TECH DIGITAL RESOURCE LIBRARY

TechGenix


Latest Content From TechGenix

Whitepaper: File and Print Sharing in Windows Vista

by TechGenixJan 01, 2008

Server consolidation has become an integral part of IT planning to reduce cost and improve efficiency in today?s enterprise data centers. The advent of virtualization allows consolidation of multiple applications into virtual containers hosted on a single or multiple physical servers. However, this poses new challenges, including choosing the right virtualization technology and consolidation configuration for a particular set of applications. In this white paper, the author has evaluated two representative virtualization technologies, Xen and OpenVZ, in various configurations.


Whitepaper: Adding Email Disclaimer Text With the IMS Extension in MS Exchange 5.5

by TechGenixJan 01, 2008

The casual nature of email belies the fact that an electronic message is still, in a business context, a legally binding document, and newspaper stories about the legal issues raised by email are becoming increasingly common. While most people can happily dismiss these stories as ’A sign of the times’, to the Exchange Administrator they can be a potential source of dismay. In an effort to preempt legal problems, many Exchange Admins like to add a ’Disclaimer’ or ’Footer’ message to their outgoing emails such messages can also have other uses.


Whitepaper: Exchange Memory Allocation

by TechGenixJan 01, 2008

Large organizations might have statistics for Exchange usage so they can plan according to charts, but even then the planning might fail if user’s mail usage changes or a virus spreads internally. Any Exchange hardware or software problem might also prove to be too much for systems that usually run smoothly. This deals with how much memory Exchange servers should have and how to deal with servers with large RAM.


Whitepaper: Protecting Microsoft Exchange With ISA Server 2004 Firewalls

by TechGenixJan 01, 2008

This is especially true if a person has a well established network and firewall infrastructure that’s working for him. Why would he want to go and change everything just to add a new application layer intelligent firewall to his setup? Things are working already and the person hasn’t been successfully attacked for at least 6 weeks. This shows how the person can place an ISA 2004 firewall on the network to protect the Exchange Servers with minimal changes to the current network topology.


Whitepaper: Backing Up Exchange 2000 Using Windows 2000 Backup

by TechGenixJan 01, 2008

This paper from TechGenix explains the steps taken to backup the Exchange 2000 Information Store using the built-in Windows 2000 Backup program on the Exchange 2000 Server. It also explains the other information that should be backed up to ensure a person can recover from a disaster. Microsoft Windows 2000 comes with a utility that enables to backup data and System State information on that server. When the user install Exchange 2000 onto the server, the Windows 2000 Backup utility is updated to support backing up and restoring Exchange data. The backup program now becomes ""Exchange aware"".


Whitepaper: Introducing the ISA Server 2000 Exchange Server 2000/2003 Deployment Kit - Getting the Most Out of the Firewall for Microsoft Exchange Server

by TechGenixJan 01, 2008

One of the most common subjects on the ISAServer.org Web boards and mailing list is how to use ISA Server firewalls to allow secure remote access to Exchange Server services on the Exchange Server on the internal network. Creating a secure remote access solution to the Exchange Server using an ISA Server firewall can be a daunting project. The ISA Server 2000 Exchange 2000/2003 Deployment Kit is answers to all questions regarding Exchange Server publishing and remote access to Exchange Server services via ISA Server firewalls are found in the kit. This paper from TechGenix is an intro to the kit and downloads links.


Whitepaper: Exchange 2000 Postmaster@IP and Abuse@IP Mailboxes

by TechGenixJan 01, 2008

If a person ever needs to add Postmaster@IP and Abuse@IP addresses to his Exchange 2000 server, he will not be able to do so with ADUC. This paper from TechGenix describes a way in which it can be done with ADSI Edit. The problem of junk email seems to be spiralling out of control, and more and more companies are resorting to email domain blacklists in an effort to control the flood of unwanted messages. As a result, many Exchange admins will inadvertently find their servers blacklisted.


Whitepaper: Things to Do When Your Exchange Gets Blacklisted

by TechGenixJan 01, 2008

One day a person may get a lot of phone calls regarding mail not getting anywhere and his SMTP queue is full of junk. This could easily get the person into panic and much calls to outside expensive consultants. Instead, a few steps can rid the person of these attacks. This paper from TechGenix deals with how to get the Exchange server out of block lists and stop attacks at the same time.


Whitepaper: How to Properly Configure File System Antivirus Software on Exchange Server

by TechGenixJan 01, 2008

Improperly configured file system antivirus software on Exchange server can cause a person serious problems. It shows how to properly configure file system antivirus software on Exchange server and avoid most common pitfalls. It discusses a situation where one have an Exchange server with file system antivirus software and Exchange server antivirus software installed.


Whitepaper: Exchange 2000 Diagnostics Logging

by TechGenixJan 01, 2008

Diagnostics logging might be a powerful tool, especially if one knows something about the inner workings of Exchange. It can also be a time saver when talking to Microsoft support services that can analyze the information and help in a time of need. The diagnostic logging options are available on the server object ""Diagnostics Logging"" property page in Exchange System Manager. To effectively use logging options one must know what the various components of Exchange are. The authors experience shows that turning up the logging even to the Minimum setting can easily flood the Event Viewer application log.