<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-97438829961263986</id><updated>2024-11-01T02:38:50.032-07:00</updated><category term="window 2003"/><category term="win 2008"/><category term="Linux"/><category term="Tips and Trick"/><category term="Exchange Server"/><category term="Issues problem"/><category term="win xp"/><category term="ms outlook"/><category term="Exchange 2013"/><category term="Windows 2008 GPO"/><category term="Windows 2012 GPO"/><category term="interview server"/><category term="Ubuntu"/><category term="Disaster Recovery"/><category term="Exchange Server 2010"/><category term="SQL Server"/><category term="windows 2012"/><category term="DAG on exchange 2013"/><category term="Exchange Server 2007"/><category term="Fedora"/><category term="Hardware"/><category term="Lotus note"/><category term="Migration"/><category term="Windows 8"/><category term="hacking"/><category term="unlock data card"/><category term="Mobile"/><category term="VMware"/><category term="blackberry"/><category term="fujitsu"/><title type='text'>IT Technology</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>243</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-3224508074809270198</id><published>2015-10-08T13:34:00.000-07:00</published><updated>2015-10-11T14:19:52.530-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows 2012"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2012 GPO"/><title type='text'>How to enable BitLocker on Windows Server 2012 R2</title><summary type="text">Thanks to the improvements of virtualization and storage technologies, it’s not difficult to clone a disk. A great advantage for disaster recovery, but also a potential risk for the security of your information.Microsoft&amp;nbsp;allows to encrypt the disks of a server with a feature named&amp;nbsp;BitLocker. We are going to see how you can enable&amp;nbsp;BitLocker&amp;nbsp;on a physical or virtual server to </summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/3224508074809270198/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-enable-bitlocker-on-windows.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/3224508074809270198'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/3224508074809270198'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-enable-bitlocker-on-windows.html' title='How to enable BitLocker on Windows Server 2012 R2'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-5466050267172844677</id><published>2015-10-08T13:33:00.000-07:00</published><updated>2015-10-11T14:19:52.551-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2008 GPO"/><category scheme="http://www.blogger.com/atom/ns#" term="windows 2012"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2012 GPO"/><title type='text'>How to enable Roaming Profiles on Windows Server 2012 R2</title><summary type="text">Roaming Profiles&amp;nbsp;allow users of an&amp;nbsp;Active Directory Domain&amp;nbsp;to access their desktop and documents from any PC of the domain.It’s a powerful feature that can improve the productivity of the employees and make their lives easier.The best thing about&amp;nbsp;Roaming Profiles&amp;nbsp;is how they are easy to set up.Before configuring a&amp;nbsp;Roaming Profile, we need to create a&amp;nbsp;Share. Open</summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/5466050267172844677/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-enable-roaming-profiles-on.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/5466050267172844677'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/5466050267172844677'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-enable-roaming-profiles-on.html' title='How to enable Roaming Profiles on Windows Server 2012 R2'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-7058186339624043962</id><published>2015-10-08T13:30:00.000-07:00</published><updated>2015-10-11T14:19:52.572-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2008 GPO"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2012 GPO"/><title type='text'>How to: Software Restriction policies with AppLocker</title><summary type="text">We’ve already seen&amp;nbsp;how to restrict software on Windows Server 2012 // R2 using GPOs. There’s another way available since&amp;nbsp;Windows Server 2012, thanks to a feature called&amp;nbsp;AppLocker.We still use&amp;nbsp;GPOs&amp;nbsp;–&amp;nbsp;AppLocker&amp;nbsp;is a subset of&amp;nbsp;GPOs&amp;nbsp;– to enforce software restriction but it’s easier and more powerful.AppLocker&amp;nbsp;can manage execution permissions </summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/7058186339624043962/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-software-restriction-policies.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/7058186339624043962'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/7058186339624043962'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-software-restriction-policies.html' title='How to: Software Restriction policies with AppLocker'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-5664605543921348085</id><published>2015-10-08T13:27:00.000-07:00</published><updated>2015-10-11T14:19:52.592-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2008 GPO"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2012 GPO"/><title type='text'>How to share printers via Group Policy (GPO)</title><summary type="text">One great advantage of using&amp;nbsp;Active Directory Domain Services&amp;nbsp;is the possibility to share a printer in just a few clicks with a group of computers or users.Since&amp;nbsp;Windows Server 2012&amp;nbsp;isn’t even necessary to create a&amp;nbsp;Group Policy Object (GPO),&amp;nbsp;Windows&amp;nbsp;will do the job for us speeding up the process.We are going to show how you can share an existing (installed) </summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/5664605543921348085/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-share-printers-via-group-policy.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/5664605543921348085'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/5664605543921348085'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-share-printers-via-group-policy.html' title='How to share printers via Group Policy (GPO)'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-3508522343881967712</id><published>2015-10-08T13:25:00.000-07:00</published><updated>2015-10-11T14:19:52.610-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2008 GPO"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2012 GPO"/><title type='text'>How to deploy a Registry Key via Group Policy</title><summary type="text">System administrators often need to deploy one or more&amp;nbsp;Registry Keys&amp;nbsp;in business environment. Customized software or hardware need particular configurations and companies usually have solutions tailored to their needs.Whatever the reason is, a&amp;nbsp;Group Policy&amp;nbsp;is the best way to deploy a&amp;nbsp;Registry Key&amp;nbsp;in an&amp;nbsp;Active Domain Directory Services.The configuration is quite </summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/3508522343881967712/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-deploy-registry-key-via-group.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/3508522343881967712'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/3508522343881967712'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-deploy-registry-key-via-group.html' title='How to deploy a Registry Key via Group Policy'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-9017956469643885396</id><published>2015-10-08T13:22:00.000-07:00</published><updated>2015-10-11T14:19:52.627-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2008 GPO"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2012 GPO"/><title type='text'>How to deploy (and/or remove) software packages via GPO in Windows 2012</title><summary type="text">One of the greatest advantages of having an&amp;nbsp;Active Directory Domain&amp;nbsp;is the possibility to&amp;nbsp;deploy software packages via GPO (Group Policy Object).&amp;nbsp;Software deployment&amp;nbsp;is crucial in business environments to save time and money.Microsoft&amp;nbsp;not only gives us a simple way to&amp;nbsp;deploy software, but also provides a quick solution to uninstall it when we don’t need it </summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/9017956469643885396/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-deploy-andor-remove-software.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/9017956469643885396'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/9017956469643885396'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-deploy-andor-remove-software.html' title='How to deploy (and/or remove) software packages via GPO in Windows 2012'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-5230135086995209575</id><published>2015-10-08T13:19:00.000-07:00</published><updated>2015-10-11T14:19:52.645-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2012 GPO"/><title type='text'>How to enforce Device Restrictions with a GPO in Windows 2012</title><summary type="text">Now it’s time to&amp;nbsp;restrict devices.&amp;nbsp;Device restrictions&amp;nbsp;can improve the security of a business network and limit potential headaches to the IT staff.It’s also really easy to enforce a&amp;nbsp;device restriction GPO.Open the&amp;nbsp;Server Manager&amp;nbsp;and launch the&amp;nbsp;Group Policy Management:Create a new&amp;nbsp;GPO:Edit the policy:Navigate to the path&amp;nbsp;Computer Configuration\Policies</summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/5230135086995209575/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-enforce-device-restrictions-with.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/5230135086995209575'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/5230135086995209575'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-enforce-device-restrictions-with.html' title='How to enforce Device Restrictions with a GPO in Windows 2012'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-6367412056990084241</id><published>2015-10-08T13:18:00.000-07:00</published><updated>2015-10-11T14:19:52.660-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2008 GPO"/><title type='text'>How to Prevent Users from Connecting to a USB Storage Device by Group Policy</title><summary type="text">To prevent users from connecting to USB storage devices by group policy&amp;nbsp;If a USB storage device is already installed on the computer:&amp;nbsp;Click&amp;nbsp;Start&amp;nbsp;– &amp;nbsp;All programs &amp;nbsp;– Administrative Tools – Group Policy&amp;nbsp;Management.Create or Edit Group Policy ObjectsExpand&amp;nbsp;Computer Configuration&amp;nbsp;–&amp;nbsp;Preferences&amp;nbsp;–&amp;nbsp;Windows Settings.Right click&amp;nbsp;Registry&amp;</summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/6367412056990084241/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-prevent-users-from-connecting-to.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/6367412056990084241'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/6367412056990084241'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-prevent-users-from-connecting-to.html' title='How to Prevent Users from Connecting to a USB Storage Device by Group Policy'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEje8oCPDhyzg3MA6JPsTNTzHxA67enJP8Ox0ZWr4pNd8KZzrndIKsRjsSiSmy67aA6OkRr-eM_xkJazy7xLSx8T8vTVUlZbrb_A1Ed5LGb7jJtIf7tdQlaayQzhff-RHKMsk2wl6R_lUdTu/s72-c/sample-1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-4857557994724739212</id><published>2015-10-08T13:11:00.000-07:00</published><updated>2015-10-11T14:19:52.677-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2008 GPO"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2012 GPO"/><title type='text'>Active Directory: how to restrict sites in IE 10 and IE 11 with a Group Policy</title><summary type="text">Site restrictions are common in business networks. Mangers and entrepreneurs want to limit potential distractions and&amp;nbsp;Microsoft&amp;nbsp;offers a range of solutions to achieve the objective. An usual practice is to adopt a proxy server but you can enforce site restrictions on&amp;nbsp;Internet Explorer&amp;nbsp;– even the latest versions – using a simple&amp;nbsp;Active Directory Group Policy.In this </summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/4857557994724739212/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/active-directory-how-to-restrict-sites.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/4857557994724739212'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/4857557994724739212'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/active-directory-how-to-restrict-sites.html' title='Active Directory: how to restrict sites in IE 10 and IE 11 with a Group Policy'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-3499219450605247646</id><published>2015-10-08T13:09:00.000-07:00</published><updated>2015-10-11T14:19:52.697-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2008 GPO"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2012 GPO"/><title type='text'>How to: Software Restriction policy for AD Domain Users</title><summary type="text">Now it’s time to prevent users of an&amp;nbsp;Active Directory Domain Services&amp;nbsp;from using specific applications.Surprisingly enough, it’s much easier to restrict software than websites. You just need to access thedomain controller&amp;nbsp;and follow these steps.Open the&amp;nbsp;Server Manager&amp;nbsp;and launch the&amp;nbsp;Group Policy Management:Create a new&amp;nbsp;Group Policy Object:Give a name to the new&amp;</summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/3499219450605247646/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-software-restriction-policy-for.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/3499219450605247646'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/3499219450605247646'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-software-restriction-policy-for.html' title='How to: Software Restriction policy for AD Domain Users'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-7147989813951885924</id><published>2015-10-08T13:06:00.000-07:00</published><updated>2015-10-11T14:19:52.715-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2008 GPO"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2012 GPO"/><title type='text'>How to force proxy settings via Group Policy on Windows Server 2012</title><summary type="text">Proxy servers&amp;nbsp;may be useful in business environments to restrict websites, analyze Internet traffic or for caching purposes. There are several proxy servers available on the market but we won’t talk about them.Instead, we’re going to see how to force proxy settings via&amp;nbsp;Group Policy (GPO)&amp;nbsp;on&amp;nbsp;Windows Server 2012&amp;nbsp;//&amp;nbsp;R2. The&amp;nbsp;Policy&amp;nbsp;will only affect&amp;nbsp;</summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/7147989813951885924/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-force-proxy-settings-via-group.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/7147989813951885924'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/7147989813951885924'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-force-proxy-settings-via-group.html' title='How to force proxy settings via Group Policy on Windows Server 2012'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-4339786802642982501</id><published>2015-10-08T12:57:00.000-07:00</published><updated>2015-10-11T14:19:52.730-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2008 GPO"/><title type='text'>How to Change Local Administrator Password with Group Policy</title><summary type="text">We will use Group Policy Preferences to set password on local user accounts.Click&amp;nbsp;Start&amp;nbsp;–&amp;nbsp;All programs – Administrative Tools – Group Policy Management.Create or Edit Group Policy Objects.Expand&amp;nbsp;Computer Configuration&amp;nbsp;–&amp;nbsp;Preferences – Control Panel Settings.Right click on&amp;nbsp;Local Users and Groups – New – Local User.Note:&amp;nbsp;Group policy update will take 90 min (</summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/4339786802642982501/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-change-local-administrator.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/4339786802642982501'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/4339786802642982501'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-change-local-administrator.html' title='How to Change Local Administrator Password with Group Policy'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVQhyphenhyphend17F0BpVaX7gEYRINlsBEZPG76I7eWRFiPSCepiiP1GGh_fZ1-l8y9ijOevOJfL9O7_A73Whhl7Yoy2offlr99Bj13eK-J9pLboZ-ZwEocUhKgfpq9GgpWLTlTcO2GrjXVVG17PKa/s72-c/pic-11+%25281%2529.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-3653529576986564716</id><published>2015-10-08T12:49:00.000-07:00</published><updated>2015-10-11T14:19:52.744-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Windows 2008 GPO"/><title type='text'>How to Make a Domain User the Local Administrator for all PCs</title><summary type="text">You can create GPO and link the GPO to domain or OU containing all the computers.Step 1 : Creating a Security GroupFirst you need to create a security group called&amp;nbsp;Local AdminLog onto a Domain Controller, open Active Directory Users and Computers (dsa.msc)Create a security Group name it&amp;nbsp;Local Admin.&amp;nbsp;From Menu&amp;nbsp;Select&amp;nbsp;Action | New | GroupName the group as&amp;nbsp;Local </summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/3653529576986564716/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-make-domain-user-local.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/3653529576986564716'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/3653529576986564716'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/10/how-to-make-domain-user-local.html' title='How to Make a Domain User the Local Administrator for all PCs'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-4883054740414567676</id><published>2015-09-27T06:26:00.000-07:00</published><updated>2015-10-11T14:19:52.760-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows 2012"/><title type='text'>Step by Step : How to Deploy System Center 2012 R2 Configuration Manager (SCCM) in Windows Server 2012 R2</title><summary type="text">A little bit of intro about SCCM 2012 R2 :System Center solutions help you manage the physical and virtual information technology (IT) environments across data centers, client computers, and mobile devices. You can improve your productivity by using the integrated and automated solutions of System Center.What SCCM 2012 R2 can do for you?You can use the change and configuration management </summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/4883054740414567676/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/09/step-by-step-how-to-deploy-system.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/4883054740414567676'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/4883054740414567676'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/09/step-by-step-how-to-deploy-system.html' title='Step by Step : How to Deploy System Center 2012 R2 Configuration Manager (SCCM) in Windows Server 2012 R2'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-3962240560250784350</id><published>2015-09-27T06:21:00.000-07:00</published><updated>2015-10-11T14:19:52.779-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="windows 2012"/><title type='text'>Step by Step : Installing &amp;amp; Configuring WSUS in Server 2012 R2</title><summary type="text">Today lets go through a step by step on how to installing &amp;amp; configuring WSUS in Windows Server 2012 R2.But as usual, before we start, let me explain a little bit about WSUS (Windows Server Update Services).What Is WSUS?WSUS is a server role included in the Windows Server 2012 R2 OS, and that downloads and distributes updates to Windows clients and servers.WSUS can obtain updates that are </summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/3962240560250784350/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/09/step-by-step-installing-configuring.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/3962240560250784350'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/3962240560250784350'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/09/step-by-step-installing-configuring.html' title='Step by Step : Installing &amp;amp; Configuring WSUS in Server 2012 R2'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-2595618507733848854</id><published>2015-09-27T06:15:00.000-07:00</published><updated>2015-10-11T14:19:52.797-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><title type='text'>How to check/repair (fsck) filesystem after crash or power-outage</title><summary type="text">At some point your system will crash and you need to perform a manual repair of your file system. A typical situation would be power loss while you are working on the system. You reboot and the system stops and indicates you must perform a manual repair of the system using fsck.fsck (file system consistency check) is a command used to check filesystem for consistency errors and repair them on </summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/2595618507733848854/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/09/how-to-checkrepair-fsck-filesystem.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/2595618507733848854'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/2595618507733848854'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/09/how-to-checkrepair-fsck-filesystem.html' title='How to check/repair (fsck) filesystem after crash or power-outage'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-5390838362855123141</id><published>2015-09-27T06:10:00.000-07:00</published><updated>2015-10-11T14:19:52.811-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ubuntu"/><title type='text'>Ubuntu Reference</title><summary type="text"></summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/5390838362855123141/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/09/ubuntu-reference.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/5390838362855123141'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/5390838362855123141'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/09/ubuntu-reference.html' title='Ubuntu Reference'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEGksoutcARKLGXk2mD-7a-BrNPx5srZcvrksP8OajccTDUnGImG5AGrEXvnsFRYmTIm75YsfLkeULLmk1CF1rv6EfROw1etuRs2z2bY9W9vbwk9-n21zyq39-DfeS2x0XSAFvl9hFo4gg/s72-c/Ubuntu.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-4966175285950029245</id><published>2015-09-27T06:07:00.000-07:00</published><updated>2015-10-11T14:19:52.822-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><title type='text'>Linux Cheat Sheet</title><summary type="text"></summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/4966175285950029245/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/09/linux-cheat-sheet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/4966175285950029245'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/4966175285950029245'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/09/linux-cheat-sheet.html' title='Linux Cheat Sheet'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjexIJh9Y620UgmsGxq6m3F-KZvO_0XKztv3991gxnh5RH7dqRKoTWJ6KHPyTJc63SLIbNfeo3NEPs0glyBGf-ktXCCjc6J3kaHDJAXauEamFInh6sibyyw-FS3AYRCTGjXS-NWrHxzfuuI/s72-c/linux-cheat-sheet.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-8323017350975428819</id><published>2015-09-27T06:03:00.000-07:00</published><updated>2015-10-11T14:19:52.835-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux"/><title type='text'>Linux/Unix Command Reference</title><summary type="text"></summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/8323017350975428819/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2015/09/linuxunix-command-reference.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/8323017350975428819'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/8323017350975428819'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2015/09/linuxunix-command-reference.html' title='Linux/Unix Command Reference'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiw9U67sSGfSN9J1gKEvTM-MJXru_-nfy_eZyNQoYFIiH_e3umgcq_iTC2a1YSaooEc5H7mVNW9snwh1KVS31mT8-GOzMGBijyjFxh4zQyi9fTSWpW2F23R9jQFNJe23Obweg8rNxfgSOxb/s72-c/Linux.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-6074994322415476285</id><published>2014-07-06T07:01:00.000-07:00</published><updated>2015-10-11T14:19:52.848-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exchange 2013"/><title type='text'>Recovery Database in Exchange Server 2013</title><summary type="text">In the previous two article we have learnt how to Backup and Restore Exchange Server 2013 database using Windows Server Backup. In this article we would be focusing on how to create Recovery Database (Aka RDB).It is very important to understand in what scenario RDB can be useful. Lets first understand the scenario.A user has deleted some important emails and that needs to be recovered. Without </summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/6074994322415476285/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2014/07/recovery-database-in-exchange-server.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/6074994322415476285'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/6074994322415476285'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2014/07/recovery-database-in-exchange-server.html' title='Recovery Database in Exchange Server 2013'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-2925649151198667122</id><published>2014-07-06T06:57:00.000-07:00</published><updated>2015-10-11T14:19:52.862-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exchange 2013"/><title type='text'>Outlook Anywhere in Exchange Server 2013 – What’s New</title><summary type="text">In this blog we will explore something new which has been introduced in Exchange Server 2013. Yes, that’s New Outlook Anywhere configuration changes introduced for Microsoft Outlook.ScenarioClient – Microsoft Outlook 2010Exchange Server – Microsoft Exchange 2013In Previous versions of exchange so far we have seen all local clients are considered as&amp;nbsp;“MAPI”&amp;nbsp;clients. In Exchange Server </summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/2925649151198667122/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2014/07/outlook-anywhere-in-exchange-server.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/2925649151198667122'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/2925649151198667122'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2014/07/outlook-anywhere-in-exchange-server.html' title='Outlook Anywhere in Exchange Server 2013 – What’s New'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-5713625413164486499</id><published>2014-07-06T06:56:00.000-07:00</published><updated>2015-10-11T14:19:52.878-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DAG on exchange 2013"/><category scheme="http://www.blogger.com/atom/ns#" term="Exchange 2013"/><title type='text'>Automatic Reseed in Exchange Server 2013</title><summary type="text">In this blog we will be exploring some new feature introduced in Exchange Server 2013. Microsoft has introduced a new High Availability Feature “Automatic Reseed”. To simulate the scenario we have already created two member DAG.Lets ExploreFigure 1 : Two Node DagTo understand the concept lets first explore the new DAG properties.Figure 2 : Data propertiesIn figure 2 we can see some attributes as </summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/5713625413164486499/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2014/07/automatic-reseed-in-exchange-server-2013.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/5713625413164486499'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/5713625413164486499'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2014/07/automatic-reseed-in-exchange-server-2013.html' title='Automatic Reseed in Exchange Server 2013'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-7960345865462597016</id><published>2014-07-06T06:55:00.000-07:00</published><updated>2015-10-11T14:19:52.895-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exchange 2013"/><title type='text'>Certificate Restore in Exchange Server 2013 SP1</title><summary type="text">Disclaimer Note:&amp;nbsp;The test performed is on Certificate which was issued by an Internal CA. Third party vendors may offer a different solution. Please check and understand their terms and conditions before performing any steps.Figure 1: After Disaster RecoveryFigure 2: Import Exchange CertificateIn figure 2 we have to ensure that our cursor is pointing somewhere in the middle pane. Do not </summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/7960345865462597016/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2014/07/certificate-restore-in-exchange-server.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/7960345865462597016'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/7960345865462597016'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2014/07/certificate-restore-in-exchange-server.html' title='Certificate Restore in Exchange Server 2013 SP1'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-1903414673451143655</id><published>2014-07-06T06:54:00.000-07:00</published><updated>2015-10-11T14:19:52.911-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exchange 2013"/><title type='text'>How to Restore Exchange Server 2013 Database – Part 2</title><summary type="text">In first part we have successfully backed up Exchange Server 2013 Database. In this blog we will be performing restore.Lets see what options we have to select, so that the restore is successful with zero errors.Figure 1.1 : Windows Server Backup (Apps)In figure 1.1 we will be selecting Recover.Figure 1.2 : Getting StartedFigure 1.3 : Select Backup DateIn figure 1.3 Dates shown in&amp;nbsp;BOLD&amp;nbsp;</summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/1903414673451143655/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2014/07/how-to-restore-exchange-server-2013.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/1903414673451143655'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/1903414673451143655'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2014/07/how-to-restore-exchange-server-2013.html' title='How to Restore Exchange Server 2013 Database – Part 2'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-97438829961263986.post-8526452460618706911</id><published>2014-07-06T06:53:00.000-07:00</published><updated>2015-10-11T14:19:52.929-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Exchange 2013"/><title type='text'>How to Backup Exchange Server 2013 Database – Part 1</title><summary type="text">Over the past so many years managing and maintaining Exchange Server Mailbox and Public folder Database has played a critical role for Exchange Administrators. The spontaneous growth which leads to add more room to store the large database was very critical. Preserving those databases was not that easy, because the data might go corrupt at any time. These was realized only when a backup is </summary><link rel='replies' type='application/atom+xml' href='http://mcseittechnology.blogspot.com/feeds/8526452460618706911/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://mcseittechnology.blogspot.com/2014/07/how-to-backup-exchange-server-2013.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/8526452460618706911'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/97438829961263986/posts/default/8526452460618706911'/><link rel='alternate' type='text/html' href='http://mcseittechnology.blogspot.com/2014/07/how-to-backup-exchange-server-2013.html' title='How to Backup Exchange Server 2013 Database – Part 1'/><author><name>mb</name><uri>http://www.blogger.com/profile/02227378672899675381</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>