<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <copyright>Copyright TechTarget - All rights reserved</copyright>
        <description></description>
        <docs>https://cyber.law.harvard.edu/rss/rss.html</docs>
        <generator>Techtarget Feed Generator</generator>
        <language>en</language>
        <lastBuildDate>Sun, 15 Mar 2026 22:09:55 GMT</lastBuildDate>
        <link>https://www.techtarget.com/searchwindowsserver</link>
        <managingEditor>editor@techtarget.com</managingEditor>
        <item>
            <body>&lt;p&gt;Managing PowerShell resources is a critical task for administrators, who must ensure that scripts and modules are up to date and correctly configured across environments.&lt;/p&gt; 
&lt;p&gt;With the release of PSResourceGet, Microsoft has improved upon the original PowerShellGet module by producing a modernized approach to &lt;a href="https://www.techtarget.com/searchITOperations/video/Automate-PowerShell-scripts-for-self-healing-IT-infrastructure"&gt;managing PowerShell resources&lt;/a&gt;. This article looks at some of PowerShellGet's limitations, the problems solved by PSResourceGet and its key capabilities, and practical examples of how to use PSResourceGet in daily workflows.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Problems that PSResourceGet Solves"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Problems that PSResourceGet Solves&lt;/h2&gt;
 &lt;p&gt;As useful as PowerShellGet has been, PSResourceGet was developed to address several key issues, including:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Complexity and performance issues&lt;/b&gt;. Microsoft designed PowerShellGet with a provider model that relied on the PackageManagement module, which led to bottlenecks and added complexity in managing dependencies.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Usability and extensibility.&lt;/b&gt; Because it was based on an older codebase, PowerShellGet was neither user-friendly nor easy to extend, making bug fixes and implementing new features difficult.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Compatibility concerns&lt;/b&gt;. Because it was written in PowerShell, keeping PowerShellGet &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Why-you-should-consider-an-upgrade-from-PowerShell-51-to-7"&gt;compatible with all supported versions of PowerShell&lt;/a&gt; was a challenge.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;By rewriting PowerShellGet's replacement in C# and removing its dependency on PackageManagement, PSResourceGet offers a more efficient and maintainable approach.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="PSResourceGet capabilities"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;PSResourceGet capabilities&lt;/h2&gt;
 &lt;p&gt;As the new package manager for PowerShell, PSResourceGet is a comprehensive tool to manage all types of PowerShell artifacts available from repositories, including modules, scripts, &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/See-whats-new-in-Desired-State-Configuration-v3"&gt;Desired State Configuration resources&lt;/a&gt; and role capabilities.&lt;/p&gt;
 &lt;p&gt;For each resource type, PSResourceGet lets administrators:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Install, update and remove resources.&lt;/li&gt; 
  &lt;li&gt;Manage dependencies automatically.&lt;/li&gt; 
  &lt;li&gt;Manage repositories that provide resources.&lt;/li&gt; 
  &lt;li&gt;Search repositories for resources.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;All capabilities are exposed in the module through cmdlets.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Benefits of PSResourceGet"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Benefits of PSResourceGet&lt;/h2&gt;
 &lt;p&gt;Now that we've covered the purpose of PSResourceGet and its capabilities, let's cover the advantages of using PSResourceGet over PowerShellGet.&lt;/p&gt;
 &lt;h3&gt;Improved performance&lt;/h3&gt;
 &lt;p&gt;The most significant and immediate benefit of PSResourceGet is speed. For example, the following script compares the search performance of both modules:&lt;/p&gt;
 &lt;pre class="language-powershell"&gt;&lt;code&gt;Measure-Command {
&amp;nbsp;&amp;nbsp;&amp;nbsp; Find-Module -Name Microsoft.PowerShell.PSResourceGet
} | Select-Object TotalSeconds
Measure-Command {
&amp;nbsp;&amp;nbsp;&amp;nbsp; Find-PSResource -Name Microsoft.PowerShell.PSResourceGet
} | Select-Object TotalSeconds&lt;/code&gt;&lt;/pre&gt;
 &lt;p&gt;After running these commands a few times, PSResourceGet typically executes twice as fast as PowerShellGet. Results can vary depending on the testing environment, including the host machine and internet connection.&lt;/p&gt;
 &lt;h3&gt;Compatibility&lt;/h3&gt;
 &lt;p&gt;To maintain compatibility with previous versions of PowerShellGet, Microsoft released a &lt;a href="https://github.com/PowerShell/PowerShellGet/tree/master"&gt;compatibility module&lt;/a&gt; designed to accept commands in the same syntax as PowerShellGet and call the equivalent PSResourceGet commands. This approach lets administrators continue running scripts that use PowerShellGet syntax while also benefiting from PSResourceGet enhancements.&lt;/p&gt;
 &lt;h3&gt;Maintainability and extensibility&lt;/h3&gt;
 &lt;p&gt;Although this might not be immediately noticeable for most users, one goal for PSResourceGet was to build a module that could easily implement changes based on customer feedback. From the start, the codebase was written to be clean and efficient so Microsoft could quickly address bugs and feature requests.&lt;/p&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="Using PSResourceGet"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Using PSResourceGet&lt;/h2&gt;
 &lt;p&gt;To start using PSResourceGet, you might have to install it. For all versions of PowerShell prior to 7.4, PSResourceGet isn't included by default, so we will use PowerShellGet's Install-Module cmdlet for the installation:&lt;/p&gt;
 &lt;pre class="language-powershell"&gt;&lt;code&gt;Install-Module -Name Microsoft.PowerShell.PSResourceGet&lt;/code&gt;&lt;/pre&gt;
 &lt;p&gt;After installation, you can verify by importing it, running a command from the module or simply listing the commands in the module:&lt;/p&gt;
 &lt;pre class="language-powershell"&gt;&lt;code&gt;Get-Command -Module Microsoft.PowerShell.PSResourceGet&lt;/code&gt;&lt;/pre&gt;
 &lt;h3&gt;Managing repositories&lt;/h3&gt;
 &lt;p&gt;A repository is a location to publish PowerShell resources and retrieve them. The most well-known is the PowerShell Gallery. Using PSResourceGet, you can find the currently configured repositories:&lt;/p&gt;
 &lt;pre class="language-powershell"&gt;&lt;code&gt;Get-PSResourceRepository&lt;/code&gt;&lt;/pre&gt;
 &lt;p&gt;By default, PowerShell only includes the PowerShell Gallery. To add other repositories, such as an internal private repository hosted in GitHub Packages, use the following code:&lt;/p&gt;
 &lt;pre class="language-powershell"&gt;&lt;code&gt;$splat = @{
&amp;nbsp;&amp;nbsp;&amp;nbsp; Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 'GitHubOrg'
&amp;nbsp;&amp;nbsp;&amp;nbsp; Uri&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; = 'https://nuget.pkg.github.com/&amp;lt;GitHubOrg&amp;gt;/index.json'
&amp;nbsp;&amp;nbsp;&amp;nbsp; Trusted&amp;nbsp; = $true
&amp;nbsp;&amp;nbsp;&amp;nbsp; Priority = 10
}
Register-PSResourceRepository @splat&lt;/code&gt;&lt;/pre&gt;
 &lt;p&gt;In this case, the script designates the repository as trusted and assigns it to a higher priority than the PowerShell Gallery.&lt;/p&gt;
 &lt;p&gt;You can verify the change by rerunning Get-PSResourceRepository.&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/ahowell_psresourceget_1-f.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/ahowell_psresourceget_1-f_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/ahowell_psresourceget_1-f_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/ahowell_psresourceget_1-f.jpg 1280w" alt="A command window shows a PowerShell command used to list repositories registered for use with PSResourceGet." height="103" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Re-run the Get-PSResourceRepository command after registering a GitHub repository as a trusted source for PowerShell resources.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;To see the full list of supported repository types, you can refer to &lt;a href="https://learn.microsoft.com/en-us/powershell/gallery/powershellget/supported-repositories?view=powershellget-3.x"&gt;Microsoft's documentation.&lt;/a&gt;&lt;/p&gt;
 &lt;h3&gt;Installing modules&lt;/h3&gt;
 &lt;p&gt;The most common use for PSResourceGet is to install modules. This is very similar to using Install-Module, but instead use:&lt;/p&gt;
 &lt;pre class="language-powershell"&gt;&lt;code&gt;Install-PSResource -Name Microsoft.Graph&lt;/code&gt;&lt;/pre&gt;
 &lt;p&gt;If you want a specific version, PSResourceGet has a lot more flexibility than PowerShellGet. The Version parameter accepts any valid Nuget version &lt;a target="_blank" href="https://learn.microsoft.com/en-us/nuget/concepts/package-versioning?tabs=semver20sort#version-ranges" rel="noopener"&gt;range&lt;/a&gt;, while PowerShellGet required three version parameters. For example, to install an exact version, use the following command:&lt;/p&gt;
 &lt;pre class="language-powershell"&gt;&lt;code&gt;Install-PSResource -Name Microsoft.Graph -Version 2.21.0&lt;/code&gt;&lt;/pre&gt;
 &lt;p&gt;To specify a version range, such as greater than 1.5 but less than 2.0, you can use:&lt;/p&gt;
 &lt;pre class="language-powershell"&gt;&lt;code&gt;Install-PSResource -Name Microsoft.Graph -Version '[1.5,2.0)'&lt;/code&gt;&lt;/pre&gt;
 &lt;p&gt;To validate your version range, use Find-PSResource.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/ahowell_psresourceget_2-f.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/ahowell_psresourceget_2-f_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/ahowell_psresourceget_2-f_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/ahowell_psresourceget_2-f.jpg 1280w" alt="A command window runs a PowerShell command to find a module between a specific version range.
" height="242" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The command checks for versions of the Microsoft.Graph module that are at least version 1.5 but less than version 2.0.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;PSResourceGet will install the latest version listed in the provided range.&lt;/p&gt;
 &lt;h3&gt;Installing modules across several servers&lt;/h3&gt;
 &lt;p&gt;To ensure the entire environment has the appropriate modules installed, you can use PSResourceGet through PowerShell remoting. For example, to manage Windows updates, you might want to install the PSWindowsUpdate module. The following script -- which requires PowerShell v7 because it uses the&lt;b&gt; &lt;/b&gt;&lt;a href="https://www.techtarget.com/searchwindowsserver/tutorial/PowerShell-ForEach-Object-cmdlet-picks-up-speed"&gt;Parallel parameter of Foreach-Object&lt;/a&gt; -- retrieves a list of servers from Active Directory and then installs the module remotely:&lt;/p&gt;
 &lt;pre class="language-powershell"&gt;&lt;code&gt;Get-ADComputer -Filter 'OperatingSystem -like "*Server*"' | ForEach-Object -ThrottleLimit 5 -Parallel {
&amp;nbsp;&amp;nbsp;&amp;nbsp; Invoke-Command -ComputerName $_.Name -ScriptBlock {
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Install-Module -Name Microsoft.PowerShell.PSResourceGet -Confirm:$false -Force
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Install-PSResource -Name PSWindowsUpdate -Confirm:$false
&amp;nbsp;&amp;nbsp;&amp;nbsp; }
}&lt;/code&gt;&lt;/pre&gt;
 &lt;p&gt;The script will install PSResourceGet if it isn't installed with Install-Module, then it will install PSWindowsUpdate with Install-PSResource.&lt;/p&gt;
 &lt;h3&gt;Browse from the command line&lt;/h3&gt;
 &lt;p&gt;Because PSResourceGet is so much faster than PowerShellGet, browsing the PowerShell Gallery from the command line makes more sense. For example, if you know there's a &lt;a href="https://www.techtarget.com/searchwindowsserver/tutorial/Reveal-Windows-file-server-permissions-with-PowerShells-help"&gt;module to import Excel files&lt;/a&gt; but can't remember the name, you can search for it:&lt;/p&gt;
 &lt;pre class="language-powershell"&gt;&lt;code&gt;Find-PSResource -Name '*Excel'&lt;/code&gt;&lt;/pre&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/ahowell_psresourceget_3-f.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/ahowell_psresourceget_3-f_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/ahowell_psresourceget_3-f_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/ahowell_psresourceget_3-f.jpg 1280w" alt="A command window with a PowerShell command that searches for resources using a wildcard.
" height="142" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Use the Find-PSResource command to search for PowerShell resources in the registered repositories with 'Excel' at the end of the name.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;This command returns several modules, one of which is ImportExcel. To see the full metadata for the module, query it directly:&lt;/p&gt;
 &lt;pre class="language-powershell"&gt;&lt;code&gt;Find-PSResource -Name 'ImportExcel' | fl *&lt;/code&gt;&lt;/pre&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/ahowell_psresourceget_4-f.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/ahowell_psresourceget_4-f_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/ahowell_psresourceget_4-f_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/ahowell_psresourceget_4-f.jpg 1280w" alt="A command window that shows a PowerShell command to display a module's metadata.
" height="330" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Execute a search to that displays all the metadata for the ImportExcel module.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;The output shows important information, such as the ProjectUri property, which you can use to verify it is the proper module.&lt;/p&gt;
&lt;/section&gt;                                    
&lt;section class="section main-article-chapter" data-menu-title="PSResourceGet offers scalability and reliability"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;PSResourceGet offers scalability and reliability&lt;/h2&gt;
 &lt;p&gt;PSResourceGet offers improved package management in PowerShell, providing &lt;a href="https://www.techtarget.com/searchwindowsserver/tutorial/Try-these-PowerShell-Start-Job-examples-for-more-efficiency"&gt;better speed&lt;/a&gt; and reliability. By directly addressing user feedback and the issues with PowerShellGet, PSResourceGet presents a more streamlined and efficient approach to reduce time spent on repetitive tasks and allow more time to focus on automation and scripting.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Anthony Howell is an IT strategist with extensive experience in infrastructure and automation technologies. His expertise includes PowerShell, DevOps, cloud computing, and working in both Windows and Linux environments.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The updated package manager for PowerShell improves performance, simplifies module management and streamlines repository handling to free up time for automation tasks.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/keyboard_g1077903946.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/tutorial/Use-PSResourceGet-to-manage-PowerShell-modules-and-scripts</link>
            <pubDate>Tue, 07 Oct 2025 15:42:00 GMT</pubDate>
            <title>Use PSResourceGet to manage PowerShell modules and scripts</title>
        </item>
        <item>
            <body>&lt;p&gt;Defragmentation, also known as &lt;i&gt;defragging&lt;/i&gt; or &lt;i&gt;defrag&lt;/i&gt;, is the process of rearranging data on a storage medium, such as a hard disk drive (&lt;a href="https://www.techtarget.com/searchstorage/definition/hard-disk-drive"&gt;HDD&lt;/a&gt;), to ensure efficient storage and access.&lt;/p&gt; 
&lt;p&gt;Defragmenting a hard drive can improve a computer's or laptop's performance and speed. To reduce fragmentation, a disk optimization tool typically uses compaction to free up larger areas of space. Certain disk defragmentation tools might try to keep smaller files together, especially if they're often accessed sequentially.&lt;/p&gt; 
&lt;p&gt;Fragmentation is less common in Linux-based file systems. The Linux journaling system stores data across multiple locations on the disk and automatically moves it around as soon as it senses fragmentation.&lt;/p&gt; 
&lt;p&gt;Longtime users of Windows and Mac computers will remember when defragmentation was strictly a manual process they had to initiate themselves. However, Windows and &lt;a href="https://www.techtarget.com/whatis/definition/Mac-OS"&gt;macOS&lt;/a&gt; have been automatically defragmenting disks for some time -- Windows, since the Vista release, and macOS since Mac OS X 10.2.&lt;/p&gt; 
&lt;div class="youtube-iframe-container"&gt;
 &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/Qnk2FP3_r-I?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
&lt;/div&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Why is defragmentation important?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why is defragmentation important?&lt;/h2&gt;
 &lt;p&gt;Defragmentation can solve and mitigate computer problems such as slow speeds, freezes and extended boot times. If there is not enough contiguous space to hold complete files on an HDD, files can become fragmented, and the storage &lt;a href="https://www.techtarget.com/whatis/definition/algorithm"&gt;algorithms&lt;/a&gt; on the disk separate the data to fit it inside the available space. Defragmentation consolidates these fragmented files so all the related pieces are aligned.&lt;/p&gt;
 &lt;p&gt;A fragmented hard drive is like a huge, jumbled-up load of laundry, with all the different clothing types and colors mixed up. Once the HDD is defragmented, system performance improves because all the jumbled-up data is reorganized and stored appropriately.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="The benefits of defragging"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The benefits of defragging&lt;/h2&gt;
 &lt;p&gt;The following are the main benefits of defragmenting a hard drive:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Files stay organized.&lt;/b&gt; Over time, adding and deleting files from a hard drive can scatter the data, especially if it is running low on storage space. Defragmentation organizes the individual files, resulting in improved hard drive speed.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Unused space is freed.&lt;/b&gt; Any unused space on a hard drive can be maximized by defragmentation. Sometimes, it can also create more usable space if &lt;a href="https://www.techtarget.com/whatis/definition/bit-binary-digit"&gt;bits&lt;/a&gt; of data are left over from deleted files.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;The HDD life is extended.&lt;/b&gt; With regular defragmentation, the files on a hard drive stay organized. This means the mechanical and &lt;a href="https://www.computerweekly.com/feature/Spinning-disk-hard-drives-Good-value-for-many-use-cases"&gt;spinning components of a hard drive&lt;/a&gt; aren't used as extensively, which, in turn, extends the lifespan of a hard drive.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/example_of_file_fragmentation-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/example_of_file_fragmentation-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/example_of_file_fragmentation-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/example_of_file_fragmentation-f.png 1280w" alt="An image showing an HDD before and after defragmentation. " height="179" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;This shows a hard drive before and after defragmentation. 
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="How does fragmentation occur?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does fragmentation occur?&lt;/h2&gt;
 &lt;p&gt;Fragmentation happens over time and can be caused by many different things. The following are a few reasons why fragmentation occurs inside a hard drive:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;If an excessively large file, such as a media or movie file, cannot fit into the empty spaces on a hard drive, fragmentation will occur.&lt;/li&gt; 
  &lt;li&gt;If an existing file is updated, but the space it occupies does not have room for any new changes, then it will cause fragmentation.&lt;/li&gt; 
  &lt;li&gt;The file system -- the part of the operating system (OS) that controls how files are stored -- might break the files into smaller chunks when trying to save them quickly.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="How to perform defragmentation"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to perform defragmentation&lt;/h2&gt;
 &lt;p&gt;Most contemporary OSes have built-in disk defragmentation tools that perform the defragmentation process automatically. However, some OSes, such as Microsoft &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Windows-7"&gt;Windows 7&lt;/a&gt; and beyond, can also be defragmented manually.&lt;/p&gt;
 &lt;p&gt;To manually defragment a hard drive on a &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/Troubleshooting-the-most-common-issues-with-Windows-11"&gt;Windows 11 machine&lt;/a&gt;, perform the following steps:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;Go to the search bar on the Start menu and type &lt;b&gt;defrag&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;On the &lt;b&gt;Defragment and Optimize Drives &lt;/b&gt;option, select the drive that needs to be defragmented and click on &lt;b&gt;Optimize&lt;/b&gt;.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/defrag-f.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/defrag-f_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/defrag-f_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/defrag-f.jpg 1280w" alt="A screenshot showing the defragmentation process for a Windows SSD." height="466" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;This shows the defragmentation process.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;This process is almost identical to defragmenting a server hard drive, such as a &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Windows-Server-2016"&gt;Windows Server 2016&lt;/a&gt; or a &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Compare-the-features-in-the-Windows-Server-2022-editions"&gt;Windows Server 2022&lt;/a&gt; drive.&lt;/p&gt;
 &lt;p&gt;It is also possible to change the schedule of defragmentation on a Windows 11 machine using the following steps:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;Go to the search bar on the Start menu and type &lt;b&gt;defrag&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;On the &lt;b&gt;Defragment and Optimize Drives &lt;/b&gt;option, select the drive where defragmentation needs to be rescheduled, and click on &lt;b&gt;Change settings&lt;/b&gt; under &lt;b&gt;Scheduled optimization&lt;/b&gt;. Options include daily, weekly, monthly or not at all.&lt;/li&gt; 
 &lt;/ol&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="How often do you need to defrag a hard drive?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How often do you need to defrag a hard drive?&lt;/h2&gt;
 &lt;p&gt;The frequency of defragging a hard drive depends on its usage. Because modern versions of both Windows and macOS come with built-in optimization tools, there's no need to manually perform defragmentation, especially if the computer is always on. However, if a device is routinely shut down after each use, its built-in defragmentation utilities might be prevented from running automatically. In such cases, running the defragmentation utility once a month is probably a good idea.&lt;/p&gt;
 &lt;p&gt;By default, a Windows 11 machine defragments a hard drive once a week; macOS does not have a defragmentation schedule option but defragments in real time.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="How long does disk defragmentation take?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How long does disk defragmentation take?&lt;/h2&gt;
 &lt;p&gt;The time required for defragmentation of a disk drive can vary considerably, due to the following factors:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;The size of the drive.&lt;/b&gt; The larger the drive, the longer the defragmentation process lasts.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Speed of the hard drive.&lt;/b&gt; The faster the drive, the faster the defragmentation process goes.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Speed of the processor. &lt;/b&gt;The faster the processor executes the process, the faster the defragmentation proceeds.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Fragmentation level.&lt;/b&gt; The more fragmented the drive, the longer the defragmentation takes.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;First-time defragmentation. &lt;/b&gt;If a hard drive has never been defragmented before, the first time might take longer than normal.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;It is also important to remember that solid-state drives do not require defragmentation.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="What's the difference between defragmentation and disk cleanup?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What's the difference between defragmentation and disk cleanup?&lt;/h2&gt;
 &lt;p&gt;The terms &lt;i&gt;defragmentation&lt;/i&gt; and &lt;i&gt;disk cleanup&lt;/i&gt; are sometimes used interchangeably, but this is incorrect: They are different.&lt;/p&gt;
 &lt;p&gt;Disk defragmentation is strictly limited to reorganizing the physical storage of data to group related data and improve storage and retrieval efficiency.&lt;/p&gt;
 &lt;p&gt;Disk cleanup is also about storage efficiency, but its purpose is to remove files from storage that have accumulated over time but are no longer necessary. This includes temp files, system files and other files that are just taking up space.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Primary data storage is often all-flash, but solid-state hybrid drives (SSHD) blend flash and hard disk drives. Learn &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchstorage/feature/Hybrid-drive-vs-SSD-Whats-best-for-your-organization"&gt;&lt;i&gt;how an SSHD differs from an SSD and an HDD&lt;/i&gt;&lt;/a&gt;,&lt;i&gt; &lt;/i&gt;&lt;i&gt;and the benefits and drawbacks of each.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Defragmentation, also known as 'defragging' or 'defrag,' is the process of rearranging the data on a storage medium, such as a hard disk drive (HDD), to ensure efficient storage and access.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/1.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/definition/defragmentation</link>
            <pubDate>Wed, 20 Aug 2025 15:37:00 GMT</pubDate>
            <title>What is defragmentation?</title>
        </item>
        <item>
            <body>&lt;p&gt;NTFS, which stands for NT file system and the New Technology File System, is the &lt;a href="https://www.techtarget.com/searchstorage/definition/file-system"&gt;file system&lt;/a&gt; that many versions of the &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Windows"&gt;Windows&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Windows-Server-OS-operating-system"&gt;Windows Server&lt;/a&gt; operating systems (&lt;a href="https://www.techtarget.com/whatis/definition/operating-system-OS"&gt;OSes&lt;/a&gt;) use for storing, organizing, and retrieving files on hard disk drives (&lt;a href="https://www.techtarget.com/searchstorage/definition/hard-disk-drive"&gt;HDDs&lt;/a&gt;) and solid-state drives (&lt;a href="https://www.techtarget.com/searchstorage/definition/SSD-solid-state-drive"&gt;SSDs&lt;/a&gt;).&lt;/p&gt; 
&lt;p&gt;NTFS is the primary file system for recent versions of Windows and Windows Server OSes. A computer's OS creates and maintains the file system on a storage drive or device. The file system essentially organizes the data into files. It controls how data files are named, stored, retrieved and updated and what other information can be associated with the files -- for example, data on &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/This-PowerShell-module-takes-control-of-NTFS-permissions"&gt;file ownership and user permissions&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;With Windows 2008, Microsoft introduced self-healing NTFS, which means that the file system can automatically correct transient corruption issues without taking the volume offline. Also, if a computer restarts after a system failure, NTFS automatically restores data using the &lt;a href="https://www.techtarget.com/whatis/definition/log-log-file"&gt;log file&lt;/a&gt; and checkpoint information.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="How is NTFS used?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How is NTFS used?&lt;/h2&gt;
 &lt;p&gt;NTFS continues to be the primary file system for Windows 10, Windows 11 and Windows Server versions 2016, 2019, 2022 and 2025. These Windows OSes use NTFS to organize, name and store files on SSDs and HDDs.&lt;/p&gt;
 &lt;p&gt;NTFS can be used with Cluster Shared Volumes (CSV) to easily manage a large number of logical unit numbers (&lt;a href="https://www.techtarget.com/searchstorage/definition/logical-unit-number"&gt;LUNs&lt;/a&gt;) in a &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Windows-Server-failover-clustering"&gt;Windows Server failover cluster&lt;/a&gt;. Additionally, the CSV provides continuously available volumes in these clusters. The NTFS volumes can be simultaneously accessed by multiple cluster nodes in a failover cluster. Multiple nodes in &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Windows-Azure"&gt;Azure&lt;/a&gt; Local (versions 23H2 and 22H2) can also use NTFS and CSV to access the same disk (LUN) that's provisioned as an NTFS volume.&lt;/p&gt;
 &lt;p&gt;The clustered roles can fail over quickly from one node to another without requiring a &lt;a href="https://www.techtarget.com/searchstorage/definition/volume"&gt;volume&lt;/a&gt; to be dismounted and then remounted. There's also no need to take a volume offline or use the disruptive chkdsk.exe tool to &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/How-to-scan-and-repair-disks-with-Windows-10-Check-Disk"&gt;correct transient corruption issues&lt;/a&gt; of disk volumes. Instead, NTFS includes a self-healing capability by default to automatically, efficiently, and reliably eliminate corruption in the background. If there is a major issue that NTFS cannot automatically fix, it will notify users along with possible solutions.&lt;/p&gt;
 &lt;p&gt;Authorized users, such as &lt;a href="https://www.techtarget.com/searchnetworking/definition/system-administrator"&gt;system admins&lt;/a&gt;, can use NTFS to restore a system after a failure event, such as a server crash. In addition, NTFS uses its log file and checkpoint information to recover data and maintain file system consistency. Admins can also use the chkdsk utility to scan and analyze the drive while the volume is online.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/posey_file_systems1_091620.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/posey_file_systems1_091620_half_column_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/posey_file_systems1_091620_half_column_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/posey_file_systems1_091620.jpg 1280w" alt="Screen capture showing Windows 10 using NTFS by default." height="222" width="280"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Screen capture showing Windows 10 using NTFS by default.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;NTFS is very useful when the space on a volume is limited because it allows flexible capacity allocations. &lt;a href="https://www.itprotoday.com/microsoft-windows/how-can-i-copy-disk-quotas-from-one-volume-to-another-"&gt;Disk quotas&lt;/a&gt; can be used to control disk space usage, while many files can be compressed to store more data on NTFS volumes. Volume space can also be increased by adding unallocated space.&lt;/p&gt;
 &lt;p&gt;NTFS can be used to set permissions and access controls on files and folders. Also, data can be encrypted using &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/BitLocker"&gt;BitLocker Drive Encryption&lt;/a&gt;. These approaches help to secure files and lower the possibility of corruption by malicious users like hackers and data thieves.&lt;/p&gt;
 &lt;p&gt;NTFS is frequently used for large volumes up to 8 petabytes (&lt;a href="https://www.techtarget.com/searchstorage/definition/petabyte"&gt;PB&lt;/a&gt;), where older file systems like file allocation table (&lt;a href="https://www.techtarget.com/whatis/definition/file-allocation-table-FAT"&gt;FAT&lt;/a&gt;) and High-Performance File System (HPFS) are unsuitable. For large VDHX files larger than 1 terabyte (&lt;a href="https://www.techtarget.com/searchstorage/definition/terabyte"&gt;TB&lt;/a&gt;), users must use the Format-Volume &lt;a href="https://www.techtarget.com/whatis/definition/cmdlet"&gt;cmdlet&lt;/a&gt; in &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/PowerShell"&gt;Windows PowerShell&lt;/a&gt; with specific Windows-defined parameters.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/rtyXJC6RdpA?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="How NTFS works"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How NTFS works&lt;/h2&gt;
 &lt;p&gt;The OS determines which file system will be used. For example, NTFS is the default file system for Windows 10/11 and for all versions of Windows Server after version 2016. But older versions of Windows -- &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Windows-NT"&gt;Windows NT&lt;/a&gt;, Windows 95, Windows 98, Windows 2000 -- support either HPFS or FAT file systems.&lt;/p&gt;
 &lt;p&gt;When an HDD is formatted or initialized, it is divided into &lt;a href="https://www.techtarget.com/searchstorage/definition/partition"&gt;partitions&lt;/a&gt;. Partitions are the major divisions of the hard drive's physical space. Within each partition, the OS keeps track of all the files it stores. Each file is stored on the HDD in one or more &lt;a href="https://www.techtarget.com/whatis/definition/cluster"&gt;clusters&lt;/a&gt; or disk spaces of a predefined uniform size. A cluster refers to the smallest unit of size that the NTFS can reference when accessing storage&lt;/p&gt;
 &lt;p&gt;In NTFS, cluster sizes range from 4 kilobytes (&lt;a href="https://www.techtarget.com/searchstorage/definition/kilobyte"&gt;KB&lt;/a&gt;), which is the default size, to 2048 KB. NTFS supports different combinations of cluster sizes and volumes. For example, a 4 KB cluster can have a maximum volume of 16 TB, while the maximum volume for a 2048 KB cluster can be as high as 8 PB.&lt;/p&gt;
 &lt;p&gt;Cluster size and deployment often determine system performance. In general, higher cluster sizes offer increased volume and file capacity. This can be a big advantage when a volume holds many large files, and in situations involving the &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/What-is-Hyper-V-on-Windows-11-and-what-can-it-do"&gt;use of Hyper-V&lt;/a&gt;, &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/SQL"&gt;Structured Query Language&lt;/a&gt; or &lt;a href="https://www.techtarget.com/searchstorage/definition/data-deduplication"&gt;deduplication&lt;/a&gt;. On the other hand, smaller clusters can be used to minimize wasted space when storing small files. That said, Microsoft discourages the use of clusters smaller than 4 KB.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="NTFS features"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;NTFS features&lt;/h2&gt;
 &lt;p&gt;Some of the notable features of NTFS include:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Quick file access.&lt;/b&gt; NTFS uses a binary tree directory scheme to index files and keep track of file clusters. This allows for efficient file sorting, organization, and retrieval.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;File size.&lt;/b&gt; NTFS supports very large files, with maximum allowable volumes of 16 TB.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Continuously available volumes&lt;/b&gt;. NTFS can be used with the CSV file system in Windows Server failover clusters to enable multiple cluster nodes to access continuously available volumes simultaneously.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;User permissions.&lt;/b&gt; NTFS has an access control list (&lt;a href="https://www.techtarget.com/searchnetworking/definition/access-control-list-ACL"&gt;ACL&lt;/a&gt;) that lets a server administrator control who can access specific files and the access type.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Compression.&lt;/b&gt; Integrated file &lt;a href="https://www.techtarget.com/searchstorage/definition/compression"&gt;compression&lt;/a&gt; shrinks file sizes and provides more storage space.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Unicode file naming.&lt;/b&gt; Because it supports file names based on &lt;a href="https://www.techtarget.com/whatis/definition/Unicode"&gt;Unicode&lt;/a&gt;, long file names can be used with a wider array of characters. Short names can also be used on the system volume to ensure application compatibility. NTFS also supports extended-length paths.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security features.&lt;/b&gt; NTFS provides increased data security with features like encryption, rich &lt;a href="https://www.techtarget.com/whatis/definition/metadata"&gt;metadata&lt;/a&gt; and disk quotas.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Extra storage space. &lt;/b&gt;With NTFS, extra storage space can be created by mounting a volume at any empty folder on a local NTFS volume.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windowsserver-what_is_metadata-h.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windowsserver-what_is_metadata-h_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windowsserver-what_is_metadata-h_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/windowsserver-what_is_metadata-h.png 1280w" alt="Text illustration showing a presenter highlighting examples of metadata" height="244" width="279"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Advantages of NTFS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Advantages of NTFS&lt;/h2&gt;
 &lt;p&gt;There are several advantages to using NTFS, which are included below.&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Support for large volumes.&lt;/b&gt; NTFS supports volumes ranging in size from 16 TB to 8 PB on Windows Server 2019 and newer, and on Windows 10, v1709 and newer.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Control.&lt;/b&gt; NTFS provides disc quotas, which enable administrators to limit and control the amount of storage space on shared drives.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Performance.&lt;/b&gt; NTFS uses file compression, which shrinks file sizes, increasing file transfer speeds and providing more storage space.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security.&lt;/b&gt; NTFS's built-in security features let administrators grant permissions to sensitive data, restricting access to certain users. NTFS also supports &lt;a href="https://www.techtarget.com/searchsecurity/definition/encryption"&gt;encryption&lt;/a&gt; to protect data integrity.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Easy logging for transaction rollbacks.&lt;/b&gt; NTFS logs all &lt;a href="https://www.techtarget.com/searchcio/definition/transaction"&gt;transactions&lt;/a&gt;, making it possible to rollback transactions in order to restore a system and recover data. The built-in logging and auditing system also allows administrators to track files that have been deleted, added or changed in any way.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Reliability.&lt;/b&gt; Data and files can be quickly restored in the event of a system failure or error, because NTFS dynamically remaps clusters with bad sectors and allocates new clusters for data.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Disadvantages of NTFS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Disadvantages of NTFS&lt;/h2&gt;
 &lt;p&gt;The main disadvantages of the NTFS file system are:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Limited OS compatibility.&lt;/b&gt; The main disadvantage of NTFS is that it is read-only with non-Windows OSes, such as &lt;a href="https://www.techtarget.com/whatis/definition/Mac-OS"&gt;macOS&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;It's unsuitable for smaller volumes.&lt;/b&gt; NTFS has a lot of space overhead -- 4 megabytes (&lt;a href="https://www.techtarget.com/searchstorage/definition/megabyte"&gt;MB&lt;/a&gt;) of drive space on a 100-MB partition -- making it unsuitable for volumes smaller than 400 MB. The overhead also makes it impossible to format floppy disks with NTFS.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;No built-in file encryption. &lt;/b&gt;While NTFS provides data encryption, it doesn't support file encryption. This can allow anyone to view the data stored on an NTFS volume, for example, by using a low-level disk editing utility.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Possible partition size limitations. &lt;/b&gt;Underlying hardware limitations might limit the partition size possible with NTFS. The partition table is also limited to a maximum of 2 TB.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="NTFS vs. FAT vs. HPFS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;NTFS vs. FAT vs. HPFS&lt;/h2&gt;
 &lt;p&gt;File systems are generally differentiated by the OS and the type of drive they are used with. NTFS is one &lt;a href="https://www.techtarget.com/searchstorage/feature/4-different-file-systems-and-how-theyre-evolving"&gt;type of file system&lt;/a&gt;. NTFS is the Windows 10/11/Server equivalent of the older Windows file systems: FAT and HPFS.&lt;/p&gt;
 &lt;p&gt;Although NTFS, FAT, and HPFS are all file systems for Windows OSes, they have several differences.&lt;/p&gt;
 &lt;p&gt;Both FAT and HPFS are only supported under older versions of Windows. In particular, HPFS, which was first introduced with OS/2 1.2, is now only supported under the now-end-of-life (&lt;a href="https://www.techtarget.com/whatis/definition/end-of-life-EOL"&gt;EOL&lt;/a&gt;) Windows NT OS versions 3.1, 3.5, and 3.51. FAT (specifically, FAT32) is available for Windows 98/Windows 95 OSR2 and Windows 2000.&lt;/p&gt;
 &lt;p&gt;FAT is a very simple file system. A FAT-formatted disk is allocated in clusters. The cluster size depends on the volume size. FAT supports only read-only, hidden, system and archive file attributes.&lt;/p&gt;
 &lt;p&gt;FAT uses a file allocation table that resides at the very top of the volume and is stored -- along with the root directory -- in a fixed location to allow for the system's &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/boot"&gt;boot&lt;/a&gt; files to be correctly located. The FAT directory structure is not organized in any particular way. Every time a file is created, an entry is created in the FAT table. The FAT table must be regularly updated to prevent data loss.&lt;/p&gt;
 &lt;p&gt;One advantage of the FAT system is that it allows for file undeletes. Undeletes are not possible with older Windows OS (e.g., Windows NT) and their associated older file systems. Also, FAT starts out with little overhead, making it a suitable file system for drives or partitions that are smaller than 200 MB. The main drawback of FAT is that for volumes of over 200 MB, disk performance tends to decrease. Another is that it is not possible to set permissions on files that are FAT partitions.&lt;/p&gt;
 &lt;p&gt;HPFS organizes drives into multiple 8-MB bands, with files usually contained within one of these bands and in contiguous sectors. The file system maintains the directory organization of FAT, although directory entries under HPFS hold more information than they would under FAT. Also, unlike FAT where files are given the first open location on the drive, the directory entries in HPFS point to the FNODE. HPFS also automatically sorts the directory based on filename and provides increased flexibility by allowing for files to be composed of data and special attributes.&lt;/p&gt;
 &lt;p&gt;In contrast to FAT, HPFS is best for drives in the 200-400 MB volume range. It is not suited for volumes under 200 MB due to the overhead involved. And for volumes over 400 MB, it often causes performance degradation. Another limitation of HPFS is that it is not possible to set security on HPFS under Windows NT.&lt;/p&gt;
 &lt;p&gt;NTFS supports bigger volumes and cluster sizes than HPFS and FAT. Unlike these other file systems, NTFS doesn't use any special locations or objects on the disc. Additionally, it is not dependent on the underlying hardware, so it can often avoid partition size limitations.&lt;/p&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="Advantages of NTFS over FAT and HPFS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Advantages of NTFS over FAT and HPFS&lt;/h2&gt;
 &lt;p&gt;Like HPFS, NTFS organizes files into directories and also automatically sorts the directories based on filenames.&lt;/p&gt;
 &lt;p&gt;NTFS offers several improvements over FAT and HPFS in terms of performance, extendibility and security. It also removes many of FAT and HPFS's limitations. For example, it increases the size of files and volumes. In fact, it can support volumes as large as 8 PB on Windows Server 2019 and newer and Windows 10, version 1709 and newer.&lt;/p&gt;
 &lt;p&gt;Additionally, NTFS provides excellent performance even with larger volumes (400 MB or more). This is one of its standout advantages over FAT and HPFS.&lt;/p&gt;
 &lt;p&gt;NTFS also eliminates problems related to a fixed sector size (common with HPFS). Additionally, performance does not degrade with larger volume sizes (common with FAT), making NTFS ideal for volumes of 400 MB or more. These advantages are particularly valuable for high-end systems and &lt;a href="https://www.techtarget.com/searchnetworking/definition/file-server"&gt;file servers&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Unlike HPFS, NTFS doesn't include special data objects. This allows the file system to avoid fatal single-sector failures. It also tracks and protects all the objects on the disk and maintains multiple copies of the &lt;a href="https://www.itprotoday.com/it-infrastructure/jsi-tip-2709-manage-the-size-of-the-master-file-table-reserved-zone-on-windows-2000-"&gt;Master File Table&lt;/a&gt; (MFT).&lt;/p&gt;
 &lt;p&gt;NTFS also allows for better recoverability because it keeps track of transactions through a log. Chkdsk can use the log to roll back transactions to the last commit point to recover files and also maintain consistency within the file system. The built-in recoverability capabilities in NTFS mean that there's rarely any need to run a disk repair utility on NTFS partitions to recover data and avoid data loss.&lt;/p&gt;
 &lt;p&gt;NTFS also supports &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/hotfix"&gt;hot fixing&lt;/a&gt;. When it detects a bad sector, it uses a table of hotfixes to handle write errors. It does this by using the hotfixes entry to logically point to an existing good sector and mark the original sector as bad. FAT does not support hot fixing. HPFS does support hot fixing, but not with the version included in Windows NT.&lt;/p&gt;
 &lt;p&gt;NTFS provides additional functionality unavailable with FAT or HPFS. It provides a rich and flexible platform that other file systems can use. NTFS also supports multiple &lt;a href="https://www.techtarget.com/searchnetworking/definition/data-streaming"&gt;data streams&lt;/a&gt;, is POSIX.1 compliant, and allows for the addition of user-defined attributes to a file.&lt;/p&gt;
 &lt;p&gt;Finally, NTFS includes numerous security features that are not available with FAT or HPFS. For one, it fully supports the Windows NT security model. It provides ACL-based security for files and folders, meaning certain authorized users (e.g., admins) can set permissions and restrict or allow specific users and groups. NTFS also supports BitLocker drive encryption to protect critical system information on NTFS volumes.&lt;/p&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="NTFS vs. FAT32 vs. exFAT"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;NTFS vs. FAT32 vs. exFAT&lt;/h2&gt;
 &lt;p&gt;Microsoft developed FAT32, the 32-bit version of the FAT file system, before NTFS, making FAT32 the oldest Windows file system. FAT 32 works with every version of Mac, Linux and Windows. However, it is generally considered less efficient than NTFS.&lt;/p&gt;
 &lt;p&gt;In contrast to NTFS, which supports volumes of up to 8 PB in size, FAT32 has a smaller 4 GB file size. This means file partitions are limited to a maximum size of 4 GB. If a file size is larger, FAT32 is not particularly efficient.&lt;/p&gt;
 &lt;p&gt;FAT32 is easier to format and simpler to use than NTFS. Its file allocation table is a less complex way to organize files than the MFT in NTFS. For these reasons, FAT32 is more commonly used with devices that need wide compatibility, such as memory cards, external hard drives, and devices with USB ports.&lt;/p&gt;
 &lt;p&gt;An evolution of FAT32 is exFAT. It retains the positive characteristics of FAT32 -- a lightweight, more flexible file allocation system -- while overcoming some of its limitations. For example, FAT32 can only store files up to 4 GB, while exFAT can handle file sizes of up to 128 PB. Unlike FAT32, which allows a maximum partition size of 2 TB, exFAT allows partitions of up to 128 TB. These improvements make exFAT suitable for removable drives that have larger file sizes (+4 GB) but don't need the wide compatibility provided by FAT32.&lt;/p&gt;
 &lt;p&gt;exFAT works with Windows and modern versions of macOS systems. It requires additional software to work with older Linux systems, although it does work with Linux Kernel 5.7 and newer Linux versions. In contrast, NTFS only works with Windows systems. It is read-only on Mac systems and works with some Linux systems.&lt;/p&gt;
 &lt;p&gt;NTFS is the best choice for formatting internal hard drives if the system uses a Windows OS since it supports large and continuously available volumes, increases system reliability by correcting &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/How-to-detect-data-corruption-in-files-and-folders"&gt;corruption issues&lt;/a&gt;, and provides numerous data security features including encryption, disk quotas, and rich metadata.&lt;/p&gt;
 &lt;p&gt;The file system chosen -- NTFS, FAT, or exFAT-- mainly depends on the device type. FAT32 is best suited for USB drives, removable HDDs and gaming consoles with file sizes smaller than 4 GB, regardless of whether the system is based on Windows, Mac or Linux OS. ExFAT can be a better choice for external hard drives or flash drives that need storage capacities greater than 4 GB.&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="The file system takeaway"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The file system takeaway&lt;/h2&gt;
 &lt;p&gt;All the file systems discussed above -- NTFS, FAT32, HPFS, and exFAT -- have their strengths and weaknesses. However, each is also used in a variety of computing contexts, from personal computing to the enterprise. NTFS is prominent among the three because of its connection to Windows.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Learn more about the differences between these &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchwindowsserver/answer/Whats-the-difference-between-FAT32-FAT16-and-NTFS"&gt;&lt;i&gt;well-established file systems&lt;/i&gt;&lt;/a&gt;&lt;i&gt; and how they are used in enterprises today.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>NTFS, which stands for NT file system and the New Technology File System, is the file system that many versions of the Windows and Windows Server operating systems (OSes) use for storing, organizing, and retrieving files on hard disk drives (HDDs) and solid-state drives (SSDs).</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/5.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/definition/NTFS</link>
            <pubDate>Wed, 09 Jul 2025 12:30:00 GMT</pubDate>
            <title>What is NTFS and how does it work?</title>
        </item>
        <item>
            <body>&lt;p&gt;The blue screen of death (BSOD) -- also known as a stop error screen, blue screen error, fatal error or bugcheck -- is a critical error screen that can be displayed by &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Windows"&gt;Microsoft Windows&lt;/a&gt; operating systems (OSes). In June 2025, Microsoft &lt;a href="https://blogs.windows.com/windowsexperience/2025/06/26/the-windows-resiliency-initiative-building-resilience-for-a-future-ready-enterprise/" target="_blank" rel="noopener"&gt;announced&lt;/a&gt; that they were retiring the BSOD after 32 years. The new interface for unexpected restarts will be available in late summer 2025 across all Windows 11 24H2 devices. It will feature a black screen and maintain any necessary technical information on-screen.&lt;/p&gt; 
&lt;p&gt;If and when a BSOD appears, it is an indication that Microsoft Windows has encountered a very severe issue from which it cannot recover on its own. A BSOD functionally renders an affected system nonoperational until the issue is resolved with some form of intervention by the user.&lt;/p&gt; 
&lt;p&gt;The term &lt;i&gt;blue screen of death&lt;/i&gt; is a reference to the color of a user's system screen when the BSOD is triggered. A user's screen will turn blue with white text, providing a message that the system has encountered a problem. Once the BSOD appears, the system is largely inoperable or dead from a functional perspective.&lt;/p&gt; 
&lt;p&gt;A BSOD incident typically comes with no warning and all unsaved work is immediately lost. That could be the least of a user's problems, as the system is not usable until the issue that triggered the BSOD is resolved.&lt;/p&gt; 
&lt;p&gt;BSODs have been a part of the Windows OS since the release of &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Windows-NT"&gt;Windows NT&lt;/a&gt; 3.1 in 1993. It was originally designed as a &lt;a href="https://www.techtarget.com/searchdatacenter/definition/kernel"&gt;kernel&lt;/a&gt; error handler for situations where the OS couldn't recover from a critical error. A BSOD is intended to act as a protective measure, forcing the system to shut down to prevent catastrophic hardware failure.&lt;/p&gt; 
&lt;p&gt;A BSOD is a full system failure at the Windows kernel level due to an issue with Windows drivers and/or hardware. It is not an application crash. If the browser crashes, Windows continues to run. It's very rare that an app can cause a blue screen because they commonly run at a higher level in the OS.&lt;/p&gt; 
&lt;p&gt;While a BSOD has always had white text on a blue screen, the information and design of the BSOD has changed. Over the years, Microsoft has modified the BSOD's appearance and the information it displays in an attempt to make it somewhat user-friendly and informative.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What causes BSOD?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What causes BSOD?&lt;/h2&gt;
 &lt;p&gt;A BSOD incident can be triggered by several hardware and software issues.&lt;/p&gt;
 &lt;h3&gt;Hardware failures&lt;/h3&gt;
 &lt;p&gt;Among the types of hardware issues that can be at fault are the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Faulty memory, including system random access memory (&lt;a href="https://www.techtarget.com/searchstorage/definition/RAM-random-access-memory"&gt;RAM&lt;/a&gt;).&lt;/li&gt; 
  &lt;li&gt;Overheating components.&lt;/li&gt; 
  &lt;li&gt;Processor (&lt;a href="https://www.techtarget.com/whatis/definition/processor"&gt;CPU&lt;/a&gt;) malfunctions.&lt;/li&gt; 
  &lt;li&gt;Graphics processing unit (&lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/GPU-graphics-processing-unit"&gt;GPU&lt;/a&gt;) malfunctions and motherboard &lt;a href="https://www.techtarget.com/whatis/definition/BIOS-basic-input-output-system"&gt;BIOS&lt;/a&gt; bugs.&lt;/li&gt; 
  &lt;li&gt;Power supply issues.&lt;/li&gt; 
  &lt;li&gt;Hardware running beyond its specification limits.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Software conflicts&lt;/h3&gt;
 &lt;p&gt;Various types of software issues can also lead to a BSOD, including the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Poorly written or incompatible &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/device-driver"&gt;device drivers&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Bugs in the OS kernel.&lt;/li&gt; 
  &lt;li&gt;Corrupted system files.&lt;/li&gt; 
  &lt;li&gt;Conflicts between system processes.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/tip/10-common-types-of-malware-attacks-and-how-to-prevent-them"&gt;Malware infections&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Recent software updates. As seen in the 2024 CrowdStrike incident, third-party software updates can also cause widespread BSOD issues by introducing kernel-level conflicts.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="Common BSOD stop codes"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Common BSOD stop codes&lt;/h2&gt;
 &lt;p&gt;During a BSOD, stop codes appear at the bottom of the screen. There are 270 &lt;a target="_blank" href="https://learn.microsoft.com/en-us/windows-hardware/drivers/debugger/bug-check-code-reference2" rel="noopener"&gt;stop codes&lt;/a&gt;, but most are exceptionally rare. The following are the most common:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;span style="font-family: 'courier new', courier, monospace;"&gt;KMODE_EXCEPTION_NOT_HANDLED&lt;/span&gt; is an error in the kernel process associated with incompatibility or equipment malfunction.&lt;/li&gt; 
  &lt;li&gt;&lt;span style="font-family: 'courier new', courier, monospace;"&gt;NTFS_FILE_SYSTEM&lt;/span&gt; is a drive error caused during read or write, usually due to data integrity on disk or in memory.&lt;/li&gt; 
  &lt;li&gt;&lt;span style="font-family: 'courier new', courier, monospace;"&gt;DATA_BUS_ERROR&lt;/span&gt; is the result of errors in RAM. The cause might be incompatible or defective memory sticks.&lt;/li&gt; 
  &lt;li&gt;&lt;span style="font-family: 'courier new', courier, monospace;"&gt;IRQL_NOT_LESS_OR_EQUAL&lt;/span&gt; is an error that might be due to a malfunction of the drivers, system services or incompatible software.&lt;/li&gt; 
  &lt;li&gt;&lt;span style="font-family: 'courier new', courier, monospace;"&gt;PAGE_FAULT_IN_NONPAGED_AREA&lt;/span&gt; is an error related to the swap file during operation of file systems or failure of a service or software.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Troubleshooting and resolving BSOD"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Troubleshooting and resolving BSOD&lt;/h2&gt;
 &lt;p&gt;By taking the following troubleshooting steps, it's often possible to quickly resolve a BSOD incident:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Document the error code.&lt;/b&gt; When a BSOD appears, users should write down the error code.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Reboot the system.&lt;/b&gt; Windows will attempt to determine the problem and fix it. In some instances, that will be enough to address the problem.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Review recent system changes.&lt;/b&gt; If the problem persists, users should think back to what they did before the BSOD occurred. Was a new program installed, driver updated, or new app installed or upgraded? If so, that might have caused the BSOD.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Run System File Checker.&lt;/b&gt; Corrupt system files are a common root cause of a BSOD.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Safe mode.&lt;/b&gt; Boot into safe mode to uninstall recent updates or drivers that might have caused the issue.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Test hardware.&lt;/b&gt; Test system RAM, monitor system temperatures and verify power supply integrity.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Consider a System Restore.&lt;/b&gt; If the error persists after a user installs a new program/hardware, updates a driver or installs a Windows update, consider a system rollback using &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/System-Restore"&gt;System Restore&lt;/a&gt;. This Windows feature takes a snapshot of a computer, OS and apps, and saves it for emergencies such as this.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Scan for malware.&lt;/b&gt; A virus check for a persistent BSOD is a good idea. Users should restart their computers in safe mode by hitting F5 at boot for the menu option and then run their antivirus software. An even better option is to have a USB drive with a preinstalled antivirus to boot from rather than the computer. However, users must plan ahead to create and use such a USB drive.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Use the Blue Screen Troubleshooter.&lt;/b&gt; Both Windows 10 and Window 11 have the Get Help app that integrates a useful troubleshooting tool. After rebooting in safe mode, type "Troubleshoot BSOD error" in the Get Help app and then follow the guided process to help troubleshoot BSOD issues.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Start over with a clean install.&lt;/b&gt; As a last-resort option, users can &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/How-to-perform-a-factory-reset-on-a-Windows-11-desktop"&gt;reset Windows&lt;/a&gt; or perform a &lt;a href="https://www.techtarget.com/searchitchannel/definition/clean-install"&gt;clean install&lt;/a&gt;. However, users should back up all important data to an external hard drive before reinstalling Windows.&lt;/li&gt; 
 &lt;/ol&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Prevention measures for BSOD"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Prevention measures for BSOD&lt;/h2&gt;
 &lt;p&gt;Though not all BSOD incidents can be easily prevented by users, the following steps can be taken to reduce the risk:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Keep Windows and drivers updated.&lt;/b&gt; Regularly update the Windows OS and device drivers to ensure compatibility and fix known issues.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Use reliable antivirus/antimalware software. &lt;/b&gt;Install and maintain up-to-date antivirus software with an active scanner and firewall to protect against malware that can potentially trigger a BSOD.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Monitor system performance.&lt;/b&gt; Use built-in Windows tools, including the Resource Monitor, to &lt;a href="https://www.techtarget.com/searchitoperations/feature/Compare-8-tools-for-IT-monitoring"&gt;keep an eye on system performance&lt;/a&gt; and identify potential issues before they cause a BSOD.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Maintain proper hardware cooling.&lt;/b&gt; Monitor system temperature and ensure the system is functioning correctly to prevent overheating. Part of that effort can be as easy as cleaning dust from fans and vents regularly.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Avoid overclocking.&lt;/b&gt; Refrain from overclocking system resources beyond manufacturer specifications, as this can lead to system instability and a BSOD.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Be cautious with new software installations.&lt;/b&gt; Only download and install software from reputable sources to minimize the risk of malware or incompatible programs.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Perform regular disk checks.&lt;/b&gt; Use Windows' built-in tools, such as CHKDSK, to scan for and repair disk errors that could lead to system crashes.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Run memory diagnostics.&lt;/b&gt; Periodically use the Windows Memory Diagnostic tool to check for RAM issues that could cause a BSOD.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Changes to the BSOD in late summer 2025"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Changes to the BSOD in late summer 2025&lt;/h2&gt;
 &lt;p&gt;In the announcement, Microsoft stated that a resilient organization has the ability to "maintain productivity and minimize disruptions," which is why they are moving away from the BSOD, in favor of "streamlining the unexpected restart experience."&lt;/p&gt;
 &lt;p&gt;As well as waving goodbye to the famous blue screen, Windows is incorporating quick machine recovery - a recovery mechanism for PCs - and improvements to crash dump collection to reduce restart time for users. Microsoft says these changes are part of a larger effort to reduce descriptions caused by unexpected restarts.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="BSOD in different Windows versions"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;BSOD in different Windows versions&lt;/h2&gt;
 &lt;p&gt;The BSOD screen has changed over the years across multiple versions of Windows.&lt;/p&gt;
 &lt;p&gt;Up to Windows 7, the BSOD was full of hardware information that was useless to most users.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/editorial/062819_SED_BSOD_Fig2.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/editorial/062819_SED_BSOD_Fig2_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/editorial/062819_SED_BSOD_Fig2_mobile.png 960w,https://www.techtarget.com/rms/editorial/062819_SED_BSOD_Fig2.png 1280w" alt="Screenshot of the former blue screen of death format." data-credit="TheWindowsClub.com" height="351" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;This is the old blue screen of death format.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Starting with Windows 8, it scaled down the amount of information and put a large sad emoticon on the screen. It also put a QR code on the screen so users can look up the cause of the blue screen with their smartphones.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/editorial/062819_SED_New-BSOD_Fig3.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/editorial/062819_SED_New-BSOD_Fig3_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/editorial/062819_SED_New-BSOD_Fig3_mobile.png 960w,https://www.techtarget.com/rms/editorial/062819_SED_New-BSOD_Fig3.png 1280w" alt="Screenshot of the blue screen of death format for Windows 10." data-credit="TheWindowsClub.com" height="270" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;This is the new BSOD format with Windows 10.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Windows 11 briefly experimented with a black screen before reverting to blue.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="The CrowdStrike BSOD"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The CrowdStrike BSOD&lt;/h2&gt;
 &lt;p&gt;Perhaps the most infamous BSOD ever occurred in July 2024 with the &lt;a href="https://www.techtarget.com/whatis/feature/Explaining-the-largest-IT-outage-in-history-and-whats-next"&gt;CrowdStrike incident&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;CrowdStrike is an endpoint security vendor whose technology is widely deployed across large enterprise and mission-critical operations across the transportation, &lt;a href="https://www.techtarget.com/healthtechsecurity/news/366596025/Global-IT-outage-forces-hospitals-to-cancel-appointments"&gt;healthcare&lt;/a&gt;, financial services and media sectors.&lt;/p&gt;
 &lt;p&gt;The CrowdStrike Falcon endpoint agent hooks into Microsoft as a Windows kernel process. A logic &lt;a href="https://www.techtarget.com/searchsecurity/news/366596023/Defective-CrowdStrike-update-triggers-mass-IT-outages"&gt;flaw in an automated update for CrowdStrike&lt;/a&gt; triggered a BSOD that had a massive impact on IT around the world.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="BSOD in non-Windows systems"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;BSOD in non-Windows systems&lt;/h2&gt;
 &lt;p&gt;A BSOD is specific to Microsoft Windows OS, but there are somewhat similar kinds of critical errors on non-Windows systems.&lt;/p&gt;
 &lt;p&gt;In both Linux and Apple macOS there is the concept of a &lt;a href="https://www.techtarget.com/searchdatacenter/definition/kernel-panic"&gt;kernel panic&lt;/a&gt;. That error screen can vary based on OS version. Much like a BSOD, a kernel panic is triggered by bad code interacting with the OS kernel, which then renders the system unstable.&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The blue screen of death (BSOD) -- also known as a stop error screen, blue screen error, fatal error or bugcheck -- is a critical error screen that can be displayed by Microsoft Windows operating systems (OSes).</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/1.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/definition/blue-screen-of-death-BSOD</link>
            <pubDate>Wed, 02 Jul 2025 00:00:00 GMT</pubDate>
            <title>What is the blue screen of death (BSOD)?</title>
        </item>
        <item>
            <body>&lt;p&gt;Active Directory (AD) is Microsoft's proprietary directory service that enables network admins to manage users, permissions and their access to networking resources. It runs on &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Windows-Server-OS-operating-system"&gt;Windows Server&lt;/a&gt; and stores information about &lt;a href="https://www.techtarget.com/searchapparchitecture/definition/object"&gt;objects&lt;/a&gt;, such as shared network resources, on a corporate network in a logical, hierarchical format. This enables administrators to manage those resources, as well as the users who need to access those resources to get their work done.&lt;/p&gt; 
&lt;p&gt;A &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/domain-controller"&gt;domain controller&lt;/a&gt; is needed to run the AD service. A &lt;a href="https://www.techtarget.com/whatis/definition/domain"&gt;domain&lt;/a&gt; controller is a server running a version of the Windows Server operating system that has Active Directory Domain Services (&lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Active-Directory-Domain-Services-AD-DS"&gt;AD DS&lt;/a&gt;) installed. By installing AD DS, admins can configure a specific server role for a computer, such as the role of a domain controller.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is the role of Active Directory and what is it used for?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is the role of Active Directory and what is it used for?&lt;/h2&gt;
 &lt;p&gt;Active Directory stores data about all the objects on a network. An object is a single element, such as a user, group, application or shared device, such as a server or printer. Objects are normally defined as either resources, such as printers or computers, or security principals, such as users or groups.&lt;/p&gt;
 &lt;p&gt;Active Directory uses a set of rules known as the &lt;i&gt;&lt;a href="https://www.techtarget.com/searchdatamanagement/definition/schema"&gt;schema&lt;/a&gt;&lt;/i&gt; to define object classes and their attributes. The schema also determines the format of each object's name. AD also includes a global catalog that contains information about all the objects. The schema and global catalog make it easy for network admins to identify and manage objects. Also, by storing relevant information about user accounts on a network, such as their names and passwords, AD enables other authorized users and admins on that network to access this information.&lt;/p&gt;
 &lt;p&gt;AD also enables admins, users and applications to publish and find objects and the objects' properties. They can do this via AD's &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/query"&gt;query&lt;/a&gt; and index mechanism. Additionally, AD provides a &lt;a href="https://www.techtarget.com/searchdisasterrecovery/definition/data-replication"&gt;replication&lt;/a&gt; service that has two roles. It ensures that all domain controllers in a network contain a complete copy of all directory information for their domain, and it ensures that any change to the data in the directory is replicated to all domain controllers in the domain. By maintaining replicas of directory data on all domain controllers, the replication service ensures the directory's availability and also optimizes its performance for all users.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_server-active_directory-h.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_server-active_directory-h_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_server-active_directory-h_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/windows_server-active_directory-h.png 1280w" alt="what are the services in Active Directory graphic" height="304" width="279"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Microsoft Active Directory provides a variety of services to manage network security and control access to applications and other resources.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="What is Active Directory Domain Services?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is Active Directory Domain Services?&lt;/h2&gt;
 &lt;p&gt;In older versions of Windows Server -- Windows 2000 Server and Windows Server 2003 -- the directory service was named Active Directory. However, from Windows Server 2008 R2 and Windows Server 2008 onward, Microsoft changed the name of the directory service to Active Directory Domain Services.&lt;/p&gt;
 &lt;p&gt;AD DS stores directory information, including information about user accounts. It does this using a &lt;a href="https://www.techtarget.com/whatis/definition/structured-data"&gt;structured data&lt;/a&gt; store known as the &lt;i&gt;directory&lt;/i&gt;. This directory enables the directory information to be organized in a logical and hierarchical format. AD DS also makes directory data available to authorized network users and administrators, allowing them to access it as required.&lt;/p&gt;
 &lt;p&gt;As with AD, AD DS includes a replication system that automatically builds and updates the global catalog server, which is a domain controller. This catalog stores a full, writable replica of all objects and their attributes in a domain, as well as partial, &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Read-only"&gt;read-only&lt;/a&gt; replicas of all the other domains in the &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Active-Directory-forest-AD-forest"&gt;forest&lt;/a&gt;. Such attribute replication makes it easy for users and admins to search for objects in AD DS.&lt;/p&gt;
 &lt;p&gt;AD DS provides security through built-in sign-in &lt;a href="https://www.techtarget.com/searchsecurity/definition/authentication"&gt;authentication&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchsecurity/definition/access-control"&gt;access control&lt;/a&gt; mechanisms. These mechanisms allow authorized users to access network resources and enable admins to easily manage directory data and organization throughout the network using a single network username and password.&lt;/p&gt;
 &lt;p&gt;To further support network admins, AD DS provides policy-based administration. This enables admins to easily manage even complex networks.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Active Directory modes, protocols and services"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Active Directory modes, protocols and services&lt;/h2&gt;
 &lt;p&gt;Several different services constitute Active Directory. The main service is Domain Services, but Active Directory also has the following other services:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;strong&gt;Active Directory Lightweight Directory Services (AD LDS)&lt;/strong&gt; is an independent mode of AD, meaning it operates independently of AD domains or forests and can be installed without affecting AD. It provides directory services for applications, including a data store, and uses standard application programming interfaces (&lt;a href="https://www.techtarget.com/searchapparchitecture/definition/application-program-interface-API"&gt;APIs&lt;/a&gt;) to access application data. However, it doesn't include AD's infrastructure features.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Lightweight Directory Access Protocol (&lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/LDAP"&gt;LDAP&lt;/a&gt;)&lt;/strong&gt; is a directory service protocol used to access and maintain directories over a network. Based on a &lt;a href="https://www.techtarget.com/searchnetworking/definition/client-server"&gt;client-server&lt;/a&gt; model, LDAP runs on a layer above the &lt;a href="https://www.techtarget.com/searchnetworking/definition/TCP-IP"&gt;TCP/IP&lt;/a&gt; stack. LDAP cannot be used to create directories or to specify how a directory service should operate. Its main function is to help with directory management.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Active Directory Certificate Services (AD CS)&lt;/strong&gt; is used to generate, manage and share &lt;a href="https://www.techtarget.com/searchsecurity/definition/PKI"&gt;public key infrastructure&lt;/a&gt; certificates. A certificate uses encryption to enable a user to exchange information over the internet securely with a &lt;a href="https://www.techtarget.com/searchsecurity/definition/public-key"&gt;public key&lt;/a&gt;. These certificates provide confidentiality through encryption; authenticate computers, users and device accounts on a network; and help to maintain the integrity of digital documents through &lt;a href="https://www.techtarget.com/searchsecurity/definition/digital-signature"&gt;digital signatures&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Active Directory Federation Services (&lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/Active-Directory-Federation-Services-AD-Federation-Services"&gt;AD FS&lt;/a&gt;)&lt;/strong&gt; authenticates user access to multiple applications -- even on different networks -- using single sign-on (&lt;a href="https://www.techtarget.com/searchsecurity/definition/single-sign-on"&gt;SSO&lt;/a&gt;). As the name indicates, SSO only requires the user to sign on once rather than use multiple dedicated authentication keys for each service. By allowing the secure sharing of digital identity and entitlements rights across security and enterprise boundaries, AD FS helps to streamline user experiences as they access internet-facing applications.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Active Directory Rights Management Services (AD RMS)&lt;/strong&gt; enables organizations to protect their documents using information rights management (&lt;a href="https://www.techtarget.com/searchcontentmanagement/definition/information-rights-management-IRM"&gt;IRM&lt;/a&gt;). With AD RMS, they can create IRM policies to specify who can access sensitive information, thus preventing its use or misuse by unauthorized people.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/SK8Yw-CiRHk?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Key features of AD and AD DS logical model"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Key features of AD and AD DS logical model&lt;/h2&gt;
 &lt;p&gt;Active Directory Domain Services uses a logical model consisting of forests, domains and organizational units (&lt;a href="https://www.techtarget.com/searchwindowsserver/definition/organizational-unit-OU"&gt;OUs&lt;/a&gt;). This model is important because it provides a way to do the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Store and manage information about network resources.&lt;/li&gt; 
  &lt;li&gt;Store and manage application-specific data from directory-enabled applications.&lt;/li&gt; 
  &lt;li&gt;Enable administrators to organize users, computers, devices and other elements of a network into a hierarchical containment structure.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Different objects, such as users and devices that share the same database, are on the same domain. A &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Active-Directory-tree-AD-tree"&gt;tree&lt;/a&gt; is one or more domains grouped together with hierarchical trust relationships. A forest is a group of multiple trees. Forests provide security boundaries, while domains -- which share a common database -- can be managed for settings such as authentication and encryption. These different elements have the following functions:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;A &lt;b&gt;forest &lt;/b&gt;is the top-level container in AD DS. It refers to a group of one or more AD domains. It provides a common logical structure for those domains and automatically links them with two-way, transitive trust relationships. These relationships enable AD DS to provide security across multiple domains or forests. They also enable domains to extend authentication services to users in domains outside their own forest.&lt;/li&gt; 
  &lt;li&gt;A &lt;b&gt;domain &lt;/b&gt;is a container or partition within a forest. It provides network-wide user identity, so user identities need to be created only once. Once that is done, they can be referenced on any computer joined to the forest in which that domain is located. Domains use one or more domain controllers to store user accounts and user credentials, provide authentication services for users and control access to network resources. A domain controller for a particular domain has a copy of the directory for the entire domain in which it is located.&lt;/li&gt; 
  &lt;li&gt;An &lt;b&gt;OU&lt;/b&gt; is the smallest element of the AD DS logical model. OUs form a hierarchy of containers within a domain. Admins typically use OUs to simplify administrative tasks, such as the application of &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Group-Policy"&gt;Group Policies&lt;/a&gt;. OUs are also useful for the delegation of authority, which allows owners to transfer administrative control -- full or limited -- over objects to other users or groups in order to simplify the management of those objects.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;The domain-forest-OU model of AD DS applies regardless of the &lt;a href="https://www.techtarget.com/searchnetworking/definition/network-topology"&gt;network topology&lt;/a&gt; and the number of domain controllers required within each domain.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/windowsserver-domain_forest_configuration-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/windowsserver-domain_forest_configuration-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/windowsserver-domain_forest_configuration-f_mobile.png 960w,https://www.techtarget.com/rms/onlineImages/windowsserver-domain_forest_configuration-f.png 1280w" alt="domain forest configuration diagram" height="358" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Microsoft uses a tree and forest arrangement to create hierarchies with Active Directory to manage network assets and user access to network resources.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Key features of AD and Active Directory Domain Services"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Key features of AD and Active Directory Domain Services&lt;/h2&gt;
 &lt;p&gt;One of the main features of AD and AD DS is that they use a structured and hierarchical data store to logically organize and publish directory information, i.e., information about the objects stored in the AD DS directory. These objects may include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Users.&lt;/li&gt; 
  &lt;li&gt;Groups.&lt;/li&gt; 
  &lt;li&gt;Computers.&lt;/li&gt; 
  &lt;li&gt;Domains.&lt;/li&gt; 
  &lt;li&gt;OUs.&lt;/li&gt; 
  &lt;li&gt;Security policies.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;A standardized schema is used to define object classes, attributes and names, as well as the constraints and limits on instances of these objects. The default schema in AD is modeled after the International Organization for Standardization &lt;a href="https://www.techtarget.com/searchsecurity/definition/X509-certificate"&gt;X.500&lt;/a&gt; series of standards for directory services. It is also extensible, meaning classes and attributes can be added to it and modified as needed. The AD schema is stored in the schema directory partition and replicated to all domain controllers in a forest.&lt;/p&gt;
 &lt;p&gt;Another important feature of AD is that it uses four directory partition types to store and copy different types of data in the Ntds.dit file on a domain's domain controller. Users and administrators can access this information throughout a domain. A directory partition typically contains data about a domain, configuration, schema and applications.&lt;/p&gt;
 &lt;p&gt;AD and AD DS feature a query and index mechanism. This mechanism enables network users or applications to find objects and their properties stored in AD. Finally, AD's replication service distributes directory data across a network. AD includes Knowledge Consistency Checker, which automatically creates replication connections from a source domain controller to a destination domain controller and generates the replication topology for the AD forest.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Trusting terminology"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Trusting terminology&lt;/h2&gt;
 &lt;p&gt;Active Directory relies on &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Best-Practices-for-Active-Directory-Forest-Trusts"&gt;trusts&lt;/a&gt; to facilitate authentication and to provide security across multiple domains or forests. These trust relationships apply to both domains and forests in AD. AD trusts work properly only if every resource has a direct trust path to a domain controller in the domain in which it is located. Also, to enable facilitation, Windows checks if a domain being requested by a user or computer already has a trust relationship with the requesting account's domain.&lt;/p&gt;
 &lt;p&gt;The most important trust-related terms used in AD include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;A &lt;b&gt;one-way trust&lt;/b&gt; is when a first domain (Domain A) allows access privileges to users on a second domain (Domain B). However, Domain B does not allow users access to Domain A. Simply put, it is a unidirectional authentication path between Domains A and B.&lt;/li&gt; 
  &lt;li&gt;A &lt;b&gt;two-way trust&lt;/b&gt; is when two domains trust each other. Thus, authentication requests can be passed between these domains, meaning each domain enables access to users of the other domain.&lt;/li&gt; 
  &lt;li&gt;A &lt;b&gt;trusted domain &lt;/b&gt;is a single domain that enables user access to another domain, which is called the &lt;i&gt;trusting domain&lt;/i&gt;. Forests used trusted domain objects to store all of the trusted namespaces, such as domain tree names, &lt;a href="https://www.techtarget.com/whatis/definition/User-Principal-Name-UPN"&gt;user principal name&lt;/a&gt; suffixes, service principal name suffixes and &lt;a href="https://www.techtarget.com/searchsecurity/definition/security-identifier"&gt;security identifier&lt;/a&gt; namespaces used in partner forests.&lt;/li&gt; 
  &lt;li&gt;A &lt;b&gt;transitive trust&lt;/b&gt; can extend beyond two domains and allow access to other trusted domains within a forest. In AD, a two-way, transitive trust relationship is automatically established between new domains and parent domains in a forest.&lt;/li&gt; 
  &lt;li&gt;A &lt;b&gt;nontransitive trust&lt;/b&gt; is a one-way trust that is limited to two domains. It is typically used to deny trust relationships with other domains.&lt;/li&gt; 
  &lt;li&gt;A &lt;b&gt;forest trust&lt;/b&gt; provides seamless authentication and authorization across multiple AD forests, thus enabling access to resources and other objects in those forests. It can be one-way or two-way transitive.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="History and development of Active Directory"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;History and development of Active Directory&lt;/h2&gt;
 &lt;p&gt;Microsoft offered a preview of Active Directory in 1999 and released it a year later with Windows 2000 Server. Microsoft continued to develop new features with each successive Windows Server release.&lt;/p&gt;
 &lt;p&gt;Windows Server 2003 included a notable update to add forests and the ability to edit and change the position of domains within forests. Domains on Windows 2000 Server could not support newer AD updates running in Server 2003.&lt;/p&gt;
 &lt;p&gt;Windows Server 2008 introduced AD FS. Additionally, Microsoft rebranded the directory for domain management as AD DS, and AD became an umbrella term for the directory-based services it supported. AD DS is available in all the latest versions of Windows Server, including Windows Server 2016, Windows Server 2019, Windows Server 2022 and Windows Server 2025.&lt;/p&gt;
 &lt;p&gt;Windows Server 2016 updated AD DS to improve AD security and migrate AD environments to cloud or &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/hybrid-cloud"&gt;hybrid cloud&lt;/a&gt; environments. Security updates included the addition of privileged access management. &lt;a href="https://www.techtarget.com/searchsecurity/definition/privileged-access-management-PAM"&gt;PAM&lt;/a&gt; monitors access to an object, the type of access granted and what actions the user takes. PAM adds bastion AD forests to provide an additional secure and isolated forest environment. Windows Server 2016 ended support for devices on Windows Server 2003.&lt;/p&gt;
 &lt;p&gt;In December 2016, Microsoft released Azure AD Connect, now called Microsoft Entra Connect, to join an on-premises Active Directory system with &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Windows-Azure-Active-Directory-Windows-Azure-AD"&gt;Azure AD&lt;/a&gt;, now called Microsoft Entra ID. Through this integration, organizations could connect all the identities and access controls on their local networks with Microsoft's cloud services, such as &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Microsoft-Office-365-suite"&gt;Office 365&lt;/a&gt;, and enable user-friendly SSO for those services. Azure AD Connect worked with systems running Windows Server 2008, Windows Server 2012, Windows Server 2016 and Windows Server 2019. All 1.x versions of Azure AD Connect were retired on Aug. 31, 2022.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Domains vs. workgroups"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Domains vs. workgroups&lt;/h2&gt;
 &lt;p&gt;A &lt;i&gt;workgroup&lt;/i&gt; is Microsoft's term for Windows machines connected over a &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/peer-to-peer-network-P2P-network"&gt;peer-to-peer (P2P) network&lt;/a&gt;. Workgroups are another unit of organization for Windows computers in networks. Workgroups enable these machines to share files, internet access, printers and other resources over the network. P2P networking removes the need for a server for authentication. There are several differences between domains and workgroups:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Domains, unlike workgroups, can host computers from different local networks.&lt;/li&gt; 
  &lt;li&gt;Domains can be used to host many more computers than workgroups. Domains can include thousands of computers; workgroups typically have an upper limit of close to 20.&lt;/li&gt; 
  &lt;li&gt;In domains, at least one server is a computer, which is used to control permissions and security features for every computer within the domain. In workgroups, there is no server, and computers are all peers.&lt;/li&gt; 
  &lt;li&gt;Domain users typically require security identifiers, such as logins and passwords, unlike workgroups.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Main competitors to Active Directory"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Main competitors to Active Directory&lt;/h2&gt;
 &lt;p&gt;Other directory services on the market that provide similar functionality to AD include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Red Hat Directory Server&lt;/b&gt; is an LDAP-based directory that manages user access to multiple systems in &lt;a href="https://www.techtarget.com/searchdatacenter/definition/Unix"&gt;Unix&lt;/a&gt; environments. It provides a network-based registry to centralize identity information and includes user ID- and certificate-based authentication to restrict access to data in the directory. In addition, it provides centralized, fine-grained access control over the directory and enhanced data protection, even if the number of systems and users increases.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Apache Directory&lt;/b&gt; is an &lt;a href="https://www.techtarget.com/whatis/definition/open-source"&gt;open source&lt;/a&gt; project that runs on &lt;a href="https://www.theserverside.com/definition/Java"&gt;Java&lt;/a&gt; and operates on any LDAP server, including systems on Windows, &lt;a href="https://www.techtarget.com/whatis/definition/Mac-OS"&gt;macOS&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchdatacenter/definition/Linux-operating-system"&gt;Linux&lt;/a&gt;. It provides an LDAP v3-compliant directory server and an &lt;a href="https://www.techtarget.com/searchapparchitecture/definition/Eclipse-Eclipse-Foundation"&gt;Eclipse&lt;/a&gt;-based directory tool called Apache Directory Studio. Additionally, the software includes an Apache Directory LDAP API that provides a convenient way to access all types of LDAP servers.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;OpenLDAP &lt;/b&gt;is another open source alternative to AD. Specifically, it is an open source implementation of LDAP, with modules like a standalone LDAP load balancer &lt;a href="https://www.techtarget.com/whatis/definition/daemon"&gt;daemon&lt;/a&gt;; standalone LDAP daemon (server); and various libraries, tools and sample clients to implement LDAP.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;em&gt;IT must carefully manage various Group Policies for desktops to ensure the correct policies are implemented. Learn when &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/When-does-AD-domain-joined-Group-Policy-override-local"&gt;AD domain-joined Group Policy overrides local&lt;/a&gt;. &lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Active Directory (AD) is Microsoft's proprietary directory service that enables network admins to manage users, permissions and their access to networking resources.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/5.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/definition/Active-Directory</link>
            <pubDate>Fri, 11 Apr 2025 09:00:00 GMT</pubDate>
            <title>What is Active Directory (AD)?</title>
        </item>
        <item>
            <body>&lt;p&gt;A Windows zero-day under active exploitation should take the top of the patching priority list this month, but admins should carve out time to handle three other vulnerabilities that require manual intervention.&lt;/p&gt; 
&lt;p&gt;Microsoft delivered corrections for 121 vulnerabilities on April Patch Tuesday with 11 rated critical and the remainder with a severity level of important. Most of the vulnerabilities reside in the Windows operating system with 90, but Microsoft Office ranks second with 20 flaws requiring patches.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Microsoft corrects exploited Windows zero-day"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Microsoft corrects exploited Windows zero-day&lt;/h2&gt;
 &lt;p&gt;This month's most pressing vulnerability is a Windows Common Log File System Driver elevation-of-privilege flaw, CVE-2025-29824, rated important with a CVSS rating of 7.8. It affects most Windows Server and desktop systems, but patches for Windows 10 for x64-based and 32-bit systems were not immediately available.&lt;/p&gt;
 &lt;p&gt;An attacker with local access -- either physically or via some &lt;a href="https://www.techtarget.com/searchwindowsserver/tutorial/PowerShell-7-remoting-expands-management-horizons"&gt;remote access tool&lt;/a&gt; -- only needs a regular user account to use the exploit code.&lt;/p&gt;
 &lt;p&gt;"In this case, the attacker will gain full system privileges, so they own the box. That puts Windows as our highest-risk update this month," said Chris Goettl, vice president of product management for security products at Ivanti.&lt;/p&gt;
 &lt;p&gt;Microsoft said a ransomware group called Storm-2460 targeted organizations across the U.S., Venezuela, Spain and Saudi Arabia. Storm-2460 would infiltrate vulnerable systems, gain system-level privileges for unrestricted control of the machine and then deploy its malware.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="3 vulnerabilities will require extra work"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3 vulnerabilities will require extra work&lt;/h2&gt;
 &lt;p&gt;In some instances, applying the Microsoft security updates will not completely stop a threat. Administrators must take additional steps with mitigations for three vulnerabilities this month to keep their Windows systems safe.&lt;/p&gt;
 &lt;p&gt;The first is a Windows Kerberos elevation-of-privilege vulnerability, CVE-2025-26647, rated important with an 8.1 CVSS score. This flaw only affects Windows Server systems.&lt;/p&gt;
 &lt;p&gt;Until corrected in vulnerable systems, &lt;a href="https://www.techtarget.com/searchsecurity/definition/Kerberos"&gt;Kerberos&lt;/a&gt; -- the network authentication protocol in Windows -- will not properly validate input, which an attacker can exploit to escalate their privileges. The attacker only needs network access, but Microsoft rates the attack complexity as high, meaning that the threat actor must set the right conditions to trigger the exploit.&lt;/p&gt;
 &lt;p&gt;"An authenticated attacker could exploit this vulnerability by establishing a machine-in-the-middle (MITM) attack or other local network spoofing technique, then sending a malicious Kerberos message to the client victim machine to spoof itself as the Kerberos authentication server," Microsoft wrote.&lt;/p&gt;
 &lt;p&gt;Even after installing the April Patch Tuesday update, &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/New-Active-Directory-features-coming-in-Windows-Server-2025"&gt;Windows domain controllers will still be vulnerable&lt;/a&gt; until administrators enable protections by manually changing registry settings. This is the first step in another three-phase rollout designed to help organizations avoid authentication failures and service outages by performing an audit on systems to find noncompliant certificates.&lt;/p&gt;
 &lt;p&gt;"For this one in particular, Microsoft is concerned that the fix is going to cause problems for organizations," Goettl said. "So, while they've pushed the update, it is not turned on until you choose to do so. So, there is an additional step that needs to be taken there."&lt;/p&gt;
 &lt;p&gt;In the next phase, slated to start on July 8, installing that month's security update on the domain controllers will start the Enforced by Default phase, which gives admins the option to switch a system back to Audit mode to make any adjustments. In the final phase, on Oct. 14, Microsoft will switch domain controllers to Enforcement mode and remove the ability to make further registry changes.&lt;/p&gt;
 &lt;p&gt;The second flaw requiring further mitigation work is a Windows New Technology File System (NTFS) information disclosure vulnerability, CVE-2025-21197, rated important with a CVSS score of 6.5. It affects Windows Server and desktop systems. Patches for Windows 10 systems were not immediately available.&lt;/p&gt;
 &lt;p&gt;"To mitigate against possible application compatibility risks, the fix to address this vulnerability has been released as disabled by default. However, administrators have been given the ability to enable this behavior if needed through a registry key," Microsoft wrote.&lt;/p&gt;
 &lt;p&gt;Related to this vulnerability is a Windows &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Resilient-File-System-ReFS"&gt;Resilient File System&lt;/a&gt; (ReFS) information disclosure flaw, CVE-2025-27738, rated important for Windows Server and desktop systems with a CVSS rating of 6.5.&lt;/p&gt;
 &lt;p&gt;Microsoft is disabling the fix for both CVE-2025-27738 and CVE-2025-21197 by default to avoid potential application compatibility issues. The company instructs customers to follow the directions &lt;a target="_blank" href="https://support.microsoft.com/en-us/topic/access-check-enhancements-to-prevent-unauthorized-disclosure-of-file-paths-25750bf2-46b8-48b1-b2e6-cc9fc613656a" rel="noopener"&gt;at this link&lt;/a&gt; to manually enable the correction via a registry key. The fix will enhance access checks on NTFS and ReFS volumes to prevent unauthorized users from viewing the full file path to a resource.&lt;/p&gt;
&lt;/section&gt;            
&lt;section class="section main-article-chapter" data-menu-title="Other security updates of note for April Patch Tuesday"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Other security updates of note for April Patch Tuesday&lt;/h2&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Two Microsoft SharePoint remote code execution vulnerabilities, CVE-2025-29793 and CVE-2025-29794, are rated important with CVSS 7.2 and 8.8 scores, respectively. Microsoft gave the flaws an exploitability assessment of "exploitation more likely." These vulnerabilities are particularly dangerous due to the low attack complexity, lack of requiring user interaction and fact that the threat actor only needs basic user privileges.&lt;/li&gt; 
  &lt;li&gt;Microsoft released four fixes in its developer tools ecosystem: Visual Studio (CVE-2025-29802, CVSS rating 7.3), Visual Studio (CVE-2025-29804, CVSS rating 7.3), Visual Studio Code (CVE-2025-20570, CVSS rating 6.8) and Visual Studio Tools for Applications and SQL Server Management Studio (CVE-2025-29803, CVSS rating 7.3). While they all have an exploitability assessment of "exploitation less likely," it is important for enterprises to quickly &lt;a href="https://www.techtarget.com/searchsecurity/tip/Top-4-source-code-security-best-practices"&gt;close security holes in developer tools&lt;/a&gt; to prevent a threat actor from accessing sensitive information or adding malicious code to a product.&lt;/li&gt; 
  &lt;li&gt;A Microsoft System Center elevation-of-privilege vulnerability, CVE-2025-27743, is rated important with a CVSS score of 7.8. Microsoft said the flaw is triggered by reusing System Center installer .exe files, and customers should delete the files and download the latest version of their System Center product as a .zip file.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="Microsoft cancels plan to stop driver support in WSUS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Microsoft cancels plan to stop driver support in WSUS&lt;/h2&gt;
 &lt;p&gt;Microsoft said it would delay its plan to end driver update synchronization to Windows Server Update Services (WSUS) servers planned this month on April 18. The company said feedback from customers with disconnected device scenarios spurred Microsoft to change its decision.&lt;/p&gt;
 &lt;p&gt;Microsoft deprecated WSUS driver synchronization, but will continue to support it. The company recommends that customers &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/SCCM-driver-management-strategies-for-the-modern-world"&gt;explore other options&lt;/a&gt;, such as Microsoft Intune and Windows Autopatch.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Tom Walat is the site editor for Informa TechTarget's SearchWindowsServer site.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Microsoft delivers fixes for 121 vulnerabilities with 11 rated critical this month. Admins will have extra mitigation work to correct three flaws.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_a296619547.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/news/366622229/Exploited-Windows-zero-day-addressed-on-April-Patch-Tuesday</link>
            <pubDate>Wed, 09 Apr 2025 11:43:00 GMT</pubDate>
            <title>Exploited Windows zero-day addressed on April Patch Tuesday</title>
        </item>
        <item>
            <body>&lt;p&gt;A domain controller is a server that processes authentication requests from users and computers within a computer &lt;a href="https://www.techtarget.com/whatis/definition/domain"&gt;domain&lt;/a&gt;. Domain &lt;a href="https://www.techtarget.com/whatis/definition/controller"&gt;controllers&lt;/a&gt; are most commonly used in Windows &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Active-Directory"&gt;Active Directory&lt;/a&gt; (AD) domains, but are also used with other types of identity management systems.&lt;/p&gt; 
&lt;p&gt;Domain controllers maintain directory service information for their domains, including users, &lt;a href="https://www.techtarget.com/searchsecurity/definition/authentication"&gt;authentication&lt;/a&gt; credentials and enterprise &lt;a href="https://www.techtarget.com/searchsecurity/definition/security-policy"&gt;security policies&lt;/a&gt;.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What are the main functions of a domain controller?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the main functions of a domain controller?&lt;/h2&gt;
 &lt;p&gt;Domain controllers restrict access to domain resources by authenticating user identity through login credentials and preventing unauthorized access to those resources.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_server-active_directory-h.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_server-active_directory-h_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_server-active_directory-h_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/windows_server-active_directory-h.png 1280w" alt="Graphic listing the services in Active Directory." height="304" width="279"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Domain services, such as those that domain controllers provide, are just one part of Microsoft Active Directory.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Domain controllers apply security policies to requests for access to domain resources. For example, in a &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Active-Directory-domain-AD-domain"&gt;Windows AD domain&lt;/a&gt;, the domain controller draws authentication information for user accounts from AD.&lt;/p&gt;
 &lt;p&gt;A domain controller can operate as a single system, but is usually implemented in &lt;a href="https://www.techtarget.com/whatis/definition/cluster"&gt;clusters&lt;/a&gt; for improved reliability and availability. For domain controllers running under Windows AD, each cluster comprises a primary domain controller and one or more backup domain controllers.&lt;/p&gt;
 &lt;p&gt;Insecure sites can use a read-only domain controller to speed up authentication. In &lt;a href="https://www.techtarget.com/searchdatacenter/definition/Unix"&gt;Unix&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchdatacenter/definition/Linux-operating-system"&gt;Linux&lt;/a&gt; environments, domain controllers can manage &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/LDAP"&gt;Lightweight Directory Access Protocol&lt;/a&gt; domains.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Why is securing a domain controller important?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why is securing a domain controller important?&lt;/h2&gt;
 &lt;p&gt;Domain controllers authorize all domain access, blocking unauthorized access to domain resources while allowing users access to authorized directory services. They also store many of the secrets that a domain uses to protect users and data. If someone gains unauthorized access to a domain controller, they can quickly gain access to all the data stored on the network, making domain controllers a primary target for attackers.&lt;/p&gt;
 &lt;p&gt;It is important to harden the domain controller with additional security mechanisms, such as the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchsecurity/definition/firewall"&gt;Firewalls&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Isolated networks.&lt;/li&gt; 
  &lt;li&gt;Security protocols and encryption to protect stored data and data in transit.&lt;/li&gt; 
  &lt;li&gt;Restricted use of insecure protocols, such as &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Remote-Desktop-Protocol-RDP"&gt;Remote Desktop Protocol&lt;/a&gt;, on controllers.&lt;/li&gt; 
  &lt;li&gt;Deployment in a physically restricted location for security.&lt;/li&gt; 
  &lt;li&gt;Expedited patch and configuration management.&lt;/li&gt; 
  &lt;li&gt;Blocking internet access for domain controllers.&lt;/li&gt; 
  &lt;li&gt;Dedicated administrator accounts.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="How are domain controllers set up in Active Directory?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How are domain controllers set up in Active Directory?&lt;/h2&gt;
 &lt;p&gt;The domain controller is the central server in a Windows AD domain. Domain controllers are servers that can use AD to respond to authentication requests.&lt;/p&gt;
 &lt;p&gt;Experts advise against relying on a single domain controller, even for smaller organizations. Best practices call for one primary domain controller and at least one backup domain controller to avoid downtime caused by &lt;a href="https://www.computerweekly.com/feature/Uptime-and-availability-Making-sense-of-supplier-SLAs"&gt;system unavailability&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Domain controllers can be deployed on physical servers, running as &lt;a href="https://www.techtarget.com/searchitoperations/definition/virtual-machine-VM"&gt;virtual machines&lt;/a&gt; (VMs) or as part of a &lt;a href="https://www.techtarget.com/searchcloudcomputing/feature/A-cloud-services-cheat-sheet-for-AWS-Azure-and-Google-Cloud"&gt;cloud directory service&lt;/a&gt;. It is best practice to deploy each domain controller on a standalone server. This includes virtual domain controllers, which should run on VMs running on different physical hosts. This minimizes the possibility of a compromise on another machine affecting the domain controller.&lt;/p&gt;
 &lt;p&gt;Setting up an AD domain controller includes the following steps:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Domain assessment.&lt;/b&gt; The first step in setting up a domain controller is to assess the domain in which the controller will be set up. This assessment includes determining what types of domain controllers are needed, where they will be located and how they interoperate with existing systems in the domain.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;New deployment or addition.&lt;/b&gt; Whether planning for a new deployment of AD domain controllers or adding a new controller for an existing domain, determine the domain controller location as well as the resources needed to run the centralized domain controller and any virtual domain controllers.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security by design.&lt;/b&gt; It's imperative to secure a domain controller from internal or external attacks. The domain controller architecture must also be designed to withstand service disruptions such as loss of connectivity, loss of power or system failures.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Specifics for &lt;a target="_blank" href="https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/deploy/install-active-directory-domain-services--level-100-" rel="noopener"&gt;setting up&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Configure-domain-controllers-after-Server-2025-upgrade%20"&gt;configuring AD domain controllers&lt;/a&gt; vary depending on the version of &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Windows-Server-OS-operating-system"&gt;Windows Server&lt;/a&gt; used on the domain.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/xBVauAnUT0s?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="Other domain controller implementation options"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Other domain controller implementation options&lt;/h2&gt;
 &lt;p&gt;The following options are available when setting up a domain controller with AD:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Domain Name System server.&lt;/b&gt; The &lt;a href="https://www.techtarget.com/searchnetworking/definition/domain-name-system"&gt;DNS&lt;/a&gt; domain controller can be configured to function as a DNS server. The DNS service provides the mapping of the computer name to its associated Internet Protocol address.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Global catalog capabilities.&lt;/b&gt; The domain controller can be configured to use the global catalog, which enables the controller to return AD information about any object in the organization forest, regardless of whether the object is in the same domain as the domain controller. This is useful for large enterprises with multiple AD domains.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Read-only domain controller.&lt;/b&gt; Domain controllers used in branch offices or in other circumstances where network connectivity is limited can be configured as read-only.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Directory Services Restore Mode.&lt;/b&gt; &lt;a href="https://searchwindowsserver.techtarget.com/definition/Directory-Services-Restore-Mode-DSRM"&gt;DSRM&lt;/a&gt; enables emergency maintenance, including restoring backups, on the domain controller. A DSRM password must be configured in advance.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Certificate services.&lt;/b&gt; Certificate services enable a domain controller to issue and authenticate certificates for authentication and encryption.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Group policy.&lt;/b&gt; Domain controllers host AD group policies, which can be used to enforce security settings on domain member servers and clients.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Distributed file system.&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchstorage/definition/distributed-file-system-DFS"&gt;DFS&lt;/a&gt; uses multiple file servers to host shared files. The servers can automatically replicate files and hide the underlying server structure from end users.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;The same server can host other Windows services, such as a file share or print server. However, this is not recommended, as these other services could compromise the domain controller.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="What are the benefits of domain controllers?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the benefits of domain controllers?&lt;/h2&gt;
 &lt;p&gt;Domain controller benefits include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Centralized management of authentication enables organizations to authenticate all access requests with a single set of credentials.&lt;/li&gt; 
  &lt;li&gt;Enforcement of security policies, such as password age, complexity and lockout, helps to prevent unauthorized access across an enterprise.&lt;/li&gt; 
  &lt;li&gt;Access to &lt;a href="https://www.techtarget.com/searchnetworking/definition/file-server"&gt;file servers&lt;/a&gt;, email and other network resources through domain controllers provides seamless integration with Microsoft AD.&lt;/li&gt; 
  &lt;li&gt;Support for secured authentication and transport protocols in domain controllers improves authentication process security.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/benefits_and_limitations_of_domain_controllers-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/benefits_and_limitations_of_domain_controllers-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/benefits_and_limitations_of_domain_controllers-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/benefits_and_limitations_of_domain_controllers-f.png 1280w" alt="Chart comparing the benefits and limitations of domain controllers." height="235" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Domain controllers help large organizations protect network access authentication and authorization, but they come at a cost.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="What are the limitations of domain controllers?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the limitations of domain controllers?&lt;/h2&gt;
 &lt;p&gt;Some domain controller limitations include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Domain controllers can be a single point of failure for network domain control.&lt;/li&gt; 
  &lt;li&gt;Because they control access to the entire network, domain controllers are a target for &lt;a href="https://www.techtarget.com/searchsecurity/definition/cyber-attack"&gt;cyberattacks&lt;/a&gt;. Successfully hacking a domain controller could give the attacker access to all domain network resources as well as authentication credentials for all users in the domain.&lt;/li&gt; 
  &lt;li&gt;Networks that use domain controllers for authentication and access security are dependent on them. To reduce the risk of downtime, controllers can be deployed in clusters.&lt;/li&gt; 
  &lt;li&gt;Domain controllers require additional infrastructure and security mechanisms.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Alternatives to domain controllers"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Alternatives to domain controllers&lt;/h2&gt;
 &lt;p&gt;Domain controllers have historically been the center of an organization's &lt;a href="https://www.techtarget.com/searchsecurity/definition/identity-access-management-IAM-system"&gt;identity and access management&lt;/a&gt;. Still, they don't natively support many of the advanced features that are part of a modern environment.&lt;/p&gt;
 &lt;p&gt;Traditional castle-and-moat-style networks have given way to &lt;a href="https://www.techtarget.com/searchsecurity/definition/zero-trust-model-zero-trust-network"&gt;zero-trust&lt;/a&gt; networks. Simple passwords are being replaced by &lt;a href="https://www.techtarget.com/whatis/definition/passkey"&gt;passkeys&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchsecurity/definition/two-factor-authentication"&gt;two-factor authentication&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchwindowsserver/tip/How-to-manage-a-migration-to-Microsoft-Entra-ID"&gt;Microsoft Entra ID&lt;/a&gt; is a cloud-based identity manager. It is part of Microsoft's &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Windows-Azure"&gt;Azure&lt;/a&gt; cloud platform. Entra ID is designed to be secure from the start and support modern authentication.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchsecurity/definition/federated-identity-management"&gt;Federated identities&lt;/a&gt; enable one authentication service to be used for other services. For example, a Google account can be used to sign in to an accounting website.&lt;/p&gt;
 &lt;p&gt;Amazon Web Services Directory Service is a managed AD service offered by Amazon. It hosts an AD environment in AWS.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Hybrid domain controllers"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Hybrid domain controllers&lt;/h2&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/hybrid-cloud"&gt;Hybrid cloud&lt;/a&gt; environments, which combine on-premises and cloud-based infrastructure, are becoming more prevalent. Domain controllers can be configured with tools to sync accounts and passwords with a cloud identity provider, such as Microsoft Entra ID. This enables users to have a single set of credentials that works for both on-premises and internet resources.&lt;/p&gt;
 &lt;p&gt;With hybrid deployments, a single management interface can be used to control access to all resources. Hybrid deployments are a good option for organizations that are not ready to move entirely to the cloud, but that use some online resources.&lt;/p&gt;
 &lt;p&gt;Account sync can be set up to be one-way or two-way. In a one-way sync, the on-premises information is sent to the cloud provider. Typically, only password hashes are synced; this prevents the possibility of the passwords being compromised, but could also prevent some features from working, such as self-service password resets. In a two-way sync, the online service can change the on-premises accounts.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Domain controllers are fundamental to securing unauthorized access to an organization's domains. Learn how to securely set up and &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchwindowsserver/answer/How-to-deploy-a-Windows-Server-2016-domain-controller"&gt;&lt;i&gt;deploy a Windows Server 2022 domain controller&lt;/i&gt;&lt;/a&gt;&lt;i&gt;. Also, check out this &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Windows-Server-security-hardening-guide-for-admins"&gt;&lt;i&gt;Windows Server 2022 security hardening guide&lt;/i&gt;&lt;/a&gt;&lt;i&gt; for admins.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>A domain controller is a server that processes requests for authentication from users and computers within a computer domain.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/3.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/definition/domain-controller</link>
            <pubDate>Thu, 27 Feb 2025 09:00:00 GMT</pubDate>
            <title>What is a domain controller?</title>
        </item>
        <item>
            <body>&lt;p&gt;Microsoft is the world's largest vendor of computer software and a leading provider of cloud computing services, video games, computer and gaming hardware, search and other online services. Based in Redmond, Wash., Microsoft has offices across the U.S. and multiple countries worldwide.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Microsoft origins: 1975 to 1981"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Microsoft origins: 1975 to 1981&lt;/h2&gt;
 &lt;p&gt;Bill Gates, who it is believed wrote his first software program at age 13, joined forces with his childhood friend Paul Allen to start Microsoft (originally known as Micro-Soft for &lt;i&gt;microprocessors&lt;/i&gt; and &lt;i&gt;software&lt;/i&gt;) in April 1975. At the time, Gates left Harvard University, and Allen left his job as a programmer in Boston. They sought to develop a compiler for the Altair 8800, a primitive early personal computer. Gates contacted the manufacturer, Micro Instrumentation and Telemetry Systems (MITS), and offered to write a program for a new computer.&lt;/p&gt;
 &lt;p&gt;Gates and Allen created an interpreter for BASIC, then a &lt;a href="https://www.computerweekly.com/blog/Write-side-up-by-Freeform-Dynamics/Mainframe-Skills-Challenge-or-Opportunity"&gt;mainframe programming&lt;/a&gt; language, to use with the Altair. MITS hired Gates and Allen in 1975. Within a year, they left to focus on their fledgling company, Microsoft, which they incorporated in 1981.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Microsoft history: 1980 to 2025"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Microsoft history: 1980 to 2025&lt;/h2&gt;
 &lt;p&gt;In 1980, IBM engaged Microsoft to develop an &lt;a href="https://www.techtarget.com/whatis/definition/operating-system-OS"&gt;OS&lt;/a&gt; for IBM's PC. Called PC-DOS by IBM, Microsoft also marketed its own version, &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/MS-DOS"&gt;MS-DOS&lt;/a&gt; (Microsoft Disk Operating System), which debuted in 1981 and which IBM licensed for its PC. The late 1970s and early 1980s saw Microsoft's fortunes soar, with the company adding more companies to its client roster and licensing MS-DOS to many of them.&lt;/p&gt;
 &lt;p&gt;The initial versions of MS-DOS lacked a &lt;a href="https://www.techtarget.com/whatis/video/An-explanation-of-CLI-GUI-and-NUI"&gt;GUI,&lt;/a&gt; so users had to type in various commands to open any program. However, Microsoft later developed Interface Manager, a GUI that ran on top of DOS and became &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Windows"&gt;Windows&lt;/a&gt; in 1985. Windows, which included numerous graphical features such as drop-down menus and scroll bars, was inspired by the same Xerox PARC research project that &lt;a href="https://www.techtarget.com/whatis/definition/Apple"&gt;Apple&lt;/a&gt; used to move an arrow across a graphical desktop.&lt;/p&gt;
 &lt;p&gt;In 1986, Microsoft moved its headquarters to Redmond and went public, offering $21 per share in its IPO. The IPO made Gates a multimillionaire. In less than a decade, he became a multibillionaire and one of the world's richest people.&lt;/p&gt;
 &lt;p&gt;Since the late 1990s, Microsoft has been embroiled in numerous legal cases. In 1998, the U.S. Department of Justice filed antitrust charges against the company, accusing it of using its dominant market position to drive its competitors -- such as &lt;a href="https://www.techtarget.com/whatis/definition/Netscape"&gt;Netscape&lt;/a&gt; -- out of business. Microsoft lost the case, appealed, and lost again. Gates and other Microsoft leaders were forced eventually to modify certain corporate practices to reduce Microsoft's unfair market monopoly. Due to its near-monopoly practices, Microsoft continued throughout the 2000s to face &lt;a href="https://www.computerweekly.com/news/366593634/Microsoft-and-CISPEs-settlement-in-long-running-cloud-antitrust-dispute-proves-controversial"&gt;legal challenges&lt;/a&gt; and had to pay hefty fines. Despite these challenges, Microsoft remains a healthy technology company with a strong market presence. As of January 2025, it is one of a handful of companies worldwide with trillion-dollar-plus market capitalizations.&lt;/p&gt;
 &lt;p&gt;Over the past two decades, Microsoft has acquired numerous companies, many of them well-known, including &lt;a href="https://www.techtarget.com/searchitoperations/definition/GitHub"&gt;GitHub&lt;/a&gt;, LinkedIn, Activision Blizzard and Skype. Since February 2014, CEO &lt;a href="https://www.computerweekly.com/news/366545132/Microsofts-Nadella-sees-massive-growth-opportunity-in-AI"&gt;Satya Nadella&lt;/a&gt; has led Microsoft.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Microsoft products"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Microsoft products&lt;/h2&gt;
 &lt;p&gt;By the late 1980s, Microsoft had become the world's largest PC software company. In the 1990s and 2000s, it continued to grow, developing and releasing new, innovative PC products, such as its Windows OSes, Office software suite and &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Internet-Explorer"&gt;Internet Explorer&lt;/a&gt; web browser.&lt;/p&gt;
 &lt;p&gt;Over time, the company has forayed into the development of desktops and laptops, Xbox gaming consoles, security products such as antivirus software, security operations platform, endpoint detection and response software, and identity solutions. More recently, Microsoft has started expanding its global presence with cloud-based and &lt;a href="https://www.computerweekly.com/news/366614628/AI-becomes-Microsofts-fastest-growing-business"&gt;AI-enabled products&lt;/a&gt; like Azure Cloud, the Microsoft 365 software productivity suite, and the &lt;a href="https://www.techtarget.com/whatis/definition/Microsoft-Copilot"&gt;Copilot&lt;/a&gt; AI-powered chatbot.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/how_copilot_processes_user_prompts-f_desktop.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/how_copilot_processes_user_prompts-f_desktop_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/how_copilot_processes_user_prompts-f_desktop_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/how_copilot_processes_user_prompts-f_desktop.png 1280w" alt="Chart showing how Copilot handles user prompts within Microsoft 365."&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;A look at how Copilot supports user prompts from Office apps.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;Windows OS&lt;/h3&gt;
 &lt;p&gt;For the first few years after releasing the Windows OS, Microsoft struggled to make the product a success.&lt;/p&gt;
 &lt;p&gt;It introduced Windows 1.0 in 1983, but the actual release didn't happen until November 1985. Heavily influenced by Apple's existing GUI, Windows 1.0 was more user-friendly than the command-line interface of MS-DOS, with menus a user could access with a keyboard or mouse. However, the presence of Apple's GUI made it hard for Windows to gain traction.&lt;/p&gt;
 &lt;p&gt;It wasn't until the release of Windows 3.0 in 1990 that the OS gained some respect from the PC user base. The release of Windows 3.1 in 1992 finally led to Microsoft OSes earning widespread acceptance. In 1995, the release of Windows 95 -- an OS that integrated MS-DOS with Windows and was as easy to use as Apple's Mac OS -- saw the beginning of a shift from DOS-based applications to Windows-based applications. This fueled the exponential growth and popularity of Windows as the preferred OS for PCs worldwide. By the 1990s, Windows had outsold most of its rival OSes, including CP/M and IBM OS/2.&lt;/p&gt;
 &lt;p&gt;But to run Windows, the PCs first had to load DOS. DOS was a 16-bit OS, while Windows was a 32-bit OS. The result was a crash-prone Windows. In 1992, Microsoft hired veteran developer David Cutler from Digital Equipment Corp. with the intention of building a new 32-bit OS from the ground up. It was called &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Windows-NT"&gt;Windows NT&lt;/a&gt; -- the NT standing for "new technology." The first version, Windows NT 3.1, an upgrade over Windows 3.1, was released in 1992.&lt;/p&gt;
 &lt;p&gt;While NT resolved the compatibility issues, its initial versions created other problems. System requirements were so great that few PCs could use it, so Microsoft shifted Windows NT to be a server OS. However, as hardware improved, more people began using Windows NT as a desktop OS.&lt;/p&gt;
 &lt;p&gt;In the late 1990s, Microsoft began merging Windows 95 and Windows NT into one OS. The result was Windows 2000 -- released in the year 2000 -- followed by Windows XP the following year for desktops, and Windows Server 2003 two years later. Even before the release of Windows 2000, previous versions of Windows were running 90% of the world's PCs. Following Windows 2000, Microsoft released Windows XP in 2001, Windows Vista in 2007 and &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Windows-10"&gt;Windows 10&lt;/a&gt; in 2015. The most recent version of Windows, &lt;a href="https://www.techtarget.com/whatis/feature/Windows-11-explained-Everything-you-need-to-know"&gt;Windows 11&lt;/a&gt;, came out in 2021.&lt;/p&gt;
 &lt;p&gt;Other Windows releases include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Windows 98 in 1998.&lt;/li&gt; 
  &lt;li&gt;Windows ME in 2000.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Windows-7"&gt;Windows 7&lt;/a&gt; in October 2009.&lt;/li&gt; 
  &lt;li&gt;Windows 8 in October 2012 and Windows 8.1 in 2013.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/microsoft_windows_timeline_the_38_year_evolution-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/microsoft_windows_timeline_the_38_year_evolution-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/microsoft_windows_timeline_the_38_year_evolution-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/microsoft_windows_timeline_the_38_year_evolution-f.png 1280w" alt="Microsoft Windows timeline infographic." height="742" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Microsoft Windows Timeline.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;Windows Server&lt;/h3&gt;
 &lt;p&gt;Microsoft NT 3.1 Advanced Server, released in 1993, set the foundation for Microsoft's line of server and business desktop OSes. This OS, which could run on Intel x86 and other CPUs, was designed to handle critical business applications. Although it was replaced by Windows NT 3.5 in 1994, its basic OS kernel is still used for the 32-bit version of Windows 7 and in the NTFS file system.&lt;/p&gt;
 &lt;p&gt;After 1994, Microsoft developed and released other versions of its server OS, including the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Windows NT 3.5.1 in 1995.&lt;/li&gt; 
  &lt;li&gt;Windows NT 4.0 in 1996.&lt;/li&gt; 
  &lt;li&gt;Windows NT 5.0 in 1999.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;These subsequent versions improved usability and stability and introduced the idea of the domain-based networking model for centralized network administration and unified user and access control.&lt;/p&gt;
 &lt;p&gt;In 2000, Microsoft released Windows 2000 Server, which further simplified network management with the then-new &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Active-Directory"&gt;Active Directory&lt;/a&gt; user directory feature. This OS also provided enhancements for storage management, web integration and application development. After Windows 2000 Server, Microsoft released nine more server OSes by 2022.&lt;/p&gt;
 &lt;p&gt;Windows Server 2008 and 2008 R2 introduced Microsoft's &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Understand-the-limitations-of-running-Hyper-V-in-Windows-11"&gt;Hyper-V&lt;/a&gt;, a hardware virtualization product that lets enterprise users create virtual machines (&lt;a href="https://www.techtarget.com/searchitoperations/definition/virtual-machine-VM"&gt;VMs&lt;/a&gt;) on physical computers. Subsequent versions of Windows Server improved virtualization. Additionally, these versions introduced cloud capabilities, such as Docker-compatible &lt;a href="https://www.techtarget.com/searchitoperations/tip/Containers-vs-VMs-What-are-the-key-differences"&gt;containers&lt;/a&gt; that enabled companies to take better advantage of technological innovations like hybrid cloud environments, microservices and cloud-native applications.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/windows_server-virtual_machines_vs_containers.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/windows_server-virtual_machines_vs_containers_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/windows_server-virtual_machines_vs_containers_mobile.png 960w,https://www.techtarget.com/rms/onlineImages/windows_server-virtual_machines_vs_containers.png 1280w" alt="Chart comparing the structure of virtual machines and containers." height="380" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;More recent versions of Windows Server have improved virtualization capabilities, such as virtual machines and containers, which are contrasted here.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Windows Server 2022 included advanced multilayer security features and a flexible application development platform. The latest iteration, &lt;a href="https://www.techtarget.com/searchwindowsserver/feature/Will-Windows-Server-2025-release-spark-VMware-migrations"&gt;Windows Server 2025&lt;/a&gt;, was released in November 2024. It is available in three editions -- Standard, Datacenter and Datacenter Azure Edition. It is the first and only Windows Server OS that supports ARM64 architecture -- the 86-bit version of the ARM64 instruction set.&lt;/p&gt;
 &lt;p&gt;Key features of all Windows Server OSes include Active Directory, which automates the management of user data, security and distributed resources, and enables interoperation with other directories; and Server Manager, a utility to administer server roles and make configuration changes on local or remote machines.&lt;/p&gt;
 &lt;p&gt;Also, from the 2016 version onward, Windows Server is available using two release channels: the Long-Term Servicing Channel (&lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Windows-Server-LTSC-Long-Term-Servicing-Channel"&gt;LTSC&lt;/a&gt;) and the Annual Channel (AC). Organizations can choose their preferred channel, depending on whether they want a traditional lifecycle of quality and security updates (LTSC) or more frequent releases (AC).&lt;/p&gt;
 &lt;h3&gt;Microsoft Office and Microsoft 365&lt;/h3&gt;
 &lt;p&gt;Building on the success of its OSes, Microsoft moved into the development of productivity software, which it dubbed "Office."&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchenterprisedesktop/news/252522244/Microsoft-will-sign-idle-users-out-of-Office-web-apps"&gt;Microsoft Office&lt;/a&gt; first appeared in 1990. The productivity package featured several bundled applications, including Word, Excel and PowerPoint for the desktop. More than two decades later, those applications remain popular with individuals and companies worldwide. Over the years, Microsoft added new products to the Office suite, including &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Outlook"&gt;Outlook&lt;/a&gt; (an email client), Access (a database management system), OneNote (a note-taking app), &lt;a href="https://www.techtarget.com/searchcontentmanagement/feature/Benefits-of-Microsoft-SharePoint"&gt;SharePoint&lt;/a&gt; (a set of content management, knowledge management and website creation tools) and &lt;a href="https://www.techtarget.com/searchunifiedcommunications/definition/Microsoft-Teams"&gt;Teams&lt;/a&gt; (a team collaboration application).&lt;/p&gt;
 &lt;p&gt;Microsoft's pivot toward cloud computing is reflected in the development and release of &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Microsoft-Office-365-suite"&gt;Microsoft 365&lt;/a&gt;, a cloud-powered productivity platform. First released in 2017 as Office 365 and renamed in 2020, Microsoft 365 is a browser-based yearly subscription version of Office that includes all the products available in the desktop versions of Office (Word, Excel, PowerPoint, Outlook, OneNote, Teams, etc.). It also includes access to OneDrive, Microsoft's cloud storage service (similar to &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/Google-Drive"&gt;Google Drive&lt;/a&gt;) that lets users store data in the cloud and sync files with multiple devices.&lt;/p&gt;
 &lt;p&gt;Unlike Microsoft 365, the latest desktop-based version of Office, Office 2024, is sold as a&lt;i&gt; &lt;/i&gt;one-time purchase. It does not have all of the same features that are available by default in the cloud- and subscription-based Microsoft 365.&lt;/p&gt;
 &lt;p&gt;Recently, Microsoft has strengthened Microsoft 365 with AI-powered features using Copilot, a &lt;a href="https://www.techtarget.com/searchenterpriseai/tip/7-top-generative-AI-benefits-for-business"&gt;generative AI&lt;/a&gt; chatbot-cum-assistant that makes it easy for users to draft content, simplify onerous tasks and speed up workflows.&lt;/p&gt;
 &lt;p&gt;The subscription plans for Microsoft 365 are available for the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Home and personal use.&lt;/li&gt; 
  &lt;li&gt;Small and midsize businesses.&lt;/li&gt; 
  &lt;li&gt;Large enterprises.&lt;/li&gt; 
  &lt;li&gt;Educational institutions.&lt;/li&gt; 
  &lt;li&gt;Nonprofits.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;A free version, Microsoft 365 for the web&lt;i&gt;, &lt;/i&gt;is also available.&lt;b&gt; &lt;/b&gt;Anyone with a Microsoft account can use it in a web browser. Securing the account only requires that users provide a new or existing email address.&lt;/p&gt;
 &lt;h3&gt;Internet Explorer and Edge&lt;/h3&gt;
 &lt;p&gt;Microsoft initially dismissed growing interest in the internet but nevertheless developed and released its first web browser in 1995, Internet Explorer (&lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Internet-Explorer"&gt;IE&lt;/a&gt;). First appearing as an add-on in Windows 95, IE and its subsequent versions were bundled into the Windows OS. It was this decision that prompted the 1998 &lt;a href="https://www.techtarget.com/searchcio/opinion/Google-antitrust-case-could-explore-unknown-threats"&gt;antitrust case&lt;/a&gt; against Microsoft. That case determined that Microsoft was deliberately stifling competition and building its monopoly in the web browser space. The courts initially ordered Microsoft to remove IE from Windows. However, both parties reached a settlement in 2001 that did not mandate this requirement. The courts ruled that Microsoft was an illegal monopoly and mandated that it make internal changes to eliminate this problem.&lt;/p&gt;
 &lt;p&gt;Microsoft continued development on IE, which remained available in Windows between 1995 and 2013. In 2016, the company stopped providing active technical support for all IE versions except IE 11. It also deprecated the browser in Windows 10 in favor of its newer &lt;a href="https://www.techtarget.com/whatis/definition/Microsoft-Edge"&gt;Edge&lt;/a&gt; browser. For a few years, Edge gained some traction among users. However, it slowly fell out of favor with them, many of whom preferred the more user-friendly, secure and feature-rich &lt;a href="https://www.techtarget.com/searchcio/news/366616275/DOJs-push-to-breakup-Google-faces-tough-odds"&gt;Google Chrome&lt;/a&gt; and Mozilla Firefox browsers. In 2019, Microsoft adopted the Chrome-based browser engine from Google and applied its own enhancements.&lt;/p&gt;
&lt;/section&gt;                                     
&lt;section class="section main-article-chapter" data-menu-title="Microsoft development platforms"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Microsoft development platforms&lt;/h2&gt;
 &lt;p&gt;Microsoft has released numerous developer tools and programming languages since its origins as an OS-only company. &lt;a href="https://www.techtarget.com/searchapparchitecture/tip/5-dead-programming-languages-we-should-never-forget"&gt;Visual Basic&lt;/a&gt;, an object-oriented language for creating type-safe .NET apps, was released in 1991. Microsoft then expanded to Visual C++ in 1993 and eventually Visual C#, an implementation of the existing &lt;a href="https://www.techtarget.com/whatis/definition/C-Sharp"&gt;C#&lt;/a&gt; language developed specifically for the .NET platform. In 2002, all these tools were bundled into Visual Studio.&lt;/p&gt;
 &lt;p&gt;Visual Studio is an &lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/integrated-development-environment"&gt;IDE&lt;/a&gt; that helps software developers write, edit, debug and build code. It includes compilers, code completion tools, source control, extensions and other features that developers need to develop cross-platform applications in various languages, including &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/C"&gt;C++&lt;/a&gt;, C#, &lt;a href="https://www.theserverside.com/definition/JavaScript"&gt;JavaScript&lt;/a&gt;, TypeScript and &lt;a href="https://www.techtarget.com/whatis/definition/Python"&gt;Python&lt;/a&gt;. The most recent versions of Visual Studio also provide AI assistance to help development teams streamline the &lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/software-development-life-cycle-SDLC"&gt;software development lifecycle&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Also in 2002, Microsoft launched its .NET framework, a programming model to help developers build applications for Windows. The core components of the .NET platform are its &lt;a href="https://www.techtarget.com/whatis/definition/Common-Language-Runtime-CLR"&gt;Common Language Runtime&lt;/a&gt;, which lets nearly any language compile down to an intermediate language, and the Framework Class Library, which provides core functions for any language.&lt;/p&gt;
 &lt;p&gt;Initially designed for Windows-only development, .NET now covers non-Windows platforms such as &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/How-to-choose-between-Windows-10-IoT-and-Linux"&gt;Linux&lt;/a&gt; and mobile. This led to platform fragmentation: .NET Framework, the original implementation; .NET Core, introduced in 2014 as the successor to Framework that added support for Linux and Mac; and Xamarin, a port of the .NET Framework for Android phones.&lt;/p&gt;
 &lt;p&gt;In 2019, Microsoft worked to combine .NET Framework, .NET Core and Xamarin into a single unified platform called .NET 5 Framework. That was released in 2020. As of 2025, .NET is an &lt;a href="https://www.techtarget.com/whatis/definition/open-source"&gt;open source&lt;/a&gt; development platform that supports building many types of applications for Android, Apple, Linux and Windows OSes.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Microsoft management applications"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Microsoft management applications&lt;/h2&gt;
 &lt;p&gt;Microsoft develops and sells numerous enterprise-class systems management software tools, including &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-System-Center"&gt;System Center&lt;/a&gt;, which helps IT administrators deploy, configure, maintain and manage sophisticated corporate data center installations. System Center includes the following components and services:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;System Center Operations Manager for centralized monitoring of IT infrastructures.&lt;/li&gt; 
  &lt;li&gt;System Center Orchestrator for simplifying data center workflow management.&lt;/li&gt; 
  &lt;li&gt;System Center Virtual Machine Manager for configuring and managing virtualized, software-defined data centers.&lt;/li&gt; 
  &lt;li&gt;System Center Service Manager to automate and improve IT service management practices.&lt;/li&gt; 
  &lt;li&gt;System Center Data Protection Manager for securing data with backup, storage and recovery features.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Microsoft hardware offerings"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Microsoft hardware offerings&lt;/h2&gt;
 &lt;p&gt;Microsoft started its hardware division in 1982 to develop a mouse to use with Word. In 1995, it introduced its own keyboard with specific keys for controlling Windows 95.&lt;/p&gt;
 &lt;p&gt;In 2001, it launched the &lt;a href="https://www.computerweekly.com/news/252492522/Xbox-Series-X-PlayStation-5-launches-unleash-UK-network-traffic-surge"&gt;Xbox gaming console&lt;/a&gt; system as a direct competitor to established gaming companies such as Sony and Nintendo. Since then, Microsoft has released several other iterations of Xbox, including Xbox 360 in 2005, Xbox One in November 2013, and Xbox Series X and Series S in November 2020. Xbox Series X and Series S remain available as of January 2025 and support thousands of popular &lt;a href="https://www.computerweekly.com/blog/When-IT-Meets-Politics/Do-video-games-breed-hackers"&gt;video games&lt;/a&gt; like Star Wars Outlaws, Call of Duty Black Ops 6 and Age of Mythology Retold.&lt;/p&gt;
 &lt;p&gt;Microsoft also offers the Surface family of &lt;a href="https://www.computerweekly.com/microscope/news/366547016/Tablet-market-under-pressure?"&gt;tablet computers&lt;/a&gt;, which bundle tablet hardware with the Windows OS. The first Surface appeared in 2012 and has been superseded by several subsequent models. Besides tablets, other products in the touchscreen-based Surface line include laptops and whiteboards.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Microsoft Azure cloud"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Microsoft Azure cloud&lt;/h2&gt;
 &lt;p&gt;Microsoft entered the &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/public-cloud"&gt;public cloud&lt;/a&gt; market when it introduced the Windows Azure platform at the Professional Developers Conference in October 2008. Azure became available in February 2010 as a competitor to &lt;a href="https://www.techtarget.com/searchaws/definition/Amazon-Web-Services"&gt;AWS&lt;/a&gt;. Built as an extension of the Windows NT OS, Azure set the stage for Microsoft's foray into the area of &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Platform-as-a-Service-PaaS"&gt;platform as a service&lt;/a&gt;&lt;/p&gt;
 &lt;p&gt;The company renamed the offering &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Windows-Azure"&gt;Microsoft Azure&lt;/a&gt; in March 2014. As Microsoft's public cloud computing platform, Azure provides various cloud services, including those for compute, analytics, storage, networking, management, &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-ML"&gt;machine learning&lt;/a&gt; and &lt;a href="https://searchdatamanagement.techtarget.com/definition/big-data"&gt;big data&lt;/a&gt; capabilities. Users can pick from these services to develop and scale new applications, or run existing applications in the public cloud.&lt;/p&gt;
 &lt;p&gt;Much of the appeal of Azure stems from it having the same operating environment as on-premises Windows Server. Customers can migrate their applications from on-premises to Azure, often without modification. Companies can also simplify infrastructure management through a global network of data centers Microsoft manages. Microsoft has also endeavored to make many of its key on-premises applications, such as SQL Server, have the same features in the cloud version as the on-premises version. Currently, the platform offers over 200 products and services, all accessible through the cloud for a wide range of enterprise applications and use cases. As with other Microsoft offerings, &lt;a href="https://www.computerweekly.com/news/366615541/Microsoft-ramps-up-small-language-model-effort"&gt;Azure also includes AI capabilities&lt;/a&gt; that make it easy for organizations to design and scale AI applications through a single interface.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/l9JkLhvaKA8?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Notable Microsoft acquisitions"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Notable Microsoft acquisitions&lt;/h2&gt;
 &lt;p&gt;Like most large corporations, Microsoft has acquired numerous companies over the years. here are some notable acquisitions:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Skype. &lt;/b&gt;Microsoft purchased Skype, the &lt;a href="https://www.techtarget.com/searchunifiedcommunications/definition/VoIP"&gt;VoIP&lt;/a&gt;-based video and text messaging service, from eBay in 2011 for $8.5 billion. Skype is now part of the Windows 11 OS and is used primarily in person-to-person communication, while Microsoft Teams is used for group conversation.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Nokia. &lt;/b&gt;Microsoft acquired &lt;a href="https://www.computerweekly.com/news/366613342/Nokia-sharpens-edge-for-industrial-communications"&gt;Nokia&lt;/a&gt; for $7.2 billion in 2013. At the time, Microsoft was competing in the smartphone business against Apple and Android, and Nokia was the largest supporter of the Windows Phone OS. But Windows Phone failed to gain traction, lost developers and was discontinued.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;LinkedIn. &lt;/b&gt;In December 2016, Microsoft purchased the professional &lt;a href="https://www.techtarget.com/whatis/definition/social-media"&gt;social media&lt;/a&gt; site LinkedIn for $26 billion. Recently, the company announced plans to tightly integrate LinkedIn with its video conferencing software, Microsoft Teams.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Nuance Communications.&lt;/b&gt; In April 2021, Microsoft announced it would spend $16 billion to acquire &lt;a href="https://www.techtarget.com/healthtechsecurity/news/366593951/Nuance-Communications-Notifies-12M-Individuals-of-Data-Breach"&gt;Nuance Communications&lt;/a&gt;, the leading maker of speech recognition software Dragon NaturallySpeaking.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Activision Blizzard.&lt;/b&gt; In January 2022, Microsoft sought to boost its position in the gaming industry with the $68 billion &lt;a href="https://www.techtarget.com/searchunifiedcommunications/news/252512262/Activision-Blizzard-deal-positions-Microsoft-for-the-metaverse"&gt;acquisition of Activision Blizzard&lt;/a&gt;, the maker of game franchises such as &lt;i&gt;Call of Duty&lt;/i&gt; and &lt;i&gt;Diablo&lt;/i&gt;. Activision became a wholly owned subsidiary of Microsoft in October 2023. UK antitrust officials blocked the deal until August 2023, when Microsoft revised some elements of the deal to keep the company from eliminating competition in the cloud gaming market.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Microsoft leadership"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Microsoft leadership&lt;/h2&gt;
 &lt;p&gt;Microsoft has experienced several changes in leadership through the years.&lt;/p&gt;
 &lt;p&gt;Gates led Microsoft from its earliest days before handing over CEO duties in January 2000 to longtime friend and employee Steve Ballmer. Ballmer refocused the company on devices and services, leading to products such as Xbox and Office 365. He stepped down as CEO in February 2014 when he purchased the Los Angeles Clippers NBA team. In January 2015, Ballmer and his wife pledged to donate $15 million as emergency funding to help the people affected by &lt;a href="https://www.techtarget.com/searchhrsoftware/news/366617924/Workforce-planning-lags-behind-rising-climate-disasters"&gt;wildfires that raged across Los Angeles&lt;/a&gt; for several weeks.&lt;/p&gt;
 &lt;p&gt;After a protracted CEO search, Satya Nadella, who had been executive vice president of Microsoft's cloud and enterprise division, became the new CEO in 2014.&lt;/p&gt;
 &lt;p&gt;Paul Allen, one of Microsoft's co-founders, died in 2018.&lt;/p&gt;
 &lt;p&gt;From 2005 on, Gates &lt;a href="https://www.computerweekly.com/news/252480077/Bill-Gates-steps-down-from-Microsoft-board-to-focus-on-philanthropic-efforts"&gt;dedicated himself to his charitable foundation&lt;/a&gt;, which he launched in 1994 with his then-wife, Melinda Gates. He pledged to donate virtually all his wealth to charity and remains heavily involved in the foundation that, as of 2020, was the world's third-largest nonprofit. Although he is believed to still influence Microsoft's strategic direction, he is no longer actively involved in day-to-day operations or decision-making.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Learn about the &lt;a href="https://www.techtarget.com/whatis/feature/Windows-11-vs-Windows-10-What-are-the-differences"&gt;differences between Windows 11 and Windows 10&lt;/a&gt; and explore the &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Compare-the-features-in-the-Windows-Server-2022-editions"&gt;features in the Windows Server 2022 editions&lt;/a&gt;. Read about the &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Windows-Azure"&gt;identity and access management services of Microsoft Azure&lt;/a&gt; and other major cloud providers.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Microsoft is the world's largest vendor of computer software and a leading provider of cloud computing services, video games, computer and gaming hardware, search and other online services.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/4.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/definition/Microsoft</link>
            <pubDate>Mon, 24 Feb 2025 00:00:00 GMT</pubDate>
            <title>What is Microsoft?</title>
        </item>
        <item>
            <body>&lt;p&gt;The C programming language is a procedural and general-purpose language that provides low-level access to system memory. A program written in C must be run through a C &lt;a href="https://www.techtarget.com/whatis/definition/compiler"&gt;compiler&lt;/a&gt; to convert it into an executable that a computer can run. Many versions of&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdatacenter/definition/Unix"&gt;Unix&lt;/a&gt;-based operating systems (OSes) are written in C and it has been standardized as part of the Portable Operating System Interface (&lt;a href="https://www.techtarget.com/whatis/definition/POSIX-Portable-Operating-System-Interface"&gt;POSIX&lt;/a&gt;).&lt;/p&gt; 
&lt;p&gt;Today, the C programming language runs on many different hardware platforms and OSes such as Microsoft and &lt;a href="https://www.techtarget.com/searchdatacenter/definition/Linux-operating-system"&gt;Linux&lt;/a&gt;.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Pros and cons of C"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Pros and cons of C&lt;/h2&gt;
 &lt;p&gt;The C language comes with a set of special characteristics, making it one of the most widely used languages of all time. The following are the main benefits of using C:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;strong&gt;Structured. &lt;/strong&gt;It offers a&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/structured-programming-modular-programming"&gt;structured programming&lt;/a&gt; approach for breaking down problems into smaller modules or functions that are easy to understand and modify.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Portable. &lt;/strong&gt;C is machine-independent and C programs can be executed on different machines.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Mid-level programming language. &lt;/strong&gt;It's a mid-level language that supports the features of both a low-level and a high-level language.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Rich library. &lt;/strong&gt;It offers numerous built-in library functions that expedite the development process.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Dynamic memory allocation. &lt;/strong&gt;C supports the&amp;nbsp;dynamic memory allocation feature, which can be used to &lt;a href="https://www.techtarget.com/searchitoperations/feature/Memory-management-techniques-improve-system-performance"&gt;free the allocated memory&lt;/a&gt; at any time by calling the &lt;strong&gt;free()&lt;/strong&gt;&amp;nbsp;function.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Speed. &lt;/strong&gt;It's a compiler-based language, which makes the compilation and execution of code faster. Since only essential and required features are included in C, it saves processing power and improves speed.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Pointers. &lt;/strong&gt;C uses pointers, which improve performance by enabling direct interaction with the system memory.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Recursion. &lt;/strong&gt;C enables developers to backtrack by providing code reusability for every function.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Extensible. &lt;/strong&gt;A C program can be easily extended. If code is already written, new features and functionalities can be added to it with minor alterations.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;C also comes with a few shortfalls, even though it's an ideal language for programming beginners due to its simple syntax, algorithms and modular structure. The following are a few disadvantages of using C:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;strong&gt;OOP features.&lt;/strong&gt; C doesn't extend its support for object-oriented programming (&lt;a href="https://www.techtarget.com/searchapparchitecture/definition/object-oriented-programming-OOP"&gt;OOP&lt;/a&gt;) features, which enables the creation of subclasses from parent classes. Unlike &lt;a href="https://www.theserverside.com/definition/Java"&gt;Java&lt;/a&gt;, &lt;a href="https://www.techtarget.com/whatis/definition/Python"&gt;Python&lt;/a&gt; or C++, multiple inheritances can't be created in C, which makes it difficult to reuse existing code.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Namespace feature.&lt;/strong&gt; C lacks namespace features, which means the same variable name can't be reused in one scope. Without namespaces, it's impossible to declare two variables with the same name.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Run-time checking.&lt;/strong&gt; C doesn't display code errors after each line of code; instead, all the errors are presented by the compiler after the program has been written. This can make code checking a challenge, especially for larger programs.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Exception handling.&lt;/strong&gt; C lacks exception handling, which is the ability to handle exceptions, such as bugs and anomalies that can happen during &lt;a href="https://www.techtarget.com/searchapparchitecture/definition/source-code"&gt;source code&lt;/a&gt;&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Constructor and destructor.&lt;/strong&gt; Since C isn't object oriented, it doesn't offer constructor and destructor features. Constructing or destructing a variable in C must be done manually through a function or by other means.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Garbage collection.&lt;/strong&gt; C isn't equipped with garbage collection. This important feature automatically reclaims memory from objects that are no longer required by the library or an app.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Where is C used?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Where is C used?&lt;/h2&gt;
 &lt;p&gt;C has a wide range of real-world applications that aren't limited to the development of OSes and applications. C is also used in areas such as graphical user interface development and &lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/integrated-development-environment"&gt;integrated development environments&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
 &lt;p&gt;The following are some use cases for the C language:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;OSes, such as Unix and all Unix applications;&lt;/li&gt; 
  &lt;li&gt;databases, including Oracle Database, &lt;a href="https://www.techtarget.com/searchoracle/definition/MySQL"&gt;MySQL&lt;/a&gt;, Microsoft SQL Server and PostgreSQL, which are partially written in C;&lt;/li&gt; 
  &lt;li&gt;language compilers, including the C compiler;&lt;/li&gt; 
  &lt;li&gt;text editors;&lt;/li&gt; 
  &lt;li&gt;print spoolers;&lt;/li&gt; 
  &lt;li&gt;assemblers;&lt;/li&gt; 
  &lt;li&gt;network drivers;&lt;/li&gt; 
  &lt;li&gt;modern programs, such as &lt;a href="https://www.techtarget.com/searchitoperations/definition/Git"&gt;Git&lt;/a&gt; and FreeBSD;&lt;/li&gt; 
  &lt;li&gt;language interpreters; and&lt;/li&gt; 
  &lt;li&gt;utilities, such as network drivers, mouse drivers and keyboard drivers.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/popular_cloud_programming_languages_and_frameworks-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/popular_cloud_programming_languages_and_frameworks-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/popular_cloud_programming_languages_and_frameworks-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/popular_cloud_programming_languages_and_frameworks-f.png 1280w" alt="programming languages and frameworks" height="427" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;There are a variety of programming languages and frameworks, including C.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="What's the difference between C and C++?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What's the difference between C and C++?&lt;/h2&gt;
 &lt;p&gt;While C and &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/C"&gt;C++&lt;/a&gt; sound familiar, the usage and features of both languages differ to a certain extent. C++ is a superset and successor to the C language that uses an entirely different set of programming concepts. C is a procedural programming language, whereas C++ provides OOP support.&lt;/p&gt;
 &lt;p&gt;The following highlights the differences between the two languages:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;C is a procedural language that provides no support for objects and classes. C++ is a combination of OOP and procedural programming&amp;nbsp;languages.&lt;/li&gt; 
  &lt;li&gt;C has 32 keywords and C++ has 63 keywords.&lt;/li&gt; 
  &lt;li&gt;C supports built-in &lt;a href="https://www.techtarget.com/searchapparchitecture/definition/data-type"&gt;data types&lt;/a&gt;, while C++ supports both built-in and user-defined data types.&lt;/li&gt; 
  &lt;li&gt;C doesn't have access modifiers, whereas C++ does.&lt;/li&gt; 
  &lt;li&gt;C uses the &lt;strong&gt;&amp;lt;stdio.h&amp;gt;&lt;/strong&gt; header file for input and output operations and C++ uses the &lt;strong&gt;&amp;lt;iostream.h&amp;gt;&lt;/strong&gt; header file for input and output operations.&lt;/li&gt; 
  &lt;li&gt;C can't hide data, while C++ is secure and provides &lt;a href="https://www.techtarget.com/searchsecurity/definition/encryption"&gt;encryption&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;There's no direct &lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/error-handling"&gt;exception handling&lt;/a&gt; support in C, but C++ supports it.&lt;/li&gt; 
  &lt;li&gt;C doesn't support function and operator overloading, but C++ does.&lt;/li&gt; 
  &lt;li&gt;In C, the &lt;strong&gt;main()&lt;/strong&gt; function calls are made through other functions used in the code, but C++ doesn't provide that functionality.&lt;/li&gt; 
  &lt;li&gt;Reference &lt;a href="https://www.techtarget.com/whatis/definition/variable"&gt;variables&lt;/a&gt; aren't supported by C, but C++ supports them.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/6Ff5ls0TXHU?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="History of C"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;History of C&lt;/h2&gt;
 &lt;p&gt;The C programming language was developed at the former AT&amp;amp;T Bell Laboratories in the early 1970s by computer scientist &lt;a href="https://www.bell-labs.com/usr/dmr/www/chist.html" target="_blank" rel="noopener"&gt;Dennis Ritchie&lt;/a&gt;. The successor to the B language, C was initially developed for writing code for the Unix operating system, which at the time used &lt;a href="https://www.techtarget.com/searchdatacenter/definition/assembler"&gt;assembly programs&lt;/a&gt; that communicated directly with the computer hardware. Assembly programs can be complex and lengthy, and programmers needed a language that promoted a user-friendly set of instructions. C fulfilled these objectives and also helped overcome the challenges that programmers experienced with &lt;a href="https://www.techtarget.com/whatis/definition/BASIC-Beginners-All-purpose-Symbolic-Instruction-Code"&gt;BASIC&lt;/a&gt;, B and Basic Combined Programming Language.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;Due to its popularity and flexible features, it was soon released for cross-platform usage and quickly became commercialized. C is still commonly used in web development projects and many popular languages, such as Java, PHP and &lt;a href="https://www.theserverside.com/definition/JavaScript"&gt;JavaScript&lt;/a&gt; have directly or indirectly borrowed features and syntax from C.&lt;/p&gt;
 &lt;p&gt;While C has transformed over the years, it's still used commonly in lower-level programs, such as &lt;a href="https://www.techtarget.com/searchdatacenter/definition/kernel"&gt;kernels&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;C has rapidly evolved since its inception. Examine the &lt;a href="https://www.techtarget.com/searchapparchitecture/tip/A-quick-glance-at-the-history-of-C-programming-languages"&gt;history of C&lt;/a&gt;, how it has evolved and why it's still relevant today. &lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The C programming language is a procedural and general-purpose language that provides low-level access to system memory.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/5.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/definition/C</link>
            <pubDate>Tue, 22 Oct 2024 09:34:00 GMT</pubDate>
            <title>What is C (programming language)?</title>
        </item>
        <item>
            <body>&lt;p&gt;Enterprise content management is a set of defined processes, strategies and tools that enables a business to obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.&lt;/p&gt; 
&lt;p&gt;ECM has evolved rapidly as different forms of content have been introduced to the work ecosystem. However, ECM tools continue to focus on digitally managing a company's information in a centralized repository and using the digital content to support business processes.&lt;/p&gt; 
&lt;p&gt;Enterprise &lt;a href="https://www.techtarget.com/searchcontentmanagement/definition/content-management"&gt;content management&lt;/a&gt; does not refer to a single technology or process. It's an umbrella term that describes a combination of methods, tools and strategies that support capturing and managing content, as well as the storage, retention and delivery of &lt;a href="https://www.techtarget.com/searchcontentmanagement/tip/7-key-stages-of-enterprise-content-lifecycle-management"&gt;information throughout its lifecycle&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;The definition of &lt;i&gt;content&lt;/i&gt; can range significantly, but it generally refers to any information that employees use to do their work. In the context of traditional ECM, content often took the form of paper documents, such as invoices, resumes and contracts. As technology has advanced, however, the definition of content has broadened to include video and audio files, social media posts, email, web content and more.&lt;/p&gt; 
&lt;p&gt;ECM can handle both structured and unstructured content:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;&lt;b&gt;Structured content.&lt;/b&gt; Data that is contained and defined, such as databases and code repositories.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Unstructured content.&lt;/b&gt; Information that doesn't have a predefined format and can include content such as Microsoft Office documents, PDFs and emails.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Enterprise content management software helps streamline the information lifecycle with a &lt;a href="https://www.techtarget.com/searchcontentmanagement/tip/Document-management-vs-content-management-How-they-differ"&gt;document management system&lt;/a&gt; and the automation of process workflows. It's critical for any organization with large volumes of content to define an ECM plan to eliminate operational inefficiencies, reduce costs and adhere to regulatory compliance mandates.&lt;/p&gt; 
&lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/content_management-content_lifecycle_stages-f.png"&gt;
 &lt;img data-src="https://www.techtarget.com/rms/onlineimages/content_management-content_lifecycle_stages-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/content_management-content_lifecycle_stages-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/content_management-content_lifecycle_stages-f.png 1280w" alt="Circular flowchart of the 7 content lifecycle management stages: capture, preserve, categorize, process, publish, archive, remove." height="468" width="560"&gt;
 &lt;figcaption&gt;
  &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Content lifecycle management includes these seven comprehensive stages.
 &lt;/figcaption&gt;
 &lt;div class="main-article-image-enlarge"&gt;
  &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/figure&gt; 
&lt;p&gt;Some specific areas of business that benefit from ECM software include the following:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;&lt;b&gt;Contracts management.&lt;/b&gt; ECM software enables users to digitally collaborate and ensure contracts are reviewed, edited and approved on time by automatically routing the documents and notifying the appropriate people when contracts need attention.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;HR automation.&lt;/b&gt; ECM software can remove the need for paper-based employee files while also improving new hire processes, streamlining the organization of HR-related information and guaranteeing compliance with HR onboarding mandates.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Accounts payable automation.&lt;/b&gt; ECM software enables users to accurately match, distribute and approve purchase orders, delivery tickets and invoices, resulting in reduced late fees and enhanced efficiency.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Accounts receivable automation.&lt;/b&gt; ECM software provides users with immediate access to purchase orders, invoices and signed receipts, thus reducing the time for &lt;a href="https://www.techtarget.com/searchbusinessanalytics/definition/days-sales-outstanding-DSO"&gt;days sales outstanding&lt;/a&gt; by accelerating the speed of customer payments.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;section class="section main-article-chapter" data-menu-title="How does ECM work?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How does ECM work?&lt;/h2&gt;
 &lt;p&gt;Enterprise content management refers to a collection of strategies, methods and tools used to capture, manage and store key business process management information throughout its lifecycle.&lt;/p&gt;
 &lt;p&gt;Organizations can use ECM software to identify duplicate and near-duplicate content, enabling the organization to keep a few copies of a particular piece of content instead of hundreds. This variety of information is organized in a central location with document &lt;a href="https://www.techtarget.com/whatis/definition/metadata"&gt;metadata&lt;/a&gt; stored in folders, ensuring the content is available to the right people at the right time.&lt;/p&gt;
 &lt;p&gt;Users with the proper approvals can find specific documents using full-text searches. The ECM platform retrieves the document and presents it to users, allowing them to read, edit or print a copy of the information regardless of their location or the device they're using. With ECM software, users can also look for specific words or phrases within the stored documents, decreasing the time spent scanning content and increasing productivity.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/liwOFr6gLcI?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Why is ECM important?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why is ECM important?&lt;/h2&gt;
 &lt;p&gt;In recent years, ECM has become increasingly important and complex for various reasons. Financial fraud and data breaches -- and the regulations designed to prevent them -- have made &lt;a href="https://www.techtarget.com/searchcio/definition/information-governance"&gt;information governance&lt;/a&gt; essential for compliance reasons and to help protect an organization's reputation. Organizations also need to manage content effectively for integration with business intelligence/business analytics applications that help them to use the information to guide business decisions.&lt;/p&gt;
 &lt;p&gt;Furthermore, productivity and efficiency within companies increase when they reduce their dependence on paper documents and create an organized, secure repository of unstructured information that considers business needs. Companies that don't implement ECM risk losing time and productivity as well as potential noncompliance with corporate policies and regulations. If disaster strikes, companies that don't securely store content can lose that information, leading to significant business interruptions.&lt;/p&gt;
 &lt;p&gt;Technological advancements are also making a &lt;a href="https://www.techtarget.com/searchcontentmanagement/definition/content-management-system-CMS"&gt;content management system&lt;/a&gt; more important than ever. The proliferation of remote work has necessitated the business continuity and collaboration features that ECM provides. Advancements in &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-ML"&gt;machine learning&lt;/a&gt;, mobile and cloud technology are creating new opportunities for businesses.&lt;/p&gt;
 &lt;p&gt;New types of content are also emerging in the form of social media, video and audio. ECM software must continue to adapt with these new forms of unstructured information so it can continue to organize data and optimize business performance.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="What are the components of ECM?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the components of ECM?&lt;/h2&gt;
 &lt;p&gt;Traditionally, the five main components of ECM are: capture, manage, store, preserve and deliver. The purpose of each component, as originally defined by the Association for Intelligent Information Management, is as follows:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Capture.&lt;/b&gt; The capture component creates information by converting paper documents into electronic formats, obtaining and collecting electronic files into a cohesive structure, and organizing information. With document capture, information can include content such as invoices, contracts and research reports.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Manage.&lt;/b&gt; The manage component connects, modifies and employs information through means such as document management, collaborative software, &lt;a href="https://www.techtarget.com/searchcontentmanagement/definition/web-content-management-WCM"&gt;web content management&lt;/a&gt; and records management.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Store.&lt;/b&gt; The store component temporarily backs up frequently changing information in the short term within flexible folder structures to let users view or edit information.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Preserve.&lt;/b&gt; The preserve component backs up infrequently changing information in the medium and long term, and it is usually accomplished through records management. It's commonly used to help organizations comply with government regulations and other directives.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Deliver.&lt;/b&gt; The deliver component provides clients and end users with requested information.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;These five elements largely make up the ECM architecture, which encompasses both front-end and back-end functionalities for end users and software support teams, respectively.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/content_management-ecm.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/content_management-ecm_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/content_management-ecm_mobile.jpg 960w,https://www.techtarget.com/rms/onlineImages/content_management-ecm.jpg 1280w" alt="Chart of the five enterprise content management components: capture, manage, store, preserve, deliver." height="388" width="520"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Enterprise content management architecture comprises these five elements.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="What are the benefits of ECM?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What are the benefits of ECM?&lt;/h2&gt;
 &lt;p&gt;An effective enterprise content management system provides everyone in the organization with easy access to all the information they need to make business decisions, complete projects, collaborate and perform their jobs with efficiency.&lt;/p&gt;
 &lt;p&gt;In addition to the obvious benefits of organization and efficiency, &lt;a href="https://www.techtarget.com/searchcontentmanagement/tip/5-benefits-of-enterprise-content-management-ECM"&gt;ECM provides a wealth of other benefits&lt;/a&gt;, including the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Minimized compliance and regulatory risk.&lt;/b&gt; ECM provides a centralized platform where content can be held and disseminated in a way that meets regulatory compliance requirements and risk management guidelines. An ECM achieves this by eliminating ad hoc processes that can expose an enterprise to regulatory compliance risks and other potential problems.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;A single source of truth.&lt;/b&gt; ECM software can provide organizations with a single source of truth by structuring information so it's only stored once -- in a secure digital content repository. This reduces the risk of duplication and ensures the entire enterprise has access to a single, approved and authoritative piece of information. An ECM system also enables effective &lt;a href="https://www.techtarget.com/searchcontentmanagement/definition/knowledge-management-KM"&gt;knowledge management&lt;/a&gt; due to an organization's ability to create, share and optimize the total &lt;a href="https://www.techtarget.com/searchcontentmanagement/tip/Content-management-vs-knowledge-management-What-are-the-differences"&gt;knowledge in the content management platform&lt;/a&gt;.&amp;nbsp;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Reduced cost.&lt;/b&gt; ECM reduces costs across the organization by automating previously manual processes, reducing compliance penalties, minimizing storage needs and reducing postal requirements. It also reduces the cost of e-discovery in the event of a legal or compliance incident when lawyers or compliance officers would require access to the organization's content.&amp;nbsp;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Improved customer satisfaction.&lt;/b&gt; When resolving customer issues, customer service representatives require access to the right content at the right time, which is one of the major goals of ECM. An ECM system enables employees to help customers more quickly and efficiently, thus improving customer satisfaction.&amp;nbsp;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Business continuity.&lt;/b&gt; An ECM platform that is properly implemented enables a business to have high availability and uptime for its content. ECM incorporates archives, disaster recovery and account backups.&amp;nbsp;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Increased productivity.&lt;/b&gt; Effective ECM can streamline access and business processes, optimize security, maintain integrity, minimize overhead and eliminate bottlenecks by reducing storage as well as paper and mailing needs. All of these can lead to increased productivity.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Improved content accessibility.&lt;/b&gt; ECM provides data search and analytics tools, thus improving &lt;a href="https://www.techtarget.com/searchbusinessanalytics/definition/data-mining"&gt;data mining&lt;/a&gt;. Users can set search ranges and parameters that enable them to narrow search results and find information more efficiently.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="What is an example of an ECM?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is an example of an ECM?&lt;/h2&gt;
 &lt;p&gt;Some examples of &lt;a href="https://www.techtarget.com/searchcontentmanagement/tip/Best-enterprise-content-management-software"&gt;ECM software products&lt;/a&gt; include Alfresco, Box Platform, Hyland OnBase, IBM Cloud Pak for Business Automation, iManage Work, Microsoft SharePoint, Nuxeo Platform, OpenText Extended ECM, Newgen and SER Group's Doxis. Free and open source ECM services are available.&lt;/p&gt;
 &lt;p&gt;Organizations can deploy ECM software &lt;a href="https://www.techtarget.com/searchcontentmanagement/tip/7-steps-for-ECM-migration"&gt;on premises or in the cloud&lt;/a&gt;. The benefits of cloud-based ECM include flexible licensing models, easier remote and mobile access, and integration with other cloud services.&lt;/p&gt;
 &lt;p&gt;ECM software provides several capabilities. But companies that want more flexibility in choosing content management tools or don't need all the components of an ECM suite can purchase one-off apps from software providers to meet their needs. This approach to managing enterprise content -- which includes content services applications, platforms and components -- falls into the &lt;i&gt;content services&lt;/i&gt; classification.&lt;/p&gt;
 &lt;p&gt;At a high level, key elements of ECM incorporate the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Content lifecycle management.&lt;/li&gt; 
  &lt;li&gt;Workflow management.&lt;/li&gt; 
  &lt;li&gt;Information governance.&lt;/li&gt; 
  &lt;li&gt;Content management systems.&lt;/li&gt; 
  &lt;li&gt;Collaboration tools.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchcontentmanagement/definition/enterprise-document-management-EDM"&gt;Enterprise document management&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Digital asset management.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Reliable ECM software includes the following features:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Automated workflows.&lt;/b&gt; A workflow engine pushes content through a set of defined steps that support business processes and the content lifecycle.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Integration with other applications.&lt;/b&gt; It's useful for ECM to interoperate with an organization's existing platforms, such as CRM and ERP applications. Many ECM platforms use RESTful APIs to integrate with other web services. Generally, cloud-based ECM tools easily integrate with other cloud services.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Disaster recovery planning.&lt;/b&gt; ECM software incorporates disaster recovery planning, enabling organizations to digitally secure and protect their content from theft, fire or natural disaster, while also ensuring operations proceed as normal in case of a disaster.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Document scanning.&lt;/b&gt; ECM software lets users easily convert paper-based documents into digital information, store those documents in the ECM system, and share, manage and mine them with efficiency.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Search capabilities.&lt;/b&gt; One of the primary goals of ECM is to make content more accessible to users. Advanced search capabilities should be a top priority, enabling users to perform a full-text search and filter the results.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Metadata support.&lt;/b&gt; Advanced ECM platforms include support for automated metadata and &lt;a href="https://www.techtarget.com/searchcontentmanagement/tip/AI-in-content-management-supports-tagging-search"&gt;tagging driven by an AI engine&lt;/a&gt;. They also support multiple enterprise taxonomies.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Versioning.&lt;/b&gt; ECM can track and store multiple versions of files. These tools might also incorporate the ability to revert to a previous version of a document.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;User access controls.&lt;/b&gt; For security reasons, an ECM platform often has capabilities to prevent unauthorized users from viewing or editing certain documents. Many ECM platforms incorporate role-based access controls to achieve this.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/contentmanagement-ecm_software_comparison-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/contentmanagement-ecm_software_comparison-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/contentmanagement-ecm_software_comparison-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/contentmanagement-ecm_software_comparison-f.png 1280w" alt="Table comparing enterprise content management vendors and their features." height="506" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Compare some of the top enterprise content management vendors and their features.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="How to implement an ECM platform"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to implement an ECM platform&lt;/h2&gt;
 &lt;p&gt;An ECM implementation is often a &lt;a href="https://www.techtarget.com/searchcontentmanagement/tip/Top-8-enterprise-content-management-challenges-to-avoid"&gt;complex and challenging process&lt;/a&gt; that involves a variety of stakeholders and departments. Before implementing ECM, it's important for organizations to &lt;a href="https://www.techtarget.com/searchcontentmanagement/tip/How-to-develop-an-ECM-strategy-and-roadmap"&gt;develop an ECM roadmap or strategy&lt;/a&gt; to identify the priorities of the ECM implementation and get clarity on the necessary procedures and technologies it entails.&lt;/p&gt;
 &lt;p&gt;The first step of creating an ECM strategy is to perform a content audit by documenting all the types of content the organization deals with, the business processes it's part of and who handles the content.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/contentmanagement-key_steps_for_creating_an_emc_roadmap-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/contentmanagement-key_steps_for_creating_an_emc_roadmap-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/contentmanagement-key_steps_for_creating_an_emc_roadmap-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/contentmanagement-key_steps_for_creating_an_emc_roadmap-f.png 1280w" alt="Outline of the three key steps in an enterprise content management roadmap." height="319" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Follow these key steps to create an enterprise content management roadmap.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Once an organization clearly understands the ECM strategy, the next step is implementation. The following are essential steps to &lt;a href="https://www.techtarget.com/searchcontentmanagement/tip/5-steps-to-a-successful-ECM-implementation"&gt;successfully implement an ECM system&lt;/a&gt;:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Involve key stakeholders.&lt;/b&gt; A single employee -- or even a single department -- should not try to implement an ECM system alone. Multiple departments must be involved due to the collaborative nature of ECM. Businesses should create a team centered around multiple groups, including implementation, governance and executive teams.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/content_management-5_steps_ecm_implementation-h.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/content_management-5_steps_ecm_implementation-h_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/content_management-5_steps_ecm_implementation-h_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/content_management-5_steps_ecm_implementation-h.png 1280w" alt="Graphic of a numbered list showing the five steps of an enterprise content management implementation." height="275" width="279"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Follow these five steps for an ECM rollout.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Define goals.&lt;/b&gt; Organizations should have a clear understanding of what an ECM implementation will achieve. Regardless of the industry or department implementing ECM, users likely have common goals: 
   &lt;ul class="default-list"&gt; 
    &lt;li&gt;Eliminate the dependency on paper.&lt;/li&gt; 
    &lt;li&gt;Streamline all business processes.&lt;/li&gt; 
    &lt;li&gt;Reduce organizational risk.&lt;/li&gt; 
    &lt;li&gt;Optimize productivity.&lt;/li&gt; 
    &lt;li&gt;Improve customer service.&lt;/li&gt; 
   &lt;/ul&gt; &lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Plan how to reach those goals. &lt;/b&gt;Next, businesses should determine how to reach the goals they've set. They should consider whether they need to migrate content, train users or build a new ECM system. During this step, businesses should evaluate which processes are high priority.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Build, test and deploy. &lt;/b&gt;Ideally, businesses should drive an ECM implementation using&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsoftwarequality/video/Agile-vs-Scrum-How-to-choose-between-them"&gt;Agile or Scrum methodology&lt;/a&gt;. This enables stakeholders to be fully engaged as they evaluate biweekly or monthly releases.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Iterate. &lt;/b&gt;An ECM implementation never truly ends. Businesses should build in the capability to refine an ECM system over time to maximize business value.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="The future of ECM"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The future of ECM&lt;/h2&gt;
 &lt;p&gt;In 2016, Gartner declared enterprise content management had been replaced by content services -- the strategic concept that involves content services applications, platforms and components but is less concerned with centralizing all information into one enterprise-wide platform. As part of that initiative, Gartner replaced the ECM Magic Quadrant with a content services Magic Quadrant in 2017.&lt;/p&gt;
 &lt;p&gt;However, organizations still frequently use ECM to organize their information and achieve goals faster.&lt;/p&gt;
 &lt;p&gt;Content services platforms (CSPs) and ECM &lt;a href="https://www.techtarget.com/searchcontentmanagement/answer/Whats-the-difference-between-ECM-vs-content-services"&gt;are not equivalent terms&lt;/a&gt;, and one will not likely replace the other. A CSP focuses on managing transactional content in the context of solving a particular problem. ECM is broader in scope; it seeks to manage all forms of content within the enterprise, regardless of its type or where it resides.&lt;/p&gt;
 &lt;p&gt;ECM has also evolved to become an approach rather than a single technology. In the future, enterprise content management strategies and tools will continue to change to adapt to the demands of organizations looking for more agility and integration. As technology evolves, ECM vendors add more features.&lt;/p&gt;
 &lt;p&gt;More organizations are &lt;a target="_blank" href="https://www.teknita.com/the-impact-of-ecm-on-collaboration-and-team-productivity/" rel="noopener"&gt;incorporating team collaboration&lt;/a&gt; tools into their ECM approach. Plus, constant advancements in cloud, mobile and analytics technology continue to increase users' expectations of ECM capabilities. Automation and machine learning are becoming key complements to ECM, and it is becoming more and more likely that cloud deployment will be the key to maximizing an ECM system's effectiveness.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt; &lt;i&gt;This article was republished to improve the reader experience.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Enterprise content management is a set of defined processes, strategies and tools that enables a business to obtain, organize, store and deliver critical information to its employees, business stakeholders and customers.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/5.jpg</image>
            <link>https://www.techtarget.com/searchcontentmanagement/definition/enterprise-content-management-ECM</link>
            <pubDate>Wed, 11 Sep 2024 00:00:00 GMT</pubDate>
            <title>What is enterprise content management? Guide to ECM</title>
        </item>
        <item>
            <body>&lt;p&gt;Microsoft Azure Files -- sometimes known as Microsoft Azure File Service -- is a simple, secure, serverless, fully managed and cloud-based file sharing service for enterprise users. Through Azure files, users can access the file shares via the industry-standard Server Message Block (&lt;a href="https://www.techtarget.com/searchnetworking/definition/Server-Message-Block-Protocol"&gt;SMB&lt;/a&gt;) and Network File System (&lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Network-File-System"&gt;NFS&lt;/a&gt;) protocols, as well as the &lt;a href="https://www.techtarget.com/searchwindowsserver/tutorial/How-to-use-PowerShell-with-the-Azure-REST-API"&gt;Azure Files REST API&lt;/a&gt;.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Azure cloud storage services and Azure Files"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Azure cloud storage services and Azure Files&lt;/h2&gt;
 &lt;p&gt;Enterprise users can choose from several cloud storage services available with the &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Windows-Azure"&gt;Azure cloud&lt;/a&gt;. These storage solutions for &lt;a href="https://www.techtarget.com/searchstorage/tip/Compare-block-vs-file-vs-object-storage-differences-uses"&gt;object, block, and file storage&lt;/a&gt; provide high availability and enterprise-grade security and allow users to scale cloud performance and unify data management.&lt;/p&gt;
 &lt;p&gt;Azure Files is a managed file share and storage service that offers a highly available and durable &lt;a href="https://www.techtarget.com/searchstorage/definition/distributed-file-system-DFS"&gt;distributed file system&lt;/a&gt;. By replacing or augmenting on-prem file shares with Azure Files, organizations can worry less about local power outages or network issues affecting business continuity and focus more on their core business.&lt;/p&gt;
 &lt;p&gt;With Azure Files, organizations get the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;100 GB of local redundant storage, or LRS, transaction optimized, hot and cool files.&lt;/li&gt; 
  &lt;li&gt;2 million read, list and other file operations.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;These files and operations are available free every month for 12 months.&lt;/p&gt;
 &lt;p&gt;Since Azure Files is a fully managed service, users are relieved of the management or administration burden. To access the stored data, they simply navigate to the path where the file share is mounted and open the file.&lt;/p&gt;
 &lt;p&gt;Users can also store and access data from multiple sources since Azure Files supports multiple protocols, including SMB, NFS and File Transfer Protocols (&lt;a href="https://www.techtarget.com/searchsecurity/tip/8-secure-file-transfer-services-for-the-enterprise"&gt;FTPs&lt;/a&gt;). Support for various protocols allows users to seamlessly replace on-prem file shares with Azure file shares and even share file systems across multiple machines, applications and application &lt;a href="https://www.techtarget.com/whatis/definition/instance"&gt;instances&lt;/a&gt; - without worrying about application compatibility or file system shareability.&lt;/p&gt;
 &lt;p&gt;Additionally, the service is ideal for &lt;a href="https://www.techtarget.com/searchcloudcomputing/feature/Multi-cloud-vs-hybrid-cloud-and-how-to-know-the-difference"&gt;hybrid cloud&lt;/a&gt; deployments. This allows Azure users to transform Windows Servers into caches of cloud shares and mount the file shares from anywhere, while simultaneously enjoying on-prem performance.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/l9JkLhvaKA8?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="Accessing Azure Files"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Accessing Azure Files&lt;/h2&gt;
 &lt;p&gt;Accessing and using Azure Files shares is easy. Users can directly mount file shares concurrently by cloud or on-premises deployments of many different systems, including Windows, &lt;a href="https://www.techtarget.com/searchdatacenter/definition/Linux-operating-system"&gt;Linux&lt;/a&gt; and &lt;a href="https://www.techtarget.com/whatis/definition/Mac-OS"&gt;macOS&lt;/a&gt;. It is also possible to &lt;a href="https://www.techtarget.com/searchstorage/definition/cache"&gt;cache&lt;/a&gt; SMB Azure Files shares on Windows Servers using the Azure File Sync feature. Caching enables fast access near where the data is being used. Along with Azure Files AD Authentication, SMB Azure Files shares can work with on-prem Active Directory Domain Services (&lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Active-Directory-Domain-Services-AD-DS"&gt;AD DS&lt;/a&gt;) for strong access control.&lt;/p&gt;
 &lt;p&gt;As a distributed file system, Azure Files is highly available and durable for enterprise use. There are no hidden infrastructure-as-a-service (&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Infrastructure-as-a-Service-IaaS"&gt;IaaS&lt;/a&gt;) virtual machines (&lt;a href="https://www.techtarget.com/searchitoperations/definition/virtual-machine-VM"&gt;VMs&lt;/a&gt;) or network-attached storage (&lt;a href="https://www.techtarget.com/searchstorage/definition/network-attached-storage"&gt;NAS&lt;/a&gt;) filers, increasing transparency and simplifying usage. Moreover, Azure Files can supplement or extend traditional on-prem file servers or NAS devices into the Azure cloud. The service can also be used to replace the devices entirely and provide simple, fast, secure, and hassle-free &lt;a href="https://www.techtarget.com/searchdatabackup/tip/Cloud-backup-versus-cloud-storage-comparison"&gt;file storage in the cloud&lt;/a&gt;.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Azure File Sync"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Azure File Sync&lt;/h2&gt;
 &lt;p&gt;Azure Files includes a File Sync feature that allows users to replicate SMB Azure file shares to Windows servers, both on-prem and in the cloud. Doing so improves performance and enables distributed data caching. Azure File Sync also helps to optimize file storage and access by centralizing file shares and providing the flexibility and compatibility of a Windows &lt;a href="https://www.techtarget.com/searchnetworking/definition/file-server"&gt;file server&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Using Azure File Sync, users can maintain as many caches as needed. And by enabling cloud tiering, users can cache frequently accessed files on a local server while tiering the least frequently accessed files to the cloud. Cloud tiering improves the user experience since tiered files can be quickly recalled as needed. It also helps reduce storage costs since there's less data to store on premises. The local data can be easily accessed using any protocol that's available on Windows Server, including SMB, NFS, and FTPs.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/3_cloud_storage_services_explained-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/3_cloud_storage_services_explained-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/3_cloud_storage_services_explained-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/3_cloud_storage_services_explained-f.png 1280w" alt="cloud storage vs. cloud backup vs. cloud file sync table" height="385" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Learn the use cases for cloud storage, cloud backup, and cloud file sync and share.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Benefits of Azure Files"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Benefits of Azure Files&lt;/h2&gt;
 &lt;p&gt;Azure Files provides a simple and secure cloud file sharing service for modern enterprise &lt;a href="https://www.techtarget.com/searchdatacenter/definition/workload"&gt;workloads&lt;/a&gt;. The file shares are fully managed and &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Top-benefits-and-disadvantages-of-serverless-computing"&gt;serverless&lt;/a&gt;, meaning Microsoft manages all underlying infrastructure and management tasks. This allows users to focus on their core tasks rather than on busywork related to hardware management, operating system (OS) patching and security upgrades.&lt;/p&gt;
 &lt;p&gt;The service is OS-agnostic, so users can directly mount and access their Azure file shares from any &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/client"&gt;client&lt;/a&gt;, including Windows, Linux and macOS. They can also access NFS Azure file shares from Linux clients.&lt;/p&gt;
 &lt;p&gt;Azure Files also allows the replication of SMB Azure file shares to Windows servers, both on-prem and in the cloud. This flexibility of choice supplements on-prem servers and supports distributed data caching to improve overall performance. Furthermore, administrators can easily create and manage Azure file shares using &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Top-PowerShell-commands-you-must-know-with-cheat-sheet"&gt;PowerShell cmdlets&lt;/a&gt;, &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Evaluate-Azure-CLI-vs-PowerShell-for-resource-management"&gt;Azure CLI&lt;/a&gt;, Azure portal or &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/What-are-the-main-features-of-Azure-Storage-Explorer"&gt;Azure Storage Explorer&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;It is also easy to migrate the Windows file server to the cloud using Azure Files. There's no downtime and no need to break existing links when &lt;a href="https://www.techtarget.com/whatis/definition/lift-and-shift"&gt;lifting-and-shifting&lt;/a&gt; applications that expect a file share to store file application or user data. Migration is further simplified using &lt;a href="https://www.techtarget.com/searchwindowsserver/tutorial/Migrating-file-servers-using-Storage-Migration-Service"&gt;Microsoft's Storage Migration Service&lt;/a&gt; and Azure File Sync.&lt;/p&gt;
 &lt;p&gt;Azure Files supports both classic lift-and-shift and hybrid lift-and-shift cloud migration. With the classic approach, users can move the application and its data to Azure while with the hybrid approach, they can move only application to Azure Files while running the application on-prem.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Azure Files use cases"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Azure Files use cases&lt;/h2&gt;
 &lt;p&gt;Azure Files is a good choice for cloud file shares, regardless of whether users mount the service directly or use Azure File Sync to cache on-prem. The service is useful for a wide range of cloud development projects, particularly those that require shared application settings. With Azure Files, &lt;a href="https://www.techtarget.com/searchitoperations/definition/configuration-file"&gt;configuration files&lt;/a&gt; for a project can be stored in a centralized location and accessed from many application instances. These instances will load the files through the Azure Files REST API. Users can access the files by mounting the share locally.&lt;/p&gt;
 &lt;p&gt;Azure Files is also useful for storing logs, &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/business-metric"&gt;metrics&lt;/a&gt; and crash dumps from cloud applications. Developers can access these files by mounting the file share on a local machine. Moreover, when working on VMs in the cloud, they don't need to copy any utilities or tools to the cloud. Rather, they can mount Azure file shares locally on the VM (or VMs). Essentially, Azure Files allows users to benefit from the cloud's flexibility while enjoying the freedom to work the way they want and with the familiar tools they are most comfortable with.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-1" src="https://www.youtube.com/embed/a1LW8rDB874?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;p&gt;Finally, Azure Files is ideal for &lt;a href="https://www.techtarget.com/searchitoperations/definition/container-containerization-or-container-based-virtualization"&gt;container&lt;/a&gt;-based applications. Using containers allows developers to build once and run anywhere, thus accelerating application development and time to market. Azure file shares can be used as persistent volumes for &lt;a href="https://www.techtarget.com/searchitoperations/tip/How-to-manage-stateful-containers-with-Kubernetes"&gt;stateful containers&lt;/a&gt; and the data between containers can be shared using NFS or SMB file shares. SMB file shares can be used to share data between containers since Azure Files is tightly integrated with Azure Kubernetes Service (&lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/Azure-Kubernetes-Service-AKS"&gt;AKS&lt;/a&gt;) for easy cloud file storage and data management.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;With file storage in the public cloud, there are many options available across some of the largest vendors, with performance a major consideration. Compare &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchstorage/tip/Compare-file-storage-options-in-the-cloud"&gt;&lt;i&gt;file storage options in the cloud&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Microsoft Azure Files -- sometimes known as Microsoft Azure File Service -- is a simple, secure, serverless, fully managed and cloud-based file sharing service for enterprise users.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/4.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Azure-File-Service</link>
            <pubDate>Thu, 15 Aug 2024 17:39:00 GMT</pubDate>
            <title>What is Microsoft Azure File Service?</title>
        </item>
        <item>
            <body>&lt;p&gt;For basic disk operations on Windows systems, administrators can use &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Diskpart-Disk-Partition-Utility"&gt;diskpart&lt;/a&gt;, a command-line utility that remains useful for many different drive-related jobs more than 20 years after it was released.&lt;/p&gt; 
&lt;p&gt;Microsoft introduced the diskpart management tool in the Windows 2000 OS in 1999 and has included it all versions of Windows since. Diskpart scans for newly added disks, but it can also create, delete and resize drive &lt;a href="https://www.techtarget.com/searchstorage/definition/partition"&gt;partitions&lt;/a&gt;, as well as assign or reassign drive letters. Diskpart also works with drive volumes, virtual hard disks (VHDs) and removable media, such as USB flash drives. In addition to its management capabilities, diskpart can troubleshoot disk problems, fix corrupted partitions and recover data. The Disk Management utility is also included with Windows OSes and is a similar GUI-based tool, but it lacks the granular control and automation capabilities in diskpart.&lt;/p&gt; 
&lt;p&gt;Microsoft continues to develop diskpart, and the latest version features 38 commands. To use diskpart, list the objects, such as disks or partitions, and then select an object to change it.&lt;/p&gt; 
&lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/071621_diskpart_command_list.jpg"&gt;
 &lt;img data-src="https://www.techtarget.com/rms/onlineimages/071621_diskpart_command_list_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/071621_diskpart_command_list_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/071621_diskpart_command_list.jpg 1280w" alt="diskpart commands list" height="291" width="560"&gt;
 &lt;figcaption&gt;
  &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Diskpart is a disk management utility in Windows with an extensive commands list.
 &lt;/figcaption&gt;
 &lt;div class="main-article-image-enlarge"&gt;
  &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/figure&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Using diskpart requires understanding data storage terminology"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Using diskpart requires understanding data storage terminology&lt;/h2&gt;
 &lt;p&gt;Using diskpart effectively requires a basic understanding of &lt;a href="https://www.techtarget.com/searchenterprisedesktop/answer/What-are-Windows-10-disk-management-terms-IT-should-know"&gt;Windows disk terminology&lt;/a&gt;. A basic disk is a storage device, such as a hard drive, solid-state drive or USB flash drive, which you format with a &lt;a href="https://www.techtarget.com/searchwindowsserver/answer/Whats-the-difference-between-FAT32-FAT16-and-NTFS"&gt;Windows file system&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;A basic disk can hold one or several partitions in Windows. A partition is a logical structure confined to a single disk.&lt;/p&gt;
 &lt;p&gt;A volume is a construct of the OS that consists of one or more partitions that can span one or more disks.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Use caution when running diskpart commands"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Use caution when running diskpart commands&lt;/h2&gt;
 &lt;p&gt;You should be careful when using diskpart because there is no undo function if you select the wrong object. For example, if you format a disk, then you lose any data on the disk.&lt;/p&gt;
 &lt;p&gt;Also, once a command is entered -- even a destructive one -- diskpart does not ask for confirmation before it runs. For example, if you perform an errant diskpart delete partition operation, you must use another utility, such as a third-party disk management program, to recover the data or &lt;a href="https://www.techtarget.com/searchdatabackup/feature/Full-incremental-or-differential-How-to-choose-the-correct-backup-type"&gt;use a backup image&lt;/a&gt; to restore the files from the drive.&lt;/p&gt;
 &lt;p&gt;There is no override function. You can use the Ctrl+C hotkey or close the command window to stop the ongoing diskpart operation, but this could lead to data corruption or introduce problems with disk functionality.&lt;/p&gt;
 &lt;p&gt;Follow these tips to avoid issues when using diskpart:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Do not use diskpart until you back up the disk you plan to modify.&lt;/li&gt; 
  &lt;li&gt;Exercise caution when using diskpart on systems that use dynamic disks, which Microsoft still supports but considers a legacy feature.&lt;/li&gt; 
  &lt;li&gt;Check with your hardware vendor before using diskpart.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="How to create a partition with diskpart"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to create a partition with diskpart&lt;/h2&gt;
 &lt;p&gt;A disk partition sections off a portion of a physical hard drive. Partitioning a hard drive can be done for several reasons, such as organizing data in a more logical fashion or installing a different OS on each partition.&lt;/p&gt;
 &lt;p&gt;Diskpart performs the tasks of a disk partition manager. Partitioning your disk can help increase the I/O performance of hard disks newly added to &lt;a href="https://www.techtarget.com/searchstorage/definition/RAID"&gt;RAID&lt;/a&gt;. The documentation for many server applications, such as Exchange Server, recommends using diskpart to create the primary or extended partitions. You can use a primary partition as the system partition; you can only use an extended partition for additional logical drive assignments.&lt;/p&gt;
 &lt;p&gt;The diskpart &lt;span style="font-family: courier new, courier, monospace;"&gt;create&lt;/span&gt;&lt;b&gt; &lt;/b&gt;command makes disk partitions, volumes on a single disk or multiple disks, and VHDs.&lt;/p&gt;
 &lt;p&gt;To run diskpart, open a &lt;a href="https://www.techtarget.com/whatis/definition/command-prompt"&gt;command prompt&lt;/a&gt;, and run it as the administrator.&lt;/p&gt;
 &lt;p&gt;Take the following steps to create a partition with diskpart:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;Type &lt;span style="font-family: courier new, courier, monospace;"&gt;diskpart&lt;/span&gt;.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;list disk&lt;/span&gt;. Note the drive number you wish to modify.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;select disk [number]&lt;/span&gt;. Replace [number] with the disk number to edit using the information from step two.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;create partition primary size=102400&lt;/span&gt;. The &lt;span style="font-family: courier new, courier, monospace;"&gt;size&lt;/span&gt; parameter refers to the size in megabytes. In this case, 102400 equals 100 GB. Change the word &lt;span style="font-family: courier new, courier, monospace;"&gt;primary&lt;/span&gt;&lt;b&gt; &lt;/b&gt;to &lt;span style="font-family: courier new, courier, monospace;"&gt;extended&lt;/span&gt;&lt;b&gt; &lt;/b&gt;to create an extended partition. If you do not set a size, then all available space on the disk is used for the partition.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;assign letter=D&lt;/span&gt;. Choose an unused drive letter.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;exit&lt;/span&gt;.&lt;/li&gt; 
  &lt;li&gt;From the command prompt, use the &lt;span style="font-family: courier new, courier, monospace;"&gt;format&lt;/span&gt; command, the Disk Management utility in Windows or any disk format tool to format the drive. It is typical to use New Technology File Sysem (&lt;a href="https://www.techtarget.com/searchwindowsserver/definition/NTFS"&gt;NTFS&lt;/a&gt;) during the initialization process.&lt;/li&gt; 
 &lt;/ol&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="How to extend a partition with diskpart"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to extend a partition with diskpart&lt;/h2&gt;
 &lt;p&gt;When it comes to adjusting the space for a partition or volume, the following method is superior to configuring two disks. Dynamic disk extensions only concatenate the newly added space, meaning they just add the disk space to the end of the original partition without restriping the data.&lt;/p&gt;
 &lt;p&gt;Concatenation isolates performance within each partition and does not offer fault tolerance when the partition is configured in RAID. Diskpart restripes your existing data. This is beneficial when the partition is set up in RAID because the existing partition data spreads across all the drives in the array rather than just adding new space to the end, like the Disk Management utility.&lt;/p&gt;
 &lt;p&gt;Take the following steps to extend a partition with diskpart:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;Verify that contiguous free space is available on the same drive and this free space is next to the partition you intend to extend with no partitions in between. Be sure you have a full backup before executing this command.&lt;/li&gt; 
  &lt;li&gt;At a command prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;diskpart&lt;/span&gt;.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;select disk [number]&lt;/span&gt;. Enter the proper disk number to modify.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;select volume [number]&lt;/span&gt;. Choose the volume.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;extend&lt;/span&gt;. If you do not set a size, then diskpart uses all available space on the disk.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;exit&lt;/span&gt;.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/071621_diskpart_extend_partition.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/071621_diskpart_extend_partition_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/071621_diskpart_extend_partition_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/071621_diskpart_extend_partition.jpg 1280w" alt="extend disk volume" height="162" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Use diskpart to select a volume to extend with diskpart.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="How to delete a partition with diskpart"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to delete a partition with diskpart&lt;/h2&gt;
 &lt;p&gt;The &lt;span style="font-family: courier new, courier, monospace;"&gt;delete&lt;/span&gt;&lt;b&gt; &lt;/b&gt;command in diskpart removes dynamic disks, partitions, volumes and shadow copies. When you have multiple volumes on the disk or an unwanted partition, such as a recovery partition, this command removes them and returns them to unallocated space.&lt;/p&gt;
 &lt;p&gt;Take the following steps to delete a partition:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;At a command prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;diskpart&lt;/span&gt;.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;select disk [number]&lt;/span&gt;. Choose the disk to modify.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;list partition&lt;/span&gt;.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;select partition [number]&lt;/span&gt;. Enter the partition number to modify.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;delete partition&lt;/span&gt;.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;exit&lt;/span&gt;.&lt;/li&gt; 
 &lt;/ol&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="How to create a volume using diskpart"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to create a volume using diskpart&lt;/h2&gt;
 &lt;p&gt;A volume is a logical construction the OS builds from one or several partitions. In Windows, you can create several volume types with diskpart: simple volume, spanned volume, striped volume, mirrored volume and &lt;a href="https://www.techtarget.com/searchstorage/definition/RAID-5-redundant-array-of-independent-disks"&gt;RAID 5 volume&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;A simple volume spans just one partition on a disk.&lt;/p&gt;
 &lt;p&gt;A spanned volume gathers space from several disks into one logical volume. This operation requires erasing the disks, building the partitions, extending one volume from one disk to the other disk to make the span and then formatting the new volume.&lt;/p&gt;
 &lt;p&gt;A striped volume, also called a &lt;i&gt;&lt;a href="https://www.techtarget.com/searchstorage/definition/RAID-0-disk-striping"&gt;RAID 0&lt;/a&gt; volume&lt;/i&gt;, requires two or more disks. This arrangement is often used to boost performance with read/write speeds by spreading data across the drives.&lt;/p&gt;
 &lt;p&gt;A mirrored volume creates a copy of a volume on another disk, which is helpful to avoid data loss if a disk fails. A mirrored volume requires at least two disks that have the same size.&lt;/p&gt;
 &lt;p&gt;A RAID 5 volume is similar to a mirrored volume but uses parity information to distribute the data across disks. A RAID 5 volume requires at least three disks. This method is more scalable but has a slower recovery time compared to a mirrored volume.&lt;/p&gt;
 &lt;p&gt;Take the following steps to create a simple volume of 500 GB with diskpart:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;At a command prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;diskpart&lt;/span&gt;.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;list disk&lt;/span&gt;. Output shows available disks.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, &lt;span style="font-family: courier new, courier, monospace;"&gt;select disk [number]&lt;/span&gt;. Choose the disk for the volume.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;create volume simple size=512000&lt;/span&gt;.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;exit&lt;/span&gt;.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;Take the following steps to create a spanned volume of 1 TB using two available disks:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;At a command prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;diskpart&lt;/span&gt;.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;list disk&lt;/span&gt;&lt;b&gt; &lt;/b&gt;. See the available disks on the system.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;select disk [number]&lt;/span&gt;. Select the first disk.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;clean&lt;/span&gt;. This removes data and any existing partitions or volumes on the selected disk.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;create partition primary&lt;/span&gt;. This creates a partition on the disk.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;select disk [number]&lt;/span&gt;. Select the second disk.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;clean&lt;/span&gt;. This removes data and any partitions and volumes from the second disk.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;create partition primary&lt;/span&gt;. This creates a partition on the second disk.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;select disk [number]&lt;/span&gt;. Enter&lt;b&gt; &lt;/b&gt;the first disk number.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;create volume spanned size=1048576&lt;/span&gt;. This creates a spanned volume of 1 TB from the two disks.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;exit&lt;/span&gt;.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;Take the following steps to create a RAID 0 or striped volume using two disks:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;At a command prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;diskpart&lt;/span&gt;.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;list disk&lt;/span&gt;. See the available disks on the system.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;select disk [number]&lt;/span&gt;. Select the first disk.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;clean&lt;/span&gt;&lt;b&gt;.&lt;/b&gt; This erases data and any partition and volumes on the selected disk.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;convert dynamic&lt;/span&gt;. This converts the basic disk to a dynamic disk.&lt;/li&gt; 
  &lt;li&gt;Repeat steps 3-5 for the second disk.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;create volume stripe disk=[disk number 1],[disk number 2]&lt;/span&gt;. Enter the proper disk numbers separated by a comma.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;format fs=ntfs quick label="[label name]"&lt;/span&gt;. This formats the volume with NTFS and adds the label of your choosing.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;exit&lt;/span&gt;.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;Take the following steps to create a mirrored volume using two disks:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;At a command prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;diskpart&lt;/span&gt;.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;list disk&lt;/span&gt;. See the available disks on the system.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;select disk [number]&lt;/span&gt;. Select the first disk.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;clean&lt;/span&gt;. This erases data and any partition and volumes on the selected disk.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;convert dynamic&lt;/span&gt;. This converts the basic disk to a dynamic disk.&lt;/li&gt; 
  &lt;li&gt;Repeat steps 3-5 for the second disk.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;create volume mirror disk=[disk number 1],[disk number 2]&lt;/span&gt;. Enter the proper disk numbers separated by a comma.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;assign letter=[drive letter]&lt;/span&gt;. Enter an unused drive letter.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;format fs=ntfs quick label="[volume name]"&lt;/span&gt;. Format the volume, and enter a name for the mirrored volume.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;exit&lt;/span&gt;.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;Take the following steps to create a RAID 5 volume:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;At a command prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;diskpart&lt;/span&gt;.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;list disk&lt;/span&gt;. Output shows available disks.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;select disk [number]&lt;/span&gt;. Choose the first disk for the volume.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;clean&lt;/span&gt;. This erases data and any partition and volumes on the selected disk.&lt;/li&gt; 
  &lt;li&gt;Repeat steps 3-4 for the second disk and third disk.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;create volume raid disk=[disk number 1],[disk number 2],[disk number 3]&lt;/span&gt;. Enter the three disk numbers separated by commas.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;format fs=ntfs quick label="[volume name]"&lt;/span&gt;. Format the volume with NTFS, and give the RAID 5 volume a name.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;assign letter=[drive letter]&lt;/span&gt;. Enter an unused drive letter.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;exit&lt;/span&gt;.&lt;/li&gt; 
 &lt;/ol&gt;
&lt;/section&gt;                 
&lt;section class="section main-article-chapter" data-menu-title="How to delete a volume using diskpart"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to delete a volume using diskpart&lt;/h2&gt;
 &lt;p&gt;There are several reasons to remove an existing volume on a disk, such as restructuring disk space or switching file systems. Deleting a volume with diskpart permanently deletes any data on the volume and makes the space available for use.&lt;/p&gt;
 &lt;p&gt;Take the following steps to delete a volume:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;At a command prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;diskpart&lt;/span&gt;.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;list volume&lt;/span&gt;. Output shows available volumes.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;select volume [number]&lt;/span&gt;. Choose the volume to remove.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;delete volume&lt;/span&gt;.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;exit&lt;/span&gt;.&lt;/li&gt; 
 &lt;/ol&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="How to erase disk configuration and data using diskpart"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to erase disk configuration and data using diskpart&lt;/h2&gt;
 &lt;p&gt;When you have an entire disk to wipe clean, you can use the &lt;span style="font-family: courier new, courier, monospace;"&gt;diskpart clean all&lt;/span&gt; command to convert all the stored data into unallocated space. This operation deletes all data on the disk by writing zeros on each disk sector. Diskpart also removes all partition and volume information from the selected drive. If security is not a concern, you can use the &lt;span style="font-family: courier new, courier, monospace;"&gt;diskpart clean&lt;/span&gt;&lt;b&gt; &lt;/b&gt;command, which removes all partitions or volume formatting from the disk.&lt;/p&gt;
 &lt;p&gt;Take the following steps to clean a disk:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;At a command prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;diskpart&lt;/span&gt;.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;select disk [number]&lt;/span&gt;. Enter the disk number to wipe.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;clean all&lt;/span&gt;.&lt;/li&gt; 
  &lt;li&gt;At the DISKPART prompt, type &lt;span style="font-family: courier new, courier, monospace;"&gt;exit&lt;/span&gt;.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;ol class="default-list"&gt;&lt;/ol&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="How to troubleshoot problems with diskpart"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to troubleshoot problems with diskpart&lt;/h2&gt;
 &lt;p&gt;Most operations that change disk structure using diskpart require administrator privileges, so be sure to run diskpart with the right permissions and start from an elevated command prompt to avoid unexpected issues.&lt;/p&gt;
 &lt;p&gt;It's helpful to check the status of the disk using the &lt;span style="font-family: courier new, courier, monospace;"&gt;list&lt;/span&gt;&lt;b&gt; &lt;/b&gt;parameter in diskpart before performing any action on a disk, volume or partition.&lt;/p&gt;
 &lt;p&gt;The &lt;span style="font-family: courier new, courier, monospace;"&gt;attributes disk&lt;/span&gt;&lt;b&gt; &lt;/b&gt;command shows the properties of the disk and can check if a disk is set to read-only, which prevents any changes. To allow writes to the disk, run diskpart, select the disk and run the &lt;span style="font-family: courier new, courier, monospace;"&gt;attributes disk clear readonly&lt;/span&gt;&lt;b&gt; &lt;/b&gt;command.&lt;/p&gt;
 &lt;p&gt;If you encounter a virtual disk service error when trying to perform a diskpart command, then this could mean the disk is being used. To correct this, try closing any running applications, or reboot the device.&lt;/p&gt;
 &lt;p&gt;An I/O error when running diskpart could mean several things, including a possible hardware failure, but one of the first troubleshooting steps is to run the &lt;span style="font-family: courier new, courier, monospace;"&gt;chkdsk /f /r&lt;/span&gt;&lt;b&gt; &lt;/b&gt;command, which checks a disk for any errors and recovers information from bad sectors.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Other ways to use diskpart"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Other ways to use diskpart&lt;/h2&gt;
 &lt;p&gt;For maintenance work that requires a bootable USB flash drive, you can use diskpart to format the partition and set up the file system on the removable drive. Administrators can also use diskpart in both Windows Preinstallation Environment and Windows Recovery Environment to correct disk problems or to configure the machine for deployment.&lt;/p&gt;
 &lt;p&gt;With the &lt;span style="font-family: courier new, courier, monospace;"&gt;diskpart /s&lt;/span&gt;&lt;b&gt; &lt;/b&gt;switch, administrators can run scripts to automate tasks associated with setting up Windows computers, such as configuring the disks for multiple systems, adding a recovery partition or wiping all data from a disk to return it to a factory state.&lt;/p&gt;
 &lt;p&gt;Sample code from the Microsoft site gives &lt;a target="_blank" href="https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/oem-deployment-of-windows-desktop-editions-sample-scripts?view=windows-10&amp;amp;preserve-view=true" rel="noopener"&gt;examples&lt;/a&gt; of how to develop a text-based script file administrators can call from diskpart and run automatically. IT workers can run several diskpart scripts, but Microsoft recommends building in a delay of 15 seconds after a script runs to prevent issues.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt; &lt;i&gt;This article was updated in August 2024 to improve the reader experience.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Diskpart is one of the oldest disk management tools in Windows, but it remains useful for its advanced capabilities in automation and granular control compared to other utilities.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/pharma_g1878483820.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/tip/Using-Diskpart-to-create-extend-or-delete-a-disk-partition</link>
            <pubDate>Wed, 14 Aug 2024 09:00:00 GMT</pubDate>
            <title>Use diskpart to create, delete and modify disk partitions</title>
        </item>
        <item>
            <body>&lt;p&gt;There are a multitude of hidden settings in the Windows OS that you can unlock with help from several tools designed for Windows registry editing.&lt;/p&gt; 
&lt;p&gt;There are times when a simple addition to the Windows registry can fix a stubborn problem to save you from having to reinstall an application or modifying an existing Windows registry key mitigates an emerging threat until Microsoft patches the vulnerability. There are several utilities and techniques to make registry changes. Windows Registry Editor (regedit) is one of the oldest tools, but Microsoft provides several more options, including the command-line utilities named reg and regini, &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Top-PowerShell-commands-you-must-know-with-cheat-sheet"&gt;PowerShell cmdlets&lt;/a&gt; and the Group Policy administrative tool.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is the Windows registry?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is the Windows registry?&lt;/h2&gt;
 &lt;p&gt;The registry is a database feature in the Windows desktop and server OSes used to configure and organize settings on the Windows device for the users, installed software and hardware devices. The registry replaced the need to use configuration files in application folders. One benefit to the registry is to reduce issues from faulty program updates that corrupted configuration files.&lt;/p&gt;
 &lt;p&gt;The registry in the latest versions of Windows has a default of five predefined keys:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;HKEY_CLASSES_ROOT (HKCR).&lt;/b&gt; This root key tells Windows what application to use when you want to open a certain file type.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;HKEY_CURRENT_USER (HKCU).&lt;/b&gt; This root key holds data related to the user currently using the machine, including the user's folders and screen colors.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;HKEY_LOCAL_MACHINE (HKLM).&lt;/b&gt; Data in this root key relates to configuration information for the computer or any user.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;HKEY_USERS (HKU).&lt;/b&gt; This root key holds all the actively loaded profiles for users on the machine.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;HKEY_CURRENT_CONFIG (HKCC).&lt;/b&gt; This root key holds hardware profile information the machine calls during system startup.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;Below each key can be multiple subkeys and values. Not every application requires a subkey.&lt;/p&gt;
 &lt;p&gt;Often, Microsoft directs administrators to mitigate a pressing security issue in Windows by modifying subkeys in the registry by adding new registry values -- also called &lt;i&gt;data entries&lt;/i&gt; -- or modifying existing ones.&lt;/p&gt;
 &lt;p&gt;One common Windows registry edit is changing the file association for a certain file type so it opens with a specific application. For example, if you want .html files to open with Google Chrome rather than Microsoft Edge, you can adjust those settings in the file extension area of the Windows registry.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Regedit.exe uses"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Regedit.exe uses&lt;/h2&gt;
 &lt;p&gt;Regedit is the GUI-based tool built into Windows for editing the Windows registry. To start, type &lt;b&gt;regedit &lt;/b&gt;in the Windows search box on the taskbar.&lt;/p&gt;
 &lt;p&gt;Regedit gives a visual representation of the Windows registry, using a dual-pane layout with the root keys and subkeys in the left pane and the values for the selected key or subkey in the right pane. You can import or export registry subkeys and values from the &lt;b&gt;File&lt;/b&gt; menu. From the &lt;b&gt;Edit&lt;/b&gt; menu, you can create a new entry in the registry, check the permissions for the selection, delete or rename the selection, or copy the key name. You can also run a search from this menu.&lt;/p&gt;
 &lt;p&gt;Right-clicking in the different sections lets you add a new key, modify an existing one or delete a key.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/072021_regedit_1.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/072021_regedit_1_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/072021_regedit_1_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/072021_regedit_1.jpg 1280w" alt="regedit layout" height="314" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The regedit registry editor is a GUI-based tool that displays the hierarchical layout of the Windows registry. It also includes several command-line options.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;Due to its importance to the Windows OS, you should export a &lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/How-and-when-to-perform-a-Windows-Registry-cleanup"&gt;backup of the registry&lt;/a&gt; in case you need to recover from a problem. Use the export function in the regedit &lt;b&gt;File&lt;/b&gt; menu to make a backup of the entire registry or just the section you plan to edit. This creates a .reg file. If a problem occurs, you can double-click on that .reg file to restore the original settings.&lt;/p&gt;
 &lt;p&gt;Microsoft released its first 64-bit Windows Server version with &lt;a href="https://www.techtarget.com/searchwindowsserver/feature/Server-2008-R2-end-of-life-hitting-home-for-many-in-IT"&gt;Server 2008&lt;/a&gt; and its first Windows client 64-bit version with Windows 8. The default version of regedit in the latest versions of Windows can open both 64-bit and 32-bit registry keys for backward compatibility.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Regedit command-line parameters and syntax"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Regedit command-line parameters and syntax&lt;/h2&gt;
 &lt;p&gt;You can use regedit with either hotkeys or a mouse, but the utility has several command-line switches for basic registry work.&lt;/p&gt;
 &lt;table class="main-article-table"&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td&gt;regedit&lt;/td&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;filename.reg&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt;Imports a registry file into the Windows registry.&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;regedit&lt;/td&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;/c filename.reg&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt;Creates a new registry file and replaces existing entries in the Windows registry.&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;regedit&lt;/td&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;/d registry-subkey&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt;Removes a subkey from the registry, such as &lt;span style="font-family: courier new, courier, monospace;"&gt;regedit /d HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default&lt;/span&gt;.&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;regedit&lt;/td&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;/e&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt;Exports the entire registry to a file. You can modify this command to add a file name and specific location on the drive, such as &lt;span style="font-family: courier new, courier, monospace;"&gt;regedit /e c:\AllRegistryEntries.reg&lt;/span&gt;. You can export a specific key with the following example command: &lt;span style="font-family: courier new, courier, monospace;"&gt;regedit /e keybackup.reg HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Edge&lt;/span&gt;.&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;regedit&lt;/td&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;/l: system &lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt;Specify the location of the &lt;b&gt;SYSTEM.DAT&lt;/b&gt; file used in legacy Windows OSes and typically stored in the &lt;b&gt;C:\Windows&lt;/b&gt; folder. This file stores the data kept in the &lt;b&gt;HKEY_LOCAL_MACHINE&lt;/b&gt; key in the registry.&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;regedit&lt;/td&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;/r:user&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt;Specify the location of the &lt;b&gt;NTUSER.DAT &lt;/b&gt;file to use. This is the backup of the &lt;b&gt;HKEY_USERS &lt;/b&gt;key in the registry. The file is typically found in the &lt;b&gt;C:\Users\username&lt;/b&gt; folder.&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;regedit&lt;/td&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;/m&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt;Opens an additional regedit instance, which can be helpful when troubleshooting to compare registry entries.&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;regedit&lt;/td&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;/s&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt;Uses silent mode. It performs an action without stopping for confirmation with dialog box.&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="How to edit the Windows registry using the command line"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to edit the Windows registry using the command line&lt;/h2&gt;
 &lt;p&gt;While regedit can be used on the command line, it is not optimal for granular administrative work. To make repeatable changes to the registry in multiple machines with &lt;a href="https://www.techtarget.com/searchitoperations/tip/These-IT-automation-scripts-take-little-effort-and-save-a-lot-of-work"&gt;automation&lt;/a&gt;, it's worth looking into switching from regedit to reg, a &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/What-admins-should-know-about-Microsoft-Windows-Terminal"&gt;command line-based tool&lt;/a&gt; included with Windows.&lt;/p&gt;
 &lt;p&gt;The reg utility offers more expansive functionality to edit subkeys and their values from the command line. Reg is more flexible and works well for a range of administrative scenarios, such as using &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/batch-file"&gt;batch files&lt;/a&gt; to correct common issues in client machines and managing the registry on a remote machine.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/072021_regedit_2.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/072021_regedit_2_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/072021_regedit_2_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/072021_regedit_2.jpg 1280w" alt="reg add parameter" height="312" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The reg command has 11 parameters, each with its own set of flags that provide additional functionality. The screenshot shows the Help menu for the reg add parameter, which includes its flags and examples of how to use the parameter. 
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;To use reg, type &lt;b&gt;cmd&lt;/b&gt; from the Windows run or search box to open the command prompt.&lt;/p&gt;
 &lt;p&gt;To show all the parameters for the reg command, enter &lt;span style="font-family: courier new, courier, monospace;"&gt;reg /?&lt;/span&gt; from the command prompt. Typing &lt;span style="font-family: courier new, courier, monospace;"&gt;reg &amp;lt;parameter&amp;gt; /?&lt;/span&gt; shows the switches available for the parameter and examples of how to use them.&lt;/p&gt;
 &lt;table class="main-article-table"&gt; 
  &lt;thead&gt; 
   &lt;tr&gt; 
    &lt;td&gt;Parameter&lt;/td&gt; 
    &lt;td&gt;Description&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/thead&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;reg add&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt;Inserts a new subkey or entry to the registry. The following example shows how to add a key to remote Windows system named &lt;b&gt;RemotePC&lt;/b&gt;: &lt;span style="font-family: courier new, courier, monospace;"&gt;reg add \\RemotePC \HKLM\Software\Test&lt;/span&gt;.&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;reg compare&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Runs a comparison of specified registry subkeys or entries. The following example compares all values under the named keys: &lt;span style="font-family: courier new, courier, monospace;"&gt;reg compare HKLM\Software\Test\MyApp HKLM\Software\Test\SaveMyApp&lt;/span&gt;. If the results are identical, reg returns a 0 code. If the results are different, reg returns a code of 2. If the operation failed, reg displays a code of 1.&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;reg copy&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt; &lt;p&gt;Copies a registry entry to a specified location on the local or remote computer. Here is an example of its use: &lt;span style="font-family: courier new, courier, monospace;"&gt;reg copy \\RemotePC\HKLM\Software\TestKey HKLM\Software\TestKey&lt;/span&gt;. The command copies the &lt;b&gt;TestKey&lt;/b&gt; values in the registry from the remote machine named &lt;b&gt;RemotePC&lt;/b&gt; to the current machine.&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;reg delete&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt;Removes a subkey or entries from the registry. Here is an example of its use: &lt;span style="font-family: courier new, courier, monospace;"&gt;reg delete HKLM\Software\FakeName\TestApp\Settings&lt;/span&gt;. This command deletes the &lt;b&gt;Settings&lt;/b&gt; registry key, as well as any subkeys and settings.&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;reg export&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt;Exports named subkeys, entries and values of the local computer into a file. Here is an example of its use: &lt;span style="font-family: courier new, courier, monospace;"&gt;reg export HKLM\Software\FakeName\TestApp BackupFile.reg&lt;/span&gt;. The command makes a copy of the &lt;b&gt;TestApp&lt;/b&gt; key and its subkeys and values in a file name &lt;b&gt;BackupFile.reg&lt;/b&gt;.&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;reg import&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt;Copies the contents of a file that contains exported registry subkeys, entries and values into the registry of the local computer. Here is an example of its use: &lt;span style="font-family: courier new, courier, monospace;"&gt;reg import BackupFile.reg&lt;/span&gt;. The command adds &lt;b&gt;BackupFile.reg&lt;/b&gt; registry entries to the machine.&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;reg load&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt;Writes saved subkeys and entries into a different subkey in the registry. Here is an example of its use: &lt;span style="font-family: courier new, courier, monospace;"&gt;reg load HKLM\Test TestHive.hiv&lt;/span&gt;. This command loads the &lt;b&gt;TestHive.hiv&lt;/b&gt; file into the &lt;b&gt;HKLM\Test&lt;/b&gt; key.&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;reg query&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt;Returns a list of the next tier of subkeys and entries that are located under a specified subkey in the registry. Here is an example of its use: &lt;span style="font-family: courier new, courier, monospace;"&gt;reg query HKLM\Software &amp;gt; C:\regoutput.txt&lt;/span&gt;. This command outputs the subkeys of &lt;b&gt;HKLM\Software&lt;/b&gt; into a file named &lt;b&gt;regoutput.txt&lt;/b&gt; in the &lt;strong&gt;C:\&lt;/strong&gt; folder.&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;reg restore&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt;Imports subkeys and entries from a file into the registry. Here is an example of its use: &lt;span style="font-family: courier new, courier, monospace;"&gt;reg restore HKLM\Software\Microsoft\Test RegBackup.hiv&lt;/span&gt;. This command &lt;a target="_blank" href="https://docs.microsoft.com/en-us/troubleshoot/windows-server/performance/windows-registry-advanced-users" rel="noopener"&gt;restores the contents&lt;/a&gt; of the &lt;b&gt;RegBackup.hiv&lt;/b&gt; file into the &lt;b&gt;Test &lt;/b&gt;key.&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;reg save&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt;Exports specified registry subkeys, entries and values into a named file. Here is an example of its use: &lt;span style="font-family: courier new, courier, monospace;"&gt;reg save HKLM\Software\Test\AppTest BackupFile.hiv&lt;/span&gt;. The command saves the &lt;b&gt;AppTest&lt;/b&gt; hive to the &lt;b&gt;BackupFile.hiv&lt;/b&gt; file.&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td&gt;&lt;span style="font-family: courier new, courier, monospace;"&gt;reg unload&lt;/span&gt;&lt;/td&gt; 
    &lt;td&gt;Removes the registry section loaded by the &lt;span style="font-family: courier new, courier, monospace;"&gt;reg load&lt;/span&gt; operation. Here is an example of its use: &lt;span style="font-family: courier new, courier, monospace;"&gt;reg unload HKLM\TestHive&lt;/span&gt;. The command unloads &lt;b&gt;HKLM\TestHive&lt;/b&gt; from the registry.&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt; &lt;i&gt;This article was revised in 2024 by TechTarget editors to improve the reader experience.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>This tutorial explains how to use the regedit tool on the command line and make changes to the Windows registry for advanced administrative jobs.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/container_g1074391400.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/tip/Command-line-options-for-Regeditexe</link>
            <pubDate>Mon, 05 Aug 2024 09:00:00 GMT</pubDate>
            <title>Learn to use Windows registry editor command-line options</title>
        </item>
        <item>
            <body>&lt;p&gt;Microsoft addressed 142 flaws in a busy July Patch Tuesday, including two zero-day vulnerabilities that are under active exploitation.&lt;/p&gt; 
&lt;p&gt;The &lt;a href="https://www.techtarget.com/searchsecurity/definition/zero-day-vulnerability"&gt;zero-day vulnerabilities&lt;/a&gt; include CVE-2024-38080, a privilege escalation flaw in Microsoft's Hyper-V virtualization software that affects Windows 11 and Windows Server 2022. The vulnerability received a 7.8 &lt;a href="https://www.techtarget.com/searchsecurity/definition/CVSS-Common-Vulnerability-Scoring-System"&gt;CVSS&lt;/a&gt; score and was rated as important. Microsoft's advisory for CVE-2024-38080 said exploitation has been detected, though the scope of activity is unclear. The advisory also said the flaw was reported to Microsoft by an anonymous individual.&lt;/p&gt; 
&lt;p&gt;The second zero-day bug patched was CVE-2024-38112, a spoofing vulnerability in the Windows MSHTML platform. The flaw received a 7.5 CVSS score and was also rated important. Exploitation of the flaw enables an attacker to send malicious files through the network, though Microsoft noted in &lt;a target="_blank" href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38112" rel="noopener"&gt;the advisory&lt;/a&gt; that it requires "additional actions prior to exploitation to prepare the target environment."&lt;/p&gt; 
&lt;p&gt;"Attackers can remotely exploit this flaw if they're somewhere on your network already, which is not a hard thing to do," Chris Goettl, vice president of security product management at Ivanti, told TechTarget Editorial. "This affects all Windows OS versions, even as far back as Windows Server 2008."&lt;/p&gt; 
&lt;p&gt;Microsoft credited Haifei Li of Check Point Software Technologies with discovering and reporting CVE-2024-38112. In a post on X, formerly Twitter, Li &lt;a target="_blank" href="https://x.com/HaifeiLi/status/1810743597127582135" rel="noopener"&gt;expressed frustration&lt;/a&gt; with Microsoft, saying the software giant disclosed and patched the flaw earlier than expected and without notifying Check Point of the schedule change.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Additional vulnerabilities"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Additional vulnerabilities&lt;/h2&gt;
 &lt;p&gt;Microsoft also patched two other vulnerabilities it categorized as zero-days because the flaws were made public -- though not exploited in the wild -- before their official disclosure in this month's Patch Tuesday.&lt;/p&gt;
 &lt;p&gt;The first was CVE-2024-35264, a &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/remote-code-execution-RCE"&gt;remote code execution&lt;/a&gt; vulnerability affecting .NET version 8.0 and Visual Studio 2022. The RCE flaw received an 8.1 CVSS score and was rated as important. Microsoft's advisory said successful exploitation of the flaw requires the attacker to win a race condition. The company did not say who first publicized CVE-2024-35264 or where it was made public. However, Microsoft employee Radek Zikmund was credited with discovering the flaw.&lt;/p&gt;
 &lt;p&gt;The second disclosed zero-day vulnerability was CVE-2024-37985, an information disclosure flaw in Windows 11 versions for Arm64-based systems; it was given a 5.9 CVSS score and also rated as important. According to Microsoft, an attacker could exploit the vulnerability to view heap memory from privileged processes on a targeted server.&lt;/p&gt;
 &lt;p&gt;The attack complexity for CVE-2024-37985 is considered high, and exploitation is "less likely," according to &lt;a target="_blank" href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-37985" rel="noopener"&gt;Microsoft's advisory&lt;/a&gt;. However, Goettl said organizations should prioritize the vulnerability.&lt;/p&gt;
 &lt;p&gt;"A privileged process is one that's going to have a lot more sensitive information," Goettl said. "Chances of exploitation are lower, but because it's been disclosed, it gives threat actors a bit more of an idea of where to look for this [flaw]. The risk is higher than, say, even some critical flaws that don't have a disclosure related to them."&lt;/p&gt;
 &lt;p&gt;In addition to the two disclosure-related zero-days, Microsoft patched CVE-2024-38060, an RCE flaw affecting the Windows Imaging Component, which is a framework for processing images. The vulnerability received an 8.8 CVSS score and was rated critical. An attacker could exploit the flaw by uploading a malicious TIFF file to a targeted server.&lt;/p&gt;
 &lt;p&gt;The massive Patch Tuesday included 38 RCE vulnerabilities in SQL Server alone. Goettl said 142 vulnerabilities is definitely "on the high side," but users shouldn't be alarmed.&lt;/p&gt;
 &lt;p&gt;"When this much volume comes out, you typically want to hit the big ones quickly," he said. "With the OS and SQL Server updates this month, you take two huge chunks out of that 142."&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Rob Wright is a longtime reporter and senior news director for TechTarget Editorial's security team. He drives breaking infosec news and trends coverage. Have a tip? &lt;a target="_blank" href="mailto:rwright@techtarget.com?subject=News%20tip" rel="noopener"&gt;Email him&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Microsoft disclosed and patched a whopping 142 vulnerabilities in a busy Patch Tuesday that included two zero-day flaws under active exploitation in the wild.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/ransom_g1264284948_01.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/news/366593052/Microsoft-fixes-2-zero-days-in-massive-July-Patch-Tuesday</link>
            <pubDate>Tue, 09 Jul 2024 18:22:00 GMT</pubDate>
            <title>Microsoft fixes 2 zero-days in massive July Patch Tuesday</title>
        </item>
        <item>
            <body>&lt;section class="section main-article-chapter" data-menu-title="What is Windows Server Update Services (WSUS)?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is Windows Server Update Services (WSUS)?&lt;/h2&gt;
 &lt;p&gt;Windows Server Update Services (WSUS) is a Windows server role that can plan, manage and deploy updates, service packs, &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/patch"&gt;patches&lt;/a&gt; and hotfixes for Windows servers, client operating systems (&lt;a href="https://www.techtarget.com/whatis/definition/operating-system-OS"&gt;OSes&lt;/a&gt;) and other Microsoft software. It lets system administrators control when and how systems install updates and provides a central point for clients to get updates. It's designed for &lt;a href="https://www.techtarget.com/whatis/definition/SMB-small-and-medium-sized-business-or-small-and-midsized-business"&gt;small and medium-sized business&lt;/a&gt; use. There's typically no additional cost to add WSUS to a Windows network.&lt;/p&gt;
 &lt;p&gt;Installed on &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Windows-Server-OS-operating-system"&gt;Microsoft Windows Server&lt;/a&gt;, WSUS is a simple tool system administrators use to manage Microsoft Windows updates. It's available for various versions of Windows Server and client OSes, such as Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, 2016, 2019 and Windows Server 2022. All supported Microsoft client OSes can use WSUS, including Windows 8.1, 10 and 11.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/vIDG-O_17qA?si=A_OxshsHqTsvCIss?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Practical applications and benefits of WSUS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Practical applications and benefits of WSUS&lt;/h2&gt;
 &lt;p&gt;WSUS lets an organization control when and how its Windows devices receive OS updates and patches. Practical applications and benefits of WSUS include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Automated updates.&lt;/b&gt; WSUS enables automatic updates within specific parameters. Without WSUS, clients install updates as soon as they're available from Microsoft. This can cause clients to be at different patch levels, or to install patches that break &lt;a href="https://www.techtarget.com/searchapparchitecture/definition/software"&gt;software&lt;/a&gt; or install during the middle of the workday, causing employee downtime.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Testing and approval.&lt;/b&gt; Using WSUS gives system administrators time to test that the updates work with their &lt;a href="https://www.techtarget.com/searchnetworking/definition/network"&gt;network&lt;/a&gt; and don't introduce compatibility issues. It also lets them install the updates during a maintenance timeframe so that production work isn't affected. For example, an organization would want to avoid installing updates to the accounting department during tax preparation.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Reporting and monitoring.&lt;/b&gt; WSUS provides reporting about Windows updates in an organization. System administrators can use this information to verify that all clients are installing security updates correctly and have the same updates applied. This ensures that the systems &lt;a href="https://www.techtarget.com/searchsecurity/tip/5-enterprise-patch-management-best-practices"&gt;have the correct security patches&lt;/a&gt;, reducing overall network vulnerability.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Centralized update management.&lt;/b&gt; Without WSUS, all clients go directly to Microsoft servers to download updates. In networks with many clients or with poor &lt;a href="https://www.techtarget.com/searchnetworking/definition/bandwidth"&gt;bandwidth&lt;/a&gt;, this could cause excessive internet use and affect productivity. With WSUS acting as a central point, the &lt;a href="https://www.techtarget.com/searchnetworking/definition/client-server"&gt;server&lt;/a&gt; downloads only one copy of the update from Microsoft and all clients can get the update from there. This approach makes better use of high-speed LAN connections and reduces overall internet usage. WSUS supports multiple languages and can selectively make the information for these languages available.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Custom updates.&lt;/b&gt; WSUS enables administrators to organize updates into custom categories based on criteria such as importance, type or product.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Bandwidth conservation.&lt;/b&gt; By downloading updates once to the WSUS server and then distributing them internally, for example, through a downstream server, organizations can &lt;a href="https://www.techtarget.com/searchnetworking/feature/Top-ten-ways-to-optimize-network-performance"&gt;conserve internet bandwidth&lt;/a&gt;. This is particularly useful for large organizations with many computers, where downloading updates individually could strain network resources.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Compliance and security.&lt;/b&gt; WSUS helps organizations maintain compliance with security standards and regulations by ensuring that all systems are up to date with the latest security patches and fixes. This is crucial for protecting sensitive data and mitigating security risks.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/security-patch_management_software.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/security-patch_management_software_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/security-patch_management_software_mobile.jpg 960w,https://www.techtarget.com/rms/onlineImages/security-patch_management_software.jpg 1280w" alt="Chart showing patch management software cost-benefit analysis." height="336" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;WSUS lets system administrators control and manage every facet of updating, patching and hotfixing Microsoft OS and software products.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="WSUS database requirements"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;WSUS database requirements&lt;/h2&gt;
 &lt;p&gt;When planning to deploy WSUS, organizations should consider their hardware and database requirements, which are driven by the number of client computers being updated within the organization.&lt;/p&gt;
 &lt;p&gt;The various database requirements for a WSUS deployment include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Database software requirements.&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/SQL-Server"&gt;Microsoft SQL Server&lt;/a&gt; Express 2008 R2 has a database size constraint of 10 GB, which should typically meet the needs of WSUS. However, opting for this database instead of Windows Internal Database (WID) doesn't offer any significant benefits. A WID database has a minimum &lt;a href="https://www.techtarget.com/searchstorage/definition/RAM-random-access-memory"&gt;RAM&lt;/a&gt; requirement of 2 GB beyond the standard Windows Server system requirements.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Database size and content.&lt;/b&gt; Updates consist of metadata that details the update's description and the files required to install the update. Update metadata is typically much smaller than the actual update and is stored in the WSUS database. However, the update files are stored on a local WSUS server or a Microsoft Update Web server.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Minimum hardware requirements.&lt;/b&gt; Microsoft recommends a minimum of 2 GB of RAM and 40 GB of storage space for the WSUS server. However, enterprises commonly use a minimum of 64 GB of RAM and more than 1 TB of WSUS content.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Additional hardware requirements.&lt;/b&gt; For WSUS, an extra 2 GB of RAM beyond the server's standard requirements and those of all other services or software is necessary. It's recommended to use a separate server, or a &lt;a href="https://www.techtarget.com/searchitoperations/definition/virtual-machine-VM"&gt;virtual machine&lt;/a&gt; dedicated to WSUS, along with an SQL or SQL Express instance for the database.&lt;span style="display: none;"&gt;Top of Form&lt;/span&gt;&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="WSUS license and OS requirements"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;WSUS license and OS requirements&lt;/h2&gt;
 &lt;p&gt;WSUS doesn't require an additional license for the server. Clients connecting to WSUS only require a Windows Server Client Access License (&lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Windows-Server-Client-Access-License-CAL"&gt;CAL&lt;/a&gt;). Because most organizations already purchase Windows Server and CALs, WSUS is typically no additional cost to them.&lt;/p&gt;
 &lt;p&gt;WSUS only supports Microsoft products, such as Windows and Microsoft Office updates. It doesn't allow admins to install new software or update other products, such as Google Chrome. It also doesn't support other OSes, such as &lt;a href="https://www.techtarget.com/whatis/definition/Mac-OS"&gt;macOS&lt;/a&gt; or &lt;a href="https://www.techtarget.com/searchdatacenter/definition/Linux-operating-system"&gt;Linux&lt;/a&gt;.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="How to use WSUS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to use WSUS&lt;/h2&gt;
 &lt;p&gt;The following outlines the step-by-step process of how to use and configure WSUS:&lt;/p&gt;
 &lt;h3&gt;Step 1: Installing WSUS&lt;/h3&gt;
 &lt;p&gt;WSUS is installed on an upstream server as a server role using Microsoft Windows Server Manager. This server provides features to manage and distribute updates through a management console.&lt;/p&gt;
 &lt;p&gt;Once the role is activated, it's available for use. It has a few prerequisites, including .NET, Microsoft Report Viewer, &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/IIS"&gt;Internet Information Services&lt;/a&gt;, and a database such as Windows Internal Database or SQL. All these prerequisites are freely available on Windows Server.&lt;/p&gt;
 &lt;p&gt;Depending on the size of the network, WSUS can be a single server or many servers working together. WSUS servers can get updated content and configurations from each other. This permits extremely large networks and different office locations to each have their own server. Organizations can also use WSUS disconnected from the internet. This way, high-security networks can receive regular patches without exposing the network to the internet.&lt;/p&gt;
 &lt;h3&gt;Step 2: Client configuration&lt;/h3&gt;
 &lt;p&gt;Just deploying a WSUS server to a network isn't enough; clients must be configured to connect to it instead of to Microsoft update. System admins often configure the client using &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Group-Policy"&gt;Group Policy&lt;/a&gt;, but could also set it up through Microsoft System Center Configuration Manager (&lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-System-Center-Configuration-Manager-2012"&gt;SCCM&lt;/a&gt;), mobile device management or manually with registry keys. The settings can be configured via &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Group-Policy-Object"&gt;Group Policy Objects&lt;/a&gt; if &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Active-Directory"&gt;Active Directory&lt;/a&gt; is being used.&lt;/p&gt;
 &lt;p&gt;Admins can set how clients install updates, if they reboot after installation and notify users of the updates.&lt;/p&gt;
 &lt;h3&gt;Step 3: Managing updates&lt;/h3&gt;
 &lt;p&gt;The Windows Update Agent performs the actions on the client to install updates. It connects to the WSUS server and scans for needed updates and then downloads and installs them. The download uses &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Windows-Background-Intelligent-Transfer-Service-BITS"&gt;Microsoft Windows Background Intelligent Transfer Service&lt;/a&gt; to optimize bandwidth use.&lt;/p&gt;
 &lt;p&gt;WSUS requires a few network &lt;a href="https://www.techtarget.com/searchnetworking/definition/port"&gt;ports&lt;/a&gt; to be open for operation. The server must be able to communicate out to the internet Windows update servers on ports 80 and 443 to receive the update packages. Clients connect to the WSUS server on ports 8530 and 8531 by default, though these can be changed.&lt;/p&gt;
 &lt;h3&gt;Step 4: Testing and approving updates&lt;/h3&gt;
 &lt;p&gt;After synchronization, admins should review the available updates in the WSUS console. They can approve updates for deployment to specific computer groups or all computers within the organization. It's recommended to test updates on a subset of machines before approving them for widespread deployment.&lt;/p&gt;
 &lt;h3&gt;Step 5: Automating tasks&lt;/h3&gt;
 &lt;p&gt;The WSUS Administration Console helps automate approvals using rules and admins can specify rules based on when a particular update becomes available, which products have updates available or when an update should be approved.&lt;/p&gt;
 &lt;p&gt;Windows &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/PowerShell"&gt;PowerShell&lt;/a&gt; scripting can also be used to automate tasks such as approvals, cleanups, synchronization and update installation scheduling.&lt;/p&gt;
 &lt;h3&gt;Step 6: Monitoring and reporting&lt;/h3&gt;
 &lt;p&gt;Admins should use the WSUS console to monitor the update status of client machines, track failed installations and generate reports on updated compliance and deployment progress.&lt;/p&gt;
 &lt;h3&gt;Step 7: Regular maintenance&lt;/h3&gt;
 &lt;p&gt;Admins should regularly review and install the updates as they become available. Additionally, they should monitor the WSUS server performance and disk space usage. Regular database maintenance tasks should also be conducted to maintain optimal performance.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/editorial/sSQL_tip_WSUS_server_figA.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/editorial/sSQL_tip_WSUS_server_figA_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/editorial/sSQL_tip_WSUS_server_figA_half_column_mobile.png 960w,https://www.techtarget.com/rms/editorial/sSQL_tip_WSUS_server_figA.png 1280w" alt="PowerShell screenshot."&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;System administrators can install the WSUS management console using PowerShell.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;                      
&lt;section class="section main-article-chapter" data-menu-title="Can WSUS update third-party software?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Can WSUS update third-party software?&lt;/h2&gt;
 &lt;p&gt;WSUS can update third-party software. Through a procedure called local publishing, system admins can increase the usage of WSUS patching mechanisms to deliver fixes for third-party programs such as &lt;a href="https://www.theserverside.com/definition/Java"&gt;Java&lt;/a&gt; and Adobe Reader. This process involves using auxiliary management tools to publish update packages containing the binaries and their respective certificates to the WSUS server. Administrators can also use these technologies to push locally generated and tested software and custom upgrades to client computers.&lt;/p&gt;
 &lt;p&gt;Additionally, third-party software updates can be enabled using the Configuration Manager console and third-party update signing certificates can be automatically managed via WSUS.&lt;/p&gt;
 &lt;p&gt;It's important to understand that WSUS doesn't natively support third-party patch management, since Microsoft created it to distribute patches for Microsoft products. However, there are numerous benefits to using WSUS instead of &lt;a href="https://www.techtarget.com/searchwindowsserver/feature/5-WSUS-alternatives-for-patch-management"&gt;alternative WSUS techniques for patch management&lt;/a&gt; when deploying third-party software and updates. For example, WSUS can distribute drivers and command-line executables natively without requiring users to have administrator capabilities.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="WSUS and System Center Configuration Manager"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;WSUS and System Center Configuration Manager&lt;/h2&gt;
 &lt;p&gt;WSUS and SCCM are both Microsoft tools used for managing updates within an organization, but they serve different purposes and have the following distinguishing features:&lt;/p&gt;
 &lt;h3&gt;WSUS&lt;/h3&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;WSUS only manages updates and patches. It's specifically focused on managing and distributing updates for Microsoft products, primarily Windows OSes and Microsoft software.&lt;/li&gt; 
  &lt;li&gt;It provides a centralized platform for downloading, approving and deploying updates to Windows machines within an organization.&lt;/li&gt; 
  &lt;li&gt;WSUS is simpler to deploy and manage compared to SCCM. It's primarily focused on update management and is often used in conjunction with Group Policy for client configuration.&lt;/li&gt; 
  &lt;li&gt;WSUS is suitable for organizations mainly concerned with managing Windows updates without the need for advanced systems management capabilities.&lt;/li&gt; 
  &lt;li&gt;WSUS lacks the advanced features of SCCM. It provides basic reporting and monitoring capabilities but doesn't offer the same level of automation, customization and integration with other systems management functions.&lt;/li&gt; 
  &lt;li&gt;WSUS is available free of charge and is included as a feature in Windows Server OSes. There are no additional licensing costs associated with using WSUS.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="SCCM"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;SCCM&lt;/h2&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;SCCM can perform any role that WSUS does and much more. For example, it enables updates, patches, software installation, administration, configuration, endpoint protection and inventory management across a wide range of devices including laptops, desktops, servers and mobile devices.&lt;/li&gt; 
  &lt;li&gt;SCCM gives users enhanced control over patch deployment, report generation and management of Windows machines on their network.&lt;/li&gt; 
  &lt;li&gt;SCCM is a more complex and feature-rich tool compared to WSUS. It requires more planning, configuration and ongoing maintenance to deploy effectively. However, SCCM offers greater flexibility and scalability for managing diverse environments and complex deployments.&lt;/li&gt; 
  &lt;li&gt;SCCM offers a wide range of features beyond update management, including software distribution, patch management, compliance monitoring, endpoint protection, remote control and reporting.&lt;/li&gt; 
  &lt;li&gt;SCCM is part of the Microsoft System Center suite and is a paid product. It's available through various licensing options, including standalone licensing or as part of Microsoft 365 subscriptions. The cost of SCCM depends on the licensing model and the number of managed devices.&lt;/li&gt; 
  &lt;li&gt;SCCM relies on WSUS to check for and apply patches and it can be used to manage the WSUS server through the SCCM console.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-1" src="https://www.youtube.com/embed/1iWD31hOrHQ?si=RmD7Tn-hHb6WoucC?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Windows Server Update Services and Windows Update for Business"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Windows Server Update Services and Windows Update for Business&lt;/h2&gt;
 &lt;p&gt;Windows Update for Business (&lt;a target="_blank" href="https://learn.microsoft.com/en-us/windows/deployment/update/waas-manage-updates-wufb" rel="noopener"&gt;WUfB&lt;/a&gt;) is a free and modern update system from Microsoft. In WUfB, the organization sets when and how clients apply updates, but the clients connect to Microsoft servers or use peer distribution to download updated content. This is different than in WSUS where clients connect to servers that the organization manages.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchwindowsserver/tip/WUfB-vs-WSUS-Which-handles-Windows-updates-better"&gt;WUfB is easier to set up and manage than WSUS&lt;/a&gt; and provides benefits to remote workers, but it doesn't offer as much control of updates nor as much bandwidth savings as WSUS.&lt;/p&gt;
 &lt;p&gt;According to Microsoft, WUfB is available for the following versions of Windows 10 and Windows 11:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Windows Pro, including Windows Pro for Workstations.&lt;/li&gt; 
  &lt;li&gt;Windows 10 Pro Education.&lt;/li&gt; 
  &lt;li&gt;Windows Enterprise, including Enterprise &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Windows-Server-LTSC-Long-Term-Servicing-Channel"&gt;LTSC&lt;/a&gt; (Long-Term Servicing Channel), IoT Enterprise and IoT Enterprise LTSC.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;i&gt;Numerous options exist for organizations looking for comprehensive patch options. Explore &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/12-best-patch-management-software-and-tools"&gt;&lt;i&gt;top &lt;/i&gt;&lt;i&gt;patch management &lt;/i&gt;&lt;i&gt;software tools&lt;/i&gt;&lt;/a&gt;&lt;i&gt; and find the right fit for your organizational needs.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Windows Server Update Services (WSUS) is a Windows server role that can plan, manage and deploy updates, service packs, patches and hotfixes for Windows servers, client operating systems (OSes) and other Microsoft software.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/1.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/definition/Windows-Server-Update-Services-WSUS</link>
            <pubDate>Tue, 25 Jun 2024 12:30:00 GMT</pubDate>
            <title>Windows Server Update Services (WSUS)</title>
        </item>
        <item>
            <body>&lt;section class="section main-article-chapter" data-menu-title="What is Group Policy?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is Group Policy?&lt;/h2&gt;
 &lt;p&gt;Group Policy is a management feature in Microsoft's Active Directory (&lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Active-Directory"&gt;AD&lt;/a&gt;) that enables network and system administrators to configure and assign user and computer settings in an AD environment. Group Policy provides a centralized, policy-based approach to &lt;a href="https://www.techtarget.com/searchitoperations/definition/systems-management"&gt;system management&lt;/a&gt; that can be applied at different AD container levels, such as &lt;a href="https://www.techtarget.com/whatis/definition/domain"&gt;domains&lt;/a&gt;, sites or organizational units (&lt;a href="https://www.techtarget.com/searchwindowsserver/definition/organizational-unit-OU"&gt;OUs&lt;/a&gt;).&lt;/p&gt;
 &lt;p&gt;Group Policy is often viewed as a security tool, and certainly a large portion of the settings apply to user and computer security. However, Group Policy also offers a variety of other options. For example, administrators can configure settings related to &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/device-driver"&gt;driver&lt;/a&gt; installation, folder redirection, &lt;a href="https://www.techtarget.com/searchnetworking/tip/Common-types-of-enterprise-network-connections"&gt;network connections&lt;/a&gt;, shared folders, logon scripts, printers and much more.&lt;/p&gt;
 &lt;p&gt;Group Policy settings are specific to either users or computers. Computer settings are applied when a computer starts up, and user settings are applied when a user logs onto the system. Computer settings take precedence over user settings.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/mkanakos_gpo_backrestore_1.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/mkanakos_gpo_backrestore_1_half_column_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/mkanakos_gpo_backrestore_1_half_column_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/mkanakos_gpo_backrestore_1.jpg 1280w" alt="Group Policy Management Console screenshot"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Group Policy Management Console works in Active Directory's tree structure to add and modify Group Policy Objects.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;In Active Directory, Group Policy settings are organized into Group Policy Objects (&lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Group-Policy-Object"&gt;GPOs&lt;/a&gt;) for administrative purposes. A GPO is a logical collection of settings that is assigned a unique name. Administrators often use the Group Policy Management Console (&lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Group-Policy-Management-Console"&gt;GPMC&lt;/a&gt;) to manage and deploy Group Policy Objects throughout the AD environment. The GPMC is a Microsoft Management Console (MMC) snap-in that provides a graphical user interface for configuring GPOs.&lt;/p&gt;
 &lt;p&gt;Administrators can also use &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/command-line-interface-CLI"&gt;command-line&lt;/a&gt; tools, such as gpresult and gpupdate, when working with GPOs. In addition, many administrators now leverage Microsoft &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/PowerShell"&gt;PowerShell&lt;/a&gt; to manage GPOs. PowerShell includes multiple Group Policy &lt;a href="https://www.techtarget.com/whatis/definition/cmdlet"&gt;cmdlets&lt;/a&gt; that enable administrators to create GPO-related scripts and automate management tasks, which can be especially beneficial for large-scale deployments.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/rtyXJC6RdpA?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="Group Policy processing order"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Group Policy processing order&lt;/h2&gt;
 &lt;p&gt;Group policy settings can be applied to different container levels within the AD hierarchy. For example, administrators can assign GPOs to domains, OUs, child OUs or any combination of these. The policy settings are inherited and accumulative. They affect all users and computers assigned to that container and the container's children.&lt;/p&gt;
 &lt;p&gt;The policy settings are processed in a specific order, based on the container level on which they're applied. Active Directory processes the settings in the following order:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Local policies.&lt;/li&gt; 
  &lt;li&gt;Site-specific policies.&lt;/li&gt; 
  &lt;li&gt;Domain-specific policies.&lt;/li&gt; 
  &lt;li&gt;OU-specific policies.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;This processing order is sometimes referred to as LSDOU: local, site, domain, organization unit. Local policies are always processed before domain policies. If there are any conflicts between settings, the last applied settings override the previous settings, which means that AD-based policy settings always take precedence over local policy settings. If an AD implementation includes &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Active-Directory-nesting-groups-strategy-and-implementation"&gt;nested OUs&lt;/a&gt;, the service first processes the parent OU, followed by the child OUs, with those closest to the root always applied first.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Group Policy extensibility"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Group Policy extensibility&lt;/h2&gt;
 &lt;p&gt;The native settings in Group Policy are specific to the Windows operating system. An administrator might, for instance, use them to enforce a minimum password length, hide the Windows Control Panel from users or force the installation of security &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/patch-management"&gt;patches&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;However, Group Policy can be extended through the use of administrative templates. The templates enable administrators to configure Group Policy settings specific to certain types of applications. For example, administrative templates are available for Microsoft Office and &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Microsoft-Office-365-suite"&gt;Microsoft Office 365 Suite&lt;/a&gt; apps.&lt;/p&gt;
 &lt;p&gt;Administrative templates consist of two file types: ADMX and ADML. An ADMX file is an Extensible Markup Language (&lt;a href="https://www.techtarget.com/whatis/definition/XML-Extensible-Markup-Language"&gt;XML&lt;/a&gt;) file that contains all of the Group Policy settings associated with the template. A corresponding ADML file acts as a language file that makes it possible to display the settings in a specific language.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/windows_server-active_directory-h.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/windows_server-active_directory-h_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/windows_server-active_directory-h_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/windows_server-active_directory-h.png 1280w" alt="what are the services in Active Directory" height="304" width="279"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;The Group Policy management feature in Active Directory enables admins to assign user/computer settings.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Local vs. Active Directory Group Policy"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Local vs. Active Directory Group Policy&lt;/h2&gt;
 &lt;p&gt;In an Active Directory environment, much of the focus on Group Policy is often specific to how the settings are applied through Group Policy Objects. However, Group Policy settings can also be applied locally to a Windows computer and its users through the computer's operating system.&lt;/p&gt;
 &lt;p&gt;Local Group Policy settings are machine-specific. They can be applied to either standalone computers or to computers managed by a domain controller. Administrators can configure local Group Policy settings directly on a Windows computer by using the &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Local-Group-Policy-Editor"&gt;Local Group Policy Editor&lt;/a&gt; MMC snap-in. They can also use the Group Policy Object Editor snap-in to manage the local settings on remote computers. In addition, administrators can take advantage of tools such as gpupdate to manage local Group Policy settings.&lt;/p&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/wiloc_gped1-f.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/wiloc_gped1-f_half_column_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/wiloc_gped1-f_half_column_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/wiloc_gped1-f.jpg 1280w" alt="screen capture showing Local Group Policy Editor"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Screen capture showing Local Group Policy Editor Microsoft Management Console snap-in with Local Computer Group Policy Editor expanded.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;In contrast to local Group Policy settings, AD-based GPOs can be centrally configured and applied to multiple users and computers, but only if they're joined to the AD domain. Administrators often use the Group Policy Management Console when working with AD-based Group Policy settings, but they might use other tools as well.&lt;/p&gt;
 &lt;p&gt;Many organizations use a combination of local and AD Group Policy objects when managing their computers and users. The local policy settings provide security when the user is not logged into a domain, while Active Directory GPOs are applied as soon as a connected computer starts up or the user logs into the network.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Learn what techniques can be used to &lt;/em&gt;&lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Techniques-to-troubleshoot-Active-Directory-issues"&gt;&lt;em&gt;troubleshoot common issues&lt;/em&gt;&lt;/a&gt;&lt;em&gt; in Active Directory, and &lt;/em&gt;&lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Active-Directory-replication-troubleshooting-tips-and-tools"&gt;&lt;em&gt;tips on replication troubleshooting&lt;/em&gt;&lt;/a&gt;&lt;em&gt;.&lt;/em&gt;&lt;i&gt; See how to &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Automate-Active-Directory-jobs-with-PowerShell-scripts"&gt;&lt;i&gt;automate Active Directory jobs with PowerShell scripts&lt;/i&gt;&lt;/a&gt;&lt;i&gt;. Check out &lt;/i&gt;&lt;a href="https://www.techtarget.com/searchenterprisedesktop/tip/What-to-do-when-Group-Policy-shows-an-access-denied-message"&gt;&lt;i&gt;what to do when Group Policy shows an access denied message&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Group Policy is a management feature in Microsoft's Active Directory (AD) that enables network and system administrators to configure and assign user and computer settings in an AD environment.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/1.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/definition/Group-Policy</link>
            <pubDate>Tue, 18 Jun 2024 11:50:00 GMT</pubDate>
            <title>Group Policy</title>
        </item>
        <item>
            <body>&lt;section class="section main-article-chapter" data-menu-title="What is a Windows Server Client Access License (CAL)?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is a Windows Server Client Access License (CAL)?&lt;/h2&gt;
 &lt;p&gt;A Windows Server Client Access License (CAL) is a &lt;a href="https://www.techtarget.com/searchcio/definition/software-license"&gt;software license&lt;/a&gt; that gives a user or device the right to access services, such as file and print sharing from a server running the &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Windows-Server-OS-operating-system"&gt;Windows Server&lt;/a&gt; operating system (&lt;a href="https://www.techtarget.com/whatis/definition/operating-system-OS"&gt;OS&lt;/a&gt;).&lt;/p&gt;
 &lt;p&gt;A Windows Server CAL allows client computers to legally connect to Microsoft Server. A popular misconception is that a CAL is a software product. Rather, it is a license that allows the users of an organization (that holds the license) to access the server's services.&lt;/p&gt;
 &lt;p&gt;The CAL comes in the form of a Certificate of Authenticity (CoA) and a license key. The key may be attached to the CoA. All the different editions of Windows Server include a small number of CALs that allow a few users (or a few devices) to access the server software and services. If more connections to the server are needed, additional CALs must be purchased.&lt;/p&gt;
 &lt;p&gt;CALs are available for all these Microsoft Server products:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Windows Server (Core per CAL and Specialty Server).&lt;/li&gt; 
  &lt;li&gt;Microsoft &lt;a href="https://www.techtarget.com/searchdatamanagement/definition/SQL-Server"&gt;SQL Server&lt;/a&gt; (Server plus CAL and Per Core).&lt;/li&gt; 
  &lt;li&gt;Microsoft &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Exchange-Server"&gt;Exchange Server&lt;/a&gt; (Server plus CAL).&lt;/li&gt; 
  &lt;li&gt;Microsoft &lt;a href="https://www.techtarget.com/searchunifiedcommunications/news/252451428/Microsoft-releases-Skype-for-Business-2019-server"&gt;Skype for Business Server&lt;/a&gt; (Server plus CAL).&lt;/li&gt; 
  &lt;li&gt;Microsoft &lt;a href="https://www.techtarget.com/searchcontentmanagement/definition/Microsoft-SharePoint-2016"&gt;SharePoint Server&lt;/a&gt; (Server plus CAL).&lt;/li&gt; 
  &lt;li&gt;Microsoft &lt;a href="https://www.techtarget.com/whatis/definition/Microsoft-Project-Microsoft-Office-Project"&gt;Project Server&lt;/a&gt; (Server plus CAL).&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Device-based and user-based CALs"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Device-based and user-based CALs&lt;/h2&gt;
 &lt;p&gt;Microsoft offers two types of CALs: device-based CALs (device CAL) and user-based CALs (user CAL).&lt;/p&gt;
 &lt;p&gt;A user CAL must be purchased for every user who accesses the server to use its various services, regardless of how many devices they use to access those services. This is a common licensing arrangement and grants each user the right to access server services from several different devices. If company employees tend to use multiple devices, require roaming access to the corporate network or access the network from unknown devices, a user CAL is the right type of CAL to buy.&lt;/p&gt;
 &lt;p&gt;A device CAL must be purchased for each device that accesses the server, regardless of how many users use that particular device. If devices are shared by several users, such as in a &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/Call-Center"&gt;call center&lt;/a&gt; where workers take shifts but use the same systems, it is advisable for companies to purchase device CALs.&lt;/p&gt;
 &lt;p&gt;Organizations that want external users like partners, contractors or customers to access their Windows Server network, must acquire CALs for each of those users or acquire external connector licenses for each server that will be accessed by those outside users.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/windows_server-os_timeline.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/windows_server-os_timeline_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/windows_server-os_timeline_mobile.jpg 960w,https://www.techtarget.com/rms/onlineImages/windows_server-os_timeline.jpg 1280w" alt="Timeline of Windows Server OS versions." height="258" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;A Windows Server CAL permits clients computers to legally connect to Windows Server.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Server license vs. Client Access License"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Server license vs. Client Access License&lt;/h2&gt;
 &lt;p&gt;A server license grants the right to run the server software on a single server. A CAL is needed for any device or user wishing to access a server's services. Thus, the CAL is an additional license required on top of a server license.&lt;/p&gt;
 &lt;p&gt;Not all Windows Server services require a CAL. Only users or devices that need to access Windows Server, Microsoft Exchange Server, SharePoint Server, SQL Server, Skype or Project Server require a CAL.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Base CALs and Additive CALs for Windows Server"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Base CALs and Additive CALs for Windows Server&lt;/h2&gt;
 &lt;p&gt;A Windows Server CAL may not be required at all. For example, a small business with up to 25 users and up to 50 devices can use Windows Server 2022 Essentials Edition without CALs. A server license is however required and the licensing model is called &lt;em&gt;specialty server&lt;/em&gt;. Windows Server CALs are required for every user or device accessing the Datacenter and Standard editions of Windows Server 2022.&lt;/p&gt;
 &lt;p&gt;With Windows Server, CALs are either Base CALs or Additive CALs. A Base CAL is required for each user or device that accesses licensed servers (on Windows Server). An Additive CAL is needed for each user or device that accesses advanced or additional functionality on the licensed server. For access to the advanced functionality, Additive CALs -- also known as premium or premium services CALs -- must be licensed in addition to the corresponding Base CALs.&lt;/p&gt;
 &lt;p&gt;Thus, a Base CAL is needed for Windows Server per user and per device. An Additive CAL is needed for these products:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Windows Server &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/Remote-Desktop-Services-RDS"&gt;Remote Desktop Services&lt;/a&gt; -- per user or device.&lt;/li&gt; 
  &lt;li&gt;Windows Server &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Active-Directory"&gt;Active Directory&lt;/a&gt; Rights Management Services -- per user or device.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;The above two Additive CALs are included in Windows Server and require a Windows Server CAL for their use.&lt;/p&gt;
 &lt;p&gt;Four licensing options with Windows Server CALs, Additive CALs are also available with Exchange Server (Exchange Server Enterprise CAL), SharePoint Server (SharePoint Enterprise CAL) and Skype Server (Skype for Business Server Plus CAL).&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/virt_desktop-microsoft_rds.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/virt_desktop-microsoft_rds_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/virt_desktop-microsoft_rds_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/virt_desktop-microsoft_rds.png 1280w" alt="Diagram showing how Microsoft Remote Desktop Services works." height="434" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;A Windows Server CAL is required for Microsoft Remote Desktop Services.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="Core CAL Suite and Enterprise CAL Suite"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Core CAL Suite and Enterprise CAL Suite&lt;/h2&gt;
 &lt;p&gt;A CAL Suite is a single license that provides usage rights to one user or device. It is equivalent to multiple licenses and cannot be split up among multiple users or devices. A Suite reduces the number of licenses required to access Microsoft servers and thus simplifies licensing and tracking.&lt;/p&gt;
 &lt;p&gt;Microsoft provides two types of CAL Suites:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Core CAL Suites.&lt;/li&gt; 
  &lt;li&gt;Enterprise CAL Suites.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;The Core CAL Suite is equivalent to Windows Server CAL, Exchange Server Standard CAL, SharePoint Server Standard CAL, Skype for Business Standard CAL, Microsoft Endpoint Configuration Manager Client Management License and System Center Endpoint Protection Client Management License.&lt;/p&gt;
 &lt;p&gt;The Enterprise CAL Suite includes all of the components of the Core CAL Suite plus some additional components so organizations that purchase the Enterprise CAL Suite don't need to license the Core Suite as well. It is a distinct license that grants users specific usage rights to specific features of Microsoft SharePoint, Exchange and Skype for Business Server.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Compare the &lt;/em&gt;&lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Compare-the-features-in-the-Windows-Server-2022-editions"&gt;&lt;em&gt;features in the Windows Server 2022 editions&lt;/em&gt;&lt;/a&gt;&lt;em&gt; and see how &lt;/em&gt;&lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Network-security-gets-a-boost-in-Windows-Server-2022"&gt;&lt;em&gt;network security gets a boost in Windows Server 2022&lt;/em&gt;&lt;/a&gt;&lt;em&gt;. Explore how to &lt;/em&gt;&lt;a href="https://www.techtarget.com/searchwindowsserver/tip/How-to-use-Windows-Server-2022-secured-core-server-features"&gt;&lt;em&gt;use Windows Server 2022 secured-core server features&lt;/em&gt;&lt;/a&gt;&lt;em&gt; and check out this &lt;/em&gt;&lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Windows-Server-security-hardening-guide-for-admins"&gt;&lt;em&gt;Windows Server 2022 security hardening guide for admins&lt;/em&gt;&lt;/a&gt;&lt;em&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>A Windows Server Client Access License (CAL) is a license that gives a user or device the right to access services, such as printing or access to a file share, from a server running the Windows Server operating system (OS).</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/2.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/definition/Windows-Server-Client-Access-License-CAL</link>
            <pubDate>Fri, 17 May 2024 16:25:00 GMT</pubDate>
            <title>Windows Server Client Access License (CAL)</title>
        </item>
        <item>
            <body>&lt;section class="section main-article-chapter" data-menu-title="What is Microsoft Remote Desktop Web Access (Microsoft RD Web Access)?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is Microsoft Remote Desktop Web Access (Microsoft RD Web Access)?&lt;/h2&gt;
 &lt;p&gt;Microsoft Remote Desktop Web Access (Microsoft RD Web Access) is a &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/Remote-Desktop-Services-RDS"&gt;Remote Desktop Services&lt;/a&gt; role in some versions of the &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Windows-Server-OS-operating-system"&gt;Windows Server&lt;/a&gt; operating system (OS), including Windows Server 2008 R2, Windows Server 2012, &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Windows-Server-2016"&gt;Windows Server 2016&lt;/a&gt; and Windows Server 2019. It enables users to access RemoteApp and Desktop Connections on these OSes via a web &lt;a href="https://www.techtarget.com/whatis/definition/browser"&gt;browser&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Microsoft RD Web Access was earlier known as Terminal Services Web Access (TS Web Access).&lt;/p&gt;
 &lt;p&gt;To start a RemoteApp program, the user visits a website to access a list of available programs and then clicks on the required program's &lt;a href="https://www.techtarget.com/whatis/definition/icon"&gt;icon&lt;/a&gt;. This starts the TS session on the &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/terminal-server"&gt;terminal server&lt;/a&gt; that hosts the program. The other option to access these services is through the computer's Start menu.&lt;/p&gt;
 &lt;p&gt;RD Web Access includes RD Web Connection, which &lt;a href="https://www.techtarget.com/whatis/feature/15-advantages-and-disadvantages-of-remote-work"&gt;enables users to connect remotely&lt;/a&gt; to the desktop of any computer with RD Web Access. RD Web Access must be configured to specify the source that provides the virtual desktops and RemoteApp programs that are displayed to users. It can be configured using either a RemoteApp source or RD Connection Broker &lt;a href="https://www.techtarget.com/whatis/definition/server"&gt;server&lt;/a&gt;, which provides users access to virtual desktops hosted on RD Virtualization Host servers and RemoteApp programs hosted on &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/Remote-Desktop-Session-Host-RDSH"&gt;RD Session Host&lt;/a&gt; servers.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Deploying Microsoft RD Web Access"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Deploying Microsoft RD Web Access&lt;/h2&gt;
 &lt;p&gt;The server where the RD Web Access role is installed acts as the &lt;a href="https://www.techtarget.com/whatis/definition/Web-server"&gt;web server&lt;/a&gt;. It does not have to be an RD Session Host server. The role works with minimal configuration. The default RD Web Access webpage includes a customizable frame plus a web part that can be incorporated into a customized webpage.&lt;/p&gt;
 &lt;p&gt;The role service must be installed on the server that users connect to over the web to access RemoteApp programs. Once the role is installed, admins can specify the terminal server they want to populate the web part. All the RemoteApp programs on the specified terminal server that are configured to show in RD Web Access appear in the web part. The list can be populated from an external data source by the web server, which is why the RD Web Access server does not have to be a terminal server.&lt;/p&gt;
 &lt;p&gt;When the RD Web Access role is installed, Microsoft Internet Information Services 7.0 is also installed. &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/IIS"&gt;IIS&lt;/a&gt; is a Microsoft web server role that's &lt;a href="https://www.techtarget.com/searchwindowsserver/video/How-to-install-and-test-Windows-Server-2019-IIS"&gt;included with all versions of Microsoft's OSes&lt;/a&gt;. The web server in IIS 7.0 enables server customizations by adding or removing modules to meet the organization's or user's specific needs.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/lNldCGjqj1M?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;p&gt;Here's how the RD Web Access role service is installed on Windows Server:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Open Server Manager (Start &amp;gt; Administrative Tools &amp;gt; Server Manager) on the computer where the role is to be installed.&lt;/li&gt; 
  &lt;li&gt;If the role is &lt;i&gt;not&lt;/i&gt; already installed, click &lt;b&gt;Add Roles&lt;/b&gt; under Roles Summary. Select the &lt;b&gt;Remote Desktop Services&lt;/b&gt; checkbox on the Select Server Roles page, review the Remote Desktop Services page and select &lt;b&gt;Remote Desktop Web Access&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;If the role &lt;i&gt;is&lt;/i&gt; already installed, click &lt;b&gt;Remote Desktop Services&lt;/b&gt; under Roles Summary, click &lt;b&gt;Add Role Services&lt;/b&gt; under Role Services and select the &lt;b&gt;Remote Desktop Web Access&lt;/b&gt; checkbox on the Select Role Services page.&lt;/li&gt; 
  &lt;li&gt;Review the information about the required role services.&lt;/li&gt; 
  &lt;li&gt;Click &lt;b&gt;Add Required Role Services&lt;/b&gt;, and then click &lt;b&gt;Next&lt;/b&gt;.&lt;/li&gt; 
  &lt;li&gt;Review the IIS page.&lt;/li&gt; 
  &lt;li&gt;Select the role services that are to be installed for IIS on the Select Role Services page.&lt;/li&gt; 
  &lt;li&gt;Click &lt;b&gt;Install&lt;/b&gt; on the Confirm Installation Selections page.&lt;/li&gt; 
  &lt;li&gt;Confirm successful installation on the Installation Results page, and click &lt;b&gt;Close&lt;/b&gt;.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;To provide users access to RemoteApp and Desktop Connections, RD Web Access must be configured to specify the source -- either &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/remote-desktop-connection-broker"&gt;RD Connection Broker&lt;/a&gt; or RemoteApp source -- to provide the RemoteApp programs and virtual desktops displayed to users. To specify the source, a connection to the RD Web Access website is required using a local Administrator account on the RD Web Access server.&lt;/p&gt;
 &lt;p&gt;The RD Connection Broker server can be configured with the &lt;a href="https://www.techtarget.com/searchvirtualdesktop/definition/Remote-Desktop-Connection-Manager-RDCMan"&gt;Remote Desktop Connection Manager&lt;/a&gt; tool. RemoteApp programs can be configured on a RemoteApp source -- an individual RD Session Host server -- with the RemoteApp Manager tool.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/virt_desktop-microsoft_rds.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/virt_desktop-microsoft_rds_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/virt_desktop-microsoft_rds_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/virt_desktop-microsoft_rds.png 1280w" alt="Diagram of how Microsoft Remote Desktop Services works" height="434" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;How Microsoft Remote Desktop Services works
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="Microsoft RD Web Access: Role in publishing and updating the RD web client"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Microsoft RD Web Access: Role in publishing and updating the RD web client&lt;/h2&gt;
 &lt;p&gt;Before setting up the RD web &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/client"&gt;client&lt;/a&gt;, it's important to ensure that RD Web Access is running on Windows Server, e.g., Windows Server 2016 or &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Optimize-Windows-Server-2019-with-file-server-best-practices"&gt;Windows Server 2019&lt;/a&gt;. In addition, public trusted certificates must be configured for the RD Web Access role.&lt;/p&gt;
 &lt;p&gt;The role is also required to publish and update the Remote Desktop web client.&lt;/p&gt;
 &lt;p&gt;To publish the RD web client, users must obtain the certificate used for RD connections on the RD Connection Broker server, export it as a CER file and copy the file from RD Connection Broker to the server running the RD Web Access role. Next, an elevated &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/PowerShell"&gt;PowerShell&lt;/a&gt; prompt must be opened on the RD Web Access server, followed by updating the PowerShellGet module. This is followed by installing the RD web client management &lt;a href="https://www.techtarget.com/searchdatacenter/tip/4-PowerShell-modules-every-IT-pro-should-know"&gt;PowerShell module&lt;/a&gt; from the PowerShell gallery, downloading the latest version of the RD web client and, finally, publishing the RD web client. The name of the server where the web client is accessed -- at the web client &lt;a href="https://www.techtarget.com/searchnetworking/definition/URL"&gt;URL&lt;/a&gt; -- must match the RD Web Access &lt;a href="https://www.techtarget.com/searchsecurity/definition/public-key-certificate"&gt;public certificate&lt;/a&gt; in the URL. This is typically the server fully qualified domain name (FQDN).&lt;/p&gt;
 &lt;p&gt;The RD Web Access server enables installation of the RD web client without an internet connection. This can be done either by importing the RD web client management PowerShell module or by copying the downloaded RDWebClientManagement folder to a &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Top-PowerShell-commands-you-must-know-with-cheat-sheet"&gt;local PowerShell&lt;/a&gt; module folder listed under $env:psmodulePath.&lt;/p&gt;
 &lt;p&gt;The RD web client can also be updated using the RD Web Access server and an elevated PowerShell prompt. Once the client is updated, it gets replaced for all users when they relaunch the web client webpage.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-1" src="https://www.youtube.com/embed/rtyXJC6RdpA?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="RD Web Access role and trusted certificates"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;RD Web Access role and trusted certificates&lt;/h2&gt;
 &lt;p&gt;If a user gets a security warning in their web browser when trying to access the web client, it may mean that the RD Web Access role is not using a trusted certificate. This issue can be prevented by ensuring that the role is configured with a publicly trusted certificate. If this step doesn't work, there &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Getting-a-handle-on-certificate-management-in-Windows-shops"&gt;may be a mismatch&lt;/a&gt; between the server's name in the web client URL and the name provided by the RD Web Access certificate. This issue may be resolved by checking that the URL uses the FQDN of the server hosting the RD Web Access role.&lt;/p&gt;
 &lt;p&gt;It's also important to &lt;a href="https://media.techtarget.com/digitalguide/images/Misc/EA-Marketing/Eguides/How_to_Fix_8_Common_Remote_Desktop_Connection_Problems.pdf"&gt;check that the certificate&lt;/a&gt; has not expired. It must be copied in CER format to the RD Web Access server. Without these precautions, a user may not be able to connect to a resource with the web client even if they can see the items under All Resources. They may also get an "unexpected server authentication certificate was received" error message when trying to connect to the web client.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;When the connection between a desktop and its host fails, it's time to do some remote desktop troubleshooting. See how to &lt;a href="https://www.techtarget.com/searchvirtualdesktop/tip/Top-5-remote-desktop-connectivity-problems-and-how-to-prevent-them"&gt;fix common remote desktop connection problems&lt;/a&gt;. Also, compare the &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Compare-the-features-in-the-Windows-Server-2022-editions"&gt;features in the Windows Server 2022 editions&lt;/a&gt;, and learn how to &lt;a href="https://www.techtarget.com/searchwindowsserver/answer/How-to-deploy-a-Windows-Server-2016-domain-controller"&gt;set up a Windows Server 2022 domain controller&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Microsoft Remote Desktop Web Access (Microsoft RD Web Access) is a Remote Desktop Services role in some versions of the Windows Server OS.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/3.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Remote-Desktop-Web-Access-Microsoft-RD-Web-Access</link>
            <pubDate>Mon, 13 May 2024 09:00:00 GMT</pubDate>
            <title>Microsoft Remote Desktop Web Access (Microsoft RD Web Access)</title>
        </item>
        <item>
            <body>&lt;p&gt;Admins have no zero-days or public disclosures to stress over this month, but organizations that work with Hyper-V or use Exchange Server will want to avoid delays with patch deployment.&lt;/p&gt; 
&lt;p&gt;On March Patch Tuesday, Microsoft issued security updates to correct 60 new vulnerabilities and revised two Microsoft Visio flaws from August with updated information.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Microsoft virtualization platform hit with critical bugs"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Microsoft virtualization platform hit with critical bugs&lt;/h2&gt;
 &lt;p&gt;The only two critical vulnerabilities for March Patch Tuesday were both in Hyper-V, Microsoft's hypervisor.&lt;/p&gt;
 &lt;p&gt;A Hyper-V remote code execution vulnerability (CVE-2024-21407) has a CVSS score of 8.1. The attacker needs to be authenticated on a guest VM to send a malicious file operation request to hardware resources to attempt remote code execution on the host. Microsoft gave this flaw an assessment of "exploitation less likely."&lt;/p&gt;
 &lt;p&gt;The other critical flaw is CVE-2024-21408, a Hyper-V &lt;a href="https://www.techtarget.com/searchsecurity/definition/denial-of-service"&gt;denial-of-service&lt;/a&gt; vulnerability with a CVSS rating of 5.5. Microsoft assessed this CVE with "exploitation less likely." Microsoft did not release additional details in its vulnerability notes, but the attacker does not require user interaction and only needs basic privileges to disrupt the system, potentially causing a crash.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Microsoft delivers fix and issues advisory for Exchange Server"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Microsoft delivers fix and issues advisory for Exchange Server&lt;/h2&gt;
 &lt;p&gt;Microsoft released a security update for Exchange Server that corrects a remote code execution vulnerability (CVE-2024-26198) rated important with an 8.8 CVSS rating. The attacker needs to place a malicious file either in an online directory or on the local network, then convince a user to open the file to trigger the exploit.&lt;/p&gt;
 &lt;div class="imagecaption alignLeft"&gt;
  &lt;img src="https://cdn.ttgtmedia.com/rms/onlineImages/goettl_chris.jpg" alt="Chris Goettl, vice president of product management for security products, Ivanti"&gt;Chris Goettl
 &lt;/div&gt;
 &lt;p&gt;Chris Goettl, vice president of product management for security products at Ivanti, stressed that any patching delays only benefit threat actors who are in a race to develop tools and techniques to exploit vulnerabilities on unpatched systems, &lt;a href="https://www.techtarget.com/searchsecurity/news/366562020/Fancy-Bear-hackers-still-exploiting-Microsoft-Exchange-flaw"&gt;particularly Exchange Server&lt;/a&gt;. He cited two February Patch Tuesday&amp;nbsp;vulnerabilities -- a Windows kernel elevation-of-privilege vulnerability (CVE-2024-21338) and an Exchange Server elevation-of-privilege vulnerability (CVE-2024-21410) -- that initially did not show as exploited, but were updated with exploitation flags within two weeks of publication.&lt;/p&gt;
 &lt;p&gt;"Exchange is still targeted by sophisticated groups who know it extremely well. I've seen articles that count 97,000 Exchange Servers still out in the wild. When you have that big of an audience, then it's still worth it for these groups to go and poke at it," Goettl said.&lt;/p&gt;
 &lt;p&gt;Microsoft also published an advisory for Exchange Server (&lt;a target="_blank" href="https://msrc.microsoft.com/update-guide/advisory/ADV24199947" rel="noopener"&gt;ADV24199947&lt;/a&gt;) to warn admins that applying the March security updates for Exchange Server will disable an Oracle library.&lt;/p&gt;
 &lt;p&gt;Oracle's Outside In Technology (OIT), also called the OutsideInModule, is used to extract text from email attachments &lt;a href="https://www.techtarget.com/searchsecurity/tip/12-Microsoft-Exchange-Server-security-best-practices"&gt;for security checks&lt;/a&gt; in the Exchange Transport Rule and Data Loss Prevention features. Applying the security update will patch the OIT libraries to mitigate multiple vulnerabilities, then disable the OIT module and finally configure Exchange to use an alternative file scanner. While not recommended, admins can reenable the OIT module with a script included with the security update.&lt;/p&gt;
 &lt;p&gt;This is the initial step in a three-part rollout. The second phase will replace the OutsideInModule with a Microsoft-based file scanner, and the last phase will remove the OIT module code. As of publication, Microsoft did not release a timeline for the upcoming stages.&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="2 corrections delivered for Open Management Infrastructure"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;2 corrections delivered for Open Management Infrastructure&lt;/h2&gt;
 &lt;p&gt;Enterprises that use Microsoft's Azure cloud platform have two security updates in the Open Management Infrastructure (OMI) platform, an open source project designed for Linux and Unix management.&lt;/p&gt;
 &lt;p&gt;An OMI remote code execution vulnerability (CVE-2024-21334) rated important has March Patch Tuesday's highest CVSS rating with 9.8. This bug also affects &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-System-Center-Operations-Manager-Microsoft-SCOM"&gt;System Center Operations Manager&lt;/a&gt; (SCOM) 2019 and 2022 systems. SCOM uses OMI to collect logs and automate configuration for Linux VMs.&lt;/p&gt;
 &lt;p&gt;"A remote unauthenticated attacker could access the OMI instance from the Internet and send specially crafted requests to trigger a use-after-free vulnerability," Microsoft wrote in the CVE notes.&lt;/p&gt;
 &lt;p&gt;Admins need to update to OMI version 1.8.1-0 to mitigate the vulnerability, or they can disable OMI incoming ports on Linux VMs that do not require network listening.&lt;/p&gt;
 &lt;p&gt;The other OMI flaw is an elevation-of-privilege vulnerability (CVE-2024-21330) rated important with a CVSS score of 7.8. An attacker who exploits the flaw can gain full administrative privileges to control the OMI server. This flaw affects a wide range of Microsoft products listed in the &lt;a target="_blank" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21330" rel="noopener"&gt;CVE notes&lt;/a&gt;.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Next step to mitigate Secure Boot vulnerability coming in April"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Next step to mitigate Secure Boot vulnerability coming in April&lt;/h2&gt;
 &lt;p&gt;In addition to their usual patching duties, admins will have to pay close attention to prevent issues during another staged rollout, this time to protect the boot state of Windows systems. Over the next several months, all bootable media will require an update, otherwise Windows systems will not start with outdated recovery media.&lt;/p&gt;
 &lt;p&gt;A Microsoft Knowledge Base article (&lt;a target="_blank" href="https://support.microsoft.com/en-us/topic/kb5025885-how-to-manage-the-windows-boot-manager-revocations-for-secure-boot-changes-associated-with-cve-2023-24932-41a975df-beb2-40c1-99a3-b3ff139f832d" rel="noopener"&gt;KB5025885&lt;/a&gt;) gives the timeline and steps admins need to take to protect Windows systems affected by CVE-2023-24932, a &lt;a href="https://www.techtarget.com/searchwindowsserver/news/366537316/Light-May-Patch-Tuesday-will-weigh-heavily-on-Windows-admins"&gt;Secure Boot security feature bypass vulnerability&lt;/a&gt; first reported in May 2023. This flaw is not limited to on-premises physical devices, but also affects some VMs and cloud-based devices.&lt;/p&gt;
 &lt;p&gt;The Microsoft security update from May Patch Tuesday addressed the vulnerability that allowed an attacker with physical access or administrative privileges to exploit a system with the BlackLotus &lt;a href="https://www.techtarget.com/whatis/definition/Unified-Extensible-Firmware-Interface-UEFI"&gt;UEFI&lt;/a&gt; bootkit and alter the system's boot policy. The threat actor could then lower the system's defenses, opening the way to further damage.&lt;/p&gt;
 &lt;p&gt;However, the protections from the security update are not enabled by default because it removes the existing &lt;a href="https://www.techtarget.com/searchdatacenter/definition/boot-loader-boot-manager"&gt;boot manager&lt;/a&gt;, which could cause problems with system boot configurations.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchwindowsserver/news/366544377/Microsoft-repairs-5-zero-days-for-July-Patch-Tuesday"&gt;July Patch Tuesday added revocation files&lt;/a&gt; to update the Code Integrity Boot Policy and the Secure Boot UEFI Forbidden List, which add full protection from CVE-2023-24932. Following the deployment of this security update, admins need to follow several steps to complete the process. Admins should be aware that any bootable media that does not have the July Patch Tuesday updates will not work after the revocations have been implemented on the system.&lt;/p&gt;
 &lt;p&gt;"Once the mitigation for this issue is enabled on a device, meaning the revocations have been applied, it cannot be reverted if you continue to use Secure Boot on that device. Even reformatting of the disk will not remove the revocations if they have already been applied," Microsoft wrote.&lt;/p&gt;
 &lt;p&gt;In Microsoft's third deployment phase, the security updates for April Patch Tuesday will add more boot manager mitigations. Admins will have until October Patch Tuesday to prepare for the final step, the enforcement phase, which will apply the Code Integrity Boot Policy and Secure Boot disallow list revocations.&lt;/p&gt;
 &lt;p&gt;Goettl said admins need to redo all bootable media to avoid future issues. The other hurdle is to check systems for problems with the firmware update.&lt;/p&gt;
 &lt;p&gt;"The final stage coming in October is when mandatory enforcement begins and mitigations become revocations," he said. "The update will no longer allow anything that is vulnerable to the Secure Boot bypass. The biggest challenge will be checking the Windows event error logs."&lt;/p&gt;
 &lt;p&gt;Goettl said it will take some work for admins to examine all the system event logs for codes that tell if the patch did or did not install properly. Microsoft &lt;a target="_blank" href="https://support.microsoft.com/en-us/topic/kb5016061-secure-boot-db-and-dbx-variable-update-events-37e47cf8-608b-4a87-8175-bdead630eb69" rel="noopener"&gt;released a list&lt;/a&gt; of relevant event IDs to help with this process.&lt;/p&gt;
 &lt;p&gt;"When the updated [Forbidden Signature Database] DBX revocation list is installed on a device, Windows checks to determine whether the system is in a state where the DBX update can be successfully applied to the firmware and will report event log errors if an issue is detected," Microsoft wrote.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Tom Walat is the site editor for TechTarget Editorial's Windows Server site, where he manages all site content. Walat previously worked for a newspaper in the Greater Boston area.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Microsoft also corrects a remote code execution flaw on Exchange Server and issues an advisory related to changes with an outdated file-scanning feature on the messaging platform.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_a303249453.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/news/366573352/March-Patch-Tuesday-fixes-critical-Hyper-V-vulnerabilities</link>
            <pubDate>Tue, 12 Mar 2024 21:29:00 GMT</pubDate>
            <title>March Patch Tuesday fixes critical Hyper-V vulnerabilities</title>
        </item>
        <item>
            <body>&lt;h3&gt;What is Windows Sysinternals?&lt;/h3&gt; 
&lt;p&gt;Windows Sysinternals is a collection of 70 &lt;a href="https://www.techtarget.com/whatis/definition/freeware"&gt;freeware&lt;/a&gt; utilities that Microsoft offers IT administrators and developers to help them monitor, manage, diagnose and &lt;a href="https://www.techtarget.com/whatis/definition/troubleshooting"&gt;troubleshoot&lt;/a&gt; &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Windows"&gt;Windows&lt;/a&gt; systems and their applications. Microsoft has also started porting some of the Sysinternals tools to the &lt;a href="https://www.techtarget.com/searchdatacenter/definition/Linux-operating-system"&gt;Linux&lt;/a&gt; platform, although the number of tools is still limited.&lt;/p&gt; 
&lt;p&gt;Each Sysinternals utility is an &lt;a href="https://www.techtarget.com/whatis/definition/executable-file-exe-file"&gt;executable file&lt;/a&gt; that users can run on demand without needing to install a program on their systems. Microsoft provides utilities for x86, x64 and &lt;a href="https://www.techtarget.com/whatis/definition/ARM-processor"&gt;Arm64&lt;/a&gt; Windows platforms, as well as for systems running &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Microsoft-Nano-Server"&gt;Nano Server&lt;/a&gt;. Users have several options for acquiring and running these tools:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;Download the individual utilities or one of the full suites from the &lt;a href="https://learn.microsoft.com/en-us/sysinternals/" target="_blank" rel="noopener"&gt;Microsoft Sysinternals site&lt;/a&gt; or from the &lt;a href="https://live.sysinternals.com/" target="_blank" rel="noopener"&gt;Sysinternals Live site&lt;/a&gt;.&lt;/li&gt; 
 &lt;li&gt;Run the utilities directly from the Sysinternals Live site without downloading the files. For example, you can use the following command to run the AccessChk utility at a command prompt: &lt;span style="font-family: courier new, courier, monospace;"&gt;\\live.sysinternals.com\tools\handle&lt;/span&gt;.&lt;/li&gt; 
 &lt;li&gt;Download the suite from the &lt;a href="https://apps.microsoft.com/store/detail/sysinternals-suite/9P7KNL5RWT25" target="_blank" rel="noopener"&gt;Microsoft Store&lt;/a&gt;. The suite is installed as an MSIX bundle that includes separate packages for x86, x64 and Arm64 systems.&lt;/li&gt; 
 &lt;li&gt;For the ported Linux tools, download the source code from &lt;a href="https://github.com/Sysinternals" target="_blank" rel="noopener"&gt;GitHub&lt;/a&gt;. Microsoft has ported only a few Sysinternals tools to Linux.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Sysinternals generally doesn't include utilities that can't be used for troubleshooting, such as BlueScreen Screen Saver. Also, some of the original utilities are no longer available as standalone tools because their functionality has been incorporated into other Sysinternals tools. For example, the features in RegMon and FileMon were rolled into the Process Monitor utility.&lt;/p&gt; 
&lt;p&gt;Microsoft also offers Sysinternals tools for Nano Server, a lightweight version of Windows Server. Because Nano Server does not run 32-bit applications, Microsoft developed 64-bit versions of more than 40 Sysinternals utilities so they'd be compatible with Nano Server. The utilities, which include "64" at the end of their file names, also work with other 64-bit Windows systems.&lt;/p&gt; 
&lt;h3&gt;Sysinternals categories&lt;/h3&gt; 
&lt;p&gt;Microsoft divides the Sysinternals utilities into the following six categories:&lt;/p&gt; 
&lt;ol class="default-list"&gt; 
 &lt;li&gt;&lt;b&gt;File and disk.&lt;/b&gt; This category provides utilities that monitor file usage and disk status. For example, it includes DiskMon for capturing hard disk activity, SDelete for securely overwriting sensitive files and Disk Usage for viewing disk usage by directory.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Networking.&lt;/b&gt; This category offers utilities for troubleshooting and monitoring connections on desktop and server systems. Two of the more popular tools are &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/TCPView"&gt;TCPView&lt;/a&gt;, which checks &lt;a href="https://www.techtarget.com/searchnetworking/definition/TCP"&gt;TCP&lt;/a&gt; and User Datagram Protocol (&lt;a href="https://www.techtarget.com/searchnetworking/definition/UDP-User-Datagram-Protocol"&gt;UDP&lt;/a&gt;) endpoints, and PsTools, a set of &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/command-line-interface-CLI"&gt;command-line&lt;/a&gt; utilities for listing and running processes on local and remote systems.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Process.&lt;/b&gt; This category includes utilities for monitoring and troubleshooting running applications. One popular utility is &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/Process-Explorer"&gt;Process Explorer&lt;/a&gt;, which monitors the files, registry keys and other objects that a process has open. Another popular tool is Process Monitor, a tool that shows real-time activity in the file system, registry and processes.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Security.&lt;/b&gt; This category offers &lt;a href="https://www.techtarget.com/searchsecurity/definition/security"&gt;security&lt;/a&gt;-based utilities such as LogonSessions, which lists the active logon sessions, and &lt;a href="https://www.techtarget.com/searchenterprisedesktop/photostory/2240218252/Five-Windows-Sysinternals-utilities-can-aid-in-desktop-troubleshooting/3/Disabling-unwanted-components-with-Sysinternals-Autoruns"&gt;Autoruns&lt;/a&gt;, which shows the applications that start automatically when the system boots.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;System information.&lt;/b&gt; This category includes utilities that display general information about a workstation or server. For example, the Coreinfo utility shows the mappings between logical and physical processors, and the Handle utility lists which files are open by which processes.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Miscellaneous.&lt;/b&gt; Utilities in this category do not fit into other categories and have limited diagnostic or troubleshooting capabilities. One of the more popular tools is BgInfo, which creates a background image that shows key features of the system's configuration, such as the &lt;a href="https://www.techtarget.com/whatis/definition/IP-address-Internet-Protocol-Address"&gt;IP address&lt;/a&gt; and computer name.&lt;/li&gt; 
&lt;/ol&gt; 
&lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/editorial/090518_SWS_ProcessExplorer_Fig1.png"&gt;
 &lt;img data-src="https://www.techtarget.com/rms/editorial/090518_SWS_ProcessExplorer_Fig1_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/editorial/090518_SWS_ProcessExplorer_Fig1_mobile.png 960w,https://www.techtarget.com/rms/editorial/090518_SWS_ProcessExplorer_Fig1.png 1280w" alt="Windows Sysinternals Process Explorer screenshot" height="288" width="560"&gt;
 &lt;figcaption&gt;
  &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Process Explorer lets administrators do a technical deep dive into Windows processes.
 &lt;/figcaption&gt;
 &lt;div class="main-article-image-enlarge"&gt;
  &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/figure&gt; 
&lt;h3&gt;History of Sysinternals&lt;/h3&gt; 
&lt;p&gt;The original Sysinternals tools were developed by Mark Russinovich and Bryce Cogswell. In 1996, they launched a website named NTInternals, which hosted the Sysinternals freeware utilities and related articles. The first utility they released, NTFSDOS, enabled a &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/MS-DOS"&gt;Microsoft Disk Operating System&lt;/a&gt; machine to read New Technology (NT) File System volumes.&lt;/p&gt; 
&lt;p&gt;In the same year, Russinovich and Cogswell founded Winternals, a company whose goal was to develop advanced Windows technologies. Out of this effort came a range of software products, including Protection Manager, Defrag Manager, Administrator's Pak and Recovery Manager. The company also continued to refine the Sysinternals tools.&lt;/p&gt; 
&lt;p&gt;In 1998, Russinovich and Cogswell renamed the NTInternals site to Sysinternals. This came after Microsoft's legal department requested that Winternals change the name, citing the similarity between the name NTInternals and the &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/Windows-NT"&gt;Windows NT&lt;/a&gt; operating system (OS).&lt;/p&gt; 
&lt;p&gt;In July 2006, Microsoft acquired Winternals and Sysinternals, and Cogswell and Russinovich joined the company. Cogswell retired from Microsoft in 2010 and no longer contributes to the Sysinternals tools. Russinovich -- currently chief technology officer of the Microsoft Azure cloud platform -- continues to participate in Sysinternals.&lt;/p&gt; 
&lt;p&gt;Microsoft still owns the Sysinternals utilities and offers them for free through the Microsoft site. The company does not limit the number of times that someone can download or use the software. However, Microsoft does not offer any type of distribution license, which means that &lt;a href="https://www.techtarget.com/whatis/definition/third-party"&gt;third-party&lt;/a&gt; entities are not permitted to distribute the utilities in their software or through their websites. Microsoft currently has no plans to remove or change the availability of the Sysinternals tools.&lt;/p&gt; 
&lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/dataCenter-Virtualization/rammap_fig5.png"&gt;
 &lt;img data-src="https://www.techtarget.com/rms/dataCenter-Virtualization/rammap_fig5_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/dataCenter-Virtualization/rammap_fig5_mobile.png 960w,https://www.techtarget.com/rms/dataCenter-Virtualization/rammap_fig5.png 1280w" alt="VMMap screenshot"&gt;
 &lt;figcaption&gt;
  &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;VMMap enables users to view an existing process or trace a new one and observe its memory usage.
 &lt;/figcaption&gt;
 &lt;div class="main-article-image-enlarge"&gt;
  &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/figure&gt; 
&lt;h3&gt;RootkitRevealer uncovers hidden tools&lt;/h3&gt; 
&lt;p&gt;In 2005, Sysinternals received widespread exposure when Russinovich wrote a blog that explained how he found a &lt;a href="https://www.techtarget.com/searchsecurity/definition/rootkit"&gt;rootkit&lt;/a&gt; on one of his computers when testing the RootkitRevealer tool in Sysinternals. The utility -- since discontinued -- produced a report of all the files and registry entries hidden from the system's &lt;a href="https://www.techtarget.com/searchapparchitecture/definition/application-program-interface-API"&gt;application programming interfaces&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;RootkitRevealer detected a rootkit that originated from a Sony BMG audio compact disc, which installed a digital rights management (DRM) program that modified the OS to prevent a user from copying the CD.&lt;/p&gt; 
&lt;p&gt;Bowing to public pressure after the blog's release, Sony BMG recalled products with the rootkit and released an uninstaller to remove it. The company also settled class-action lawsuits related to the rootkit with the Federal Trade Commission, several states and the Electronic Frontier Foundation.&lt;/p&gt; 
&lt;h3&gt;Additional reference guide available&lt;/h3&gt; 
&lt;p&gt;Russinovich and Aaron Margosis co-authored a Sysinternals companion book called &lt;i&gt;Troubleshooting with the Windows Sysinternals Tools,&lt;/i&gt; which provides in-depth details about working with the various utilities, along with tips and tricks for using them.&lt;/p&gt; 
&lt;div class="youtube-iframe-container"&gt;
 &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/rtyXJC6RdpA?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
&lt;/div&gt; 
&lt;p&gt;&lt;em&gt;Use the &lt;a href="https://www.techtarget.com/searchwindowsserver/tutorial/Using-the-Sysinternals-Sysmon-tool-to-check-DNS-queries"&gt;Sysinternals Sysmon tool to check DNS queries&lt;/a&gt; and these &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Windows-troubleshooting-tools-to-improve-VM-performance"&gt;Windows troubleshooting tools to improve virtual machine performance&lt;/a&gt;. Check out &lt;a href="https://www.techtarget.com/searchitoperations/tip/These-IT-automation-scripts-take-little-effort-and-save-a-lot-of-work"&gt;IT automation scripts that take little effort and save a lot of work&lt;/a&gt;. Learn about &lt;a href="https://www.techtarget.com/searchwindowsserver/definition/PowerShell"&gt;PowerShell and how to use it&lt;/a&gt;. Explore &lt;a href="https://www.techtarget.com/searchnetworking/tip/PowerShell-commands-for-network-troubleshooting"&gt;16 PowerShell commands for network troubleshooting&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Top-PowerShell-commands-you-must-know-with-cheat-sheet"&gt;top PowerShell commands you must know in general&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;</body>
            <description>Windows Sysinternals is a collection of 70 freeware utilities that Microsoft offers IT administrators and developers to help them monitor, manage, diagnose and troubleshoot Windows systems and their applications.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/5.jpg</image>
            <link>https://www.techtarget.com/searchwindowsserver/definition/Windows-Sysinternals</link>
            <pubDate>Mon, 18 Sep 2023 09:00:00 GMT</pubDate>
            <title>Windows Sysinternals</title>
        </item>
        <title>SearchWindows Server Resources and Information from TechTarget</title>
        <ttl>60</ttl>
        <webMaster>webmaster@techtarget.com</webMaster>
    </channel>
</rss>
