Configure Network Level Authentication for Remote Desktop Services Connections

Network Level Authentication is an authentication method that can be used to enhance RD Session Host server security by requiring that the user be authenticated to the RD Session Host server before a session is created.
Network Level Authentication completes user authentication before you establish a remote desktop connection and the logon screen appears. This is a more secure authentication method that can help protect the remote computer from malicious users and malicious software. The advantages of Network Level Authentication are:
 It requires fewer remote computer resources initially. The remote computer uses a limited number of resources before authenticating the user, rather than starting a full remote desktop connection as in previous versions.
 It can help provide better security by reducing the risk of denial-of-service attacks.
To use Network Level Authentication, you must meet the following requirements:
 The client computer must be using at least Remote Desktop Connection 6.0.
 The client computer must be using an operating system, such as Windows 7, Windows Vista, or Windows XP with Service Pack 3, that supports the Credential Security Support Provider (CredSSP) protocol.
 The RD Session Host server must be running Windows Server 2008 R2 or Windows Server 2008.
Use the following procedure to configure Network Level Authentication for a connection.

Configure Network Level Authentication for Remote Desktop Services Connections

Advertisements

How to Activate or Renew Symate License

After your Symantec  trial expired what need to be do.Below the document shows how will activate or renew license.

How to Activate Symate License

License Types and Policy

SEP EE Licensing guide

Datasheet

symantec-endpoint-protection

Ping request and response messages

Ping “Packet InterNet Groper” (operates by sending Internet Control

Message Protocol (ICMP) echo request packets) is a network

administration software utility used to test the reachability of a

host on an Internet Protocol (IP) network and to measure the round-

trip time for messages sent from the originating host to a destination

computer and back.

Destination host unreachable: The device you are trying to PING is

down or is not operating on the network. This could also mean you will

have to recheck the settings on your device to make sure the host is

correctly configured and also check that the routing is working

properly because a route to the destination system could not be found.

If you are trying to PING something outside of your local network,

check if gateway address is correct.

Bad IP address: An invalid IP address was entered on the command

prompt line. The IP address must be written in a dotted decimal

format, for example 127.0.0.1. Check that the IP address is correct.

Destination net unreachable: The targeted gateway to the IP

address written in the command prompt window could not be reached.

Check your computer gateway to be correct and routing table to the IP

address.

Destination specified is invalid: An invalid address has been

written in the command prompt window. Make sure the format of the

address is correct and then try again.

Request timed out: The ping command has timed out because there

was no reply from the targeted device. First check if your TCP/IP

stack is functioning correctly by pinging 127.0.0.1 . This doesn’t

mean that your network card is working properly. Now ping your default

gateway and make sure you have connectivity. Ping the next hop after

the gateway or a device before our faulty device, like a router

interface. If you have connectivity this could mean our faulty device,

the one we get replies with “request timed out” from has a problem or

may be down and not the network channel to the device. If you get

reply from another device on the way, but not from the host we are

troubleshooting, this could also mean there is no route back to your

device. Note: Destination Net Unreachable will show the IP address of

the router that tried to route a packet but couldn’t find a valid

route.

TTL expired during reassembly: The TTL value defines the number of

maximum hops a packet may live inside a network without reaching its

destination, before being discarded. It’s actually the number of

routers a packet may pass through network to destination, before being

dropped. This means the TTL value was too small and it failed to

reassembly either at the destination or on the local machine. Use -i

parameter for PING command to increase TTL value.

TTL expired in transit: The TTL value defines the number of

maximum hops a packet may live inside a network without reaching its

destination, before being discarded. It’s actually the number of

routers a packet may pass through network to destination, before being

dropped. This means the TTL value was too small to reach the target

and it failed on the way by being dropped. Use -i parameter for PING

command to increase TTL value.

Hardware error: Ping your loop-back address 127.0.0.1 to verify

that your TCP stack is working properly. If you can ping this, check

the cable. Else you will have to troubleshoot the TCP stack and

network interface card.

 No resources: Means exactly what it says but it targets RAM memory

most of times. Close some applications like the ones you don’t need

right now and try again. If this fails, reboot your computer. Will

work after.

Microsoft Robocopy

Robocopy, or “Robust File Copy is an advanced copy utility with has the feature to automatically resume file transfer on error or network disruption, or recover from terminated file copying . It also can preserve all of the file properties and information, including date and time stamps, security access control lists (ACLs) and more while replicating the file.

Robocopy came built-in in Windows operating system such as Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10 and Windows Server with command line interface only.

Syntax
robocopy <Source> <Destination> [<File>[ …]] [<Options>]

Robocopy GUI really simplify the process,having many options consolidated in a graphical interface lets you specify your source and target paths.

For example, this tool is multithreaded, allowing you to create a Robocopy script, execute it, and begin creating another one while your first script is still running. It also allows you to save your scripts (even if you don’t actually execute them) so that you can create a library of common scripts or share them with your colleagues. And most importantly, Robocopy GUI allows you to save your default settings so you don’t have to start from scratch every time.

Synatax and parameter
https://technet.microsoft.com/en-us/library/cc733145.aspx

Userguide

Microsoft Robocopy GUI Users Guide

robocopy

references
https://technet.microsoft.com/en-us/library/cc733145.aspx

Nearline Storage- An archiving service from Google Cloud

Nearline is like Amazon Glacier archiving and storage service.It is cheap,faster recovery and  on-demand I/O service with large amounts of data.

Google also launched Cloud Storage Transfer Service(earlier Online Cloud Import)offers 100 PB of free storage in Nearline for up to six months for customers

who switch from any other cloud provider or on-premises environments to Google Cloud Storage.

Both Nearline and Glacier charge same amount (penny/GB) for a month to store data, but recovery times in seconds compares hours in Glacier.

Read more about Nearline
https://cloud.google.com/storage/docs/nearline?hl=en
https://cloud.google.com/storage-nearline/

System Center 2012 – Data Protection Manager (DPM)

System Center 2012 – Data Protection Manager (DPM) is an enterprise backup system. Using DPM you can backup (copy) data from a source location to a target secondary location. If original data is unavailable because of planned or unexpected issues, you can restore data from the secondary location. Using DPM you can back up application data from Microsoft servers and workloads, and file data from servers and client computers. You can create full backups, incremental backups, differential backups, and bare-metal backups to completely restore a system.

•DPM deployment—DPM can be deployed as follows: For more information see System requirements for DPM(https://technet.microsoft.com/en-in/library/hh757829.aspx), Install DPM(https://technet.microsoft.com/en-in/library/hh758153.aspx), and Plan DPM server deployment(https://technet.microsoft.com/en-in/library/hh757988.aspx).

Physical standalone server—You can’t deploy physical DPM servers in a cluster, but you can manage multiple physical servers from a single console by installing Central Console(https://technet.microsoft.com/en-in/library/dn789204.aspx) on System Center Operations Manager.

Hyper-V virtual machine—You can run DPM as a virtual macine hosted on an on-premises Hyper-V host server. In this configuration you’ll need to make sure that DPM has access to all necessary resources and to the disks it needs for the storage pool. For details see Install DPM as a virtual machine on an on-premises Hyper-V server(https://technet.microsoft.com/en-in/library/dn440941.aspx).

Azure virtual machine—From DPM 2012 R2 Update 3 onwards you can run DPM as a virtual machine in Azure. Note that not all workloads can be backed up in this type of deployment.

•Data backup—Using DPM you can backup and recover data to and from Windows servers, Windows client computers, and Microsoft applications. For see the DPM protection support matrix(https://technet.microsoft.com/en-in/library/jj860400.aspx), and Plan for data backup and protection(https://technet.microsoft.com/en-in/library/hh758123.aspx).

•Data storage—You can backup data to a number of types of storage, including tape, disk, and the Azure cloud. For more information, see Plan DPM storage(https://technet.microsoft.com/en-in/library/hh757941.aspx).

•Data recovery—You can easily recover data from all backed up data sources from within the DPM console. For more information, see Plan for data recovery(https://technet.microsoft.com/en-in/library/hh757783.aspx).

https://technet.microsoft.com/en-in/library/hh758104.aspx
https://redmondmag.com/articles/2014/04/01/microsoft-dpm.aspx
http://www.tomsitpro.com/articles/microsoft-system-center-data-protection-backup-recovery,2-588.html
http://blogs.technet.com/b/dpm/
http://windowsitpro.com/data-protection-manager/retrospective-microsoft-vss-and-system-center-data-protection-manager

Reset TCP-IP with Netsh

If you cannot connect to the Internet, your Internet Protocol or TCP/IP may have been corrupted,You can try to reset TCP/IP . This article describes two ways to reset TCP/IP

For Windows 8 and Windows 8.1
1.On the Start screen, type CMD. In the search results, right-click Command Prompt, and then click Run as administrator.
2.At the command prompt, enter the following command, and then press Enter:

netsh int ip reset c:\resetlog.txt

Note If you don’t want to specify a directory path for the log file, run the following command instead:netsh int ip reset

3.Restart the computer.

For Windows 7 and Windows Vista
1.To open a command prompt, click Start and then type cmd in the Search programs and files box.
2.Under Programs, right-click the CMD.exe icon, and then click Run as administrator.
3.When the User Account Control box appears, click Yes.
4.At the command prompt, enter the following command, and then press Enter:netsh int ip reset c:\resetlog.txt
Note If you don’t want to specify a directory path for the log file, run the following command instead:netsh int ip reset resetlog.txt

5.Restart the computer.

For Windows XP
1.To open a command prompt, click Start, and then click Run. In the Open box, enter the following command, and then press ENTER:
cmd

2.At the command prompt, enter the following command, and then press Enter:netsh int ip reset c:\resetlog.txt
Note If you don’t want to specify a directory path for the log file, run the following command instead:

netsh int ip reset resetlog.txt

3.Restart the computer.

When you run the reset command, it overwrites the following registry keys, both of which are used by TCP/IP:

SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
SYSTEM\CurrentControlSet\Services\DHCP\Parameters

Why windows asking reboot often

why windows asking reboot often,Whether it’s for Windows updates or just when installing, uninstalling, or updating software.

“Error – Installation cannot proceed: Setup cannot continue because a pending restart is required.Restart the computer and then try running Setup again”

Because it can’t modify system files while they’re being used. Those files are locked, and can only be modified when they’re not being used.

So how we can update instead of rebooting.

from below registery ,remove contents of PendingFileRenameOperations.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager
\PendingFileRenameOperations

Windows Update keeps asking for a reboot to apply nonexistent modifications

https://social.technet.microsoft.com/Forums/en-US/46f25644-aa90-4c7a-a72d-531ad1b65835/windows-update-keeps-asking-for-a-reboot-to-apply-nonexistent-modifications

Refer
http://www.howtogeek.com/howto/31204/why-do-application-installs-make-you-reboot-and-close-other-apps/
http://answers.microsoft.com/en-us/office/forum/office_xp-outlook/error-installation-cannot-proceed-setup-cannot/217b743c-8a60-e011-8dfc-68b599b31bf5?auth=1

SMTP server installing and configuring on windows 2012 server

Many applications to send mails(send email through Office 365, there are some cases where the device or application can’t connect directly to Office 365).Here is a document how can setup SMTP on a windows 2012 servers.

smtp-2k12

Windows Authenticator(WinAuth)

WinAuth is a portable, open-source Authenticator for Windows that can

be used as a 2FA including Bitcoin / crypto-currency websites, any

service that requires the Google Authenticator, and games such as

World of Warcraft, Diablo III, Guild Wars 2, Rift, ArcheAge. WildStar,

Runescape and Steam.

YubiKey
WinAuth can use a YubiKey to encrypt its data, ensuring your

authenticators’ information cannot be read by anyone even when they

have physical access to your computer.

A YubiKey Standard or NEO 2.2.x or later is required.

HOTP / Counter-based Authenticator
A HOTP authenticator can be Adding a normal “Authenticator” and either

pasting in a counter-based KeyUri or choosing the counter option.

Code
CodeIssues
IssuesPull requests
Pull requestsPulse
PulseGraphs
GraphsHTTPS clone URL
Copy to clipboard Subversion checkout URL Copy to clipboard
You can clone with HTTPSor Subversion. Get help on which URL is right

for you.Clone in Desktop Download ZIP Authenticator for Battle.net /

Steam / Guild Wars 2 / Glyph / WildStar / Runescape / SWTOR / Bitcoin
https://winauth.com 367 commits 5 branches 55 releases 2

contributors C# 97.3% C 2.5% Other 0.2% C# C Other
Quickly jump between filesCompare, review, create a pull

requestBranch: master Switch branches/tags  Branches Tags 2.x MONO

master origin/master wiki Nothing to showWM6_0.5.1018 3.2.15

3.2.13 3.2.12 3.2.6 3.2.5 3.2.4 3.2.3 3.1.8 3.1.6 3.1.5

3.0.22.2 3.0.21 3.0.20 3.0.17 3.0.14 3.0.12 3.0.11 3.0.10

3.0.8 3.0.7 3.0.6 3.0.5 3.0.0 2.0.10 2.0.9 2.0.8 2.0.7 2.0.6

2.0.5 2.0.4 1.8.1323 1.7.1314 1.7.1311 1.5.1116 1.5.0 1.4.1170

1.4.1168 1.4.1166 1.4.1163 1.4.1161 1.4.1159 1.4.1156 1.3.1051

1.2.1045 1.2.1041 1.1.1035 1.0.1030 0.9.1025 0.8.1016 0.8.1010

0.7.107 0.5.103 0.4.1 0.4 Nothing to showwinauth /  You must be

signed in to make or propose changesFix #226: upgrade to .Net 4.5 and

force TLS

Copy SHA latest commit 618f11fbef
winauth authored Sep 23, 2015
Permalink  Failed to load latest commit information.
  Authenticator  Fix #226: upgrade to .Net 4.5 and force TLS  Sep 23,

2015
  Third Party  Fix #226: upgrade to .Net 4.5 and force TLS  Sep 23,

2015
  WinAuth.YubiKey  Clear password field.  Jul 1, 2015
  WinAuth  Fix #226: upgrade to .Net 4.5 and force TLS  Sep 23, 2015
  packages  Add Steam authenticator  May 28, 2015
  LICENSE  Initial upload of beta version.  Jul 27, 2010
  README.md  Add 3.2.16  Sep 17, 2015
  WinAuth.sln  Issue#201: don’t decode URI on TextChanged but on

button  Jun 18, 2015
  winauth3-preview.png  Update v3 preview  Jul 18, 2013

README.md
Windows Authenticator
WinAuth is a portable, open-source Authenticator for Windows that

provides a time-based RFC 6238 authenticator and common

implementations, such as the Google Authenticator. WinAuth can be used

with many Bitcoin trading websites as well as games, supporting

Battle.net (World of Warcraft, Hearthstone, Heroes of the Storm,

Diablo), Guild Wars 2, Glyph (Rift and ArcheAge), WildStar, RuneScape,

SWTOR and Steam.

———————————————————————-

———-

Download Latest Version
The latest stable version is WinAuth 3.1.8, and is available to

download from this source repository to compile yourself, or as a

pre-compiled binary from WinAuth downloads.

———————————————————————-

———-

WinAuth 3.2 (development)
The next version of WinAuth is in development. This release includes

both the new Steam Guard Mobile Authenticator, integration with

YubiKey to enhance your authenticator security and a HOTP

implementation.

Steam Guard
WinAuth can be registered as a new mobile device to create a Steam

authenticator and displays the appropriate 5 character codes.

Please read about the Steam Guard Mobile Authenticator for more

information.

YubiKey
Anyone with a YubiKey can now use it with WinAuth to further protect

their data. This will help ensure the authenticators’ secret keys

cannot be read by anyone even when they have physical access to your

computer.

A YubiKey Standard / NEO 2.2.x or later is required.

WinAuth 3.2.16 is available to download.

This is a pre-release version and should not be used with live

accounts. The configuration file updated by 3.2 is not backward

compatible with 3.1. Please make a backup of your current

authenticator data first, which is store in c:\Users<username>

\AppData\Roaming\WinAuth\winauth.xml.

WinAuth 3.1 (stable)
WinAuth provides an alternative solution to combine various two-factor

authenticator services in one convenient place.

Download Latest Version (WinAuth-3.1.8)

License
This program is free software: you can redistribute it and/or modify

it under the terms of the GNU General Public License as published by

the Free Software Foundation, either version 3 of the License, or (at

your option) any later version.

This program is distributed in the hope that it will be useful, but

WITHOUT ANY WARRANTY; without even the implied warranty of

MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU

General Public License for more details.

You should have received a copy of the GNU General Public License

along with this program. If not, see http://www.gnu.org/licenses/.

Features include:

•Support for time-based RFC 6238 authenticators, and common

implementations such as Google Authenticator.
•Supports Battle.net (World of Warcraft, Hearthstone, Heroes of the

Storm, Diablo III), GuildWars 2, Trion / Glyph (Rift, ArcheAge),

RuneScape, WildStar, SWTOR and Steam
•Supports many Bitcoin trading websites such as Bitstamp, BTC-e,

Coinbase, Cryptsy
•Displays multiple authenticators simultaneously
•Codes displayed and refreshed automatically or on demand
•Data is encrypted with your own personal password and can be locked

to Windows machine or account
•Additional password protection per authenticator
•Restore features for supported authenticators, e.g. Battle.net and

Rift
•Selection of standard or custom icons
•Hot-key binding with standard or custom actions, such as code

notification, keyboard input, and copy to clipboard
•Portable mode preventing changes to other files or registry settings
•Export in UriKeyFormat
•Importing authenticators in UriKeyFormat and from Authenticator Plus

for Android

Download software from
https://github.com/winauth/winauth

Step by step
https://www.maketecheasier.com/google-authenticator-windows/

%d bloggers like this: