How to Repair a Corrupt Outlook PST File with Scanpst

Posted on May 27, 2015 · Posted in MS Office
Scanpst checking file consistency

Microsoft Outlook stores user data in OST and PST files. An OST file is a cached copy of a user mailbox that is stored on MS Exchange server. A PST file is a personal folders file containing email messages, calendar, tasks, and other items of user and stored locally on.. read more

Driver Verifier: How to Troubleshoot & Identify Windows Driver Issues

Posted on May 22, 2015 · Posted in Windows 8
Debug drivers using Driver Verifier

Driver Verifier utility is included in all Windows versions since Windows XP and allows to scan drivers, detect problem drivers, which cause blue screens of death (BSOD), and record a detailed information about the problem driver to the memory dump for further analysis. The tool performs different stress-tests on the.. read more

Allow users to reset expired password via RD WebAccess in Windows Server 2012

Posted on May 20, 2015 · Posted in Windows Server 2012 R2
RDWeb - change password page

In this article we’ll show how enable the RD Web Access password reset option on Remote Desktop Services (RDS) server farm on Windows Server 2012 / 2012 R2.

Manage Domains and Email Address Whitelist in Exchange Server 2013

Posted on May 15, 2015 · Posted in Exchange
get-ContentFilterConfig

Anti-spam protection in Exchange Server 2013, like in previous versions, gives an opportunity to create a whitelist of trusted email addresses and senders domains, mail from which regardless of their contents should always be received.

Configuring Network Devices Authentication using Active Directory

Posted on May 14, 2015 · Posted in Active Directory
New RADIUS client

When servicing large networks, system administrators often face authentication problems on the network devices. In particular, it is quite hard to arrange normal work of several network administrators under individual accounts on a large amount of equipment (you have to support and keep up to date the database of the.. read more

How to Set TimeZone from Command Prompt in Windows

Posted on May 8, 2015 · Posted in Windows 8
tzutil timezone list

Besides time and date, Time Zone is one of the basic time settings in any computer system. If you want the time to be displayed correctly, the Time Zone should be set according to the geographic position of the computer.

Configure Internet Explorer 10 and 11 settings using GPO in Windows Server 2012

Posted on May 6, 2015 · Posted in Group Policies
Configure Internet Explorer 10 / 11 proxy settings using GPO in Windows 2012

Most Windows administrators even woken up in the middle of the night are able to tell which Group Policy section is used to set proxy server settings for Internet Explorer. It should be reminded that Internet Explorer parameters (including proxy server configuration) are set using Group Policy Editor (gpmc.msc). The.. read more

How to Find Your SharePoint Version

Posted on May 3, 2015 · Posted in Misc
Sharepoint database version GUI

I always forget how to find out the SharePoint version. So it’s a sort of reminder for me. You can see the SharePoint version in Administration Center -> System Settings -> Manage servers in this farm. Using PowerShell: Get-SPFarm | Select BuildVersion The cmdlet is available only in the SharePoint.. read more

Why Windows 8.1 Not Going to Sleep Mode: Troubleshooting Guide

Posted on April 30, 2015 · Posted in Windows 8
Allow this device to wake the computer

In this article, we’ll cover possible reasons why Windows refuses to sleep or won’t go into Sleep Mode. The article is applicable both for Windows 8 / 8.1 and Windows 7. The Sleep Mode issue can manifest itself in a number of ways, for example, the system can wake up.. read more

Enable Access-based Enumeration in Windows Server

Posted on April 29, 2015 · Posted in Windows Server 2012
Windows Server 2012 - Enable access-based enumeration

Access-based Enumeration allows on network shared folders hide files and folders from the users who don’t have NTFS permissions to access them. Thus you can provide additional security to the information stored in the network folder (due to hiding the structure and names of folders and files), improve its usability.. read more