Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.
Articles & Videos
IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.
First, is can I run OpenManage on Windows 10? I have PowerEdge T110 II running Windows 10 and I need to manage the raid array. I normally use OpenManage for this but for some reason I cannot login to…
Im getting slightly confused here.
We have a 2008 r2 server with WDS on. Its used for capturing and deploying Windows 7 pro. Its worked very well for us once WDS configured and drivers imported…
Good day. Does Jitbit Helpdesk AD integration work on trial version?
Thanks in advance for your help
I have very weird issue.
I have 2012R2 Domain Controller(I have imported Windows 10 ADMX into the 2012DC, via this manual http://www.windowstricks.i
We have 7 internal Windows 2008 R2 DC's and one remote DC hosted at partner site. User run a application which is web based and hosted by the partner site and authenticated by the remote DC which does…
Does anybody have information about Kairos Planet (https://kairosplanet.com)
I have .dat files filling up my c drive space on sql server
what should I do
We are now using Logmein Central to remotely access and manage computers for our clients. However Logmein are raising the prices every year with 20 to 50%.
Are there any decent alternati…
I have the following setup.
EXCH 2007 with 2 HUB-CAS server and 2 mailbox server.
For intern, we use a network load balancer (NLB) , which is also installed on both HUB-CAS servers.
We have Two untrusted forests separated by firewalls. we will install sccm site in forest A. we will also install management point and distribution point in the forest B. system discovery doundary gro…
We have 2 domains in our company. I setup a corresponding distribution group for a users email account so he could send an email from either domain address. (example: John.Doe@ficticiousdomain.
Our MDT 2013 fails to capture an image, when we run cscript litetouch.vbs, it skips the prompt for the location of the image, and completes.
1. The current Windows 8.1 image Task S…
what do you use to image computers in your Org? trying to find a better solution than WDS or MDT
Our organisation uses a finance software. For this software to work successfully, there is software A, which is a web based and links to another software that is on a hosted platform.
We run Win 7 and Win 10 in our domain. I'm looking to enforce a group policy that will always show a username and password field when the computer isn't logged on.
Currently, the computers retain t…
Several users will remotely log into the Server 2012 R2 as themselves (UserA, UserB, etc) but when they click on Start, UserZ's First and Last Name is displayed on the top right corner.
Can anyone here share some script or explanation how can I use Powershell Get-WinEvent or Get-EventLog to get some list of AD security event ?
I need the below information to see if any …
Can anyone here please assist me in modifying the powershell script below to go through the Windows Security Events to check where the user DOMAIN\Administrator is logging in or used in the e…
My problem is that my WordPress site it down. But on that AWS server instance I have a few other sites working.
I wonder if can literally reboot WordPress only.
I'd like to know if there is any Powershell script or software that can be used to test what my DOMAIN\Test-Account can do given certain privilege in my AD domain ?
For example: The AD a…
The server is a Dell R710 with eight physical drives. Two are configured for the virtual OS and six for the second drive.
Each disk one at a time, was swapped from 300GB to 900GB and the RAID rebu…
Is it possible to pull Microsoft software inventory using GPO? I have an OU that has all the active computers on the network but I need to see if I can get the software out.
I was wondering if anyone knows of a Hippa compliant disk wipe utility? Right now the process is removing the hard drive and using an electromagnet on it and then putting it back to test it. We do get…
This article builds on my previous two sysprep articles:
Windows 8/8.1 (http://www.experts-exchan
I have found over the years that without a basic policy in place, that is backed up with consistently enforced consequences, there is no hope of keeping your network even close to malware free. At …