Process Priority Management in Windows

Posted on June 21, 2016 · Posted in Windows Server 2012
Windows Server 2012 - six process priority

Let’s talk about the priority of Windows processes. In most cases, there is no need to think about the custom process priority settings, but sometimes a qualified system administrator can help a system to better allocate the processor time between running tasks. When is it needed? For example on the.. read more

Kernel Exchange Suite

Posted on June 16, 2016 · Posted in Exchange
Preview Panel Screen

Microsoft email solutions are trending the chart among competitive email technologies like IBM Domino, Novell GroupWise, etc. Impact of Microsoft email framework, i.e. MS Outlook and MS Exchange Server, is clearly determined by looking at the productivity and performance of a company. However, enterprises also sail through disastrous and difficult.. read more

How to Measure Disk IOPS Using PowerShell

Posted on June 15, 2016 · Posted in Powershell, Windows Server 2012 R2
test iops

One of the main metrics, which allows to estimate the performance of the existing or developed storage system is IOPS (Input/Output Operations Per Second). In simple terms, IOPS is the number of blocks read from or written to a media or a file system in a time unit. The larger.. read more

Backing Up VMWare Virtual Machines Using Altaro VM Backup

Posted on June 9, 2016 · Posted in VMWare
retention policy

In this overview, we’ll tell how to use Altaro VM Backup to back up virtual machines running on VMWare vSphere. We’ll show how to install and configure Altaro VM Backup, create a backup task and recover a VM. Originally, this product was called Altaro Hyper-V Backup and used to back.. read more

Reset Windows Update Agent and Service to Default

Posted on June 6, 2016 · Posted in Windows 7
reset windows update script: run as admin

In this article we’ll show how to restore Windows Update agent and service to default state by resetting their configuration. As a rule, it is the most effective and the easiest way to solve the issue with Windows Update agent.

How to Remove 260 Characters Limit for NTFS Paths in Windows 10

Posted on June 1, 2016 · Posted in Windows 10

When working with files, most Windows users and administrators have come across the “path too long” error. This error appears when the full path to a file (containing its name) exceeds 260 characters. Many applications, including Windows Explorer, work with such long file names incorrectly refusing to open, move or.. read more

How to Install TFTP Server on Windows Server 2012 R2

Posted on May 26, 2016 · Posted in Windows Server 2012 R2
WDSTFTP rootfolder

All Windows Server version support the ability to  run built-in TFTP server. Though there is no dedicated role or service of the TFTP server (don’t look for it in the FTP section of your IIS server), this feature, like in Windows Server 2003, is a part of Windows Deployments Services.. read more

What’s New in SharePoint Server 2016 for administrators

Posted on May 25, 2016 · Posted in Misc
sharepoin topologies

Last year Microsoft released new versions of its products and still there are open areas. New SharePoint Server 2016 is around the corner (will be fully available to customers in the second quarter in 2016.), and late January the RC (Release Candidate) was launched. Since this version is quite mature,.. read more

How to Install and Configure SMTP Server on Windows Server 2012 R2

Posted on May 19, 2016 · Posted in Windows Server 2012 R2

On all versions of Windows Server, you can setup built-in SMTP server. This SMTP server inside the organization can serve as a mail relay receiving and sending SMTP messages from and to different devices (like senders, scanners,  access control devices, etc.) and applications (web applications, SQL Reporting Services, SharePoint), which.. read more

Block Untrusted Fonts in Windows 10

Posted on May 17, 2016 · Posted in Windows 10
Untrusted Font Blocking - Windows 10 Policy

One of the ways to attack Windows machines gaining popularity is the exploitation of vulnerabilities in Windows font driver by means of loading and running a special crafted font file. To implement such attack, a hacker just has to make a user open a specially constructed document, web-page or run.. read more