Sharepoint 2013 : Federated Authentication (part 3) - Active Directory Federated Services - Installing ADFS
Creating a new farm requires a SQL Server connection and is suited to production environments, or systems requiring multiple ADFS instances in a farm
Microsoft Sharepoint 2013 : Federated Authentication (part 2) - Active Directory Federated Services - Preparing for ADFS Installation
Before we install ADFS, it is important that we complete a series of pre-installation steps, to establish a new DNS name and certificate with which we shall access ADFS.
Microsoft Sharepoint 2013 : Federated Authentication (part 1) - Active Directory Federated Services - Install Certificate Authority
ADFS requires certificates to encrypt and sign SAML tokens. In a production deployment, you would install purchased certificates, signed by a trusted root certificate authority such as VeriSign
Microsoft Sharepoint 2013 Authentication (part 3) - Configuring a Claims Web Application - Configuring SSL for SharePoint
When dealing in any kind of web-based security, we must rely on the industry standard use of Secure Socket Layer, which operates via the use of X509 Public/Private key certificates.
Microsoft Sharepoint 2013 Authentication (part 2) - Configuring a Claims Web Application - Creating a New CBA Application, Configuring an Existing CBA Web Application
The following set of steps demonstrates how to create a new Claims-Based-Authentication aware web application in SharePoint 2013. The steps below demonstrate creating our application via Central Administration.
Microsoft Sharepoint 2013 Authentication (part 1) - Legacy Approach—Classic Mode Authentication
SharePoint 2013 now uses Claims-Based-Authentication (CBA) for all web applications added to the farm. Using standard protocols and principles, SharePoint abstracts user authentication from user identity such that SharePoint can maintain his or her identity, regardless of the authentication mechanism.
Microsoft Sharepoint 2013 : Claims-Based and Federated Authentication - Digital Identity
OpenID is a standard that describes how users may authenticate with a system in a decentralized manner, eliminating the need for systems to maintain their own credentials and authentication mechanisms.
Exchange Server 2013 Management and Maintenance Practices (part 7) - Weekly Maintenance, Monthly Maintenance, Quarterly Maintenance
Tasks that do not require daily administrative input, but that still require frequent attention, are categorized as weekly maintenance routines. Recommended weekly maintenance routines are described in the following sections.
Exchange Server 2013 Management and Maintenance Practices (part 6) - Prioritizing and Scheduling Maintenance Best Practices
Exchange Server 2013 is a very efficient messaging system. However, as mailboxes and public folders are used, there is always the possibility of the logical corruption of data contained within the databases.
Exchange Server 2013 Management and Maintenance Practices (part 5) - Message Tracking
Of the auditing techniques available in Exchange Server, message tracking is by far the least resource intensive and will likely be the most commonly used by administrators. Because this feature has proven so valuable in previous versions of Exchange Server, Microsoft has enabled it by default in Exchange Server 2013.
Exchange Server 2013 Management and Maintenance Practices (part 4) - SMTP Logging
Logging SMTP protocol activity provides administrators with a powerful tool when troubleshooting issues with message delivery. By enabling SMTP logging, administrators can capture the SMTP conversations with email servers during message transport.
Exchange Server 2013 Management and Maintenance Practices (part 3) - Auditing the Environment
Various methods of auditing the Exchange Server environment exist to gather and store records of network and Exchange Server access and to assist with the monitoring and tracking of SMTP connections and message routing.
Exchange Server 2013 Management and Maintenance Practices (part 2) - Remote Connectivity Analyzer
The Remote Connectivity Analyzer (RCA) is also found in the Exchange Toolbox in Exchange Server 2013. The RCA allows administrators to test services from outside their organizations.
Exchange Server 2013 Management and Maintenance Practices (part 1) - Maintenance Tools for Exchange Server 2013
Several tools are available to administer and manage an Exchange Server 2013 environment. There are functions within the Exchange Administration Center, an automation and scripting shell, and several tools native to the Windows Server 2008/2012 operating systems.
Microsoft Sharepoint 2013 : Administering Sharepoint with Windows Powershell - Basic PowerShell Usage (part 3) - Controlling Output
Armed with a basic understanding of the pipeline and its use of objects, this section takes a look at how to control the output of these objects. While the pipeline passes objects around, the input you provide to PowerShell and the output you expect returned at the end is always text.
Microsoft Sharepoint 2013 : Administering Sharepoint with Windows Powershell - Basic PowerShell Usage (part 2) - PowerShell Help , PowerShell Variables
It is virtually impossible to ignore variables, except in the most basic cmdlet usage. The first time you pipe the output (covered in the section “PowerShell Pipeline”) of one command into another command you are already using variables
Microsoft Sharepoint 2013 : Administering Sharepoint with Windows Powershell - Basic PowerShell Usage (part 1) - Listing the SharePoint Commands
The toughest part of using a command-line interface, whether it’s PowerShell, the old Windows CMD prompt, or a Linux bash shell, is determining which commands you can use.
Microsoft Sharepoint 2013 : Administering Sharepoint with Windows Powershell - Commands
PowerShell is powered by commands. Commands get things done. There are four basic types of commands: cmdlets, functions, scripts, and native commands. It is not necessarily important to know the differences between these command types to work with PowerShell and SharePoint, but it doesn’t hurt.
Microsoft Sharepoint 2013 : Microsoft SharePoint 2013 Management Shell and Other Hosts
PowerShell has been a staple of the Windows Server operating system since it came standard in Windows 2008. Windows 2008 R2 began including PowerShell version 2, which was great for SharePoint 2010 because it relied on PowerShell version 2 as a minimum.
Microsoft Lync Server 2013 : Dependent Services and SQL - Server Certificates - Installing Lync Certificates
Lync Server 2013 provides a wizard for requesting, installing, and assigning certificates. For example, the following procedure is used to create an offline SSL certificate request to be sent to a third-party CA for a Front End Server
Microsoft Lync Server 2013 : Dependent Services and SQL - Domain Name System - DNS Load Balancing , Automatic Client Sign-in
Although the sample DNS configurations just shown can be used to meet the minimum requirements for Lync, many organizations rely on the Lync client’s capability to automatically find the Lync pool and sign in the user, an optional but very useful feature.
Microsoft Lync Server 2013 : Dependent Services and SQL - Active Directory (part 2) - Forest Prep, Domain Prep, Lync Server 2013 Security Groups
After the schema has been updated, the Deployment Wizard enables the remaining AD preparation steps. The next step is to prepare the forest for the Lync Server installation, which creates global configuration settings and universal security groups required for the Lync deployment.
Microsoft Lync Server 2013 : Dependent Services and SQL - Active Directory (part 1) - Schema Extensions
To provide the necessary attributes used by Lync Server, it is necessary to extend the AD schema. This process is typically easiest to run on a system that is planned as a Lync Front End Server, and must be run by a user that is currently a member of the Schema Admins group.
Administering Active Directory 2008 : Creating and Managing Active Directory Objects (part 4) - Moving, Renaming, and Deleting Active Directory Objects , Resetting an Existing Computer Account
One of the extremely useful features of the Active Directory Users And Computers tool is its ability to easily move users and resources.
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us