background preloader


Facebook Twitter


ACL Windows

Email. IT Security. Backups. Exchange. Using PowerShell to create a Virtual Machine Inventory in VMware and Export it to a CSV File. Hi all, In this blog I will explain an easy way to generate a Virtual Machine inventory and export it to a csv file.

Using PowerShell to create a Virtual Machine Inventory in VMware and Export it to a CSV File

We will be using the “Get-VM” cmdlet and piping it to the “Export-csv” cmdlet to get the information we need in the examples below. To do anything with PowerShell in VMware you will need to install VMware vSphere PowerCLI. You will then need to open PowerCLI connect to your VMWare vCenter server by typing “Connect-VIServer vCenterServerName”. The simplest way to get a VM inventory with lots of useful information is to type the following command replacing the path with the directory and file name you would like to use. PsTools. How to Install PowerShell on Windows Server 2003 and Enable Remote PowerShell Management–All Servers Should Have This Done - ITProGuru Blog by Systems Management Expert Dan Stolts.

TechNet Wiki.

Active Directory

Download Remote Server Administration Tools for Windows 10 from Official Microsoft Download Center. **Remote Server Administration Tools for Windows 10 can be installed ONLY on computers that are running the full release of Windows 10 Professional or Windows 10 Enterprise. or Windows 10 Education.** Remote Server Administration Tools cannot be installed on Windows RT, computers with an Advanced RISC Machine (ARM) architecture, or other system-on-chip devices.

Download Remote Server Administration Tools for Windows 10 from Official Microsoft Download Center

Remote Server Administration Tools for Windows 10 runs on both x86- and x64-based editions of the full release of Windows 10, Professional or Enterprise editions. Download and install the version that matches the architecture of the computer on which you plan to install the administration tools. Remote Server Administration Tools (RSAT) for Windows operating systems. Remote Server Administration Tools (RSAT) enables IT administrators to remotely manage roles and features in Windows Server 2012 R2, Windows Server 2012, Windows Server 2008, and Windows Server 2008 R2 from a computer that is running Windows 10, Windows 8.1, Windows 8, Windows 7, or Windows Vista.

Remote Server Administration Tools (RSAT) for Windows operating systems

You cannot install RSAT on computers that are running Home or Standard editions of Windows. You can install RSAT only on Professional or Enterprise editions of the Windows client operating system. Unless the download page specifically states that RSAT applies to a beta, preview, or other prerelease version of Windows, you must be running a full (RTM) release of the Windows operating system to install and use RSAT. Add a user or group as a DHCP administrator at a domain controller: Dynamic Host Configuration Protocol (DHCP) Updated: January 21, 2005 Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2 To add a user or group as a DHCP administrator at a domain controller Open Active Directory Users and Computers if the DHCP server is installed at a domain controller.

Add a user or group as a DHCP administrator at a domain controller: Dynamic Host Configuration Protocol (DHCP)

How to build a Windows 2012 R2 VMware Template. This is a template outline I have used several times and am very happy with it.

How to build a Windows 2012 R2 VMware Template

It should work great for you and if not then let me know. I did this with vSphere 5.5 U1 and Windows 2012 R2. I also used the vSphere Web Client as you will see in the screenshots. Setting the Desktop Wallpaper Background with Group Policy - DeployHappiness. Setting the Desktop Wallpaper Background with Group Policy is a fairly common request from administration or management.

Setting the Desktop Wallpaper Background with Group Policy - DeployHappiness

Unfortunately, the actual setup is not as straightforward as you would think. As with any Microsoft product, there are a myriad of ways to configure this and every way has a unique set of features (and drawbacks). In this guide, we will cover two ways of setting the desktop wallpaper background with Group Policy plus a few tricks that you’ll need to know first. Question Time Before configuring even a single option – ask yourself these two questions first: Windows - Enforcing lock screen after idle time via GPO. File Server: Add Quotas in Windows Server 2012 R2 with Powershell. Enabling debug logging for the Netlogon service.

Important This section, method, or task contains steps that tell you how to modify the registry.

Enabling debug logging for the Netlogon service

However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. Cannot rename this connection - NIC Server 2008-R2. Hi, In addition, you can check the KB below: Please check the registry key below:

Cannot rename this connection - NIC Server 2008-R2

Enable TLS 1.2 Ciphers in IIS 7.5, Server 2008 R2, Windows 7. Some industries, like Government, require the use of certain cryptography algorithms.

Enable TLS 1.2 Ciphers in IIS 7.5, Server 2008 R2, Windows 7

One of the great features of Windows Server 2008 R2 and Windows 7 is the support for TLS 1.2 ciphers. TLS 1.2 ciphers support AES-256 encryption with SHA-256 hashes. Unfortunately, Microsoft did not enable these protocols out of the box. I wanted IIS 7.5 to negotiate TLS 1.2 connections with my Windows 7 clients. Forward secrecy. History[edit] Forward secrecy was originally introduced by Whitfield Diffie, Paul van Oorschot, and Michael James Wiener.

Forward secrecy

It used to describe a property of the Station-to-Station protocol (STS), where the long-term secrets are private keys.[2] Forward secrecy has also been used to describe the analogous property of password-authenticated key agreement protocols where the long-term secret is a (shared) password.[3] Annex D.5.1 of IEEE 1363-2000 discusses the related one-party and two-party forward secrecy properties of various standard key agreement schemes. Strong SSL Security on Apache2. 25-03-2015 | Remy van Elst This tutorial shows you how to set up strong SSL security on the Apache2 webserver. We do this by disabling SSL Compression to mitigate the CRIME attack, disable SSLv3 and below because of vulnerabilities in the protocol and we will set up a ciphersuite that enables Forward Secrecy when possible.

We also set up HSTS and HPKP. This way we have a strong and future proof ssl configuration and we get an A on the Qually Labs SSL Test. TL;DR: Copy-pastable strong cipherssuites for NGINX, Apache and Lighttpd: Secure Server: TLS v1.1 and v1.2 Support - Speaking of Security. The recent “BEAST” and “Lucky Thirteen” attacks have made clear that it is time to use the newer versions of TLS: v1.1 and v1.2. TLS v1.2 also adds the new, safer GCM cipher suites and changes the MD5/SHA-1 handshake hash for a simple SHA-2 hash. The following table shows a list of common browsers and the version they first started supporting TLS v1.1 and v1.2: 1 Support is disabled by default.2 Different engine, support now on by default.

The browsers listed above account for over 98.5% of the market as reported by w3school in September. Note that these statistics are for all versions and not just those that support TLS v1.1 and v1.2. Not all versions of each browser have support enabled by default. How to disable SSL 2.0 and force SSL 3.0 and TLS 1.0 in IIS. I lot of places want to disable weaker encryption levels and require more secure encryption levels. There isn’t a lot of clear procedures out there that explain how this is done. So for the greater good, I’m posting it here. Follow these steps to make the change manually: Back up your registry (outside link) Disable SSL 2.0: Browse to the “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0″ key. SSL Server Test (Powered by Qualys SSL Labs)

Hardening Your Web Server’s SSL Ciphers — Hynek Schlawack. There are many wordy articles on configuring your web server’s TLS ciphers. This is not one of them. Microsoft has released a Microsoft security advisory about this issue for IT professionals. The security advisory contains additional security-related information. To view the security advisory, go to the following Microsoft website: The following files are available for download from the Microsoft Download Center: How To Install an SSL Certificate For Apache Servers. Testing Network Services with netcat. Using netcat If you have a network service that's not behaving like it should but you know it's listening to a network port, you can take a closer look at a connection to the program to see if it reveals the problem.

Setting, Changing And Resetting MySQL Root Passwords. This tutorial explains how you can set, change and reset (if you've forgotten the password) MySQL root passwords. Time and again I see problems like mysqladmin: connect to server at 'localhost' failed error: 'Access denied for user 'root'@'localhost' (using password: YES)'.


Firelit Design: Fixing InnoDB error "the age of the last checkpoint is..." CommonMisconfigurations - Httpd Wiki. TutorialCachingStory - memcached - This is a story of Caching - Memcached. Windows/Temp directory is full of Php Session's files that block the server. Nginx vs Apache - Anturis Blog. NodeSchool. Drupal. Centos - Why does MySQL Slow Queries Log not exist? How To Repair Corrupted MySQL Tables Using myisamchk. How to Install ClamAV and Configure Daily Scanning on CentOS - Shine Servers. IIS. Apache. XEN. VMware. NTFS Misreports Free Space? - Ntdebugging Blog. I have recently seen a number of issues where customers called in to report a significant difference between the “Size on disk” for the root of a volume, and the reported amount of “Used space” in the volume properties.

While considering this, I noticed that my own C: drive had a mysterious 20GB difference. Below is the story of how I found the answer. Before we begin, there are two methods used for calculating disk usage… Method 1 – Volume Bitmap Analysis The % used and %free indication shown below with the pie chart is based on volume bitmap analysis. Method 2 – File Scanning with FindFirstFileEx / FindNextFile Navigating to the “C:\” folder, we select all files/folders, then right click, and then select properties. Why such a big difference? The short answer is - “If you can’t see it with Explorer, it doesn’t get added to the total size.”

How to find the hidden disk usage… Step 1: First, check to see if your files are all actually visible with the current user account and Explorer settings. Pareto principle. PsTools. How to install, configure and manage vsftpd on Linux CentOS. Performance indicator. The Foreman.