Wednesday, 2 May 2007

Every IT Manager's Nightmare: No Tested Recovery

We all have our pet peeves about various aspects of the work that we do.

For me, it is not having "insurance" in place for the day when things go sideways. Notice I did not say "if" but "when".

Backup --> Recovery ... Backup --> Recovery ... Backup --> Recovery!

We absolutely need to test those backups!

As Microsoft Small Business Specialists, it is even more important for us to test those backups. The MSBS certification is supposed to indicate to our clients that we actually know something about providing a complete I.T. infrastructure solution to our clients.

This includes adequate Disaster Recovery Planning.

For those of us MSBSs with families, can we really get by without purchasing life insurance to protect their well being if we are hit by a bus?!?

So why would we sell a solution to our clients that does not include an adequate off-site rotation based backup? And, if we do provide such a solution, why wouldn't we test it?

The reason for this post? Yet another failure to test backups, from the article, "Business magazine fails to heed its own tech advice":
NEW YORK: Business 2.0, the technology-aware magazine published by Time, periodically reminds readers of the importance of backing up computer files. A 2003 article likened backups to flossing - everyone knows it's important, but few devote enough thought or energy to it.

Last week, Business 2.0 got caught forgetting to floss.

On the night of Monday, April 23, the magazine's editorial system crashed, wiping out all the work that had been done for its June issue. The backup server failed to back up.
I like the last line in the article, "Business 2.0 has drawn attention for skewering firms, including, occasionally, other magazines, in its annual list of the '101 Dumbest Moments in Business.'"

I leave you to draw your own conclusions about this particular Business 2.0 moment! ;)

Courtesy of Ed Bott: When was the last time you tested your backup system?.

Philip Elder
MPECS Inc.
Microsoft Small Business Specialists

Tuesday, 1 May 2007

Business Principles: When is enough enough?

For those of us who are self employed, or running a two or three man shop, when is enough enough?

We run our lives around our client's schedules and deadlines, sometimes with little consideration for our own lives and schedules.

Things change a bit when we marry and bring kids into the picture ... or do they?

Sometimes, we need to draw the line somewhere.

Lately, that point has been reached with me. I need to draw the line.

Fortunately, we are not working on business critical situations right now, so I can sit back a bit and spend more time with my family.

Those not so critical things will be there when I get to them.

We have been running for over 13 months straight with a very short four day break in January. It starts to get to you after a while.

So, where do you draw the line in the sand? Burn-out? Been on the brink ... don't want to go back there again.

Still have any friends? Heh ;)

And, the key: Still have a family that recognizes you when you get home? It is amazing how much the little people can change when I am gone very early and back very late for three days, four days, or even a week straight.

Time to slow down and smell the flowers, watch my kids grow, and enjoy the company of my wife.

Ultimately, they are the reason that I do it in the first place!

Philip Elder
MPECS Inc.
Microsoft Small Business Specialists

Monday, 30 April 2007

SBS - Exchange 2003 Post SP2 Install MUST DO - Intelligent Message Filter

For those of us who do not read the release notes, when Exchange 2003 Service Pack 2 installs, along with it comes the new and improved Intelligent Message Filter (IMF) version 2.

If one had installed the original Exchange IMF version 1 add-on, one needed to uninstall it before running SP2.

Once installed, there is an important issue that is pointed out under the Known Issues area of the release notes:
Microsoft Exchange Intelligent Message Filter Exchange Server 2003 SP2 does not create the registry key named ContentFilter under HKEY_LOCAL_MACHINE\Software\Microsoft\Exchange during an upgrade from Exchange Server 2003 or Exchange Server 2003 SP1, where Intelligent Message Filter version 1 was not previously installed. Therefore, to obtain an extended functionality (for example, change the Archive directory), you must manually create the HKEY_LOCAL_MACHINE\Software\Microsoft\Exchange\ContentFilter key and restart the SMTP service.
So, if you are like me, we both knew about the IMF and were looking forward to enabling the feature to bring down our client's spam levels right?

Okay, so after applying SP2 to Exchange we go and enable it:


Then we head up to our Message Delivery Properties and set everything as follows:


Note the Gateway Blocking Configuration setting to archive e-mail caught in the IMF.

If we read the release notes, then we would have discovered that when Exchange SP2 was installed along with the IMF, that the proper registry settings do not get inserted for the archive folder location!

We need to create that folder first of all, then run the registry editor to setup the following key and data:


The key is ContentFilter, the String Value "ArchiveDir" is your above created directory, in our case: "C:\UCEArchive".

If the above folder is not created, where does the e-mail go? Hopefully on to the e-mail client. If not, you can bet that your client will be calling you with the elusive "missing e-mail" complaint.

It should become second nature to follow through on the above configuration on all new servers that we build, or subsequent servers we come to service pack Exchange 2003 up to level 2.

Exchange Service Pack 2 Release Notes.

Exchange Server Intelligent Message Filter V2 Operations Guide.

FAQ about Intelligent Message Filter (MS KB555602).

MS KB912587: Exchange Server 2003 Intelligent Message Filter does not provide the functionality to exclude a particular recipient from anti-spam filtering.

The Microsoft Exchange Team Blog: Exposing SCL (Spam Confidence Level) in Outlook.

UPDATE 07-10-11: Made a technical change. Had ContentFolder instead of ContentFilter above. My bad, and my apologies for the mistake. P.

Philip Elder
MPECS Inc.
Microsoft Small Business Specialists

System Builder Tip: Just because they say 200 GB doesn't mean it...

Had a pleasant greeting when I came into the shop this morning.

We had a failed drive on one of our production virtual server systems RAID 1 used for the OS.

RAID controller is an Intel SRCS14L tied to an Intel 4 bay hot swap cage.

The array contained two Maxtor 6V200E0 200 GB DiamondMax 10 drives.

I went to replace it with a 200 GB Seagate ST3200827AS.

Guess what? The Seagate is smaller and thus would not hot swap into the array and allow for a rebuild.

Since we don't have any of the Maxtors around anymore, I had no choice but to swap in a 250 GB Seagate for the array rebuild to begin.

I guess 200 GB just isn't 200 GB? Or, each manufacturer interprets the size their way?

Gadz! :*Þ

Philip Elder
MPECS Inc.
Microsoft Small Business Specialists

Thursday, 26 April 2007

Microsoft Volume Licensing - The Configurator is Back ... kinda

A while back, I had a beef about trying to muddle through Microsoft's product licensing programs to find the right product fit for our clients:

Office 2007 Open Business Licensing, Open Business + Software Assurance, and Open Value Licensing SKUs.

We had two options: A spreadsheet of SKUs, or call in several times to Licensing to get a consensus of what could be the right SKUs.

It seems that Microsoft has brought back the licensing configurator, but it is now called the Microsoft Product Licensing Advisor (MPLA).

I have run through a number of different licensing schemes and it seems to be a lot more thorough, and a lot quicker than the old Configurator.

The interface is also a lot cleaner and more intuitive:


There are a number of ways to go about finding the right licensing solution.

For those who know what products and licensing scheme we want to use, it is quick and painless. And, it looks like we actually get the right SKUs!

For those who are not too sure which licensing scheme is for them or their clients, there are a number of very well thought out survey type steps that will offer the best licensing scheme based on the answers received.

One bonus feature is links to info and trial version downloads on the various products being offered in the licensing scheme.

A really neat feature though, is the thorough explanation of what features are included with Software Assurance. This alone will go a long way to clearing up the air about what Software Assurance can do for a client!

So far, it works way better than the old configurator.

The new Advisor is a huge step forward!

UPDATE 2007-05-24: Updated the URL for the advisor as the original link no longer works.

Um, nevermind. The link within the updated link doesn't work either at the moment. Me thinks MS is having a bad link day. ... Time for some Tim's! ;)

Philip Elder
MPECS Inc.
Microsoft Small Business Specialists

Wednesday, 25 April 2007

Business Principles: Keep that commitment ... or else.

I am just a little more than cranky right now! :*Þ

I don't like it when someone makes a commitment with me and then breaks it without even having the courtesy to call me ahead of time and let me know that they won't be making it. I then blow a bunch of time that could have otherwise been used productively elsewhere.

I myself had a real problem with not communicating with my clients when scheduling didn't work out. Fortunately, with a lot of coaching by my Dad and former employer Larry MacDonald, I have come a long way.

It really is important to communicate with our clients when we are not able to make an appointment.

We who do this kind of work in the I.T. industry know that our schedules can be very fluid. There are just too many variables that may come together to keep us at an appointment or service call a lot longer than we were expecting.

Some wisdom from a couple of my favourite Star Trek engineers in Scotty (original series) and B'Elanna Tores (Voyager): Quote 2 hours and get it done in 1!

Even then, we can fall behind.

So, what do we do?

First: We educate our clients by letting them know we prioritize our schedule according to the impact an issue may have on their business. The higher the impact, the greater the priority.

Second: We call ahead of time to let them know that we are on time, ahead of schedule, or running behind. We rework the scheduled appointment if need be.

The benefits to maintaining this manner of communicating with our clients are now obvious to me:
  1. Trust: Our clients come to trust that we have their best interests at heart.
  2. Clarity: Our clients know where we stand with regards to our appointment with them at all times.
  3. Reliability: We fulfil their I.T. needs in a timely manner.
  4. Honesty: Our clients know we will let them know ahead of time if we are unable to keep an appointment.
Most people understand how the priorities work.

Most people appreciate that they will be given preferential treatment if their business is impacted by a critical situation. Because if this appreciation, most people won't mind if they have a minor issue to deal with and they get bumped because of a critical issue with another one of our clients. They know we will get to them as soon as we can.

There are occasions where we drop the ball. We miss an appointment and do not let our client know. There are any number of reasons why this can happen. But, when it does, we make it clear to our client that we made a serious mistake, we apologize, and we offer to make it right by some form of restitution.

As far as this missed appointment, this is the third time it has happened. I have a three strike rule. Sorry buddy, but you are out. Don't expect any response from me again. By breaking so many appointments with me without the courtesy of a phone call or by calling 20 minutes after the appointment time, I am left feeling that you don't place any value on my time. Say, "Bubbye - cya".

Philip Elder
MPECS Inc.
Microsoft Small Business Specialists

Tuesday, 24 April 2007

Mac Security - MacBook Pro & OS X - OWND

With the recent Windows ANI vulnerability and the patch fiasco we had to go through, a lot of attention has been on Windows security.

However, the CanSecWest conference in Vancouver Canada has made it clear that Macs are not in the clear either.

They placed two MacBook Pros out for the conference attendees to try and own.

As per this post on the CanSecWest site: First_Mac_Hacked_Cancel_Or_Allow - heh, well named I might add ;) - that MacBooks indeed have at least one vulnerability, 0day, that could be executed via the Safari browser visiting a Web site that worked through QuickTime and its interaction with Java.

So, another myth blown away! And, the following paragraph demonstrates that even Symantec admits that Microsoft has taken the lead in OS security!

Via David Overton's blog: Symantec "Microsoft Listed as Most Secure OS". Quoting from the original article:
During this period, 39 vulnerabilities, 12 of which were ranked high priority or severe, were found in Microsoft Windows and the company took an average of 21 days to fix them. It's an increase of the 22 vulnerabilities and 13-day turnaround time for the first half of 2006 but still bested the competition handily.

Then there's Mac OS X. Despite the latest TV ads ridiculing the security in Vista with a Matrix-like Agent playing the UAC in Vista, Apple has nothing to brag about. Symantec found 43 vulnerabilities in Mac OS X and a 66 day turnaround on fixes.
Via: Information Security Sell Out: Vulnerabilities Are Not Marketing Fodder.

And: SecurityFocus: A Mac gets whacked, a second survives.

As much as I see Microsoft maligned for different things, I even let them have it when I believe it is warranted, I do believe that they are paying attention and learning from their mistakes.

That in turn gives me greater confidence in their products and the solutions we provide on them.

Philip Elder
MPECS Inc.
Microsoft Small Business Specialists

Help catch spammers and more - Project Honey Pot

A Honey Pot is a term for a computer, Web server, site, and the like that are purposefully left open to the Internet in an insecure manner so as to trap those trying to get unauthorized access to them.

Project Honey Pot is an organization that encourages us to get involved in the monitoring of malicious activity.

All of us who have Web sites, blogs, eCommerce sites, and more that are on the Internet are subject to many forms of malicious activities. Everything from e-mail address harvesting from our sites to comment spamming on our blogs are examples of the types of behaviours the Honey Pot Project is trying to monitor.

We can help by placing a hidden link on our sites and blogs to capture illicit robots/spiders that crawl them as one example. We can volunteer an MX record for a domain we own but do not use for e-mail. We can also setup a Honey Pot for them if we are so inclined.

Please, check it out, and if it suits you, get involved.

Honey Pot (Computing) definition on Wikipedia.

Philip Elder
MPECS Inc.
Microsoft Small Business Specialists

Monday, 23 April 2007

Manufacturers - Don't bite the hand that feeds you!

I realize that in the grand scheme of things, us smaller resellers may seem like just that: Small, not worthy of consideration when it comes to gross sales numbers.

Or are we? And, I mean we as in the huge number of smaller I.T. shops out there that tend to sell tier 1 for certain products.

So, when a tier 1 competes and undercuts us via their own Web site for product sales that we would also sell, it bites us.

Need an example? I get a call from a client looking for an ultra-light laptop. Nothing in Acer's line, so he is considering a Dell.

I mentioned that Toshiba makes an excellent line of ultra-light products in the Portégé.

So, we settle on the R300 and low and behold we find the following:



Buy from Toshiba's site and receive the approximately $300 product bonus.

I let him know that I will call disti to see if we in VAR channel have an equivalent offer in the works.

None of our suppliers have anything on the books about any type of promo.

So, we loose the sale.

To Toshiba: Are you satisfied? I mean, you cut us out of the loop so you can make a couple of extra bucks. Okay, that works for you, but not for us.

Keep doing things like that, and we will keep selling Acers and others like them that are viable alternatives.

There is always Lenovo (shudder)! 8*O

Thus, in the grand scheme of things, Toshiba you lose.

To our client: Buy the Dell (ick). ;*)

Philip Elder
MPECS Inc.
Microsoft Small Business Specialists

Friday, 20 April 2007

Windows Home Server CTP - Are you sure?!?

Heh, I get the idea that maybe, just maybe, Windows Home Server is aimed at home users! ;)

How do I come by that?

The following:



I need to "acknowledge" that data is going to be toasted on the install drive or partition by placing a check mark in the appropriate spot before the Next button comes available.

And then, the following once the tick mark has been placed beside "I acknowledge..." and Next has been clicked on:


Let's make doubly sure that the installer understands that they are about to toast their drive or partition!

So, after clicking on the "Yes" button, off the install goes.

Not too sure on the plural of "... hard drives ... " in this window though. May have to look at what happens when more than one partition or drive sets exist on the system.

In all reality, those of us who install SBS on a very regular basis see this kind of warning/acknowledge dialogue at the beginning of the second phase of the SBS install regularly.

An example SBS based warning would be the, "more processors present than supported" when installing on multi-core systems with two physical CPUs. We acknowledge the warning and continue on with the install unimpeded.

In my opinion, this multiple warning for the setup of WHS is a good thing for the end user type to see.

If this type of hand holding continues on into the actual management of the Windows Home Server, it would be good for the end user. It may however, be a bit of annoyance for a support professional. We shall see...

Philip Elder
MPECS Inc.
Microsoft Small Business Specialists

The Character Map - How to get those special characters without mucking about with fonts.

I was typing up a note that needed a copyright symbol inserted.

In Word 2007 it was pretty straight forward.

Go to the Insert Tab and click on the Symbol icon on the ribbon:


However, what do we do when we are working in Notepad or Wordpad and have need for symbols?

In Windows XP and Windows Vista you will find the character map for inserting all sorts of different symbol characters with the Character Map feature.

In Windows XP:



In Windows Vista:


It is the second option under the System Tools folder.

Both the XP and Vista Character Map versions are pretty much the same.

Here they are side by side:


The XP version is the one on the left.

Essentially, find the character you need, double click on it and it gets copied to the clipboard.

Flip back to Notepad, or the program you are using, and paste the character in.

Done.

It is helpful to get the "é" in Resumé. ;)

Philip Elder
MPECS Inc.
Microsoft Small Business Specialists

Thursday, 19 April 2007

Windows Home Server CTP

Okay, I bit in:


I am not totally sure where WHS is going to end up relative to SBS in the grand scheme of things in regards to support needs.

So, I decided to look into it and see what can be seen.

I suspect, once it is released, that we will start fielding calls for support.

I also suspect that it will be another avenue of revenue for our company.

UPDATE: Oops... should have added some links.

Windows Home Server Beta Site. Fill out the survey near the bottom of the page if you are interested in becoming a beta tester.

The Windows Home Server Blog.

Philip Elder
MPECS Inc.
Microsoft Small Business Specialists

SBS Premium and desktop security - BotNets, PWNED, & OWNED

Support Intelligence analyzes various aspects of, "eCrime including DDoS, Scanning, hosting Malware, sending Spam, etc".

They publish a list, called the Digest of Abuse Report, of the top 100 networks and the volume of incidents on them. One can subscribe to receive updates to the list.

The DOA report for Week 13, 2007.

An article, also written by SI, on Owned hosts of Banc of America Securities.

The above article, in my mind, is one really good reason to be selling the Premium version of SBS over the Standard version. Why? Because of the added network traffic security that can be found in Internet Security and Acceleration Server (ISA) 2000/2004 depending on what version of SBS Premium one is supporting.

One can closely monitor all aspects of network traffic being routed through the SBS server whether it is destined to an internal host or external network host. The type of traffic moving across the network or networks, from HTTP, SMTP, and all other protocol types is also monitored and reported on.

With ISA, one can also act on locking down certain types of network traffic, or sources of network traffic to mitigate a known threat, or even restrict a compromised system.

However, this takes a little bit of configuration on ISA and some monitoring on our part. It also takes learning to know the intricacies of configuring and tuning ISA.

Some questions that we need to ask when completing an SBS Premium install:
  • Have we setup the ISA reports to run daily?
  • Have we included an e-mail of those reports to us and a client contact if need be?
    • In many cases we are our client's only hope of mitigating network compromises.
  • Do we pay attention to those daily reports?
  • Have we configured the Server Performance Report to be emailed to us?
  • Do we look at them every morning?
One of the best ways to get to know the health and hiccups experienced on SBS based networks is to watch those reports every day. It is a good way to get to know the "personality" of each SBS server we support.

The threat of a client's network being compromised is real. The best that we can do for them is to provide a multi-tiered solution incorporating user Internet use training (yes ... this is # 1), layered system and software protection systems, and knowledge on our part of those threats. Of course, keeping in mind that a lot of our small business clients have limited I.T. budgets! :D

There is another business aspect to the configuration and monitoring of our SBS networks: A value added service for our clients.

I personally spend the first hour or two of my day going through the reports looking for issues or indicators for potential issues.

We offer this report monitoring as a "free" service, or value add, to our providing support to our SBS clients. They know that we are monitoring the health and well being of their SBS network because we let them know it, and that the service is free. To us, it is the cost of doing business.

One of the neat aspects of providing this service, is the proactive phone call: "Hi, this is Philip from MPECS, we see that there is a need for __ in the Server reports, could we schedule a time to address this please?" Or, something along those lines.

This instills in our clients a confidence and trust in our service. It is one of the ways to demonstrate that we care enough to be watching out for the well being of their business.

An excellent source of ISA information and tutorials can be found at ISAServer.org.

Via: Threat Level (27B Stroke 6), then TaoSecurity.

A definition of ASN at dictionary.com: Autonomous System Number.

Trendmicro: Network Reputation - Estimated Spam Volume by ISP. (Secure Site).

Emergent Chaos' take on Support Intelligence: Month of Owned Corporations.

Keep in mind that ISA, layered security measures, and monitoring are only a some of the aspects to network and data security. This is by no means a comprehensive list!

Philip Elder
MPECS Inc.
Microsoft Small Business Specialists

Wednesday, 18 April 2007

Office Excel 2007 - Sort and Filter Data for Print

Sometimes there is a need to print certain ranges of cells that contain a group of data values.

A fairly simple procedure that bypasses the need to create a Pivot Table is to use the built in filter.

Take a spreadsheet that tracks the number of hours for a task or tasks over a given period of time. In this case the period is one year.

The following screen shot shows the group of data after sorting by the last name:


  1. Once sorted, click in cell A1 to remove the A column highlight.
  2. Click on the Sort & Filter button on the Home ribbon.
  3. Click on the Filter option.
    • A down arrow style button will appear beside each heading in row 1.
  4. Click on the relevant data column's down arrow to find available options.
    • The following screen shot shows what you should see:
  5. In this case we are looking for people whose total in the last column is at or below the value of 10.
  6. We choose "Less Than Or Equal To..."
  7. The Custom AutoFilter dialogue window comes up where we punch in 10.
    • The AutoFilter:
  8. Click OK.
  9. Print the results.
The results screen shot:


This is a simple way to quickly pull some relevant data from what can be a very complex spreadsheet.

Philip Elder
MPECS Inc.
Microsoft Small Business Specialists

Windows Server Virtual Calculator ... VS Licensing - A good deal or not?

I must admit, that licensing Microsoft products for virtualization has been at best a rat's nest.

Following a link from the Microsoft Virtual Server 2005 R2 web site, there is a link to Virtualization.info that links back to Microsoft's site and the new Windows Server Virtualization Calculator.

Also contained within the comments on the Virtualization.info site was a link to a fellow who built an Excel spreadsheet that can do the same thing as the online one. It is the Windows Virtualization Calculator at vi411.org.

Here is a screen shot of the Microsoft online calculator with some numbers arbitrarily punched in by me:


The tool is pretty neat. It does help to clarify some aspects of licensing Microsoft products, at least when it comes to Host/Guest OSs. It primarily deals with OLP style licensing and not OEM.

The following paragraph can be found, at least as of today April 18, 2007, below the above calculator:


The second line in the paragraph really caught my attention: "Standard Edition grants the use rights to run a single virtualized instance of Windows Server Standard Edition."

Um, Microsoft, what exactly are we doing here?!? I mean, "What the chicken!?!?"

The only remotely possible and viable solution that I can see that would work on a Windows Server 2003 Standard Edition Host OS on an established SBS network based on the above restriction is as follows:
  1. Two (2) Dual Core 51xx Intel based Server (or comparable)
  2. Windows Server 2003 R2 Standard x64 (for additional memory access) OEM or OLP - HOST OS
  3. Windows Server 2003 R2 Standard OEM or OLP - Guest OS
  4. Windows XP Pro SP2 or Vista Business OEM or OLP - Guest OSs
There are other solutions I am sure, but the above is the first one that comes to mind based on our experience implementing virtual environments for our clients and our own company.

The SBS RWW is the perfect stepping place for virtualized desktops.

I have spoken with Microsoft licensing on a number of occasions about licensing on Virtual Server. If we build a box, and sell it, we can install any number of Microsoft OEM licensed OS and Application products. OEM, of course, limits the OEM based virtual machine to run on that box only. An OLP licensed virtual machine is an option for companies that want to move those licenses (virtual machines) from box to box freely without any constraints.

In my mind, OEM licensing for virtualization may save $$$ in the short run, but, given the need to move virtual machines around, or the need to add virtual machines and thus replace an existing box, leaves an OEM licensing scheme costing more in the long run.

Okay, back to the subject at hand: Microsoft, we need some clarification here.

The above paragraph limiting the VMs on a Server 2003 Standard Host OS to ONE (1) Server 2003 Standard edition server guest OS DOES NOT WORK, in my opinion, in the SMB world.

Think about this for a minute: We can build a dual processor, four (4) core, based system with up to 32 GB of RAM, any number of drives up to 10 on the SC5400 based Intel chassis for a very reasonable price for the SMB market. The market I am thinking of is the 35 to 70 seat range which is the middle to upper end most Small Business Specialists would be dealing with.

The above system running the 64 bit Windows Server 2003 R2 Standard Edition could handle a number of Server 2003 R2 Standard Edition guest OS VMs along with a number of desktop OSs and do it at a very reasonable price point.

The above solution provides a very attractive solution for an existing SBS environment and doesn't conflict with current SBS CAL licensing schemes for additional servers on the SBS network.

Why would they need to spend the extra $2K+ for Server 2003 R2 Enterprise edition?

We get to address over 4 GB of RAM on x64 Standard Edition as all of our hardware is EMT 64 capable (64 bit), thus that negates the need for Enterprise Edition's extra memory abilities on the old 32 bit platforms.

We get to work with up to 4 physical processors on the x64 Standard Edition. Keep in mind there is an exponential jump in price when going from a server with two (2) physical processors to four (4) physical processors. The price is also affected significantly by the number of cores the physical processor has.

Rarely would we go beyond two (2) physical processors, especially with the availability of the 4 Core 53xx series Intel processors. Going beyond the two physical processors puts us closer to the Small to Medium Enterprise levels especially in pricing.

Thus, there is no need to run the Windows Server 2003 R2 Enterprise Edition for additional processor support.

So, Microsoft, prove me wrong.

Justify to me, and my SMB clients, why I need to tell my clients they need to spend an extra $2K+ for a solution that can be built quite comfortably on Windows Server 2003 R2 Standard Edition!

Philip Elder
MPECS Inc.
Microsoft Small Business Specialists