Tags

Howto (51) Free Software (35) Powershell (33) Windows Server (23) AD (16) Hyper-V (16) Exchange (13) Office (13) Group Policy (10) Windows Server 2012 (9) Scripts (7) Symantec BE (5) Windows 8 (5) Cisco (4) TMG (4) Terminal Server (4) Cluster (3) HP (3) RDS (3) UAG (3) Citrix (2) DC (2) DNS (2) IE10 (2) OpenID (2) PKI (2) SCVMM (2) Windows Live (2) iLO (2) Backup (1) DPM (1) Fileserver (1) IE (1) SQL; DPM (1) Security (1) Sharepoint (1) Switch (1) VMWare (1) Veeam (1)

vrijdag 28 december 2012

Extra opties die je verkrijgt bij het afnemen van een iLO advanced licentie

De extra opties die je krijgt als je een Advanced licentie afneemt:
  • Console Record and Replay
  • Virtual Media
  • Virtual Folders
  • Power usage reporting
  • Dynamic Power Capping
  • POST and failure sequence replay
  • Directory Services Authentication

HTTP sniffer

HttpWatch is an integrated HTTP sniffer for IE and Firefox that provides new insights into how your website loads and performs.
 
HttpWatch integrates with Internet Explorer and Firefox browsers to show you exactly what HTTP traffic is triggered when you access a web page. If you access a site that uses secure HTTPS connections, HttpWatch automatically displays the decrypted form of the network traffic.
 
Conventional network monitoring tools just display low level data captured from the network. In contrast, HttpWatch has been optimized for displaying HTTP traffic and allows you to quickly see the values of headers, cookies, query strings and more ...
 
HttpWatch also supports non-interactive examination of HTTP data. When log files are saved, a complete record of the HTTP traffic is saved in a compact file. You can even examine log files that your customers and suppliers have recorded using the free Basic Edition.
 
 

Microsoft IPD

Planning the next generation of technical infrastructure for corporations can be a complex and daunting task. If done well, the Information Technology (IT) group’s capabilities will be well aligned with the business and will become a strategic asset for the company. If done poorly, IT can be a barrier to the agility of the organization. 
The success of any infrastructure is measured in how well the decisions made regarding the infrastructure match the objectives of the business. Although there are often hundreds or even thousands of pages of product documentation available, historically it has been very difficult to find guidance on how to appropriately plan the core infrastructure for an organization.
The Infrastructure Planning and Design (IPD) series provides concise architectural planning guidance for Microsoft® infrastructure technologies. It also provides a means to validate design decisions with the business to ensure that the solution meets the requirements of both business and infrastructure stakeholders.
 
 

dinsdag 25 december 2012

Aanpassen van de Citrix Netscaler inlog pagina

Netscaler Paden:
 
Wijzigingen kun je direct doorvoeren door bestanden in onderstaande map aan te passen:
 
\netscaler\ns_gui\vpn\
 
Bestanden die interessant zijn:
 
Nsshare.js        : Javascript voor voornamelijk tekstuele aanpassingen
Caxtonstyle.css   : Stylesheet om de opmaak aan te passen
 
Wijzigingen persistent houden door aangepaste bestanden tevens te plaatsen in de map:
 
\var\customizations\
 
En in onderstaand de te kopieeren paden / bestanden te plaatsen:
(opdrachten in bestand worden tijdens het opstarten van de Netscaler uitgevoerd)
 
\flash\nsconfig\rc.netscaler
 
Huidig content van rc.netscaler:
 
cp /var/customizations/login.js.mod /netscaler/ns_gui/vpn/login.js
cp /var/customizations/nsshare.js.mod /netscaler/ns_gui/vpn/nsshare.js
cp /var/customizations/en.xml.mod /netscaler/ns_gui/vpn/resources/en.xml
cp /var/customizations/images/* /netscaler/ns_gui/vpn/images/
cp /var/customizations/images/ctxHeader01.gif /netscaler/ns_gui/vpn/images/
 
 De  Citrix Client die via ClientDetection wordt geinstalleerd kun je bijwerken door een nieuwere versie te plaatsen in de map:
 
\var\wi\tomcat\webapps\Citrix\XenApp\Clients

maandag 24 december 2012

IMG to ISO

Just rename the IMG extension to ISO. That should do the trick.

dinsdag 11 december 2012

OUs are now protected from accidental deletion

BPA van AD gaf aan:
 
 
 
Om een overzicht te krijgen van de OUs die niet Protected zijn voor Accidental Deletion, voer je onderstaand commando uit:
 
PS C:\> Get-ADOrganizationalUnit -SearchBase "DC=domein,dc=local" -Filter * -Properties * | where {$_.ProtectedFromAccidentalDeletion -eq $False} | ft CanonicalName,ProtectedFromAccidentalDeletion –auto
 
 
Ipv de output naar een tabel te pipe, kun je de output ook naar een commando pipe die de ProtectedFromAccidentalDeletion attribute op True zet:
 
 
PS C:\> Get-ADOrganizationalUnit -SearchBase "DC=domein,dc=local" -Filter * -Properties * | where {$_.ProtectedFromAccidentalDeletion -eq $False} | Set-ADOrganizationalUnit -ProtectedFromAccidentalDeletion $True
 
 
 

Export AD enabled users to csv with batch file

I use a batch file to import the Active Directory module and execute a powershell script:
 
REM BEGIN BATCH FILE >>>
@echo off
c:
cd\
cd temp
echo Creating an export of enabled AD users who have an EmployeeID to a UTF8 encoded CSV file
C:\WINDOWS\system32\windowspowershell\v1.0\powershell.exe -Command Import-Module ActiveDirectory;"c:\temp\exportadusers.ps1"
echo done
exit
REM END BATCH FILE <<<
 
Thanks to get-date you can create a different export file everytime the script is executed.
Since AD responses are in UTF-8 character encoding for LDAP it is the best encoding you can use when exporting.
Default export is ASCII. When exporting in ASCII certain characters like ë will return as a question mark “?”
 
# BEGIN POWERSHELL SCRIPT >>>
$a = get-date -Format "yyyyMMddHHmm"
Get-ADUser -filter * -Properties * -SearchBase "OU=Sales,DC=domain,DC=Local" | where {$_.EmployeeID -ne $null -and $_.Enabled -ne $false} | Select-Object EmployeeID,UserPrincipalName,DisplayName,mail | sort EmployeeID | Export-Csv c:\temp\exportADusers$a.csv -encoding "utf8"
# END POWERSHELL SCRIPT <<<
 
 
 

Event ID 4105 TerminalServices-Licensing

Het logboek stond redelijk vol met warning meldingen  (Event ID 4105)
 
 
Het probleem zat in:
 
If the user accounts existed before the domain was upgraded to Windows Server 2003, the Terminal Server License Servers group might be missing in the discretionary access control list (DACL) of the user objects in Active Directory directory service. Or, the group is in the DACL, but the group does not have permissions to update the Terminal Services Licensing information for the user account.
 
Oplossing was om de rechten goed te zetten dmv dsacls:
 
 
De rechten kun je ook Op een bepaalde OU kun je delegation of control uitvoeren om het probleem op te lossen:
 
 
 
 
 
Resultaat is in beide gevallen hetzelfde:
 
 
 
Zie ook:
 
 
 
 

TMG2010 unable to edit Domain Controllers Computer set

 
 
 
 
 
 
 
 
 
 
 

DFRS Pre-staging Qouta bepalen

DFRS Pre-staging Qouta bepalen:
 
Om deze te bepalen moet je het totaal weten van de 32 grootste bestanden in te stagen map.
Dit kun je door onderstaande twee regels in powershell uit te voeren:
 
$big32 = Get-ChildItem c:\temp -recurse | Sort-Object length -descending | select-object -first 32 | measure-object -property length –sum
$big32.sum /1gb

Groep wijzigen van groupscope (type)

Een overzicht krijgen van alle groepen die beginnen met admin_ en van type Universal zijn:
 
Get-ADGroup -Server dc01 -Filter 'Name -like "admin_*"' -Properties * | where {$_.Groupscope -like "Universal"} | ft name,groupscope –auto
 
Deze groepen wijzigen naar Domain Local:
 
Get-ADGroup -Server dc01 -Filter 'Name -like "admin_*"' -Properties * | where {$_.Groupscope -like "Universal"} | Set-ADGroup -GroupScope DomainLocal