Use PowerShell to create EventLog
In the following article, I will show you how to use PowerShell to create log records on the system, namely the Write-EventLog cmdlet command. The basic syntax of this command
System is a fairly wide category, including popular Windows operating systems, how to ghost computers, install Win, fix computer errors, remove viruses, malware, security solutions, servers, network tips
In the following article, I will show you how to use PowerShell to create log records on the system, namely the Write-EventLog cmdlet command. The basic syntax of this command
In the following article, we will introduce you some characteristics, how to implement and apply the Intel Platform Administration Technology platform - IPAT.
After installing Windows Home Server 2011 you need to start configuring it. Part of the configuration work is adding users on the network. This article will show you how to
XenServer is virtualization software launched by Citrix, a company specializing in virtualization technology. Developed on Xen platforms, XenServer supports both Linux and Window
One of the obvious shortcomings of Hyper-V is the ability to monitor virtual machines from Windows PowerShell. Although Microsoft intends to provide this capability on Windows
In this article, we will learn how to access the virtual machine list and see general information about virtual machines with simple PowerShell statements. We will also look at
Cloud computing has emerged in the last few years. The cloud provides infrastructure services (IaaS) that offer unprecedented flexibility as they enable the provision and
In this section, I will show you some of the key techniques in deploying DirectAccess in that there is no need to upgrade the network infrastructure to IPv6.
Users can install the Hyper-V for Windows Server 8 management tool on the fully installed Windows Server 2008 operating system and on supported versions of Windows Vista Service
In this article, I will show you how to install the basic Service Desk services as well as the data warehouse components of this product.
In Part 3 of this series, I will show you how to use and configure Service Manager.
In this article we will not cover the basic principles of backing up virtual machines, instead we want to focus on backup methods using Windows Server Backup.
When it comes to identifying a certain virtual machine component in the system, for some reason, such as changing hardware-related settings, fixing NTFS permissions problems ...
In this article, I will continue the discussion by showing you how to use System Center Operations Manager through the deployment of management agents for each cluster node.
In this article, we will show you the steps to configure Service Manager before starting to use the product.
If you are constantly exposed and working with the Windows operating system, you will certainly feel that Microsoft Network Monitor is one of the tools to support the analysis and
In this two-part series, we will introduce you to Forefront TMG's behavior detection features.
In Part 2 of this series, we will introduce the TMG firewall's advanced intrusion detection and prevention features.
In this tutorial, we will show you how the Web Proxy client provides different security and performance advantages when accessing the TMG web proxy server.
Building your own NAS system is a great way to secure and share data. This article will show you how to build this system.