Skip to main content

Travis Nielsen

Blogs from this Author

Review of Windows 2008 Failover Clustering

In keeping with the Windows Server 2008 theme, I’m posting my second PointCast, which covers some of the new features in failover clustering. It includes a demo in which I fail over an active node of a CCR cluster to a passive one located on a different IP subnet. This is something I wish we […]

Restoring Deleted User Objects with PowerShell

I recently posted a PointCast discussing Active Directory snapshots in Windows Server 2008. In it, I point out that one of the limitations of using snapshots is the fact that they can’t be used to recover deleted user objects. Fortunately, with PowerShell and a little bit of scripting knowledge you can create a convenient way […]

Overview of Active Directory Snapshot Functionality in Windows Server 2008

I have posted my first PointCast, which discusses a new feature in Windows Server 2008: Active Directory Snapshots. This is the first in a series I’m creating that takes a look at some of the new technologies to look forward to in the upcoming release of Windows Server. It clocks in at just under 10 […]

Building a Public Key Infrastructure: Trust is Everything

From time to time, the topic of Public Key Infrastructure (PKI) comes up both internally and with our customers. Usually, these conversations involve explaining or clarifying something that was read in a document somewhere or overheard in a previous discussion. It’s become apparent to me that in order to talk intelligently about PKI, a fair […]

The impact of IRM protected emails on desktop search and reading IRM on WM6 devices

A couple of interesting questions came up recently regarding Information Rights Management that I thought I’d write about. What is the impact of IRM-protected email on Outlook Instant Search and Windows Desktop Search? Emails protected with IRM cannot be indexed because the body of the message is encrypted. The header information is not encrypted, though, […]

Disabling Stationery in Outlook 2007 Using Active Directory Group Policy

Have you ever received an email from somebody formatted with stationery of…well, questionable taste? Don’t get me wrong, I love cowboys, swans, and Valentine’s Day as much as the next guy, but in most corporate environments this practice is frowned upon, if not completely banned. Stationery is distracting and can often lead to a negative […]

Information Rights Management Activation for Windows Mobile 6: Part I 1/2

I just read on good authority that Microsoft will soon release an updated version (6.1) of Device Manager for Vista over the next few weeks. As soon as I see this pop up on the ‘ol RSS feed, I’ll be testing this out. For kicks, I thought I’d post the machine certificate that is created […]

Information Rights Management Activation for Windows Mobile 6: Part I

This is my first post in a series discussing the use of Information Rights Management (IRM) functionality with Windows Mobile 6. I’m the fortunate owner of a recently upgraded T-Mobile Dash, so I figured I’d be a great candidate to start this out. Unfortunately, it looks like I’m going to need to wait a little […]

Load More