Monthly Archives: October 2014

CleanWipe tool from Symantec

CleanWipe tool is a final solution for the removal of the Symantec Endpoint Protection product.  To receive this tool you need to contact Symantec Support. Support Support
CleanWipe utility is also included in the release of 12.1 RU2 & now it works/performs much better.

Supported Operating Systems
Windows 2000 SP4+ (requires MS KB816542 included in Update Rollout 1 for SP4)
XP / Server 2003 / 2003R2
Vista / Server 2008
Windows 7 / Server 2008R2
Windows 8 / 2012 Server
Both 32 and 64bit versions, where applicable

Before you run Cleanwipe tool, you can download Symantec Diagnostic Support Tool to identify the problem.

It’s a Zip file with password protected. Need to extract Zip file prior to run Cleanwipe.exe

1. On the welcome screen, click Next.

2. Read the license agreement, check I accept the terms in the license agreement and then click Next.

3. Now, you can see the list of products from which you can choose the required one. This is a major change compared to the previous Cleanwipe version.

4. A reboot is mandatory to completely remove any of the above products. However, if you want to hold the reboot and do it manually at a later point of time, you can now uncheck Reboot Automatically.

This doesn’t require multiple reboots when compared to the previous versions of cleanwipe utility.

You need to contact support to get cleanwipe. Open a webcase here:
They will send you the credentials to log in and download.
you can call symantec support
How to create a new case in MySymantec
Phone numbers to contact Tech Support:-
Regional Support Telephone Numbers:
•    United States: 800-342-0652 (407-357-7600 from outside the United States)
•    Australia: 1300 365510 (+61 2 8220 7111 from outside Australia)
•    United Kingdom: +44 (0) 870 606 6000


Microsoft retire its Windows Live Messenger service

A recent wide spred report that Windows Live Messenger (nearly 0.1 Billion users)would be closed on october 31, 2014 , forcing all users to switch to using Skype (Windows Live Messenger will be replaced everywhere else by Skype, which Microsoft acquired in October 2011)to continue on their instant messaging.
MSN once attracted over 20 million users in China. The number has dropped sharply due to the rapid development of mobile communication technology and challenges from domestic rivals such as QQ, WeChat and Sina Weibo. The Windows 8 system, another service provided by Microsoft, is also struggling in the Chinese market.

Little history

MSN (originally The Microsoft Network; stylized as msn) is a collection of Internet websites and services provided by Microsoft for online service and Internet service provider on August 24, 1995, to coincide with the release of the Windows 95 operating system.
MSN launched an instant messaging service in 1999 to compete with AOL Instant Messenger, which was originally known as ‘MSN Messenger Service’ and was later shortened to simply ‘MSN Messenger’. The underlying technology later became known as ‘.NET Messenger Service’ and then simply ‘Messenger’, while Windows Live Messenger was the name of the main program used to access the service beginning in 2006. Regardless, the term ‘MSN’ had come to be synonymous with the service in Internet slang. Microsoft phased out Messenger and integrated it into Skype in 2013. Microsoft started to phase out MSN Messenger (also known as Windows Live Messenger) globally in April 2013 and it will be completely shut down on October 31, 2014.


What is Drain in Loadbalancer

A feature in Load balancer called server draining enables you to take a server offline without any loss of service to users. When a server is drained it stops taking new connections and calls. These new connections and calls are routed through other servers in the pool. A server being drained allows its sessions on existing connections to continue until they naturally end. When all existing sessions have ended, the server is ready to be taken offline.
Most external load-balancing devices do not have this concept of a drain time; they simply persist the existing connections on a server and redirect new connections to other servers

Load balancer node conditions
ENABLED Node is permitted to accept new connections.
DISABLED Node is not permitted to accept any new connections regardless of session persistence configuration. Existing connections are forcibly terminated.
DRAINING Node is allowed to service existing established connections and connections that are being directed to it as a result of the session persistence configuration.

AWS ELB how to configure
F5 how to

Openstack Cloud Tools

Few Openstack cloud tools are below
Company: Apache(
Product: Hadoop
Category: Cloud framework

Company: Cloudability(
Product: Cloudability
Category: Cloud Cost Analytics

Company: Cloudyn(
Product: S3 Life-Cycle Tracker, EC2 Reservation Detector, RDS Reservation Detector
Category: Cloud Optimization

Company: Dell Boomi(
Product: AtomSphere
Category: Cloud Integration

Company: Enstratius(
Product: Enstratius
Category: Cloud infrastructure management

Company: Informatica(
Product: Informatica Cloud Spring 2013
Category: Cloud data integration

Company: MuleSoft(
Product: CloudHub
Category: Cloud integration service

Company: Opscode(
Product: Chef
Category: Cloud Configuration Management

Company: Puppet Labs(
Product: Puppet
Category: Cloud Configuration Management

Company: RightScale(
Product: RightScale Cloud Management
Category: Cloud Management

Company: ServiceMesh(
Product: Agility Platform
Category: Enterprise cloud management

Category:orchestration tool

Category:provisioning tool

Category:Deploy, monitor and manage tool

Category:application as a service

Company: Zenoss(
Category:Monitoring tool

Openssl cert generation

Generate a Private Key
This key is a 1024 bit RSA key which is encrypted using Triple-DES and stored in a PEM format so that it is readable as ASCII text.

openssl genrsa -des3 -out server.key 1024

Generate a CSR (Certificate Signing Request)
These are the X.509 attributes of the certificate.

openssl req -new -key server.key -out server.csr

Remove Passphrase from Key
One unfortunate side-effect of the pass-phrased private key is that Apache will ask for the pass-phrase each time the web server is started.

cp server.key
openssl rsa -in -out server.key

Generating a Self-Signed Certificate
To generate a temporary certificate which is good for 365 days

openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt

Installing the Private Key and Certificate
cp server.crt /usr/local/apache/conf/ssl.crt
cp server.key /usr/local/apache/conf/ssl.key

If using certificates in Apache then

Configuring SSL Enabled Virtual Hosts

SSLEngine on
SSLCertificateFile /usr/local/apache/conf/ssl.crt/server.crt
SSLCertificateKeyFile /usr/local/apache/conf/ssl.key/server.key
SetEnvIf User-Agent “.*MSIE.*” nokeepalive ssl-unclean-shutdown
CustomLog logs/ssl_request_log \
“%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \”%r\” %b”

Restart Apache and Test

/etc/init.d/httpd stop
/etc/init.d/httpd stop

Diagnosing SystemPerformance

Here is the document how to run performance monitor on windows2k8

windows performance issues viewing by report

Windows Performance Monitor

Windows Performance Monitor to examine how programs you run affect your computer’s performance, both in real time and by collecting log data for later analysis.

Windows Performance Monitor uses performance counters, event trace data, and configuration information, which can be combined into Data Collector Sets.

Performance counters are measurements of system state or activity. They can be included in the operating system or can be part of individual applications. Windows Performance Monitor requests the current value of performance counters at specified time intervals.

Event trace data is collected from trace providers, which are components of the operating system or of individual applications that report actions or events. Output from multiple trace providers can be combined into a trace session .

Configuration information is collected from key values in the Windows registry. Windows Performance Monitor can record the value of a registry key at a specified time or interval as part of a log file.

To view a Data Collector Set report

In Windows Performance Monitor, expand Reports and click User Defined or System .

In the navigation pane, expand the Data Collector Set that you want to view as a report.

Click the report that you want to view from the list of available reports. The report will open in the console pane.

Additional considerations

• To open Windows Performance Monitor, click Start , click in the Start Search box, type perfmon , and then press ENTER.

• Another way to view the most recent report for a Data Collector Set is to expand Data Collector Sets , expand User Defined or System , click the name of the Data Collector Set in the navigation pane, and click the View Latest Report icon in the toolbar.

• You can also create a new report for a data collector set by typing perfmon /report “Data_Collector_Set_name” at a command prompt. Typing perfmon /report without any other parameters will generate the System Diagnostics report.

• If a Data Collector Set has not run, no reports will be available for it.

• If a Data Collector Set is currently running, the console pane will display information about how long it is configured to run.

• After data collection has stopped, there will be a delay while the report is generated. During this time, the console pane will display a working icon.

• Larger log files result in longer report generation times. If you review your logs frequently to see recent data, we recommend that you use limits to automatically segment your logs. You can use the relog command to segment long log files or combine multiple short log files.

• For more information about the relog command, type relog /? at a command prompt.

W2k8 2008 features to diagnosing performance-related issues on a system by report

Windows Server 2008 features to diagnosing performance-related issues on a system viewing by report.

To generate a System Diagnostics Report, run the perfmon /report command from the Run line or from a command prompt.  Generating a System Diagnostics Report requires privilege elevation, so you will need to consent to the elevation prompt or provide credentials depending on how UAC is configured on your systems

features include:
•Data collector sets — Data collector sets are used to create a reusable monitoring object for different scenarios, such as creating baselines.
•Wizards and templates for creating logs — The performance logs and alerts features have been rolled into the Performance and Reliability Monitor. Microsoft has also added a set of wizards that help you add counters to log files and give you the ability to set the start, stop and duration of those counters.
•Resource View — In earlier versions of Windows, if you wanted to take a real-time view of your customers’ CPU, disk, network and memory usage, you had to use Task Manager — and the data was only available for a limited time. The Performance and Reliability Monitor has the Resource View screen for viewing those functions, and it also has the ability to drill down and see which processes are using which resources.
•Reliability Monitor — The Reliability Monitor collects data about your system and calculates what Microsoft calls a System Stability Index. The System Stability Index report shows any issues that have made the system less reliable over a period of time. The report also contains steps you can take to help troubleshoot the root cause of the issue.
•Unified property configuration — The interface for creating a monitoring action is the same whether you create a log activity or a data collector set. The ability to create and manage objects from a single location significantly reduces the time it takes to set up the monitoring that your customers require.
•Diagnostic reports — With the Performance and Reliability Monitor, there are a number of out-of-the-box reports that you can view to help analyze and troubleshoot your customers’ systems.

How to create/view System Diagnostic Reports from Reliability and Performance Monitor utility:

Just run the perfmon /report command

TermDD error or rdpx.224 error

The RDP protocol component X.224 detected an error in the protocol stream and has disconnected the client

If the issue persists, you could disable the TCP Offload. To do this,

a.       Run the following commands on both the client and the server to disable NIC offloading.

netsh int tcp set global chimney=disabled

netsh int tcp set global rss=disabled

b.      Modify the following registry key to disable netDMA on the client and the server.


Note: If this registry entry does not exist, right-click Parameters, point to New, click DWORD Value, type EnableTCPA, and then press ENTER.
Value: 0

Symantec Endpoint Protection Manager Version Up gradation

How to upgrade Symantec Endpoint Protection Manager Version from one to another described below.

Symantec Endpoint Protection Manager Version Up gradation

%d bloggers like this: