Real Admins Use the Command Line--Windows IT Pro UPDATE, February 6, 2007
In This Issue * Real Admins Use the Command Line * From the Community:
FAQ: Vista Sleep Modes
Featured Forums * Simplify IT Asset Management
==================== THESE ADVERTISERS HELP US TO BRING YOU WINDOWS IT PRO UPDATE FREE OF CHARGE.
NETWORK TESTING LABS COMPARES ARGENT TO MOM 2005
Rackspace: Now Introducing Managed Exchange! http://www.rackspace.com/promo/februaryexchange.php?CMP=windowsitpro_middleposition_feb_exchange
Free White Paper: Address the Insider Threat
Sponsor: Argent Software
NETWORK TESTING LABS COMPARES ARGENT TO MOM 2005 Network Testing Labs, one of the world's leading independent research companies, concluded that "Argent's suite had a smaller footprint, was more scalable, supported more platforms, had a more responsive and intuitive user interface and gave us more useful reports," the report says. "Argent's suite of monitoring products emerged from our testing with flying colors."
Download this FREE Comparison Paper now: http://www.argent.com/w/whitepapers_mom.html?Source=WNT
***Commentary: Real Admins Use the Command Line
by Paul Thurrott, News Editor, [email protected]
When Microsoft was freely handing out certifications back in the mid-1990s to anyone with a pen and a heartbeat, there was a real concern that Microsoft's certification program would become a joke, offering no real benefits to the certifiers or certified. And, of course, that's exactly what happened. So Microsoft overhauled its certification program, made the tests and certifications more meaningful, and turned things around. But there's still a strange stigma hanging over the heads of Windows-based administrators, who are often perceived as being less technical, less knowledgeable, and in some cases, even less employable than their UNIX counterparts
Well, those days are coming to a close. Through a strange series of coincidences, Microsoft appears to have warmed to the UNIX-style command line interfaces that inspired the company to earlier go in a completely different direction with the GUI-based administration tools we're familiar with in Windows. Part of this shift is common sense: Many repetitive administrative tasks need to be scriptable so that they can be completed more efficiently. Part of it was the rise of XML, a text-based descriptive markup language that is both standards-based and malleable from within text editors and scripts. And part of it, of course, is the maturity of Windows-based servers. Once Microsoft hit the high points, from a functional standpoint, the company naturally began looking to fill in the areas in which its server products still lagged behind the UNIX and UNIX-like competition.
Let's look at three examples of how Microsoft's new command-line religion is dramatically changing its products--and for the better.
I've written a lot about Microsoft Exchange Server 2007, Microsoft's latest messaging server. There's a lot to like about Exchange 2007, from its roles-based administration model and componentized design to its x64-based scalability to its comprehensive security features. But to me, the most impressive change in Exchange 2007 is that the server was completely designed around the Windows PowerShell (formerly code-named Monad) command line and scripting environment. Like a UNIX server, Exchange 2007's GUI tools were built on top of this command-line interface, and not vice-versa as with earlier Microsoft solutions. This is a revolutionary change, and one that administrators will immediately benefit from as they discover the rich capabilities of PowerShell.
The next version of Windows Server, codenamed Longhorn, includes a new Server Core installation option that dispenses with the Windows GUI all together and provides a base line of functionality that's perfect for infrastructure servers such as DNS, DHCP, and so on. What's truly interesting about Server Core, however, is that it represents the logical conclusion of Microsoft's "secure by design, secure in deployment" mantra: Because Longhorn is componentized, Server Core, like all other Longhorn installation types, includes only that code needed to generate the services it supplies. It is, quite literally, as secure as it can be. By stripping Windows to its most basic parts, Microsoft has limited what the server can do, but it's also limited what can go wrong. Humorous bit: When Microsoft demonstrates this feature publicly, it routinely gets rowdy applause from admin crowds. You guys are such geeks.
Finally, even Vista gets into the command-line interface game, sort of. You might recall that earlier Windows versions used a simple boot.ini file to determine the configuration of the system on boot up. Although this behavior was determined by a text file, it was controlled via a GUI tool in the System Properties dialog box. In Vista (as in Longhorn Server), boot.ini has been replaced by a boot file named Boot Configuration Data (BCD). It's locked down, so you can't edit it easily, and Microsoft--get this--supplies only a command-line tool, bcdedit.exe, for editing BCD features. BCD comes with a new set of terminology, naturally, and if you want to set options such as the boot manager timeout or which OS options appear in the menu, you'll need to grok the command line. (I do expect, however, that enterprising admins will construct GUI front-ends to this.)
What this all means for Windows-based administrators is that it's time to bone up on your typing and scripting skills. There's a brave new world out there, and if you want to take advantage of it, you'll need to leave the familiarity and comfort of the Windows GUI behind.
==================== Sponsor: Rackspace
Rackspace: Now Introducing Managed Exchange!
Rackspace's Managed Exchange: The kind of Exchange you always wished for! Managed Microsoft Exchange by Rackspace is more than a technology solution. It's a service solution, too - designed to make messaging and collaboration as simple and as flexible as possible. It's what happens when the world's most widely used messaging and collaboration tool meets the power of Fanatical Support(TM). You get the full functionality of Exchange 2003 minus the worry of having to constantly support it. When you purchase a managed hosting solution, get Exchange for free for the rest of the month. http://www.rackspace.com/promo/februaryexchange.php?CMP=windowsitpro_middleposition_feb_exchange
***From the Community FAQ: Vista Sleep Modes
by John Savill, http://www.windowsitpro.com/windowsnt20002003faq
Q: What's the different between Windows Vista's sleep and hybrid sleep modes?
Find the answer at http://www.windowsitpro.com/Articles/ArticleID/95044/95044.html
------ Have a question? Got answers? Join your peers in the Windows IT discussion forums: http://forums.windowsitpro.com/web/forum/default.aspx?forumid=8
Current Threads in the Windows XP forum (http://forums.windowsitpro.com/web/forum/categories.aspx?catid=36&entercat=y ):
Domain Computer Cannot Access Domain Shares?
Windows XP File Sharing
Microsoft Data Link
Results of Previous Poll:
The voting has closed in Windows IT Pro's nonscientific Instant Poll for the question, "Have you tested your disaster recovery plan (DRP)?" Here are the results from the 428 votes:
- 32% Yes, we test our DRP regularly
- 7% Yes, we tested our DRP when we developed it
- 17% We have a DRP, but we haven't tested it
- 17% No, we're still working on our DRP
- 26% No, we don't have a DRP New Instant Poll
The next Instant Poll question is, "When will your organization deploy Vista?" Go to the Windows IT Pro home page and submit your vote for a) Within 6 months, b) Within 12 months, c) Within 18 months, d) Already deployed it, or e) Have no plans to deploy it.
~~~~ Hot Spot: ~~~~
Free White Paper: Address the Insider Threat
Learn how to develop a comprehensive management system that virtually eliminates the risk of an insider threat. Co-authored by NetIQ and Dr. Eric Cole, this informative white paper identifies the key business processes that must be secured and ready to build a solution to contain the insider threat
***New and Improved
by Blake Eno, [email protected]
Simplify IT Asset Management RTO Software announced a new product, RTO Discover, which maintains asset information and inventory of hardware and software. This includes software license tracking capabilities that provides information on deployment locations, number of licenses, when they expire, and the users who have been assigned to the licenses. You can also use RTO Discover for dependency maps, which let you obtain blueprints of relationships between servers, applications, and resources. The software also provides different views of your infrastructure, providing an infrastructure view, configuration view, and application view. RTO Discover is slated to be available for purchase in March 2007 or earlier. For more information, contact RTO Software at 678-987-4300 or 866-987-2900.
http://www.rtosoft.com Tell Us About a Hot Product and Get a T-Shirt!
Have you used a product that changed your IT experience by saving you time or easing your daily burden? Tell us about the product, and we'll send you a T-shirt if we write about the product in a future Windows IT Pro What's Hot column. Send your product suggestions with information about how the product has helped you to mailto:[email protected]
==== Events and Resources ==== http://www.windowsitpro.com/go/researchit Do you know the clues and secrets to effective disaster recovery? Lucky mates will win a Weekly Prize of a $25 Best Buy Gift Card or a Grand Prize of a $100 Best Buy Gift Card. Find the buried treasure by uncovering the secrets to Web filtering. Complete this quiz correctly and you could be a winner!
Do you want to create a fast, user-friendly, reliable, secure, and scalable backup strategy for your small-to-midsized business? Download this free white paper today and learn how you can break away from tape and move to disk-based data protection.
How do you manage security vulnerabilities? If you depend on vulnerability assessments to determine the state of your IT security systems, you can't miss this Web seminar. Special research from Gartner indicates that deeper penetration testing is needed to augment your existing vulnerability management processes. Learn more today!
Can you really trust users to protect critical business data on their PCs? One in three users write down their passwords, putting even encrypted data at risk. True PC data protection requires organizational control of data. Download this free white paper today to find out how to accomplish your PC data security goals without inhibiting employee productivity.
Windows Connections 2007 April 1-4, 2007, Hyatt Regency Grand Cypress in Orlando, Florida. Dive into the new releases as Microsoft architects and industry experts present over 150 sessions! For more details, call 800-505-1201 or 203-268-3204. http://www.winconnections.com
==== Featured White Paper ====
Learn the 7 critical email problems to watch for and how to prevent them. Find out how to better manage your email environment, including your disaster recovery, compliance, data storage, security, and wireless devices. Download this free white paper today.
===== Announcements ====
Introducing a Unique Exchange and Outlook Resource Exchange & Outlook Pro VIP is an online information center that delivers new articles every week on topics such as administration, migration, security, and performance. Subscribers also receive tips, cautionary advice, direct access to our editors, and a host of other benefits! Order now at an exclusive charter rate and save up to $50!
Grab Your Share of the Spotlight! Nominate yourself or a peer to become IT Pro of the Month. This is your chance to get the recognition you deserve! Winners will receive over $600 in IT resources and be featured in Windows IT Pro. It's easy to enter--we're accepting March nominations now, but only for a limited time! Submit your nomination today:
==== Contact Us ====
About the newsletter -- [email protected] About technical questions -- http://www.windowsitpro.com/forums About product news -- [email protected] About your subscription -- [email protected] About sponsoring UPDATE -- [email protected]
This email newsletter is brought to you by Windows IT Pro, the leading publication for IT professionals deploying Windows and related technologies. Subscribe today!
Subscribe to this newsletter at
Make sure your copy of Windows IT Pro UPDATE doesn't get mistakenly blocked by antispam software! Be sure to add [email protected] to your list of allowed senders and contacts.
Manage Your Account You are subscribed as %%$email%%
You are receiving this email message because you subscribed to this newsletter on our Web site. To unsubscribe, click the unsubscribe link:
http://www.windowsitpro.com/aboutus/index.cfm?action=privacy Windows IT Pro is a division of Penton Media, Inc. 221 East 29th Street, Loveland, CO 80538, Attention: Customer Service Department Copyright 2007, Penton Media, Inc. All Rights Reserved.