Category Archives: Windows

Windows based articles and tools

Terminal connections increase without license

Usually RDP allowed only 2 connections (console and another).For more connections required license.
Below is using some registry tweeks to overcome this Limit.

Terminal connections increase without license


NLB-Network Load Balancer

A feature in Microsoft Windows Server 2008, 2008 R2, 2012 and 2012 R2 operating systems to balancing the load using the TCP/IP networking protocol, route traffic to different hosts based on settings and distribution algorithm.
Network Load Balancing can also ensure network traffic is re-routed to remaining hosts if one or more hosts within the cluster fail unexpectedly. A Network Load Balancing cluster can scale up to 32 servers.


Offline method for Java installing

1. Go to the Manual download page
2. Click on Windows Offline.

3. The File Download dialog box appears prompting you to run or save the download file

4.Click the Install  button to accept the license terms and to continue with the installation.

How to configure cluster quorum using as a share Windows 2008-12

Here is a document described,how to configure a cluster which quorum from a file share from a third server.

Windows 2008-12 cluster quorum using as file share

How to increase Terminal connections

Below the document show how to allow more connections using some registry tweaks

Terminal connections increase


Overview of TS Licensing

Configuring License Settings on a Terminal Server


How to reset RDC client license on Windows 7?

How to reset the 90 temporary license with Terminal Server/Win2k

How to Reset a 120-Day Terminal Server Timeout

Reset Terminal license on Windows 2008, 2008 R2 and 2012

Microsoft Baseline Security Analyzer (MBSA)

Microsoft Baseline Security Analyzer (MBSA) is a software tool released by Microsoft to determine security state by assessing missing security updates and less-secure security settings within Microsoft Windows, Windows components such as Internet Explorer, IIS web server, and products Microsoft SQL Server, and Microsoft Office macro settings. Security updates are determined by the current version of MBSA using the Windows Update Agent present on Windows computers since Windows 2000 Service Pack 3.


Configure Network Level Authentication for Remote Desktop Services Connections

Network Level Authentication is an authentication method that can be used to enhance RD Session Host server security by requiring that the user be authenticated to the RD Session Host server before a session is created.
Network Level Authentication completes user authentication before you establish a remote desktop connection and the logon screen appears. This is a more secure authentication method that can help protect the remote computer from malicious users and malicious software. The advantages of Network Level Authentication are:
 It requires fewer remote computer resources initially. The remote computer uses a limited number of resources before authenticating the user, rather than starting a full remote desktop connection as in previous versions.
 It can help provide better security by reducing the risk of denial-of-service attacks.
To use Network Level Authentication, you must meet the following requirements:
 The client computer must be using at least Remote Desktop Connection 6.0.
 The client computer must be using an operating system, such as Windows 7, Windows Vista, or Windows XP with Service Pack 3, that supports the Credential Security Support Provider (CredSSP) protocol.
 The RD Session Host server must be running Windows Server 2008 R2 or Windows Server 2008.
Use the following procedure to configure Network Level Authentication for a connection.

Configure Network Level Authentication for Remote Desktop Services Connections

Microsoft Robocopy

Robocopy, or “Robust File Copy is an advanced copy utility with has the feature to automatically resume file transfer on error or network disruption, or recover from terminated file copying . It also can preserve all of the file properties and information, including date and time stamps, security access control lists (ACLs) and more while replicating the file.

Robocopy came built-in in Windows operating system such as Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10 and Windows Server with command line interface only.

robocopy <Source> <Destination> [<File>[ …]] [<Options>]

Robocopy GUI really simplify the process,having many options consolidated in a graphical interface lets you specify your source and target paths.

For example, this tool is multithreaded, allowing you to create a Robocopy script, execute it, and begin creating another one while your first script is still running. It also allows you to save your scripts (even if you don’t actually execute them) so that you can create a library of common scripts or share them with your colleagues. And most importantly, Robocopy GUI allows you to save your default settings so you don’t have to start from scratch every time.

Synatax and parameter


Microsoft Robocopy GUI Users Guide



System Center 2012 – Data Protection Manager (DPM)

System Center 2012 – Data Protection Manager (DPM) is an enterprise backup system. Using DPM you can backup (copy) data from a source location to a target secondary location. If original data is unavailable because of planned or unexpected issues, you can restore data from the secondary location. Using DPM you can back up application data from Microsoft servers and workloads, and file data from servers and client computers. You can create full backups, incremental backups, differential backups, and bare-metal backups to completely restore a system.

•DPM deployment—DPM can be deployed as follows: For more information see System requirements for DPM(, Install DPM(, and Plan DPM server deployment(

Physical standalone server—You can’t deploy physical DPM servers in a cluster, but you can manage multiple physical servers from a single console by installing Central Console( on System Center Operations Manager.

Hyper-V virtual machine—You can run DPM as a virtual macine hosted on an on-premises Hyper-V host server. In this configuration you’ll need to make sure that DPM has access to all necessary resources and to the disks it needs for the storage pool. For details see Install DPM as a virtual machine on an on-premises Hyper-V server(

Azure virtual machine—From DPM 2012 R2 Update 3 onwards you can run DPM as a virtual machine in Azure. Note that not all workloads can be backed up in this type of deployment.

•Data backup—Using DPM you can backup and recover data to and from Windows servers, Windows client computers, and Microsoft applications. For see the DPM protection support matrix(, and Plan for data backup and protection(

•Data storage—You can backup data to a number of types of storage, including tape, disk, and the Azure cloud. For more information, see Plan DPM storage(

•Data recovery—You can easily recover data from all backed up data sources from within the DPM console. For more information, see Plan for data recovery(,2-588.html

Reset TCP-IP with Netsh

If you cannot connect to the Internet, your Internet Protocol or TCP/IP may have been corrupted,You can try to reset TCP/IP . This article describes two ways to reset TCP/IP

For Windows 8 and Windows 8.1
1.On the Start screen, type CMD. In the search results, right-click Command Prompt, and then click Run as administrator.
2.At the command prompt, enter the following command, and then press Enter:

netsh int ip reset c:\resetlog.txt

Note If you don’t want to specify a directory path for the log file, run the following command instead:netsh int ip reset

3.Restart the computer.

For Windows 7 and Windows Vista
1.To open a command prompt, click Start and then type cmd in the Search programs and files box.
2.Under Programs, right-click the CMD.exe icon, and then click Run as administrator.
3.When the User Account Control box appears, click Yes.
4.At the command prompt, enter the following command, and then press Enter:netsh int ip reset c:\resetlog.txt
Note If you don’t want to specify a directory path for the log file, run the following command instead:netsh int ip reset resetlog.txt

5.Restart the computer.

For Windows XP
1.To open a command prompt, click Start, and then click Run. In the Open box, enter the following command, and then press ENTER:

2.At the command prompt, enter the following command, and then press Enter:netsh int ip reset c:\resetlog.txt
Note If you don’t want to specify a directory path for the log file, run the following command instead:

netsh int ip reset resetlog.txt

3.Restart the computer.

When you run the reset command, it overwrites the following registry keys, both of which are used by TCP/IP:


%d bloggers like this: