Points of My Scenario:
1. I am admin of a Windows Server 2012 R2 server with 8GB RAM
2. I plan to install the Hyper-V role
3. I need to ensure that the Host OS uses only 2GB RAM, reserving the remaining 6GB for guest VMs (virtual machines).
Ransomware is a malware that is again in the list of security concerns. Not only for companies, but also for Government security and even at personal use. IT departments should be aware and have the right knowledge to how to fight it.
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs.
Launch Data Protection Manager from the deskt…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource.
Use Google, Bing, or other preferred search engine to locate trusted NTP …