Explore Networking on Experts Exchange

Expert Solutions for Your Tech Problems


Networking is the process of connecting computing devices, peripherals and terminals together through a system that uses wiring, cabling or radio w...

Read more
  • 723K Content
  • 65K Contributors

Expert Spotlight
Shabarinath RamadasanInfrastructure Architect

IT Infrastructure Architect with 16+ years of experience on Microsoft infrastructure components.


Why Every IT Professional Should Be on Experts Exchange

I discuss my journey and personal achievements on Experts Exchange, while explaining the professional and educational benefits I have experienced as a Certified Expert. I have seen people of all skill levels find value on EE, whether it’s from submitting questions or teaching others.
Deploy Teams Background via Active Directory

Teams - Deploy Team Background via Active Directory GPO

Microsoft Teams has begun to roll out the much anticipated Background Effects feature. This article describes how to deploy a custom Microsoft Teams backgrounds to users by leveraging Active Directory Group Policy File Preferences
Alberta Bighorn Country

Remote Desktop Services (RDS): Setup Guide & Best Practices

Remote Desktop Services setup guide for physical and/or virtual deployment. We've been building RDS environments in both all-in-one and TS/.RD Farm mode on Terminal Services and then Remote Desktop Services with RD Gateway in Server 2008. What follows are some of the key takeaways. Enjoy!
Screenshot of Hyper-V Settings

Using Bitlocker to encrypt virtual machines

This is another small article in my Bitlocker article series. It is about encrypting virtual machines. The scenario that I am securing the VM against, is that an attacker has physical access to the host and is trying to read out the virtual hard drive of the guest systems.
Why the Corona pandemic is also becoming an IT security challenge

Why the Corona pandemic is also becoming an IT security challenge

In this short article, I am trying to point out, what needs to be considered in order to stay secure, before trying to keep the company operable.

Preparing Your Business for an Emergency

Natural disasters, technical faults, human error—these are just a few factors that leave your IT systems vulnerable to failure. To ensure incidents like these don’t catch you off guard or put your team offline, emergency planning is a must.

Monitoring Hyper-V and Hyper-V Replica

A simple method for monitoring your Hyper-V servers and Replication Status

Analog vs. Digital PDN Impedance: How to Design for Each Signal

An analog PDN impedance is different from digital PDNs in many ways. Here’s what you need to know about each type of PDN.
0xc000000f Error

PXE Boot Error 0xc000000f and SCCM

How to fix a common PXE boot error caused by disruptions in the SCCM imaging process.

How to change display name of local Active Directory Users who are synced with AD users in Office 365 portal.

Lets take a scenario where all users in local AD has Display Name attribute set as surname, first name We need to set the same to First Name, Last Name
MAC Addresses

MAC addresses in Access and Excel

The block of six octets of a MAC address represents a lot of challenges when it comes to reading, formatting, parsing, validation, and lookup of vendor information. The functions presented here let you read, generate, format, store, list, and report MAC addresses and derived BSSIDs for most tasks.

ERROR_GEN_FAILURE [code 0x0000001f] When Attempting to Join vCenter to Active Directory

It is a common practice to join vCenter to Active Directory in order to enable AD logins and authentication to various virtual machines. However, there are times where this simple task fails. Fortunately, one of the most common reasons is due to an SMB1 issue and this describes how to resolve it.
We have bitlocker ...so we need MBAM, too?

We have bitlocker ...so we need MBAM, too?

In this article, I will take a look at Microsoft Bitlocker Administration and Monitoring (“MBAM”) and conclude, why I prefer my own scripts for deployment and management.

Delegation of access to Bitlocker Recovery Passwords – this way, please!

In this article, I will show you how delegation of control for Bitlocker recovery passwords in Active Directory is supposed to work using the common wizard, and why I think that you should do it differently.

How to Perform DNS Enumeration

DNS enumeration offers TONS of helpful info on public servers, including IP addresses, server names, and purposes. Let's take a closer look.
Standalone RD Gateway Server without RDS Infrastructure

Standalone RD Gateway Server without RDS Infrastructure

In this article, will demonstrate how to deploy standalone RD gateway server on 2012 R2 server without deploying RDS infrastructure. RD Gateway is a built-in windows server role and allows RDP to internal servers from the internet through the Https tunnel.
Branch office Inter connectivity

Branch office inter-connectivity: A free and industrial VPN approach.

byAl fa
As a network administrator, you have been probably requested to propose a secure and stable solution for branch offices connectivity to your HQ building over VPN. You possibly have usage scenarios such as IP phone, Cameras, Database replication, and remote maintenance and support.

SHA1 to SHA2 Migration Needs, Prerequisites and available options

This article explains SHA1 to SHA2 migration requirements in a simple way by putting all data on table, while explaining SHA1 and SHA2 algorithms, SHA1 deprecation plans and possible migration paths to SHA2.

Bitlocker and multi-booting

If you are asking yourself "will Bitlocker allow me to install several encrypted instances of windows 10 on the same drive?", here is your answer.

How to manually pre-provision Bitlocker

This is yet another bitlocker article. I will cover only a very small aspect: the pre-provisioning process. Without getting technical, this process means “turning on bitlocker before anything else”.

Do more with Experts Exchange.

Get Answers

Take a Class


Monitor your Site

Explore solutions and more