Archive for the ‘Windows 2008’ Category

In IT Stop anticipate the Future and Become More Responsive Instead

Tuesday, November 25th, 2014

Those working in corporate IT used to be able to depend on upon the fact that they were the only game in town. If employees needed technology or technology advice, it was only available from the IT function.

Now, as employees are more comfortable with using technology than ever before and with the advent of cloud-based services, employees will often happily buy the technology direct from vendors without having to go through IT.

And the rise of disruptive corporate tech aimed at helping employees in particular roles or improve particular processes – such futuristic things as mobile supply chain apps, SaaS ERP solutions, and end-user biometrics, to name a few – means IT professionals are less likely than they once were to know what’s most appropriate for the end user.

information technology

From ‘Anticipate’ to ‘Respond’

All of this means that it is now an essential leadership competency for all managers to be able to get the most from the technology and information at their disposal. And this shift has forced forward-thinking IT functions to spend less time trying to anticipate corporate technology trends and more time responding to those changes.

IT’s fundamental role hasn’t changed: it was, and will continue to be, to help its firm get as much value as possible from technology. But, instead of predicting the future and explaining it to line managers, IT teams should now set themselves up to help the line use the technology it deems most appropriate and ensure this use doesn’t result in wasted spending, excessive complexity, and the taking on of ill-considered risk.

Traditionally, IT governance has relied on long-term planning to make technology as efficient and reliable as possible. But with the rise of digitization and ever more niche corporate tech innovation, long-term planning often ends up missing the mark.

Three Ways to Become More Responsive

  1. Avoid multi-year commitments: Results from the benchmarking survey show that IT organizations are adapting to more unstable planning horizons. While previous versions of the emerging technology roadmap showed relatively consistent results for implementation timelines across organizations, the most recent results show timelines that vary widely, based on the companies’ perception of a technology’s relative risk and value.

Most notably, implementation timelines are shortening across the board as progressive CIOs avoid multi-year commitments— a reflection of their reluctance to “lock in” spending in areas where marketplace maturity remains unclear (e.g., for software-defined infrastructure).

  1. Shorten planning cycles: The velocity of change in both business partners’ demand and in-market offerings requires that IT organizations develop capabilities to adapt their roadmaps to shorter, more iterative cycles.

IT organizations have decreased their general technology planning cycles from three years to 18 months, according to survey results.

  1. Harness the opportunities of the cloud: Despite risk concerns, data show that cloud computing is already mainstream in corporate hosting, storage, and employee computing for 2014–2015. CEB’s data also indicate that more than a third of organizations are evaluating more extensive uses of cloud services, such as public cloud-based disaster recovery and desktop-as-a-service.

Furthermore, the fact that organizations are already moving toward a more sophisticated suite of employee computing capabilities, including access to cloud-based email and productivity tools, support for more diverse front-end interfaces, mobile access to video, etc., indicates that moving from “anticipate to respond” is becoming the norm in the employee computing capabilities area.

For More Information related to IT blog then visit at itetc

 

 

Copy open files from command line – Robocopy alternative

Tuesday, February 5th, 2013

Not too long ago we needed to keep two servers in sync (one way sync). We looked around for a command line tool that can copy files that only got modified on a set interval. However we needed that tool to copy open files as well.

Well, GSCopyPro was the tool that we found to meet all of our needs. Not only can it keep folders in sync, but it can actually copy open files as well. It took a lot of research and we evaluated a lot of good tools out there in the market. GSCopyPro was certainly the one the ranked high in our charts from performance standpoint and in terms of the features it offers.   (more…)

Ctrl+Alt+Del takes forever to prompt for password

Monday, May 23rd, 2011

We saw an issue with a customer whose Ctrl+Alt+Del took forever to prompt for password. We looked at several things to try to figure it out. It was also happening when unlocking the workstations. We finally we found out…
(more…)

LTO-5 for data backup: The cure for storage woes?

Monday, November 22nd, 2010

For years, tape storage systems have played a key role in efforts to store data for backup and retrieval, archiving, and contingency planning purposes. More recently, tape has been called on to help preserve and safeguard data to meet data retention laws and regulations. The challenge is how to manage, retain, and safeguard the data volumes being generated today. To put the data explosion issue into perspective with respect to its impact on tape, consider that even in last year’s tough economic times shipped disk storage capacity grew at a remarkable rate. All of the data being placed on that new disk capacity needs to be backed up, and much of it must also be retained for long periods of time. New tape technology provides a solution. With a capacity to store 3 TB of data per cartridge, recently introduced Linear Tape-Open (LTO)-5 tapes offer twice the storage capacity of LTO-4 and about four times the capacity of LTO-3 systems.  

(more…)

Enable of Windows 2008 R2–the Active Directory Recycle Bin

Thursday, June 10th, 2010

Even in professionally managed network environments it is still possible for mistakes to happen. If an Active Directory object such as a user or computer account is accidentally deleted  network access will be lost. Worker productivity will decline until the account is restored and IT support costs will add to the total expense incurred by the organization.

In the past the best method to restore a deleted AD object is to reboot a domain controller into Active Directory Restore Mode, logon the computer with a special administrative account, and restore the Active Directory database from a backup file. The final steps are to run the NTDSUTIL command line utility to authoritatively restore the object in question and then reboot the computer into normal mode. This procedure is cumbersome, time consuming and requires that the backup file selected contains the most current version of the object.  Many administrators have wished that an easier method was available.

With the introduction of Windows Server 2008 R2 it is possible to enable an Active Directory Recycle Bin. Deleted AD objects can be restored complete with all object related attributes intact. These attributes includes user and computer account group memberships. In order to enable the Active Directory Recycle Bin all Domain Controllers in the Domain must first be upgraded to Windows Server 2008 R2. The Domain functional level of the Domain and the Forest must be raised to 2008 R2 functional level. This can be accomplished in the Domains and Trusts administrative console. If the Active Directory Forest was created using Windows 2000 or 2003 Server it is also necessary for a member of the Schema Admins group to update the Active Directory Schema by running the ADPREP /Forest Prep command on the Schema Master domain controller and the ADPREP /DomainPrep command on the Infrastructure Master computer. Raising functional levels may affect some applications that integrate with Active Directory, therefore it is important to research possible issues before raising the levels.

Once the functional levels are raised the Recycle Bin can be enabled using the following PowerShell command: “Enable-ADOptionalFeature -Identity <ADOptionalFeature> -Scope <ADOptionalFeatureScope> -Target <ADEntity>”. This command must be run using the Active Directory Module for Windows PowerShell  by an member of the Enterprise Administrators group.  Microsoft gives us an example of how this command would look when it is used to enable the Recycle Bin for the Contoso.com domain:

“Enable-ADOptionalFeature –Identity ‘CN=Recycle Bin Feature, CN=Optional Features,CN=Directory Service, CN=WindowsNT, CN=Services, CN=Configuration, DC=contoso, DC=com’ –Scope ForestOrConfigurationSet –Target ‘contoso.com’”

Now that the Recycle Bin is enabled, deleted object can be recovered using either PowerShell or the ldp.exe utility. This process is described by Microsoft here: http://technet.microsoft.com/en-us/library/dd379509(WS.10).aspx

Save yourself time and aggravation by enabling the Active Directory Recycle Bin soon!

Keep the “Advanced Features” view always on in Active Directory Users and Computers MMC

Tuesday, June 8th, 2010

“Is there a way to keep the “Advanced Features” view always on?”

If you start a blank management console, add the ADUC snap-in, turn on Advanced Features view, and save the console, whenever you use *that* console file, Advanced Features will be on.

1. Launch a blank Microsoft Management Console: Start-> Run… mmc.exe

2. In the MMC menus, choose File->Add/Remove Snap-in… (or Ctrl+M)

3. Select “Active Directory Users and Computers” and hit the “Add >” button in the middle.

4. Hit OK to finish adding the snap-in.

5. Back in the console, select the Active Directory Users and Computers node under the “Console Root.”

6. Right-click on that ADUC node and choose “New Window from Here” in the menu.

7. In the MMC menus, choose  View->Advanced Features (this turns on the Attribute Editor, Security, Object, and other tabs as well as several other features in menus and makes other objects visible).

8. In the MMC menus, choose  File->Save (or Ctrl+S), specify a file name folder, file name, and hit the Save button.

9. In the MMC menus, choose  File->Options… and choose “User mode – limited access, single window,” then check the “Do not save changes to this console” checkbox, and finally hit OK.

10. In the MMC menus, choose “Save As…” and save under a different file name, and choose “Yes” when warned about the single window interface option.

11. In the MMC menus, choose File->Exit

12. Launch the second console you saved (in step 10) and use it – it should always have Advanced Features turned on.

13. If you need to make changes to other settings in the console, open the first console you saved (in step 8), adjust whatever other options you want, then repeat steps 9, 10, and 11 using a different file name in step 10 this time to distinguish the new settings.

Setup Windows 2008 Server Core – Networking Commands

Wednesday, April 28th, 2010

When you install windows core server, you first need to configure the network component so that it can talk to the network and then managed remotely which would simplify your administration and reduce your frustration.

I have gathered a lot of these commands for you so you do not have to try to reinvent the wheel like I did.

Here is the start of you Networking and Firewall related commands for Server Core.  To configure the IP address you will have to remember (or learn) Netsh.  In my example I use “Local Area Connection”  The quotes are needed due the spaces.  If you renamed your connection name then you will want to use the new name in its place.

Configure a Static IP Address on Server Core:
Netsh int ipv4 set address Local Area Connection static 10.1.1.10 255.255.255.0 10.1.1.1
Netsh int ipv4 set dnsserver Local Area Connection static 10.1.1.5 primary
Netsh int ipv4 set winsserver Local Area Connection static 10.1.1.6 primary

Configure a Dynamic (DHCP) IP Address on Server Core:
Netsh int ipv4 set address Local Area Connection source=dhcp

Change the name of the network interface on Server Core:
Netsh int set interface name = Local Area Connection newname = Primary Network 

The Windows Firewall is a blessing to some and a curse to others. Either way it is installed by default and you have to understand the commands that are needed to configure the basics and in some cases some advanced commands.

Disable firewall:
netsh firewall set opmode disable

Server Core can be managed by using MMCs from a remote server. However with the firewall being on by default you will have to allow these tools to work remotely.  The first thing to note here is how to translate the MMC Snap-in to Windows Firewall Rule Group.

Event Viewer – Windows Firewall Rule Group – Remote Event Log Management
Services – Windows Firewall Rule Group – Remote Services Management
Shared Folders – Windows Firewall Rule Group – File and Printer Sharing
Task Scheduler – Windows Firewall Rule Group – Remote Scheduled Tasks Management
Reliability and Performance – Windows Firewall Rule Group – Performance Logs and Alerts and Windows Firewall Rule Group – File and Printer Sharing
Disk Management – Windows Firewall Rule Group – Remote Volume Management
Windows Firewall with Advanced Security – Windows Firewall Rule Group – Windows Firewall Remote Management

To enable all of these rules follow use this command:
Netsh advfirewall firewall set rule group=remote administration new enable=yes