Posts

Showing posts from 2013

Exchange 2010 - Get Full Access to User’s Mailboxes

To get access to a specific mailbox with all permissions use the following command in “Exchange Management Shell” Get-Mailbox username | Add-ADPermission –user username –AccessRights GenericAll To get access to a specific Exchange Mailbox database and all of the mailboxes that this database contains, use the following command in “Exchange Management Shell” Get-MailboxDatabase –identity “ mailbox database name ” | Add-Permission –user username –AccessRights GenericAll Done!

Create a VLAN with DD-WRT Based Routers

Image
If you’ve never heard of DD-WRT by now… You should go to that link quickly. ( http://www.dd-wrt.com/site/index ) DD-WRT is a Linux-based firmware for wireless routers and wireless access points. Basically, it’s a firmware compatible with some cheap end-user wireless routers. Once you load that firmware on your router, you get lots of cool networking features that you would normally find in enterprise products for a lot of $$$. Some of the cool features of DD-WRT are WDS, VLAN, Multiple SSID, QoS, different wiles modes (Access Point, Bridge, Repeater, etc…), and the list goes on… It’s free to download and use. Please use it at your own risk because during the process of flashing your router, you can also “brick” your router although, I’ve never experienced this personally. Not every router is compatible with DD-WRT, so please check the “compatibility” page before trying anything. Compatible Router Database http://www.dd-wrt.com/site/support/router-database In this article, I’l

Create a Windows Azure Lab

I've been experimenting with Microsoft's new cloud services, Windows Azure. The service is very versatile and practical. Basically, it's an online platform (or Portal as Microsoft calls it) you can create virtual machines, virtual networks, highly available redundant storage, databases, cloud services, web sites, web apps, active directory and the list goes on... So how and why would you use it? It was the first question I asked to myself and when I got my answer and experimented with it, I was totally blown away by the easy usage of it. You can instantly create a Lab environment to test new products. Takes about 10-15 minutes to create a couple of virtual machines connected together. So yeah, if you don't have a Hypervisor machine at home, go ahead and create your lab. But it's meant to be used by enterprises!!! Because all these resources are highly available and redundant. Microsoft spreads out it's datacenters pretty much all over the world and they give you

Renaming a « VMDK » file in VSphere

I have a VMDK file that was used for a Windows Server VM as a secondary disk to store only archive files. When I had to scrap the VM and redo it from 0. As any lazy admin would do, I tried to be smart and just reinstall the OS on a different VMDK and copy over the secondary VMDK, rename it, attach it to the virtual machine and off you go… Things are never as easy as you imagine it would be with computer systems J . Here is another adventure of just a renaming simple VMDK file; If VSphere Gui doesn’t let you rename a file, you can do it through a PuttY ssh session;  Open an SSH session to one of your hosts.   Browse to your DataStore which has the VMDK file. cd /vmfs/volumes/DatastoreName/originalname Use the following command to rename a file;    vmkfstools -E "originalname.vmdk" "newname.vmdk" For more information about manipulating files in datastores or using the “vmkfstools”; http://kb.vmware.com/selfservice/microsites/search.do?c

Best Practices for Anti-Virus Configuration and Exclusions in a Windows Environment

Image
If you are here, it means you already know that configuring an anti-virus is not as simple as « next, next, next, ok ». Especially, deploying an antivirus to hundreds of clients… You’ve got to make sure that your clients are not suffering from intrusive antivirus processes, setup exclusions properly so that you don’t scan gigabytes of ISO files, make sure that the clients get the most recent and proper updates even if they are not connected to your network… Do you now get what I mean? J I went through this process recently. We’re using Trend-Micro Worry-Free Advanced Business security software for a couple of years now. Recently Trend-Micro had an update and the most recent version of the program is version 8 as of writing this article. The process of upgrading didn’t go very well so I had to reinstall it from scratch! Here are my notes regarding this project; I am not an antivirus expert but I guess every antivirus product has their own installing and “best practices” guide.

Change Network Locations in Windows 7 / Windows Server 2008 R2

Image
I came across this issue several times and each time I see this, I can’t remember quiet well what to do... So I decided to document my procedure. Problem: With Windows 7 and Server 2008 R2 editions, you have the “Network Locations” options. Basically, whenever your computer connects to a new network Windows is asking you if you are connected to a “Home” network, “Work” network or a “Public” network. Based on your choice Windows sets its firewall settings automatically. This feature is really clever as you don’t want your firewall to be open to everyone while you are connected to Starbuck’s “Public” network and you absolutely don’t want your file sharing to be blocked while you are at home (Home) network.   If you ever made a mistake choosing your network location, you can always go back to “Network and Sharing Center” from “Control Panel” and click on the link that defines the actual network location.   Now the problem is, sometimes this option is grayed out or the option is dis

Managing Internet Explorer Add-Ons for All Users

Image
I guess we all heard about the Java security breach . I don't know about you but I've heard about it and decided to take action like a good IT Professional. :)  We decided to deactivate the Java add-on on our Terminal Server which is running Windows Server 2008 R2. I realized that if I turn off the add-on manually from the Internet Explorer settings, the action is only takes effect only for the user account that your are logged in. But, what do you do for a Terminal server or on system that multiple user is using? I've found the answer on Microsoft TechNet forums and I wanted to share it with you guys because the answer wasn't easy to find at all. First, here is the forum thread that I'm talking about; http://social.technet.microsoft.com/Forums/en-US/winserverTS/thread/fe5b7fb6-bbda-42ac-87d2-a64f57f5d6a0 Here is the original article from Microsoft (even though it says Windows XP in the article, this applies to Windows 7 & Server 2008 R2 systems as wel

VMWare "Failed to lock the File" Error

Image
Recently I have created multiple virtual machines using VMWare Workstation 9. I wanted to prepare template VMs already installed, updated, patched and configured... Just ready to load and start my super clean VM lab. So after hours of work, all  my vms were ready with a nice Sysprep finish :) But when I started to use them, I realized that I could not open my vms... I was just copying the template VM folder that I created earlier into another folder and just renaming the folder for my personal use, but i never renamed the actual files of vms. I would go from my VMware Workstation and do "File", "Open" . Surprise! "Failed to lock the file. Cannot open the disk 'C:\path\vmfilename.vmdk' or one of the snapshot disks it depends on. Here is what I found. Actually, I think it will be even better if I just state the most important part of the VMWare knowledge base article # 1038189 regarding this problem. Here is the WHY? ; The error   Failed to loc