IT tutorials
 
Technology
 
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... >  |  Displaying page 1 of 56, items 1 to 30 of 1656.
Sharepoint 2013 : Security and Policy - Web Application Policies
Site collection security, provides nice granular control of user access to the site collection, sites, lists, and even list items. However, sometimes an administrator needs to grant access to users for an entire web application. SharePoint provides this capability via the Central Administration web site.
Sharepoint 2013 : Security and Policy - Granting Permissions (part 3) - Anonymous Access
By default, SharePoint requires users to authenticate before gaining access to a site collection. In some cases, the organization may have a desire to open a site to anonymous users.
Sharepoint 2013 : Security and Policy - Granting Permissions (part 2) - Granting Permissions to a List or Document Library
For the purpose of this discussion, documents and lists work the same way when it comes to applying unique permissions. By default, lists inherit permissions from the parent site, just as sites inherit their permissions from their parent.
Sharepoint 2013 : Security and Policy - Granting Permissions (part 1) - Granting Permissions at the Root Site Collection, Permission Inheritance
SharePoint treats AD groups or ASP.NET role provider identities as users. Thus, you can assign an AD group or ASP.NET role provider role a particular permission level or add it to a SharePoint security group, and all users of the AD group or role provider role have access to the site collection based on the permission level assigned or SharePoint group they belong to.
Windows 8 : Networking with Other Operating Systems - Internetworking with Windows 7, Vista, and XP (part 3) - Using Windows Vista and XP with a Homegroup
Using Windows Vista and XP with a Homegroup If you have two or more Windows 7 or 8 computers, you can set up a homegroup to simplify sharing libraries, folders, and printers. The HomeGroup system is based on regular Windows file sharing, so computers running other operating systems can also participate in your network.
Windows 8 : Networking with Other Operating Systems - Internetworking with Windows 7, Vista, and XP (part 2) - Password Protection and Simple File Sharing
On small Windows networks (that is, networks that aren’t managed by a Windows Server computer using the Domain security model), each computer is separately responsible for managing usernames and passwords.
Windows 8 : Networking with Other Operating Systems - Internetworking with Windows 7, Vista, and XP (part 1) - Setting TCP/IP as the Default Network Protocol
When freshly installed, Windows XP was set up to use the TCP/IP network protocol for file and printer sharing by default. If your network previously included Windows 95, 98, Me, 2000, or NT computers, you might have changed the network protocols to simplify internetworking with the older operating systems.
Windows 8 : Networking with Other Operating Systems - Mix and Match with Windows and Macs
It’s easy enough to plug a couple Windows 8 computers together and call it a network, but real-life networks are seldom so simple, even at home. Networks usually have a mix of operating systems, and Windows often has to be coaxed into getting along with them.
Using the Debugging Tools Available in Windows Server 2012 : Windows Memory Diagnostics Tool
Many troubleshooting scenarios revolve around memory-related issues associated with a system. Typical memory issues can involve an errant application, a specific process consuming too much memory, or failing hardware such as bad RAM or the memory system on the motherboard.
Using the Debugging Tools Available in Windows Server 2012 : System Startup and Recovery
The System Startup and Recovery utility stores system startup, system failure, and debugging information. It also controls the behavior (what to do) when a system failure occurs.
Using the Debugging Tools Available in Windows Server 2012 : Other Useful Troubleshooting Command-Line Tools
Displays a list of applications and services with their PID for all tasks running on either a local or a remote computer.
Using the Debugging Tools Available in Windows Server 2012 : TCP/IP Tools (part 3) - Route, Nslookup, DCDiag
DCDiag is automatically included on a Windows Server 2012 system when the Active Directory Domain Services role is added. Otherwise, on non-domain controllers, the utility can be added by adding the Remote Server Administration Tools feature in Server Manager.
Using the Debugging Tools Available in Windows Server 2012 : TCP/IP Tools (part 2) - Pathping, Ipconfig, ARP , Netstat
Pathping is a route-tracing tool that combines both features of ping and tracert commands with some more information that neither of those two commands provides.
Using the Debugging Tools Available in Windows Server 2012 : TCP/IP Tools (part 1) - Ping, Tracert
TCP/IP forms the backbone of communication and transportation in Windows Server 2012. Before you can communicate between machines, TCP/IP must be configured.
Using the Debugging Tools Available in Windows Server 2012 : Best Practices Analyzer Tools
Many years ago, Microsoft introduced Best Practices Analyzer (BPA) tools for server products such as SQL Server and Exchange. The tools enabled IT professionals to conduct a scan against a product to ensure it was configured based on industry best practices.
Windows Server 2012 : Logging and Debugging - Setting Baseline Values
Because servers perform different roles, and hence have different functions, it makes sense to monitor the essential performance objects. This helps prevent the server from being overwhelmed from the monitoring of unnecessary objects for measurement or analysis.
Microsoft Exchange Server 2013 : Preserving information (part 10) - Executing searches with EMS , What Exchange can search
EAC is a very convenient interface with which to create and initiate searches, but you can do the same through EMS by using a set of cmdlets that are exposed only if you are a member of the Discovery Management role group.
Microsoft Exchange Server 2013 : Preserving information (part 9) - Using groups with searches, Removing a search
It might seem convenient to base the target set for a search on a distribution group or even a dynamic group, and, indeed, EAC enables you to enter the name of a group when configuring the mailboxes for a hold as part of the list covered by a search.
Microsoft Exchange Server 2013 : Preserving information (part 8) - How in-place holds work
As noted earlier, an administrator can assign up to five hold queries to a mailbox. If a sixth hold query is added, the entire mailbox is placed on hold because it is more efficient to retain everything rather than attempting to resolve multiple queries.
Microsoft Exchange Server 2013 : Preserving information (part 7) - Resource throttling for searches
If you add more than 50 mailboxes to a search, you encounter a slight problem in that Exchange cannot display keyword statistics for the search simply because the search is likely to impose a large overhead on servers to gather the keywords when information from more than 50 mailboxes is reviewed.
Microsoft Exchange Server 2013 : Preserving information (part 6) - Examining search results
The results of the search, including copies of all items that match the search criteria, are placed in the selected discovery mailbox. If you copied items for the same search to the discovery mailbox previously, Exchange removes the items for the old search before it copies items for the new search.
Microsoft Exchange Server 2013 : Preserving information (part 5) - Retrieving discovered content
When investigators confirm that a search is correctly focused on the items that are necessary, they can proceed to the final stage in the process: copying items from user mailboxes into a discovery mailbox where the items can be reviewed and dealt with as necessary.
Microsoft Exchange Server 2013 : Preserving information (part 4) - Creating a new search - Refining a search
Exchange then generates an initial estimate of results based on the query specified in the search. The idea is that you immediately see how effective the search criteria are in terms of identifying information across the set of selected mailboxes.
Microsoft Exchange Server 2013 : Preserving information (part 3) - Creating a new search
Assuming that you know what information needs to be retained and keywords or other identifying phrases that can be used to locate matching data in user mailboxes, you can create a new search.
Microsoft Exchange Server 2013 : Preserving information (part 2) - Searching mailbox content, In-place holds
The legal hold mechanism available in Exchange 2010 retains mailbox data that might be required for litigation. However, a legal hold operates on an all-in basis that has a side effect of holding everything in the mailbox, including information that is not necessary for legal review.
Microsoft Exchange Server 2013 : Preserving information (part 1) - Putting a mailbox on litigation hold
When you place a mailbox on litigation hold, Exchange stops removing items from the database when their deleted items retention period expires, and any attempts by the user to delete or change items are retained in the Recoverable Items folder.
Microsoft Exchange Server 2013 : How the Managed Folder Assistant implements retention policies (part 2) - Retention date calculation
The MFA has to understand the date that should be used to calculate the age of the item (when the item first appears in the mailbox) and either the date when the item will expire or the date when the MFA has to take the action the retention policy requires (deleting the item or moving it into the archive).
Microsoft Exchange Server 2013 : How the Managed Folder Assistant implements retention policies (part 1) - Behind the scenes with the MFA
After you apply a retention policy to a mailbox, you can either wait for the next scheduled run of the MFA or start it manually so that the new policy is applied immediately.
Sharepoint 2013 : Security and Policy - SharePoint Security Groups (part 4) - Assigning New Visitor, Member, and Owner Groups at Site Creation
SharePoint 2013 presents a page for creating new subsites, which differs from the Silverlight dialog that SharePoint 2010 provided as part of the new subsite creation process.
Sharepoint 2013 : Security and Policy - SharePoint Security Groups (part 3) - Creating a New Group, Deleting a Group
Site collection administrators may create new custom security groups, and then apply permission levels to these groups within the context of a secured object (site, list, or page).
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us