Understanding Messaging Services Objects The BizTalk Messaging Configuration Object Model is the component of BizTalk Server that is used in the document processing processes. You need to use the BizTalk Messaging Manager to configure objects in the BizTalk Messaging Configuration Object Model. The different objects that you can configure in the BizTalk Messaging Configuration Model are listed here: BizTalkConfig object; used to create/configure the following BizTalk Server objects: Document specifications Messaging ports Channels BizTalkOrganization object; holds the attributes on the organization. BizTalk Document object; holds the attributes on the document Read More
Active Directory Security Principal Accounts
Understanding Active Directory Security Principal Accounts Active Directory consists of a considerable number of objects, and variety of objects, of which, security principal accounts are one. Security principal accounts are Active Directory objects that are assigned unique security identifiers (SIDs), and are therefore used in authentication and Active Directory security. A security principal account can be defined as a user account, group account, or computer account that is assigned a SID, and is also assigned permissions to access certain network resources or Active Directory objects, and to perform certain actions Read More
SSL (Secure Sockets Layer)
An Overview on Secure Sockets Layer (SSL) The Secure Sockets Layer (SSL) protocol was developed by Netscape Communications, and enables secure communication over the Internet. SSL works at the transport layer of Transmission Control Protocol/Internet Protocol (TCP/IP), which makes the protocol independent of the application layer protocol functioning on top of it. SSL is an open standard protocol and is supported by a range of both servers and clients. SSL can be utilized for the following: Encrypt Web traffic using Hypertext Transfer Protocol (HTTP). When HTTP is utilized together with Read More
0x800a138f Windows Update Error
The causes of the “0x800a138f Windows Update Error” are plentiful, and there are quite a number of ways to go about fixing this problem. The steps used to repair this error, are similar to the steps completed to repair the 0x800a0007 Windows Update Error. These steps include correcting the date and time settings, the language settings, and disabling an antivirus or firewall program. Having the wrong computer settings will produce the “0x800a138f Windows Update Error.” The simplest computer settings to change will be correcting the date and time settings. You Read More
Monitoring and Troubleshooting DNS
Monitoring DNS with the DNS Console The DNS management console includes functionality that enables you to use the console to monitor DNS activity: Event Logging tab: You can access the Event Logging tab located within the Properties dialog box of the DNS server to specify the DNS events that you want to monitor. Through the Event Logging tab, you can limit the events which are written to the DNS Events log. Monitoring tab: The Monitoring tab is also located within the Properties dialog box of the DNS server. This tab Read More
How to Configure IIS to Host a Web Page
IIS (Internet Information Services) is an easy to use web server from Microsoft. It is not installed on Windows XP Professional by default. However, it is installed when the user upgrades from Windows NT or Windows 2000 to Windows XP Pro. IIS can be installed as follows: Click Start, click Control Panel, and double-click Add/Remove Programs. The Add/Remove Programs application starts. In the left column of the Add/Remove Programs dialog box, click Add/Remove Windows Components. When the Windows Components Wizard appears, click Next. In the Windows Components list, select IIS. Read More
Managing ISA Server in the Enterprise
Managing and Configuring ISA Server Arrays The ISA Server Enterprise Edition provides integration with the Active Directory and additional benefits and features such as centralized server management, multiple levels of access policy, server clustering through arrays, fault-tolerant, and the increased efficiencies of hierarchical and distributed caching. The ISA Server Enterprise Edition uses Cache Array Routing Protocol (CARP) to provide scaling and improve efficiency. When you install multiple ISA Server computers, ISA Servers are automatically installed in arrays. The array of ISA Servers is then treated as a single logical cache. Read More
Managing IIS 5.0 and IIS 6.0
IIS Administration Tools and Methods. The administration methods and management tools which you can use to administer IIS are listed below: Microsoft Management Console (MMC) tools under the Administrative Tools Menu. The primary MMC used to administer IIS is the IIS Manager (see below). You can also use the Computer Management console to perform administration tasks for IIS. The Computer Management console can be opened from the Administrative Tools Menu. To access the Internet Information Services (IIS) node in the Computer Management console, expand the Services And Applications node in Read More
Winlogon Exe Error
Windows computer users may sometimes encounter the Winlogon exe error. When this occurs, the error is displayed and a blue screen of death (BSOD) with a secondary message similar to: “The instruction at xxxx referenced memory at xxxxx is also displayed. The memory could not be read.” The BSOD is prevented on newer Windows OS versions, but other problems that may require a computer restart will occur. What are Winlogon Exe Error’s Symptoms? The Winlogon exe error usually triggers the BSOD on Windows XP and older Windows OS versions. On Read More
Implementing Auditing
Auditing Overview Auditing enables you to determine which activities are occurring on your system and allows you to track access to objects, files and folders; and modifications made to the objects, files and folders. Auditing also enables you to collect information associated with resource access and usage on your system by allowing you to audit system logon, file access, and object access. Security auditing events are written to the Security log of the system and can be accessed from the Event Viewer tool. Because event logs grow over time and Read More
Share on: