To get this card running on Windows Server 2012 and 2012 R2, you need this driver:
Newer versions no longer seem to support this card.
Run this command in an elevated Powershell to enable remote WMI access:
Enable-NetFirewallRule -Name WMI-RPCSS-In-TCP,WMI-WINMGMT-In-TCP,WMI-WINMGMT-Out-TCP,WMI-ASYNC-In-TCP
A handy tool to edit file associations, default program handlers, and autoplay handlers:
And best of all, it's free!
The Debugging tools for Windows (a.k.a. Windbg) for Windows 8.1 can still be downloaded separately. Although it's now part of the Windows Driver Kit (WDK), you can still download the Windows 8.1 SDK Installer and select only the debugging tools. It's an about 180MB download (without the symbols).
The NETLOGON folder is in fact a subfolder of the SYSVOL directory. Unless this location is changed, you can find it here:
(replace *yourdomain* with the DNS name of your Windows domain)
To allow an Exchange user to send from an external e-mail address, perform the following steps:
Get-MailContact MyUser@MyExternalDomain.com | Add-ADPermission -User MyUser@MyLocalDomain -AccessRights ExtendedRight -ExtendedRights "Send As"Replace the first e-mail address with the external one, the second part contains the user you wish to assign the permission to.
When performing RDS shadowing, by default, the user whose session is being shadowed has to consent to viewing and/or controlling his/her session. This behaviour can be changed with a group policy.
In your group policy (local or through domain), navigate to:
Computer Configuration\Policies\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Connections
Find the policy called Set rules for remote control of Remote Desktop Services user sessions and configure it:
By default, only users with local admin rights on an RDS server can do session shadowing on that server.
To allow a particular user or group to allow shadowing, run this from a command prompt on the RDS server:
wmic /namespace:\\root\CIMV2\TerminalServices PATH Win32_TSPermissionsSetting WHERE (TerminalName="RDP-Tcp") CALL AddAccount "domain\group",2
In the command, replace domain\group with settings of your own. It's recommended to create a group specific for the job (e.g. RDS Shadowing) so you can run this command only once, and then add users to the group to allow them to shadow.
If you happen to stumble upon an unknown device in Windows Device Manager with a hardware ID of ACPI\INT33A0, it's the Intel Smart Connect Technology device. Download its driver from Intel or from your manufacturer's website.
You can clear the WINS cache (NBT) by using the command prompt in a similar fashion as clearing the DNS cache:
Note that this only clears the cache. Normally you would want to repopulate it by running a new discovery (reregistration) on the network, like so:
When a backup is still indicated to run but isn't really (e.g. after a server crash or media failure), you can try to stop the backup by running the stop command using wbadmin (from an elevated command prompt):
wbadmin stop job
However, this sometimes does not work and the command hangs indefinitely. In this case, you can still stop the backup by stopping the Block Level Backup Engine Service service. If the service does not stop, use Task Manager to kill the process wbengine.exe, which does the same thing.