Backtrack:  
 
showing posts of September 2017
 
edited by on September 28th 2017, at 14:36

If for any reason you need to determine whether a specific instance of VMWare View Connection Server is installed as a standalone server or a replica server, you can do so by looking into the registry.

In HKEY_LOCAL_MACHINE\Software\VMware, Inc.\VMware VDM, the value ServerInstanceType will indicate which type the CS is:

1 = standalone/first CS
2 = replica CS

Note that this doesn't really matter, as the only difference between them is whether they set up a new ADAM instance or connect to an existing one. After the installation of VCS, they are identical.

edited by on September 21st 2017, at 09:54
Quest Rapid Recovery provides the ability to replicate restore points to off-site location. More than often, connectivity to these locations has limited bandwidth and is sometimes even unstable. Unfortunately, Rapid Recovery doesn't do well with unstable connectivity: more than often, replication jobs abort because of high latency. Luckily, you can tweak the timeout parameters through the registry:

HKEY_LOCAL_MACHINE\SOFTWARE\AppRecovery\Core\CoreSettings\ClientTimeoutSettings Increase the values of ReadWriteTimeout and ConnectionTimeout to 1 hour.

HKEY_LOCAL_MACHINE\SOFTWARE\AppRecovery\Core\Replication\ReplicationService Increase the values of VolumeImageSessionTimeout and RemoteReplicat  ...
edited by on September 16th 2017, at 10:28

You can very easily properly uninstall the Palo Alto GlobalProtect client on Mac OSX by running the included uninstallation script:

Open a Terminal and then run it by typing:

sudo /Applications/GlobalProtect.app/Contents/Resources/uninstall_gp.sh

Provide your password when asked and the script will uninstall GlobalProtect.

edited by on September 15th 2017, at 14:25
On October 31 2017, RPC over HTTP will be deprecated in Office 365, as stated here. This means that older Outlook versions (those that use RPC over HTTP) will no longer be able to connect to Office 365. The reason for this is that RPC over HTTP will be replaced in favor of the much newer MAPI over HTTP.

This switchover has an impact on all (older) Outlook versions that do not have the required update (incorporating MAPI over HTTP) functionality installed. Only Outlook versions that get this update will be able to connect to Office 365, resulting in the following changes:

Outlook 2007: no longer supported (there is no update).

Outlook 2010: only supported with SP2 and KB 2878264 installed   ...
edited by on September 15th 2017, at 11:52
Firefox 52 introduced an insecure form warning: whenever a password is requested on a web form through a non-SSL website (i.e. no "https"), Firefox displays a warning popup below the focused field:

While the gesture is appreciated (user awareness and all), it can become annoying. There is a way to turn the warning off through the advanced configuration of Firefox:

Start up Firefox and enter the following URL in the address bar: about:config

You'll get a This might void your warranty! page. Click the I accept the risk! button to continue.

You'll get a list of everything there is to configure in Firefox. In the search bar, paste the following value to quickly locate the correct p  ...
edited by on September 15th 2017, at 10:06
Sometimes it may become necessary to make changes to a DHCP scope on your Windows DHCP Server. Unfortunately, for existing scopes, not all scope options are editable, and it can become quite a hassle to recreate the scope, especially when there are a lot of reservations. Luckily, there's a workaround which allows you to edit the scope options, which is by using netsh.

It is not possible for netsh to directly edit scope options, but you can create a dump of the complete scope configuration (including all reservations), edit the resulting file, and import it back into the DHCP server. For this to work, you'll need admin (elevated) privileges on the DHCP server.

Notice
The procedure described  ...
edited by on September 12th 2017, at 10:31

One of the most common Exchange admin tasks is setting mailbox delegations. Personally, I usually do this through EAC but once you're familiar with the Powershell counterparts, it can be quicker to use that instead. I've created this post as a reference to do just that.

In the reference below, the user "Ellen Somebody" requires access to the mailbox of "John Doe".

Send on Behalf

Set-Mailbox john.doe -GrantSendOnBehalfTo ellen.somebody

Send As

Add-ADPermission john.doe -ExtendedRights Send-As -user ellen.somebody

Full Access

Add-MailboxPermission -Identity john.doe -User ellen.somebody -AccessRights FullAccess -InheritanceType All
edited by on September 12th 2017, at 09:47
Occasionally, you may encounter AD account lockouts and the reason for the lockout is not always apparent. Enabling NETLOGON logging on your domain controllers may help in this regard. The NETLOGON log file will provide a detailed logging of all NETLOGON events and helps you to trace the originating device on which the logon attempts (and subsequent lockout) occurs.

To enable NETLOGON logging, run the following command (from an elevated command prompt):

nltest /dbflag:0x2080ffff

The parameter is a integer value of flags, and 0x2080ffff is the highest level, showing detailed timestamps, the domain controller clients authenticate against, client site, account password expiration, and much m  ...
 
showing posts of September 2017