Corporate-managed computers have this bad habit of being much slower than their personally-owned home use counterparts. All of the Group Policy, login scripts, managed antivirus configuration, management tools, and software all contribute to slow the machines down over time and even when they’re brand and never been used by an end users. If your managed […]
Category: External Articles
Links to articles that I’ve written for other sites and publications.
Shared or multi-user computers come with their own unique management issues. Fast User Switching allows someone like a receptionist to leave programs running while taking breaks, but also allows other users of that same system to leave their applications running even when they may not return to the computer for hours or days later. With […]
Running antivirus on Hyper-V is a hot topic… almost as hot as asking sysadmins which antivirus vendor they prefer. Whether you’re in the “don’t install” or “must install” camp, make sure you’re making an informed decision and, should you install to install antivirus software on your Hyper-V servers, you have it configured correctly.
In this series, I cover folder redirection in Group Policy. Part 1: Introduction – Introduction to Folder Redirection in Group Policy. Part 2: Setting up Your File Server – Creating a share, configuring share permissions, and configuring folder permissions on your file server. Part 3: Folder Permissions – Explanation of the folder permissions used for […]
In this series, I discuss AppLocker (application whitelisting/blacklisting) in Windows 7: Part 1: Planning – Planning your AppLocker deployment including how to auto-generate rule and how to audit your rules first. Part 2: Best Practices – Best Practices for writing your AppLocker rules. Part 3: Testing – How to test your AppLocker rules before deploying […]
Here’s a new six-part series on 4Sysops that I’ve written on Group Policy troubleshooting: Part 1: User Communication Part 2: Test and Deploy Part 3: Group Policy not applied? Part 4: Client Problems Part 5: Active Directory Problems Part 6: Common Problems
Here’s a series of articles I wrote for 4Sysops.com on setting up your Active Directory for BitLocker. It includes the instructions, Best Practices from Microsoft, and tips & tricks: Part 1: Introduction Part 2: Schema Update, ACE Settings, Password Recovery Viewer Part 3: Group Policy Settings Part 4: Encrypting Hard Disks Part 5: BitLocker to […]