Microsoft has a nice wizard available that will create a full proof SPF record for your domain.
You can find the simple 4 step wizard here: http://www.microsoft.com/mscorp/safety/content/technologies/senderid/wizard/
To Register select a conference, then choose the number of attendees and press that Order It! button.
Third Tier staff are known for the depth of knowledge they bring to your business. At Brain Explosion 2012 they’ve developed some very practical sessions that will leave you empowered to deploy.
In this session, we will cut through the theory and dig in to how IPv6 impacts today’s business networks. Will will give you practical tools to understand IPv6, deploy and transition your network, and support an IPv6 infrastructure including DNS, DHCP, and coexisting with IPv4. Will will leave with a better understanding and a few “next steps” to help bring your networks forward with this exciting advancement in technology.
Active Directory is a complex and powerful system, and combined with the power and complexity of Group Policy it can be downright difficult to manage sometimes. Proper setup and configuration upfront can make management and troubleshooting of complex system like Active Directory (almost) simple. We will start this session by exploring some of the common topology mistakes when setting up Active Directory, and how proper topology layouts can make managing Group Policy much easier. Next we will dive deeper into some strategies behind planning your Group Policy deployments, and discuss some performance considerations when you create new policies. Finally you’ll learn how to create your own custom schema extensions to store custom information in Active Directory. I’ll show you how to use that schema extension knowledge to effortlessly, and automatically deploy and manage network printers to users in a completely new way.
Few small and midsized businesses that have clients in the medical, financial and legal professions are actually prepared to provide data to the courts in the event of a lawsuit or investigation. Those who have some measures in place still find e-discovery to be a very tedious process. In this session we’ll look at ways the Exchange 2010 feature set has made storing and retrieving archived emails easier and will also discuss some third-party solutions that have made compliance processes even easier.
Jeremy Brings forth the Encryption as he discusses BitLocker. Addressing the physical security of your network, including laptops and tablets Jeremy will discuss Bitlocker and how to Implement and deploy it in your Active Directory Domain. How to back up the recovery keys into AD DS using the BitLocker Active Directory Recovery Password Viewer tool, and how to recover data from a drive will be discussed and demonstrated. New features, including Network Unlock and Partial Drive Encryption that is available in Windows Server 8 and Windows 8 will be discussed. Learn how easy full disk encryption is to deploy and use in your networks, and the security that it brings to your clients knowing that if they have a device lost or stolen, that the data is secure from theft.
I discovered a dark tunnel on the Internet. The dark tunnel occurs when you search for the phrase “Group Policy An unknown error occurred while data was gathered for this extension. Details: Not Found” This phrase comes from the Computer and User Configuration settings pictured below when you run Group Policy Results to troubleshoot why a policy you have configured isn’t applying to a user or computer. When searching for this you get all kinds of complex difficult repairs that look pretty darn scary.
Fortunately there is a better way to get information on how to solve these problems. In group policy results look to the Policy Events tab.
Double clicking on the Folder Redirection error provides this information:
Now isn’t that a much nicer place to start from for your troubleshooting experience, rather than the dark tunnel Details: Not Found? Now we know that the location that our folders are attempting to redirect to is offline and that we can solve.
Several members of the Third Tier staff have been nominated for the 150 most influential in SMB. This award is sponsored by SMBTN and SMB Nation. There are many reasons why people are nominated for this recognition but all of them revolve around one thing: commitment to the IT community. At Third Tier, we are fortunate to also have many MVP’s on staff; another award for commitment to the IT community. You might say it’s in our blood.
This year members of our staff were the top travellers on the all volunteer SMB IT Community Roadshow, sponsored by HP, MIcrosoft and SBSMigration.com, hitting over 25 cities in total. It was a fun show and we got to meet lots of great IT professionals committed to small business. The tour showcased SBS, MultiPoint and Storage Server Essentials.
We’re also frequent speakers at usergroups all over the Country. You probably know us too from the many forums we participate in.
If you have appreciated the volunteer time that we put into the IT community I would encourage you to recognize the individuals below. It’s a little something that can mean a lot. While you are there be sure to browse around and also recognize the other volunteers that influenced you and your business this year too.
Here are the direct links to our nominations. Click the green arrow by our names to place your vote. You will be prompted to login to prevent voting fraud.
Amy Babinchak http://smb150.com/search.php?search=babinchak
Cliff Galiher http://smb150.com/search.php?search=cliff
Jeremy Anderson http://smb150.com/search.php?search=jeremy
Steven Banks http://smb150.com/story.php?title=steven-banks-1