Take advantage of the built-in logging capabilities in Symantec Antivirus and our handy script to retrieve TimeOfLastScan, TimeOfLastVirus and PatternFileUpdate details from client PCs.
More articles by Nirmal Sharma
Discover a network adapter-independent protocol from Microsoft that facilitates NIC teaming for virtual machines on Windows Server 2012.
Our latest server tutorial details how to troubleshoot generic error messages in Hyper-V Replica as well as what you should do when a known error message occurs.
Our latest server tutorial reveals two handy PowerShell cmdlets available for checking Windows Server 2012 Hyper-V Replication status and getting replication statistical data on your VMs.
Discover the key role Hyper-V's VSP and VSC components play in improving virtual machine performance by facilitating communication between VMs and the parent partition.
For any virtualization administrator that's ever found Hyper-V's network virtual switch's capabilities to be a bit on the confusing side, we have the perfect server tutorial for you.
With Hyper-V in Windows Server 2012 R2 introducing support for two generations of virtual machines, we look at when and why you might want to select one VM generation over the other.
Discover how Windows PowerShell and the built-in PowerShell cmdlets that ship with Hyper-V can help automate a variety of server admin tasks on Hyper-V virtual machines.
Our latest Server Tutorial covers virtual machine conversion tools and takes you step by step through the process of converting a physical machine to a VM.
With Microsoft Hyper-V and VMware vSphere tackling virtualization in their own distinct ways, it's important to know the key advantages and disadvantages of each design architecture employed by the two.
Discover how the new cloning feature in Windows Server 2012 can simplify building a new additional domain controller as well as save time when provisioning domain controllers for rapid deployment.
Before virtualizing mission-critical services like Active Directory domain controllers, make sure to brush up on what you should and should not do with our "best practices" reference.
Authorization Manger makes secure server virtualization more than a pipe dream. These best practices show you the two best ways to secure Hyper-V Server and virtual machines using Authorization Manager.
Are your Hyper-V virtual machines secure? Learn how to secure them using Authorization Manager.
When deploying virtualization technologies, key choices must be made to ensure the environment is secure. This article explains how to use Authorization Manager to make Hyper-V as secure as it can be.
Setting up SQL Cluster Setup is simple. After that it gets dicey. This article steps through SQL server setup functions, configuring a second node to be cluster-aware, and the all-registry entries and their significance created during the setup.
Win Tip: DNS functions differently in the latest versions of Windows. For a quick explanation of DNS client behavior for DNS queries and registrations look no further.
Win Tip: RSAT offers a new way to manage computers remotely in Windows Server 2008.
Win Tip: Microsoft has changed the behavior of DNS server in Windows Server 2008. Now, DNS server loads the zone data from Active Directory while it restarts. This allows the server to respond to client requests coming in for other zones.
WinInstall LE is certainly not the only approach to deploying an application-specific setting to multiple computers, but it is one that saves both time and money. Learn its advantages as well as how to use this tool to convert EXE applications to MSI packages.
Win Tip: If you're in a Windows environment but prefer a command-line interface to a GUI, the Server Core edition of Windows Server 2008 may be right for you. This cheat sheet of basic commands will help you get started.
Win Tip: DFS in Windows Server 2008 boasts a number of improvements. Access-based enumeration and cluster support is just the beginning
Win Tip: 'GlobalNames' Zone is another reason to consider migrating from WINS.