Category Archives: Windows
Windows based articles and tools
1. Go to the Manual download page
2. Click on Windows Offline.
4.Click the Install button to accept the license terms and to continue with the installation.
Here is a document described,how to configure a cluster which quorum from a file share from a third server.
Below the document show how to allow more connections using some registry tweaks
Overview of TS Licensing
Configuring License Settings on a Terminal Server
UNLIMITED TERMINAL SERVICES CONNECTIONS IN WINDOWS TERMINAL SERVICES 2000 AND 2003
How to reset RDC client license on Windows 7?
How to reset the 90 temporary license with Terminal Server/Win2k
How to Reset a 120-Day Terminal Server Timeout
Reset Terminal license on Windows 2008, 2008 R2 and 2012
Microsoft Baseline Security Analyzer (MBSA) is a software tool released by Microsoft to determine security state by assessing missing security updates and less-secure security settings within Microsoft Windows, Windows components such as Internet Explorer, IIS web server, and products Microsoft SQL Server, and Microsoft Office macro settings. Security updates are determined by the current version of MBSA using the Windows Update Agent present on Windows computers since Windows 2000 Service Pack 3.
Network Level Authentication is an authentication method that can be used to enhance RD Session Host server security by requiring that the user be authenticated to the RD Session Host server before a session is created.
Network Level Authentication completes user authentication before you establish a remote desktop connection and the logon screen appears. This is a more secure authentication method that can help protect the remote computer from malicious users and malicious software. The advantages of Network Level Authentication are:
It requires fewer remote computer resources initially. The remote computer uses a limited number of resources before authenticating the user, rather than starting a full remote desktop connection as in previous versions.
It can help provide better security by reducing the risk of denial-of-service attacks.
To use Network Level Authentication, you must meet the following requirements:
The client computer must be using at least Remote Desktop Connection 6.0.
The client computer must be using an operating system, such as Windows 7, Windows Vista, or Windows XP with Service Pack 3, that supports the Credential Security Support Provider (CredSSP) protocol.
The RD Session Host server must be running Windows Server 2008 R2 or Windows Server 2008.
Use the following procedure to configure Network Level Authentication for a connection.
Robocopy, or “Robust File Copy is an advanced copy utility with has the feature to automatically resume file transfer on error or network disruption, or recover from terminated file copying . It also can preserve all of the file properties and information, including date and time stamps, security access control lists (ACLs) and more while replicating the file.
Robocopy came built-in in Windows operating system such as Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10 and Windows Server with command line interface only.
robocopy <Source> <Destination> [<File>[ …]] [<Options>]
Robocopy GUI really simplify the process,having many options consolidated in a graphical interface lets you specify your source and target paths.
For example, this tool is multithreaded, allowing you to create a Robocopy script, execute it, and begin creating another one while your first script is still running. It also allows you to save your scripts (even if you don’t actually execute them) so that you can create a library of common scripts or share them with your colleagues. And most importantly, Robocopy GUI allows you to save your default settings so you don’t have to start from scratch every time.
Synatax and parameter
System Center 2012 – Data Protection Manager (DPM) is an enterprise backup system. Using DPM you can backup (copy) data from a source location to a target secondary location. If original data is unavailable because of planned or unexpected issues, you can restore data from the secondary location. Using DPM you can back up application data from Microsoft servers and workloads, and file data from servers and client computers. You can create full backups, incremental backups, differential backups, and bare-metal backups to completely restore a system.
•DPM deployment—DPM can be deployed as follows: For more information see System requirements for DPM(https://technet.microsoft.com/en-in/library/hh757829.aspx), Install DPM(https://technet.microsoft.com/en-in/library/hh758153.aspx), and Plan DPM server deployment(https://technet.microsoft.com/en-in/library/hh757988.aspx).
Physical standalone server—You can’t deploy physical DPM servers in a cluster, but you can manage multiple physical servers from a single console by installing Central Console(https://technet.microsoft.com/en-in/library/dn789204.aspx) on System Center Operations Manager.
Hyper-V virtual machine—You can run DPM as a virtual macine hosted on an on-premises Hyper-V host server. In this configuration you’ll need to make sure that DPM has access to all necessary resources and to the disks it needs for the storage pool. For details see Install DPM as a virtual machine on an on-premises Hyper-V server(https://technet.microsoft.com/en-in/library/dn440941.aspx).
Azure virtual machine—From DPM 2012 R2 Update 3 onwards you can run DPM as a virtual machine in Azure. Note that not all workloads can be backed up in this type of deployment.
•Data backup—Using DPM you can backup and recover data to and from Windows servers, Windows client computers, and Microsoft applications. For see the DPM protection support matrix(https://technet.microsoft.com/en-in/library/jj860400.aspx), and Plan for data backup and protection(https://technet.microsoft.com/en-in/library/hh758123.aspx).
•Data storage—You can backup data to a number of types of storage, including tape, disk, and the Azure cloud. For more information, see Plan DPM storage(https://technet.microsoft.com/en-in/library/hh757941.aspx).
•Data recovery—You can easily recover data from all backed up data sources from within the DPM console. For more information, see Plan for data recovery(https://technet.microsoft.com/en-in/library/hh757783.aspx).
If you cannot connect to the Internet, your Internet Protocol or TCP/IP may have been corrupted,You can try to reset TCP/IP . This article describes two ways to reset TCP/IP
For Windows 8 and Windows 8.1
1.On the Start screen, type CMD. In the search results, right-click Command Prompt, and then click Run as administrator.
2.At the command prompt, enter the following command, and then press Enter:
netsh int ip reset c:\resetlog.txt
Note If you don’t want to specify a directory path for the log file, run the following command instead:netsh int ip reset
3.Restart the computer.
For Windows 7 and Windows Vista
1.To open a command prompt, click Start and then type cmd in the Search programs and files box.
2.Under Programs, right-click the CMD.exe icon, and then click Run as administrator.
3.When the User Account Control box appears, click Yes.
4.At the command prompt, enter the following command, and then press Enter:netsh int ip reset c:\resetlog.txt
Note If you don’t want to specify a directory path for the log file, run the following command instead:netsh int ip reset resetlog.txt
5.Restart the computer.
For Windows XP
1.To open a command prompt, click Start, and then click Run. In the Open box, enter the following command, and then press ENTER:
2.At the command prompt, enter the following command, and then press Enter:netsh int ip reset c:\resetlog.txt
Note If you don’t want to specify a directory path for the log file, run the following command instead:
netsh int ip reset resetlog.txt
3.Restart the computer.
When you run the reset command, it overwrites the following registry keys, both of which are used by TCP/IP:
why windows asking reboot often,Whether it’s for Windows updates or just when installing, uninstalling, or updating software.
“Error – Installation cannot proceed: Setup cannot continue because a pending restart is required.Restart the computer and then try running Setup again”
Because it can’t modify system files while they’re being used. Those files are locked, and can only be modified when they’re not being used.
So how we can update instead of rebooting.
from below registery ,remove contents of PendingFileRenameOperations.
Windows Update keeps asking for a reboot to apply nonexistent modifications
Many applications to send mails(send email through Office 365, there are some cases where the device or application can’t connect directly to Office 365).Here is a document how can setup SMTP on a windows 2012 servers.