July, 2007 Archive

How can I pre-cache the Microsoft Office 2007 installation files?

Office 2007 uses the MSOCACHE folder as part of its core installation and functionality process. The folder is typically populated during the Office 2007 installation. However, to avoid network activity during installation, you can accomplish a pre-cache by performing the following steps. (Use caret brackets in place of the square brackets.) 1. From the network […]

What’s the new transaction log size in Microsoft Exchange Server 2007?

The transaction log size in Exchange 2007 is now 1MB instead of 5MB, which was the transaction log size for Exchange 2003. The reason for the size reduction is related to the new log shipping clustering technologies in Exchange 2007. The smaller the log file means a smaller amount of data loss because you can’t […]

Extracting the SMS Installer Download on a Workstation

Extracting the SMS Installer-ISU integrated download (or, just the standard SMS Installer) requires that a SMS site server be present on the network connection. When the extraction intiates is asks for a valid server name and will check to see if its available. Say, you downloaded SMS Installer from home on a dial-up connection, what […]

I’m performance testing a proposed server configuration. To save disk space, I turned on circular logging and started running the Exchange Server Load Simulator (LoadSim) 2003 against my test servers, but I ended up with several dozen log files on each server. Why isn’t circular logging working?

If you read the Microsoft article “XADM: How Circular Logging Affects the Use of Transaction Logs” (http://support.microsoft.com/?kbid=147524) carefully, you’ll see that circular logging is working just fine. When it’s enabled, Exchange can reuse log files instead of creating new ones. Under typical circumstances, Exchange will create no more than five logs when you enable circular […]

How can I prevent someone from accessing event logs on my server through the network?

Windows automatically limits access to the Security log to only those users who have the Manage auditing and security log user right. However, guests can access the System and Application logs. To disable guest access to these logs, open a Group Policy Object (GPO), go to ComputerConfigurationWindows SettingsSecurity SettingsEvent LogSettings for Event Logs, and enable […]

Can you give me a good explanation of the differences between assigning someone as a delegate and giving him or her permission to a folder?

The main difference is that using Tools, Options and setting permissions on the Delegates tab also grants the delegate Send On Behalf Of permission on the mailbox in Active Directory (AD). The user can then send messages as if he or she were the mailbox owner, and the From line on such messages will read […]