Thursday 23 October 2014

Network Load Balancing and Virtual Machines: Tuneup

SharePoint 2010 Web-Front-End NLB Tuning (points to be noted before configuring Network Load Balancing and Virtual Machines on Windows Server 2008 R2):
When running NLB as a Virtual Machine (VM) guest using Windows Server 2008 R2 Hyper-V you need to be aware of some specific configurations settings in Hyper-V host prior to configuring NLB. If you do not enable spoofing of MAC address prior to configuring NLB on the VM you could potentially have problems with the NLB cluster. 
When configuring NLB in unicast mode on Hyper-V with enable spoofing of MAC Address disabled you may see some of the following symptoms:
  • When initially configuring NLB you will lose network connectivity on the network adaptor NLB was configured on.
  • Either of the nodes NLB status might show converging instead of converged and healthy status.
  • There will be an NLB error event in the Windows Event Log stating that the network adaptor does not support dynamic MAC address updates.
  • After rebooting the server, NLB will appear to be bound to the network adapter, but the cluster VIP will not have been added to the network adaptor.
  • The cluster MAC address will still be the original MAC address associated with the network adaptor prior to configuring NLB.   Use CMD> ipconfig /all to view the MAC address.  It should start with "02-BF-***"
  • If you ignore all previous symptoms and manually add the VIP you could get an IP conflict if there are other nodes in the cluster that have the same VIP.
With that said, to allow VM guests to run NLB you need to set the VM property for "Enable spoofing of MAC Address". 
To enable spoofing of MAC Addresses open the Hyper-V management console.  Make sure the VM is stopped open the properties of the VM.  Select the Network Adaptor for the NLB VM and check the "Enable spoofing of MAC Address" and click OK.  Then start the VM.
also refer articles from technet here http://technet.microsoft.com/en-us/library/cc917873.aspx

Remote Desktop Licensing

Remote Desktop supports two concurrent connections to remotely administer a computer. You do not need a license server for these connections. However to permit more concurrent connections you need to acquire MS RD license.
Checklist: Configure Remote Desktop Licensing
For moving RD Licensing from an existing Remote Desktop license server to another server, use the steps in the below article.
For Migrating the RDS CALs from the existing license server to the new license server by using the Manage RDS CALs Wizard in Remote Desktop Licensing Manager, use the below link.
(Here you need to concentrate on the subheading Migrating CALs from Windows 2003 source to Windows 2008 R2 target)
Note: This can cause a downtime during the migration process.

Tuesday 20 May 2014

Remove Windows.old From a Server

Delete the windows.old from an upgraded Windows Client:Win7 & above or Server: 2008 & above
For a client OS that's upgraded, the Disk Cleanup utility can be used to delete the very large windows.old folder containing the old OS. This isn't available on a server OS without installing the Desktop Experience feature.
To delete, it is necessary to take ownership of the folder, give administrators full control, then delete. This can be done with the commands below:
  • takeown /F c:\Windows.old\* /R /A /D Y
  • cacls c:\Windows.old\*.* /T /grant administrators:F
  • rmdir /S /Q c:\Windows.old 
Using GUI: I improvised and claimed ownership of the parent folder as well as ensured I had Full Control and that all child folders and files were altered to inherit these attributes - at that point I deleted the folder successfully.

Change default desktop background

Citrix Terminal Server
How to change the default desktop for Citrix XenApps server:

Tuesday 29 April 2014

Default attachment path in windows 7 and above email clients

Tips of the Day..!
you might sometimes wonder where does the attachments vanish in case you open an attachment and modify them directly from your email client like; Windows live mail or Microsoft outlook.
below is the path where you can search for.. simple way is to open any one of the attachment from your email client and click file save as, this will give you a clear idea of default source location.
Windows Live Mail default attachment cache location:
C:\Users\kt.rinith\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
Microsoft Outlook default attachment cache location:
C:\Users\kt.rinith\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook

Scintillating Facts: Increase Speed on your Laptop (Windows 7 & Windows 8)

Scintillating Facts: This write-up is experience based as on how to Increase Speed on your Laptop (Windows 7 & Windows 8):
remove unused adwares after use.
Disable add-ons  from IE
Reliable third party tools which has been tested and rated above average will also do. For personal use free versions will do which are rated as virus free softwares. Few of them to pick-up are:
i) CCleaner  - available @http://www.piriform.com/ccleaner/download . This removes obsolete traces and reorders the system.
ii) Check the unwanted and suspicious services and disable if not required. Type MSConfig to review them.
iii) Block Adware pop-ups while access internet via Internet Explorer or other browsers. It's simple. Download Adblock Plus for IE and follow the quick steps.

Failover cluster node setup Errors

setup errors in SQL cluster environment..
TITLE: SQL Server Setup failure.
------------------------------
SQL Server Setup has encountered the following error:
Object reference not set to an instance of an object..
------------------------------
Solution:  Open Failover Cluster Manager and move the Instance in question related resources to the other node and re-deploy the SQL server failover cluster node setup.

Tuesday 28 January 2014

Different methods to check System Configuration

Fairly simple one is to check the System Properties (Right-click My Computer, and then click Properties) or from BIOS (before the computer boots)
Windows key + R will take you to Run Command and type Msinfo32
Msinfo32  provides system information
Type dxdiag (either in command prompt or Run window)
provides DirectX Diagnostic Tool results
devmgmt.msc - shortcut to device manager
perfmon – performance of the system can also be monitored by adding various system related counters.

Tuesday 7 January 2014

‘Creepware’ on the rise: Beware..!

Remote-access Trojans (RATs) is a galloping concern among common people across the world.
Malware that secretly installs tools similar to those used by network admins to control machines remotely. Once the malware is installed on a machine, cyber pranksters can take control of the entire system, including the webcam.
Many have heard the stories about people being spied on using their own computer or people being blackmailed using embarrassing or incriminating video footage unknowingly recorded from compromised webcams.
According to leading AV and security solution provider, creepware programs, such as Pandora RAT, allow an attacker to gain access to files, processes, services, the clipboard, active network connections, the registry and printers. Some programs also allow an attacker to remotely control the desktop; take screenshots; record webcam footage; record audio; log keystrokes; steal passwords; download files; open Web pages; display onscreen messages; play audio messages using the text-to-speech function; restart the computer; and cause system failure.
To stay protected against creepware or any other 'X'ware, keep antivirus definitions, operating systems, and software up-to-date, and avoid opening emails from unknown senders or clicking on suspicious email attachments. Users should also exercise caution when clicking on enticing links sent through email, instant messages, or posted on social networks, and only download files from trusted sources.
Also be suspicious of unexpected webcam activity. When you're not using the webcam, keep the shutter closed..!

Sunday 5 January 2014

Encrypt your drive with Bitlocker

Need to have TPM activated on BIOS to get these features.. However, if you don't have TPM enabled laptops, activate bitlocker without a TPM