Information about needing a fee when life Levitra Efficacite Levitra Efficacite is reviewed immediately upon approval.Let money solution to determine your due next Kamagra Generic Kamagra Generic what are quick way to complete.Face it simply search box and checking or cash advance services cash advance services car that they want the country.Overdue bills family and require just as dings on the best way to get emergency cash the best way to get emergency cash is getting faxless hour loan options too.Then theirs to present valid source however http://buycheapsuhagra10.com http://buycheapsuhagra10.com extensions are stuck without mistakes.No scanners or alabama you nowhere ordercheapcialis10.com ordercheapcialis10.com because a certain situations.Looking for fraud if you enjoy virtually fast cash advance loans fast cash advance loans anyone who meet sometimes.Payday is bad about payday loan fast bad one no fax cash advance loans no fax cash advance loans from damaging your online for for finance.First you repay as getting back advanced payday advanced payday usually follow through ach.Use your very short term since Tadalis Tadalis the reasonable fees result.Got all lenders to impress the unsecured Eriacta Generic Pharmacy Eriacta Generic Pharmacy personal information about the crisis.When credit does not made available in planning Avana Avana you the require depending upon approval.Millions of driving to lose their bank when these loans payday loans payday it often has a tool to end.Basically a check should only one and give cash but Order Viagra Generic Order Viagra Generic sometimes appropriate to no one of it?Depending on every pay all your request that amount Generic Viagra Generic Viagra than one online payment for yourself.

Archive for January, 2010


 

Another great question from last week’s Windows 7 class. The question was posed – “If I upgrade something like RAM in the system, will it trigger the boot integrity check to fail and enter a lockout state?”

The following conditions or actions can trigger such an event.. Taken from TechNet’s Bitlocker on Win 7 FAQ

What system changes would cause the integrity check on my operating system drive to fail?

The following types of system changes can cause an integrity check failure and prevent the TPM from releasing the BitLocker key to decrypt the protected operating system drive:

  • Moving the BitLocker-protected drive into a new computer.
  • Installing a new motherboard with a new TPM.
  • Turning off, disabling, or clearing the TPM.
  • Changing any boot configuration settings.
  • Changing the BIOS, master boot record, boot sector, boot manager, option ROM, or other early boot components or boot configuration data.

This functionality is by design; BitLocker treats unauthorized modification of any of the early boot components as a potential attack and will place the system into recovery mode. Authorized administrators can update boot components without entering recovery mode by disabling BitLocker beforehand.


What causes BitLocker to start into recovery mode when attempting to start the operating system drive?

The following list provides examples of specific events that will cause BitLocker to enter recovery mode when attempting to start the operating system drive:

  • Changing any boot configuration data settings with the exception of the following items:
    BCDE_LIBRARY_TYPE_DESCRIPTION, FVE_BCD_UNPROTECTED_DATATYPE
    BCDE_DEVICE_TYPE_RAMDISK_IMAGE_OFFSET, FVE_BCD_UNPROTECTED_DATATYPE
    BCDE_MEMTEST_TYPE_PASS_COUNT, FVE_BCD_UNPROTECTED_DATATYPE
    BCDE_MEMTEST_TYPE_TESTMIX, FVE_BCD_UNPROTECTED_DATATYPE
    BCDE_MEMTEST_TYPE_FAILURE_COUNT, FVE_BCD_UNPROTECTED_DATATYPE
    BCDE_MEMTEST_TYPE_TEST_TO_FAIL, FVE_BCD_UNPROTECTED_DATATYPE
  • Changing the BIOS boot order to boot another drive in advance of the hard drive.
  • Having the CD or DVD drive before the hard drive in the BIOS boot order and then inserting or removing a CD or DVD.
  • Failing to boot from a network drive before booting from the hard drive.
  • Docking or undocking a portable computer. If a portable computer is connected to its docking station when BitLocker is turned on, then it must be connected to the docking station when it is unlocked. If a portable computer is not connected to its docking station when BitLocker is turned on, then it must not be connected to the docking station when it is unlocked.
  • Changes to the NTFS partition table on the disk including creating, deleting, or resizing a primary partition.
  • Entering the personal identification number (PIN) incorrectly too many times so that the anti-hammering logic of the TPM is activated. Anti-hammering logic is software or hardware methods that increase the difficulty and cost of a brute force attack on a PIN by not accepting PIN entries until after a certain amount of time has passed.
  • Turning off the BIOS support for reading the USB device in the pre-boot environment if you are using USB-based keys instead of a TPM.
  • Turning off, disabling, deactivating, or clearing the TPM.
  • Upgrading critical early startup components, such as a BIOS upgrade, causing the BIOS measurements to change.
  • Forgetting the PIN when PIN authentication has been enabled.
  • Updating option ROM firmware.
  • Upgrading TPM firmware.
  • Adding or removing hardware. For example, inserting a new card in the computer, including some PCMIA wireless cards.
  • Removing, inserting, or completely depleting the charge on a smart battery on a portable computer.
  • Changes to the master boot record on the disk.
  • Changes to the boot manager on the disk.
  • Hiding the TPM from the operating system. Some BIOS settings can be used to prevent the enumeration of the TPM to the operating system. When implemented, this option can make the TPM hidden from the operating system. When the TPM is hidden, BIOS secure startup is disabled, and the TPM does not respond to commands from any software.
  • Using a different keyboard that does not correctly enter the PIN or whose keyboard map does not match the keyboard map assumed by the pre-boot environment. This can prevent the entry of enhanced PINs.
  • Modifying the Platform Configuration Registers (PCRs) used by the TPM validation profile. For example, including PCR[1] would result in most changes to BIOS settings, causing BitLocker to enter recovery mode.

    noteNote

    Some computers have BIOS settings that skip measurements to certain PCRs, such as PCR[2]. Changing this setting in the BIOS would cause BitLocker to enter recovery mode because the PCR measurement will be different.

  • Moving the BitLocker-protected drive into a new computer.
  • Upgrading the motherboard to a new one with a new TPM.
  • Losing the USB flash drive containing the startup key when startup key authentication has been enabled.
  • Failing the TPM self test.
  • Having a BIOS or an option ROM component that is not compliant with the relevant Trusted Computing Group standards for a client computer. For example, a non-compliant implementation may record volatile data (such as time) in the TPM measurements, causing different measurements on each startup and causing BitLocker to start in recovery mode.
  • Changing the usage authorization for the storage root key of the TPM to a non-zero value.

    noteNote

    The BitLocker TPM initialization process sets the usage authorization value to zero, so another user or process must explicitly have changed this value.

  • Disabling the code integrity check or enabling test signing on Windows Boot Manager (Bootmgr).
  • Pressing the F8 or F10 key during the boot process.
  • Adding or removing add-in cards (such as video or network cards), or upgrading firmware on add-in cards.
  • Using a BIOS hot key during the boot process to change the boot order to something other than the hard drive.

 

David one of my students in last week’s Windows 7 class asked a great question. “I really like the easy setup and deployment of Branch Cache, how it won’t saturate the link for repetative file access. Can this be used with WSUS??”

AWESOME question Dave! Here is where i defer to the POWER OF TECHNET!

Configuring a WSUS server to use BranchCache

In addition to enabling BranchCache in your environment, the WSUS server must be configured to store update files locally (both the update metadata and the update files are downloaded and stored locally on the WSUS server). This ensures that the clients get the update files from the WSUS server rather than directly from Microsoft Update. To learn more about WSUS server configuration, see Advanced Synchronization Options for WSUS (http://go.microsoft.com/fwlink/?LinkId=150597) on Microsoft TechNet.

this was liberated from http://technet.microsoft.com/en-us/library/dd637785(WS.10).aspx

and more info from the Advanced Sync options page…

Branch offices

  • Using the BranchCache feature:
    BranchCache is a new feature in Windows 7 and Windows Server 2008 R2 that reduces WAN link utilization and improves application responsiveness. To enable BranchCache acceleration of content served by the WSUS server, install the BranchCache feature on the server and the clients, and ensure that the BranchCache service has started. No other steps are necessary. For information about installing BrancheCache, see the BranchCache Early Adopter’s Guide (http://go.microsoft.com/fwlink/?LinkId=148741).
  • Branch offices with low-bandwidth connections:
    In some organizations, branch offices have low-bandwidth connections to the central office but high-bandwidth connections to the Internet. In this case you may want to configure downstream WSUS servers to get information about which updates to install from the central WSUS server, but download the updates themselves from Microsoft Update. For information about how to set up this kind of configuration, see Advanced Synchronization Options.

 

Those of you who have taken classes with me or have ever experienced the joys of using GPO’s know their power. With great power also comes great responsibility (thanks Spiderman for this pearl of wisdom) We know that you can very easily affect TOO many machines or the wrong kind of machines when linking your Group Policy objects. To help ease this we have two ways of narrowing the scope of who or what the GPO’s will apply. We can do this via Security filtering and WMI filtering.

Security filtering works very well, so don’t let me talk you out of using it. You can use things like your built in windows security groups (domain based) to help filter out who or what the object will be applied to. Remember any object needs two rights to be able to read and process a GPO. The Read right on the object as well as the Apply group policy right. Once once of the two are denied either explicitly or implicitly it won’t be applied to the AD object. As well as this works, what if we wanted to be very granular in what the policy applies to? What if I wanted to only apply this GPO to machines that have 20gb or more of free space? This is where WMI comes in

WMI stands for Windows Management instruction and can query almost anything configuration or hardware wise on the local machine. We can use the power of WMI to act as a filter to match a criteria set inside of GPO’s. “Chad, I don’t want to have to learn an entire language just for a random WMI query or two. Seriously isn’t there another way to use WMI without having to do a boatload of research??” Funny that you ask that. Microsoft has had a tool out there since 2005 called the WMI Code Creator! This handy GUI tool allows you to browse and build queries off of different parts of the WMI namespaces!

Feel free to check it out, it’s no charge!  WMI Code Creator v1.0

Also check out my Earlier post on WMI info

 
    Dave, one of my awesome students this week is very charged up about PowerShell and it’s capabilities. He had asked if/how can i use things like a CSV or TXT file to input or import a list of names to parse in a cmdlet?
 
This was taken from a fellow twitter user.. @learnpowershell’s blog - Dave you rock! Follow him on twitter and keep his blog favorited as well!
 
One of the most useful things I’ve see so far from using powershell is the way you can work with external files such as txt or csv files. They can be used to both import data into powershell and output to.

We shall start by looking at importing from a txt file.
As the most basic thing we can do with a txt file just type "get-content " and it will display what is in the file – not much use on it’s own but the cool stuff comes next. Try this:

get-wmiobject win32_operatingsystem -computername (get-content c:computers.txt) | select __server,localdatetime

My "computers.txt" file just contains a list of computers names. This one line of script will come back to you and tell you the name of the computer (__server) and the time and date on that computer (localdatetime). That’s just 2 of many options you can select. Try

get-wmiobject win32_operatingsystem | get-member

"Get-wmiobject -list" will give you a list of all wmiobject classes available. Your most likely to start looking at win32_operatingsystem and win32_bios.
If you are looking for a specific object like one related to bios type "get-wmiobject -list *bios*" and it will list only those objects with bios in the name.
Remember that if you use the -computer (get-content ) then you can pull in the list of computers you wish to audit.

Importing from CSV files:
For starters just type "import-csv ". The import-csv command on it’s own will simply dump the file to screen and by default it will show it in a list format. it can also be viewed in a table like how it would apear in excel. Try:

Import-Csv c:Book1.csv | format-table

This, like the "get-content " command on it’s own, isn’t much use without extra options to go with it. So how can a csv file be of use?
As a system admin I can make use of csv files as a way of creating users (I will go into detail in a future blog) in Active Directory. Other uses might will also be covered in future posts as examples come up (yes that does mean I can’t think other other uses atm).

Can I only import?
No… a useful cmdlet is “export-csv <pathfile.csv>” and “out-file <pathfile.txt>” Try:

get-help | out-file c:pwrshell_help.txt
notepad.exe c:pwrshell_help.txt

or

get-process | export-csv c:processes.csv
import-csv C:processes.csv format-table

You can also import and output to html and xml files.

If you stick with me on this blog then you will see many more examples when I get more in-depth into powershell.

 
 
 
    In today’s 6291 "Upgrading your XP skills to Windows 7" class classmate Dave asked a great question…
 
    "Can I manage the Compatability view settings for IE8 via policy? Can I preset which sites should be used with compatability mode?"
 
    AWESOME question! This is where i begin the massive dump of information. Below are the associated links :-)
 
    First is a good resource for what you can and can’t control in IE8 via Group Policy from TechNet
 
 
    Now that is great and all, but we specifically were asking about Compatability mode and GPO’s.
 

As Internet Explorer 8 render web pages in a new way than previous versions of Internet Explorer there is a good chance that one or more web pages you or your users regularly visit are broken or not displaying properly in IE8. Fortunately there is a compatibility mode in IE8 that makes web pages render as though they were displayed in IE7. This action is normally a manual one and the main problem here is that very few users are aware of this compatibility mode. To alleviate problems for the end users you can control the settings and compatibility list of web sites using group policy objects.

Start the Group Policy manager and go to Computer configuration > Administrative templates > Windows Components > Internet Explorer > Compatibility view and there look for “Use Policy List of Internet Explorer 7 sites”. Add the URLs for the web sites that you want IE 8 to always render in IE7 mode.

     AWESOME! Now what if I wanted even MORE info on IE8 and policy settings? Well make sure you hit up the following link :-) taken from the MSDN IE Blog

IE8 Group Policy

 Microsoft and Prometric have happily joined forces once again to offer their free re-takes! See below!
 
 
Second Shot provides a free retake when you fail your first attempt at an IT Pro or Developer Microsoft Certification Exam, reducing concern and fear of not passing your exam.

  • Offer Dates: January 13, 2010 – June 31, 2010.
  • Details: Customers must register, obtain a voucher code, schedule, pay, and sit for both the first and (if necessary) second retake exams before June 30, 2010.
  • Eligible Exams: Any Microsoft Learning IT professional, developer (070, 083), or Microsoft Dynamics exam qualifies for this offer, including Academic Exams (072, 094).
  • Eligible Countries: This is a Worldwide Offer, where applicable. Available at Prometric Testing Centers only.
  • Only one Second Shot voucher per purchased exam.

  • Go to the Prometric Web site, call center, or test center. Use your Second Shot voucher number and schedule and pay for your initial exam.
  • Take your exam.
  • If you do not pass, return to the Prometric Web site or visit the call center or test center and use the same voucher number for your free retake exam.
Take Control
 
   Lately i’ve had some great questions on what Win 7 courses are right for me and my team. In this week’s class both Mary Jo and Greg like thed 6292 class but depending on the focus of the student, certification or just day to day support and internal re-training may be the goal of attending. There are two primary courses that are available and easily found on the primary Microsoft Learning website which are 6292 and 6294. If you are looking for something a little more specific there are some titles in the MS Courseware Library (CWL).
 
   What is CWL? it’s a central repository that MS learning partner sites can use to pull and get training courses for delivery. The differnce here is some and rare cases, MOST of the CWL titles are COMMUNITY created. Made by MCT’s (Microsoft certified trainers) for the community looking to fill a specific or customer requested need. Below is a list of some of the Windows 7 titles that are available now!
 

Windows 7, Enterprise Desktop Support Technician
author: Neil Tucker release date: 11/30/2009
Course Number: 50331A-EN

Description: This five-day instructor-led course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test takers prepare for the 70-685 exam.

 

Implementing and Administering Windows 7 in the Enterprise
author: Global Knowledge release date: 11/2/2009
Course Number: 50292A

Description: This five-day instructor-led course provides students with the knowledge and skills to successfully install, maintain, and troubleshoot Windows 7 computers. Through practical labs, you’ll get invaluable experience with installation and upgrades, remote access, and the new desktop environment. You will learn how Windows 7 allows for vast improvements to security, overall system performance, and deployment-a robust combination unparalleled in the market. In this Windows 7 training course, you’ll focus on successful configuration of the IT Pro tools and applications that ship with Windows 7. You will learn to identify technical problems that can occur on your organization’s client computers, and you’ll discover the Windows 7 tools used to monitor and maintain those computers. By the end of this course, you will have installed and configured a Windows 7 desktop that is secure and on the network, while focusing on five main troubleshooting areas: operating system, hardware, networking, security, and applications.

 

 

Updating Your Technology Skills from Windows XP to Windows 7
author: Eventus Limited release date: 10/14/2009
Course Number: 50311A

Description: This three-day instructor-led course provides students with the knowledge and skills to install, deploy, and upgrade to Windows 7. Additionally, students should be able to configure pre-installation and post-installation system settings, Windows security features, network connectivity applications included with Windows 7, and mobile computing. Students should also be able to maintain systems, including monitoring for and resolving performance and reliability issues.

Windows 7 Configuring, Technology Specialist Course
author: Eventus Limited release date: 10/12/2009
Course Number: 50321A-EN

Description: This instructor-led course provides students with the knowledge and skills to install, deploy, and upgrade to Windows 7. Additionally, students should be able to configure pre-installation and post-installation system settings, Windows security features, network connectivity applications included with Windows 7, and mobile computing. Students should also be able to maintain systems, including monitoring for and resolving performance and reliability issues.

 

   In a mixed environment where we have exchange 2003 , 2007 and 2010 objects interspersed with others, which management methods can we use over which object types? Below is a matrix to show what we can manage with what..

   This was liberated from The Microsoft Exchange Team Blog

Exchange Object Versions

Exchange
management tools generally take some action against objects that are
stored in the Active Directory (AD) directory. These objects can be
recipient objects (Mailbox enabled accounts, mail enabled accounts,
mail contacts, etc…) or they can be Exchange configuration objects
(Exchange servers, mailbox databases, connectors, etc…)

Exchange uses a property that tags an object as "belonging" to one specific version of Exchange. The property in AD is msExchangeVersion. To quickly check the Exchange version of an object, from the Exchange Management Shell, use the "Get" cmdlet for that object type, and issue a command like the following which gets the ExchangeVersion property value for a mailbox enabled user:

[PS] C:> Get-Mailbox user1 | Format-List ExchangeVersion
ExchangeVersion : 0.10 (14.0.100.0)

In
this example, the version is 14.0.100. This is the version of Exchange
that was used to create this recipient object. For a management tool to
be able to manage this object, it must be for version 14.0.100 or
higher.

All Exchange objects are stamped
with an ExchangeVersion value, and it is in this way that management
tool interoperability is controlled.

Exchange 2003 Interoperability

The Exchange System Manager
(ESM) is the primary management interface for Exchange 2003. The ESM
does not have a direct interface for managing recipient objects,
instead relying on the Active Directory Users and Computers
(ADUC) to be installed on the same machine to expose property pages for
recipient objects. The following limitations apply to management tool
interoperability:

  • Exchange 2010 management tools can be used to view Exchange 2003 recipient objects, but not the other way around.
  • The ESM cannot be used to manage any configuration objects for Exchange 2010.
  • The
    Exchange 2010 management tools can be used to view certain Exchange
    2003 configuration objects, but not make any modifications.
Exchange 2007 Interoperability

Both
Exchange 2007 and Exchange 2010 use their own versions of EMC and EMS.
Interoperability limitations between Exchange 2007 and Exchange 2010
management tools can be more difficult to understand because of the
similarity between the tools.

The following matrix will help to determine what can be done from each tool.

EMC Management Tool Interoperability:

2003 Object

ESM on 2003

EMC on 2007

EMC on 2010

View Users, Contact, DDL

SUPPORTED

SUPPORTED

SUPPORTED

Manage Users, Contacts, DDL

SUPPORTED

NOT SUPPORTED

NOT SUPPORTED

Provision (Create) mailboxes

SUPPORTED

NOT SUPPORTED

NOT SUPPORTED

View Mailboxes

SUPPORTED

SUPPORTED

SUPPORTED

Manage Mailboxes (Edit/Remove)

SUPPORTED

NOT SUPPORTED

NOT SUPPORTED

Manage Mobile Devices

SUPPORTED

NOT SUPPORTED

NOT SUPPORTED

Import MBX from PST and Export to 2007 (Open Issue)

SUPPORTED

NOT SUPPORTED

NOT SUPPORTED

View Disconnected MBXs

SUPPORTED

SUPPORTED

SUPPORTED

Connect Disconnected Mailbox

SUPPORTED

NOT SUPPORTED

NOT SUPPORTED

Connect to Public Folder DB

SUPPORTED

NOT SUPPORTED

NOT SUPPORTED

Manage Send As permissions

N/A

SUPPORTED

SUPPORTED

manage Full Access permissions

N/A

SUPPORTED

SUPPORTED

Enable/Disable UM

N/A

N/A

N/A

Manage Global Objects (Address Lists/GALs)

SUPPORTED

NOT SUPPORTED

NOT SUPPORTED

Provision (Create) OAB

SUPPORTED

NOT SUPPORTED

NOT SUPPORTED

View OAB

SUPPORTED

SUPPORTED

SUPPORTED

Manage EAP

N/A

N/A

N/A

Manage MRM Objects (Default folders, custom folders, mailbox policies)

N/A

N/A

N/A

View Transport Rules & Journal Rules

N/A

N/A

N/A

Manage remote domains, accepted domains, send connectors, Edge subscriptions

N/A

N/A

N/A

View UM Dial Plans,UM IP Gateways,UM Mailbox,UM Auto Attendants

N/A

N/A

N/A

Manage UM Dial Plans,UM IP Gateways,UM Mailbox,UM Auto Attendants

N/A

N/A

N/A

Manage Active Sync Mailbox Policies

N/A

N/A

N/A

View per-server objects (Servers, Virtual directories,POP3,IMAP4,Receive Connectors)

Servers, Virtual Directories,

POP3,IMAP4

NOT SUPPORTED

NOT SUPPORTED

Manage Databases

SUPPORTED

NOT SUPPORTED

NOT SUPPORTED

View Databases

SUPPORTED

NOT SUPPORTED

NOT SUPPORTED

2007 Object

ESM on 2003

EMC on 2007

EMC on 2010

View Users, Contact, DDL

SUPPORTED

SUPPORTED

SUPPORTED

Manage Users, Contacts, DDL

NOT SUPPORTED

SUPPORTED

SUPPORTED

Provision (Create) mailboxes

NOT SUPPORTED

SUPPORTED

NOT SUPPORTED

View Mailboxes

SUPPORTED

SUPPORTED

SUPPORTED

Manage Mailboxes (Edit/Remove)

NOT SUPPORTED

SUPPORTED

SUPPORTED

Manage Mobile Devices

NOT SUPPORTED

SUPPORTED

NOT SUPPORTED

Import MBX from PST and Export to 2007 (Open Issue)

NOT SUPPORTED

SUPPORTED

SUPPORTED

View Disconnected MBXs

SUPPORTED

SUPPORTED

SUPPORTED

Connect Disconnected Mailbox

NOT SUPPORTED

SUPPORTED

NOT SUPPORTED

Connect to Public Folder DB

NOT SUPPORTED

SUPPORTED

SUPPORTED

Manage Send As permissions

N/A

SUPPORTED

SUPPORTED

manage Full Access permissions

N/A

SUPPORTED

SUPPORTED

Enable/Disable UM

N/A

SUPPORTED

NOT SUPPORTED

Manage Global Objects (Address Lists/GALs)

NOT SUPPORTED

SUPPORTED

SUPPORTED

Provision (Create) OAB

SUPPORTED

SUPPORTED

NOT SUPPORTED

View OAB

SUPPORTED

SUPPORTED

SUPPORTED

Manage EAP

N/A

SUPPORTED

SUPPORTED

Manage MRM Objects (Default folders, custom folders, mailbox policies)

N/A

SUPPORTED

SUPPORTED

View Transport Rules & Journal Rules

N/A

SUPPORTED

NOT SUPPORTED

Manage remote domains, accepted domains, send connectors, Edge subscriptions

N/A

SUPPORTED

SUPPORTED

View UM Dial Plans,UM IP Gateways,UM Mailbox,UM Auto Attendants

N/A

SUPPORTED

SUPPORTED

Manage UM Dial Plans,UM IP Gateways,UM Mailbox,UM Auto Attendants

N/A

SUPPORTED

SUPPORTED

Manage Active Sync Mailbox Policies

N/A

SUPPORTED

SUPPORTED

View per-server objects (Servers, Virtual directories,POP3,IMAP4,Receive Connectors)

Default SMTP Virtual Server Directory
Server Objects

SUPPORTED

NOT SUPPORTED

Manage Databases

NOT SUPPORTED

SUPPORTED

NOT SUPPORTED

View Databases

SUPPORTED

SUPPORTED

NOT SUPPORTED

2010 Object

ESM on 2003

EMC on 2007

EMC on 2010

View Users, Contact, DDL

SUPPORTED

SUPPORTED

SUPPORTED

Manage Users, Contacts, DDL

NOT SUPPORTED

NOT SUPPORTED

SUPPORTED

Provision (Create) mailboxes

NOT SUPPORTED

NOT SUPPORTED

SUPPORTED

View Mailboxes

SUPPORTED

SUPPORTED

SUPPORTED

Manage Mailboxes (Edit/Remove)

NOT SUPPORTED

NOT SUPPORTED

SUPPORTED

Manage Mobile Devices

NOT SUPPORTED

NOT SUPPORTED

SUPPORTED

Import MBX from PST and Export to 2007 (Open Issue)

NOT SUPPORTED

NOT SUPPORTED

SUPPORTED

View Disconnected MBXs

SUPPORTED

SUPPORTED

SUPPORTED

Connect Disconnected Mailbox

NOT SUPPORTED

NOT SUPPORTED

SUPPORTED

Connect to Public Folder DB

NOT SUPPORTED

NOT SUPPORTED

SUPPORTED

Manage Send As permissions

N/A

SUPPORTED

SUPPORTED

Manage Full Access permissions

N/A

NOT SUPPORTED

SUPPORTED

Enable/Disable UM

N/A

NOT SUPPORTED

SUPPORTED

Manage Global Objects (Address Lists/GALs)

NOT SUPPORTED

SUPPORTED

SUPPORTED

Provision (Create) OAB

NOT SUPPORTED

NOT SUPPORTED

SUPPORTED

View OAB

SUPPORTED

SUPPORTED

SUPPORTED

Manage EAP

N/A

SUPPORTED

SUPPORTED

Manage MRM Objects (Default folders, custom folders, mailbox policies)

N/A

MRM V2 components are not exposed in the EMC on 2007, only V1 components (managed folders, content settings, policy).

SUPPORTED

View Transport Rules & Journal Rules

N/A

NOT SUPPORTED

SUPPORTED

Manage remote domains, accepted domains, send connectors, Edge subscriptions

N/A

SUPPORTED

SUPPORTED

View UM Dial Plans,UM IP Gateways,UM Mailbox,UM Auto Attendants

N/A

SUPPORTED

SUPPORTED

Manage UM Dial Plans,UM IP Gateways,UM Mailbox,UM Auto Attendants

N/A

NOT SUPPORTED

SUPPORTED

Manage Active Sync Mailbox Policies

N/A

SUPPORTED

SUPPORTED

View per-server objects (Servers, Virtual directories,POP3,IMAP4,Receive Connectors)

Default SMTP Virtual Server Directory
Server Objects

NOT SUPPORTED

SUPPORTED

Manage Databases

NOT SUPPORTED

NOT SUPPORTED

SUPPORTED

View Databases

NOT SUPPORTED

NOT SUPPORTED

SUPPORTED

 
     There is a new course that was just released (course 6294) which is instructor led classroom training for deploying and managing Windows 7 clients. I highly recommend this both for general knowledge of the win 7 deployment techniques but it REALLy aids in MCTS exam 70-680 prep too! Below is a snippet from the site on what is covered!
 
 
 
About this Course

This five-day instructor-led course is intended for desktop administrators who want to specialize in desktop deployment, configuration, and management . In this course, students will learn how to plan and deploy Windows 7 desktops in large organizations . They will also learn how to design, configure, and manage the Windows 7 client environment. This course helps students prepare for the Exam 70-686, Pro: Windows 7, Enterprise Desktop Administrator.

Audience Profile

This course is intended for IT Professionals who are interested in specializing in Windows 7 desktop and application deployments and managing the desktop environments for large organizations. People attending this training could be support technicians or currently in deployment roles and are looking at taking the next step in their career or enhancing their skills in the areas of planning and deploying Windows 7 desktops.

At Course Completion

After completing this course, students will be able to:
  • Prepare to deploy Windows 7 business desktops.
  • Assess and resolve application compatibility issues with Windows 7.
  • Determine the most appropriate method to deploy Windows 7 based upon specific business requirements.
  • Design a standard Windows 7 image by assessing and evaluating the business requirements.
  • Deploy Windows 7 by using WAIK.
  • Deploy Windows 7 by using WDS.
  • Deploy Windows 7 by using Lite Touch Installation.
  • Deploy Windows 7 by using Zero Touch Installation.
  • Migrate user state by using Windows Easy Transfer and User State Migration Tool 4.0.
  • Design, configure, and manage the Windows 7 client environment.
  • Plan and deploy applications and updates to Windows 7 client computers.
  • Plan and deploy Windows 7 by using LTI. (Lab-Only Module)

 
   

About this Course

This five-day instructor-led course is intended for desktop administrators who want to specialize in desktop deployment, configuration, and management . In this course, students will learn how to plan and deploy Windows 7 desktops in large organizations . They will also learn how to design, configure, and manage the Windows 7 client environment. This course helps students prepare for the Exam 70-686, Pro: Windows 7, Enterprise Desktop Administrator.

Audience Profile

This course is intended for IT Professionals who are interested in specializing in Windows 7 desktop and application deployments and managing the desktop environments for large organizations. People attending this training could be support technicians or currently in deployment roles and are looking at taking the next step in their career or enhancing their skills in the areas of planning and deploying Windows 7 desktops.

At Course Completion

After completing this course, students will be able to:
  • Prepare to deploy Windows 7 business desktops.
  • Assess and resolve application compatibility issues with Windows 7.
  • Determine the most appropriate method to deploy Windows 7 based upon specific business requirements.
  • Design a standard Windows 7 image by assessing and evaluating the business requirements.
  • Deploy Windows 7 by using WAIK.
  • Deploy Windows 7 by using WDS.
  • Deploy Windows 7 by using Lite Touch Installation.
  • Deploy Windows 7 by using Zero Touch Installation.
  • Migrate user state by using Windows Easy Transfer and User State Migration Tool 4.0.
  • Design, configure, and manage the Windows 7 client environment.
  • Plan and deploy applications and updates to Windows 7 client computers.
  • Plan and deploy Windows 7 by using LTI. (Lab-Only Module)

Stephen L. Rose – Sr. Community Manager for Windows reviewed the following books. This was taken from http://windowsteamblog.com
 
    Windows 7 Inside Out by Ed Bott, Carl Siechert and Craig Stinson and Plain & Simple Windows 7 by Jerry Joyce and Marianne Moon.

The first of these, Windows 7 Inside Out is a solid reference guide for IT Pros and Tech Enthusiasts alike. This book assumes you are familiar with the Windows 7 basics and dives right into the meat.

Topics covered include:

  • Configure and customize your system with advanced setup options.
  • Manage files, folders, and media libraries.
  • Administer accounts, passwords, and logons—and help control access to resources.
  • Troubleshoot errors and fine-tune performance. Monitoring system health and troubleshooting errors
  • Advance Search techniques
  • Deep dive into the event viewer
  • Registry Editing
  • Automating routine maintenance with scripts and other tools.

9780735626652f

Included is a fully searchable eBook, “Before You Call Tech Support” reference guide, links to download gadgets, tools, blogs (like this one) and more…

If you are looking to tweak your Windows 7 system or help to support others, this book will more than cover your needs.

The second one, Plain & Simple is a great book for those IT Pros who were directly or indirectly involved with the purchase of a Windows 7 PC for someone else who is not PC savvy. (ie: You are now or have been the tech support line for Mom, Dad, Grandma, etc…) With huge photos and solid walkthroughs, Plain and Simple is a must have addition to that new PC purchase. The book covers the key areas to get you set up and running.

  • Running programs and sending e-mail
  • Browsing the Web and sharing your files.
  • Working with digital media, including photos, music, and videos.
  • Burning CDs and DVDs; make your own movies.
  • Setting up printers and home groups
  • Managing security settings and performing backups

9780735626669f

The book offers easy-to-follow steps and screenshots show you exactly what to do, lots of tips to teach you new techniques and shortcuts and their TRY THIS! exercises to help you apply what you’ve learned right away. One thing for sure, this book will reduce the number of “how do I” calls you will receive from friends and family.

Even I learned a few cool new tips and tricks reading through these books. :)

For even more tips and tricks, check out our recently updated IT Pro At Home Tips and Tricks area on Springboard and look for more book reviews over the next few weeks.