This post by David Papkin about Virtual Networks using Microsoft Azure Virtual Networks (VNets) in Microsoft Azure are network overlays that you can use to configure and control connectivity between virtual machines (VMs) and PaaS cloud service roles. You can use…
Configuring Mailbox Servers in Exchange 2013 by David Papkin
This post by David Papkin is about configuring Mailbox Servers in Microsoft Exchange 2013. The key component of the Microsoft® Exchange Server 2013 infrastructure is the Mailbox server, which hosts mailbox databases and addresses books, handles message transport and routing,…
Deploying and Managing Microsoft Exchange Server 2013
Exchange Server 2013 is the current version of Microsoft’s email and collaboration suite. It is a successor to Microsoft® Exchange Server 2010. Exchange Server 2013 offers many enhancements in architecture, functionality, and features for both administrators and end users. To successfully implement…
Configuring Users and Rights in Microsoft Lync Server 2013
To configure and manage users in Microsoft® Lync® Server 2013, you can use a variety of methods. Lync Server 2013 provides configuration management options, including Lync Server Control Panel and Lync Server Management Shell. You can use basic syntax for…
Deploying Microsoft Lync 2013
Lync Server 2013 Topology Setup Process Your deployment process for Lync Server 2013 is determined by the Lync Server 2013 topology and the components that you plan to install. The deployment process also depends on whether you plan to deploy…
Unable to remove failed disk error when configuring a Redundant Storage Space in Windows Server 2012 R2
This post is about how to remove a failed disk after the volume is in use and you have to replace it by adding another disk to the storage pool. 1) PS C:Usersadministrator.ADATUM> get-physicalDisk FriendlyName CanPool OperationalStatus HealthStatus Usage Size…
Planning and Configuring Role-Based Administration in SCCM 2012 R2
Microsoft® System Center 2012 Configuration Manager and System Center 2012 R2 Configuration Manager implement role-based access control (RBAC). With RBAC, you can use security roles, security scopes, and collections to define access permissions for your administrative users. Overview of Role-Based Administration…
Discovering and Organizing Resources in System Center 2012 R2 Configuration Manager
You can manage computer and user resources within a System Center 2012 R2 Configuration Manager environment only when Configuration Manager has discovered these resources and assigned them to a site. In this post , you will learn about boundaries and boundary…
Overview of System Center 2012 R2 Configuration Manager SCCM
System Center 2012 R2 Configuration Manager is a user-centric product that focuses on the management of users and the devices they have rather than the management of devices and the people who use them. You can use System Center 2012…
Implementing Virtual Machines using Microsoft IaaS by David Papkin
This post by David Papkin is about Implementing Virtual Machines using Microsoft Azure IAAS Infrastructure as a Service Running a server or virtual machine in your on-premises datacenter requires you to bear all the capital expenses and maintenance costs of…