Customized ESXi images by hardware vendors
When you install ESXi server on brand made servers (IBM, HP, DELL,…) you should use customized ESXi ISO images prepared by vendors:
I hope this will help someone.
When you install ESXi server on brand made servers (IBM, HP, DELL,…) you should use customized ESXi ISO images prepared by vendors:
I hope this will help someone.
One Exchange 2010 server didn’t mount databases after each reboot. When I looked to Event viewer I saw following events:
One of our customer has Exchange working Exchange 2010 environment. Customer wanted to create one exchange mailbox server in other physical location. Customer would use this new mailbox server to host only archive databases. So I have installed new mailbox server in separate physical location (in separate AD site), created couple databases and configured users to use this databases as archive.
Sometimes you need to have a overview what happened on OS couple days/weeks/monts ago. Before I knew there is some utility I would look into events and look for some problem ones.
Now I know there is a utility in Windows Vista and higher which is called Reliability Monitor which records all major changes/errors on OS. You can run it from Start Menu typying “Reliabi..” and you will find:
Today one of our customer called that he has all exchange 2003 databases down and he cannot mount them.
In eventlog I saw following error:
If you want to list all encrypted files by EFS you can use command:
cipher [PATH]
This command will list all files in PATH. Encrypted files will have “E” character in front of it:
This command is great to handle encrypted files. Look at cipher /? command output.
I found great utility builtin Windows Vista and higher. It’s called Problem Steps Recorder. It’s mentioned to use it by users to record their problems and then send recorded screens to Helpdesk/Administrator.
Sometimes you need to find out if your windows is activated and quickes way to do so is to run command:
slmgr /dli
This command can also do
For full help use slmgr /?.
Once upon the time I played with enterprise certification authority at one of our customers. I’ve created new certificate for certification authority. And then problem begun.
One my colleague wanted to make one of our customer’s environment very secure so he decided to install Enterprise Certification Authority environment with 4kB keys. He created one offline root CA with 4kB key (Windows 2003). This computer is offline all the time. Another CA is Issuing CA which key is signed by root CA. This issuing CA also had 4kB key (Windows 2008 R2). Certificates issued by issuing CA were from 2kB-16kB.
Problem raised when customer wanted to create certificate for Cisco devices to secure Wifi. To make those devices use and trust certificates from issuing CA customer needed to import Root and Issuing CA public certificates into those Cisco devices. And this was a problem. Those Cisco devices didn’t want to work with more than 2kB certificates.
Recent Comments