Wednesday, April 30, 2008

PostPath

Mucking about with this and have errors, for giggle have installed gnome and X server to see if that makes it easier for me. Uses CentOS
 
Note : need to start server this way:
 
/etc/init.d/xfs start
startx
 
 

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Tuesday, April 29, 2008

Getting a VM workstation guest OS machine to start at boot

Add an entry to the VMX file as a registry key

HLM\Software\Microsoft\Windows\Current Version\Run

Use a string value like

Name "MYMACHINE"
Value "c:\myvirtual machines\mymachine.vmx"

Tip on getting VM Workstation machines to start to Host boot

If you want to auto start a guest image, perform the following steps…

1) VMware Guest Machine > Settings > Options > Power
Check the box, “Power on after opening this virtual machine”

2)Right-click on the Guest .VMX file and make sure VMware Workstation is the default application associated with .VMX file type.

3) Add the .VMX file (as a shortcut) to the Windows Start-up Program group. (If you have VMware WS set to run the guest image “headless”, you can set the Short-cut in Start up to Run: Minimized)


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Sunday, April 27, 2008

Howto: enable remote desktop on a windows xp machine - remotely

Howto: enable remote desktop on a windows xp machine - remotely

I’ve been configuring my LAN for spiceworks this afternoon. The Windows XP firewall is enabled on most of our PCs, and I didn’t want to visit each station to configure it to allow spiceworks to inventory the machine. I’m also not big into group policy here at the office (what the saying about the cobbler’s son’s shoes?) so I didn’t want to make the setting change that way.

My first idea was to use remote desktop to access the computers from my machine. That worked fine, since I have local administrator access on each machine… but I’d have to interrupt each user’s work, log them off, make my firewall adjustments, then tell them it’s okay to log on now… assuming that I could even get into their machines remotely.

I needed a solution for users with remote desktop disabled. If your remote user has administrator access to their machine, have them click on Start - Run and type:

netsh firewall set service remoteadmin enable

netsh firewall set service remotedesktop enable

[note: remoteadmin = remote administration, while remotedesktop = remote assistance and remote desktop]

You can also enable remote desktop over the network via regedit if you have administrator rights to the remote machine:

  1. Run Regedit
  2. Select File –> Connect Network registry
  3. Enter the name of the remote computer and select Check Name
  4. At the bottom of the registry tree you will see 2 Hives appear Hkey_Local_Machine and
    Hkey_Users (under the remote computer’s name)
  5. Goto hklm\system\currentcontrolset\control\terminal server\FdenyTSConnections=1
  6. Change the FdenyTSConnections to 0
  7. Attempt to Re-Login

This worked okay, but I like to implement the most elegant solution possible.

So I fired up the command line on my local machine, and used psexec to configure the firewall service on the remote machine via netsh. The users never even knew I was working on their computer, which is fine by me.

To enable remote access to a machine via the command line, type:

psexec \\remotecomputername netsh firewall set service remoteadmin enable

psexec \\remotecomputername netsh firewall set service remotedesktop enable

If you aren’t familiar with the PStools suite of utilities, and you like administration from the command line, you need to check out the Sysinternals web site. Too bad they were acquired by Microsoft in 2006.


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Howto: Enable Remote Desktop on a Windows 2008 Server Core System

 

Howto: Enable Remote Desktop on a Windows 2008 Server Core System

Windows 2008 Server Core uses the SCregEdit.wsf script found in C:\Windows\System32 to configure Terminal Services (TS) behavior. TS is the method of remote controlling your Server Core system through Remote Desktop (RDP).

To view the current Terminal Server settings for Vista/Windows 2008 clients, at the server command prompt type:

c:\windows\system32\scregedit.wsf /AR /v

The following values correspond to the response generated by the scregedit.wsf script.

1 = Terminal Services Disabled (remote access disabled)

0 = Terminal Services Enabled (remote access enabled)

To enable Terminal Services access from Vista/Windows 2008, at the server command prompt type:

c:\windows\system32\scregedit.wsf /AR 0

To disable Terminal Services access from Vista/Windows 2008, at the server command prompt type:

c:\windows\system32\scregedit.wsf /AR 1

Note:

The /AR setting applies to Windows Vista/2008 machines. If you want to allow Terminal Services connections to the Windows 2008 server from Windows XP machines, you have to use the /CS switch.

To view the current Terminal Server settings for Windows XP clients, at the server command prompt type:

c:\windows\system32\scregedit.wsf /AR /v

To enable Terminal Services access from Windows XP, at the server command prompt type:

c:\windows\system32\scregedit.wsf /CS 0

To disable Terminal Services access from Windows XP, at the server command prompt type:

c:\windows\system32\scregedit.wsf /CS 1

You could also edit the registry directly to enable Terminal Services using the same registry entry I wrote about when describing how to enable remote access for Windows XP machines remotely.

Finally you will need to create a hole in your server’s Windows Firewall for inbound RDP traffic on port 3389. KB 947709 details how to use the netsh advfirewall firewall command to configure the firewall in several different ways. I suggest running the following at the server command prompt:

netsh advfirewall firewall set rule group=”remote desktop” new enable=yes


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Server 2008 and Network discovery

I'm having a lot of issues with the new improved Network Discovery feature in 2K8
 
In particular, my 2008 VMHost OS cannot see or be seen by the guests on it and cannot be seen by other machines in the domain.
 
I am going to try forcing network discovery on through a GPO and see how we go:
 
 
 
This could be a VMware issue, a server 2008 issue or a combination of both

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

How to force Kerberos to use TCP instead of UDP in Windows Server 2003, in Windows XP, and in Windows 2000

SUMMARY

The Windows Kerberos authentication package is the default authentication package in Microsoft Windows Server 2003, in Microsoft Windows XP, and in Microsoft Windows 2000. It coexists with the NTLM challenge/response protocol and is used in instances where both a client and a server can negotiate Kerberos. Request for Comments (RFC) 1510 states that the client should send a User Datagram Protocol (UDP) datagram to port 88 at the IP address of the Key Distribution Center (KDC) when a client contacts the KDC. The KDC should respond with a reply datagram to the sending port at the sender's IP address. The RFC also states that UDP must be the first protocol that is tried.

A limitation on the UDP packet size may cause the following error message at domain logon:
Event Log Error 5719
Source NETLOGON

No Windows NT or Windows 2000 Domain Controller is available for domain Domain. The following error occurred:

There are currently no logon servers available to service the logon request.
Additionally, the Netdiag tool may display the following error messages:
Error message 1
DC list test . . . . . . . . . . . : Failed [WARNING] Cannot call DsBind to COMPUTERNAMEDC.domain.com (159.140.176.32). [ERROR_DOMAIN_CONTROLLER_NOT_FOUND]
Error message 2
Kerberos test. . . . . . . . . . . : Failed [FATAL] Kerberos does not have a ticket for MEMBERSERVER$.]
The Windows XP event logs which are symptoms of this issue are SPNegotiate 40960 and Kerberos 10.

MORE INFORMATION

Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
322756 (http://support.microsoft.com/kb/322756/) How to back up and restore the registry in Windows


Important If you use UDP for Kerberos, your client computer may stop responding (hang) when you receive the following message:
Loading your personal settings.
By default, the maximum size of datagram packets for which Windows Server 2003 uses UDP is 1,465 bytes. For Windows XP and for Windows 2000, this maximum is 2,000 bytes. Transmission Control Protocol (TCP) is used for any datagrampacket that is larger than this maximum. The maximum size of datagram packets for which UDP is used can be changed by modifying a registry key and value.

By default, Kerberos uses connectionless UDP datagram packets. Depending on a variety of factors including security identifier (SID) history and group membership, some accounts will have larger Kerberos authentication packet sizes. Depending on the virtual private network (VPN) hardware configuration, these larger packets have to be fragmented when going through a VPN. The problem is caused by fragmentation of these large UDP Kerberos packets. Because UDP is a connectionless protocol, fragmented UDP packets will be dropped if they arrive at the destination out of order.

If you change MaxPacketSize to a value of 1, you force the client to use TCP to send Kerberos traffic through the VPN tunnel. Because TCP is connection oriented, it is a more reliable means of transport across the VPN tunnel. Even if the packets are dropped, the server will re-request the missing data packet.


You can change MaxPacketSize to 1 to force the clients to use Kerberos traffic over TCP. To do this, follow these steps:
1. Start Registry Editor.
2. Locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\ Kerberos\Parameters
Note If the Parameters key does not exist, create it now.
3. On the Edit menu, point to New, and then click DWORD Value.
4. Type MaxPacketSize, and then press ENTER.
5. Double-click MaxPacketSize, type 1 in the Value data box, click to select the Decimal option, and then click OK.
6. Quit Registry Editor.
7. Restart your computer.
The following template is an administrative template that can be imported into Group Policy to let the MaxPacketSize value be set for all enterprise computers that are running Windows Server 2003, Windows XP, or Windows 2000. To view the MaxPacketSize settings in Group Policy Object Editor, click Show Policies Only on the View menu so that Show Policies Only is not selected. This template modifies registry keys outside the Policies section. By default, Group Policy Object Editor does not display these registry settings.
CLASS MACHINE   CATEGORY !!KRB_PARAMS   KEYNAME "SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters"   POLICY !!SET_MAXPACKETSIZE EXPLAIN !!MAXPACKETSIZE_HELP PART !!MAXPACKETSIZE NUMERIC REQUIRED VALUENAME "MaxPacketSize" MIN 1 MAX 2000 DEFAULT 2000 END PART   PART !!MAXPACKETSIZE_TIP TEXT END PART END POLICY   POLICY !!LOGLEVEL EXPLAIN !!LOGLEVEL_HELP VALUENAME "LogLevel" END POLICY END CATEGORY   [strings] KRB_PARAMS="Kerberos Parameters" SET_MAXPACKETSIZE="Set MaxPacketSize" MAXPACKETSIZE_HELP="The Windows 2000 Kerberos Authentication package is  the default in Windows 2000. It coexists with challenge/response (NTLM)  and is used in instances in which both a client and server can negotiate  Kerberos. Request for Comments (RFC) 1510 states that when a client  contacts the Key Distribution Center (KDC), it should send a User  Datagram Protocol (UDP) datagram to port 88 at the KDC's IP address.  The KDC should  respond with a reply datagram to the sending port at the sender's IP  address.\n\nWindows 2000, by default, uses UDP when the data can be fit in  packets under 2,000 bytes. Any data above this value uses TCP to carry the packets. The value of 2,000 bytes is configurable via  this policy." MAXPACKETSIZE="Bytes: " MAXPACKETSIZE_TIP="Range is from 1 to 2000. Use 1 to force Kerberos to  use TCP."  LOGLEVEL="Kerberos Event Logging" LOGLEVEL_HELP="Windows 2000 offers the capability of tracing detailed  Kerberos events through the event log mechanism. You can use this  information when you troubleshoot Kerberos.  All Kerberos errors are logged to the System log." 

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Forum post concerning Outlook, VPN, ADSL and MTU etc

 
Looks like there maybe some handy tips here on getting outlook to work without switching to RPC over HTTP(S)

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Exchange store forwarding by rule

To enable forwarding by rule:

  1. Log on to the server running exchange server.
  2. Run "Exchange System Manager".
  3. Expand "Global Settings".
  4. Click on "Internet Message Formats" to highlight it.
  5. In the right hand window pane, double click on "Default" to open its properties.
  6. On the "Advanced" tab, check "Allow automatic forward".
  7. Click [OK] to save.

 

 


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Some collected articles on monitoring server performance - original sources lost

To make sure that you have enough memory for IIS, you should monitor the following counters:
  • File Cache Hits
  • File Cache Hits %
  • File Cache Misses
  • File Cache Flushes

By monitoring the successful and failed hits, you can determine whether IIS has to rely on paging as opposed to going to cache. Keep in mind that the IIS file cache can use up to 4 GB of RAM for caching


Monitoring and Tuning Your Server


Next Topic

Suggestions for Optimizing Memory Usage

Servers running IIS 5.0, like other high-performance file servers, benefit from ample physical memory. Generally, the more memory you add, the more the servers use and the better they perform. IIS 5.0 requires a minimum of 64 MB of memory; at least 128 MB is recommended. If you are running memory-intensive applications, your server could require a much larger amount of memory to run optimally (for example, most of the servers that service the microsoft.com Web site have at least 512 MB of memory).

Adding RAM to your system is not the only option, however. Here are a few suggestions for optimizing memory performance without adding memory:

Improve Data Organization Keep related Web files on the same logical partitions of a disk. Keeping files together improves the performance of the File System Cache. Also, defragment your disks. Even well-organized files take more time to retrieve if they are fragmented.

Try Disk Mirroring or Striping The optimum configuration is to have enough physical memory to hold all static Web pages. However, if pages must be retrieved from disk, use mirroring or striping to make reading from disk sets faster. In some cases, a caching disk controller may help.

Replace or Convert CGI Applications CGI applications use much more processor time and memory space than equivalent ASP or ISAPI applications. For more information about ASP, ISAPI, and CGI applications, see Web Applications .

Enlarge Paging Files Add paging files and increase the size of the ones you have. The Windows 2000 operating system creates one paging file on the system disk, but you can also create a new paging file on each logical partition of each disk.

Retime the IIS Object Cache Consider lengthening the period that an unused object can remain in the cache (use the ObjectCacheTTL setting in the registry, as mentioned earlier in this section, to accomplish this).

Change the Balance of the File System Cache to the IIS 5.0 Working Set By default, servers running the Windows 2000 operating system are configured to give preference to the File System Cache over the working sets of processes when allocating memory space. Although IIS 5.0based servers benefit from a large File System Cache, the setting Maximize Throughput for File Sharing often causes the IIS 5.0 pageable code to be written to disk, which results in lengthy processing delays. To avoid these processing delays, set Server properties to the Maximize data throughput for network applications option.

To change Server properties

1.

On the desktop, open My Computer and select Network and Dial-up Connections .

2.

Right-click Local Area Connection and open its property sheet.

3.

Select File and Printer Sharingfor Microsoft Networks and select Properties .

4.

On the Server Optimization property sheet, select Maximize data throughput for network applications .

Limit Connections If your server doesnt have enough memory, limiting the number of connections on the server might help alleviate the shortage because some physical memory (about 10 KB per connection) is consumed by the data structures the system uses to keep track of connections.

To control the number of current connections

1.

In the IIS snap-in, right-click a site, then choose Properties and select the Web Site tab.

2.

Select the Limited To check box in the Connections panel. Type into the field the maximum number of connections you want to allow.

Eliminate Unnecessary Features You can also disable the performance boost for applications in the foreground. In addition, at times when you are not actively checking performance, you can disable performance-related logging in order to squeeze a bit more performance from your server.

Using PerfMon to Monitor the File System Cache

There are several counters in the Memory and Cache performance objects that you can use to monitor the size and effectiveness of the File System Cache. Table 5.3 lists these counters.

Table 5.3 Counters for Monitoring the File System Cache

Counter

Indicates

Memory\ Cache bytes

The size of the cache, in bytes. This counter displays the last observed value; it is not an average.

Memory\ Cache faults/sec

How often data sought in the File System Cache is not found there. The count includes faults for data found elsewhere in memory, as well as faults that require disk operations to retrieve the requested data.
This counter displays the number of faults, regardless of the number of pages retrieved in response to the fault.

Cache\ Copy Reads/sec

The frequency of reads from pages of the File System Cache that involve a memory copy of the data from the cache to the applications buffer. This is a method used by the LAN Redirector, the LAN Server (for small items), and the disk file systems.

Cache\ Fast Reads/sec

The frequency of reads from the File System Cache that bypass the installed file system and retrieve the data directly from the cache. Normally, file I/O requests invoke the appropriate file system to retrieve data from a file. However, this path permits direct retrieval of data from the cache without file system involvement, if the data is in the cache. Even if the data is not in the cache, one invocation of the file system is avoided.

Cache\ MDL Reads/sec

How often the system attempts to read large blocks of data from the cache.
Memory Descriptor List (MDL) Reads are read operations in which the system uses a list of the physical address of each page to help it find the page.
MDL Reads are often used to retrieve cached Web pages and FTP files.

Cache\ Pin Reads/sec

How often the system attempts to read recently accessed blocks of data from the cache. This counter is more accurate for ASP content than the MDL Reads/sec counter is.
Pin counters display reads of cache data that is held because it has just been read or written. They reflect cache data that is used repeatedly.

Cache\ MDL Read Hits %

How often attempts to find large sections of data in the cache are successful.
You can use the Cache\ MDL Read Hits % counter to calculate the percentage of MDL misses. Misses are likely to result in disk I/O.

Cache\ Pin Read Hits %

How often attempts to find recently accessed sections of data in the cache are successful. This counter is more accurate for ASP content than the MDL Read Hits % counter is.
You can use the Cache\ Pin Read Hits % counter to calculate the percentage of misses. Misses are likely to result in disk I/O. Pin counters display reads of cache data that is held because it has just been read or written. They reflect cache data that is used repeatedly.

Cache\ Data Maps/sec

How often pages are mapped into the cache from elsewhere in physical memory or from disk.
To measure the percentage of data maps from elsewhere in physical memory, use Cache\ Data Map Hits %. 100 minus the value of Cache\ Data Map Hits % is the percentage of data maps retrieved from disk.

Cache\ Read Aheads/sec

A measure of sequential reading from the cache. When the system detects sequential reading, it anticipates future reads and reads larger blocks of data. The read ahead counters are a useful measure of how effectively an application uses the cache.

Memory\ Page Faults/sec

Hard and soft faults in the working set of the process. This counter displays the number of faults, without regard for the number of pages retrieved in response to the fault.

Memory\ Page Reads/sec

Table 5.1 Counters for Monitoring the IIS 5.0 Working Set

Counter

Indicates

Computername\ Memory\ Available Bytes

The amount of physical memory remaining and available for use, in bytes. This counter displays the amount of memory not currently used by the system or by running processes. It displays the last observed value, not an average.
The operating system attempts to prevent this value from falling below 4 MB. It often trims the working sets of processes to maintain the 4 MB minimum available memory.

Computername\ Process\ Working Set: Inetinfo

Size of the working set of the process, in bytes. This counter displays the last observed value, not an average over time.

Computername\ Process\ Page Faults/sec: Inetinfo

Hard and soft faults in the working set of the process.

Computername\ Memory\ Page Faults/sec

Hard and soft faults for all working sets running on the system.

Computername\ Memory\ Page Reads/sec

Hard page faults. This counter displays the number of times the disk is read to satisfy page faults. It displays the number of read operations, regardless of the number of pages read in each operation.
A sustained rate of 5 reads/sec or more can indicate a memory shortage.

Computername\ Memory\ Pages Input/sec

One measure of the cost of page faults. This counter displays the number of pages read to satisfy page faults. One page is faulted at a time, but the system can read multiple pages ahead to prevent further hard faults.

Hard faults in the working sets of processes and in the File System Cache.

Table 5.2 Counters for Monitoring the IIS Object Cache

Counter

Indicates

Internet Information Services Global\ Cache Hits
Internet Information Services Global\ Cache Misses
Internet Information Services Global\ Cache Hits %

A measure of the efficiency of the IIS Object Cache. These counters demonstrate how often data sought in the IIS Object Cache is found.
Internet Information Services Global\ Cache Misses indicates how often the system must search elsewhere in memory or on disk to satisfy a request.
The first two of these counters (Cache Hits and Cache Misses) display totals since the service was started. Internet Information Services Global\ Cache Hits % displays an instantaneous value, not an average over time.

Internet Information Services Global\ Cache Flushes

How many times an object was deleted from the IIS Object Cache, either because it timed out, or because the object changed.

Internet Information Services Global\ Objects
Internet Information Services Global\ Directory Listings

The total number of objects currently stored in the IIS Object Cache.
Directory Listings is a subset of the Objects counter.
At any given time, the difference between the total number of objects and the number of Directory Listings is equal to the number of other objects stored in the cache. The Directory Listings counter is most important to servers running the FTP service.


Using PerfMon to Monitor Processor Activity

To monitor your servers processors, use PerfMon to log data from the counters listed in Table 5.4:

Table 5.4 Counters for Processor Activity Monitoring

Counter

Indicates

System\ Processor Queue Length

Threads waiting for processor time. If this value exceeds 2 for a sustained period of time, the processor may be bottlenecked.

Processor\ % Processor Time (Total instance)

The sum of processor use on each processor.

Processor\ % Processor Time

Processor use on each processor (#0, #1, and so on). In a multiprocessor server, this counter reveals unequal distribution of processor load.

Processor\ % Privileged Time

Proportion of the processors time spent in privileged mode. In the Windows 2000 operating system, only privileged mode code has direct access to hardware and to all memory in the system. The Windows 2000 Executive runs in privileged mode. Application threads can be switched to privileged mode to run operating system services.

Processor\ % User Time

Proportion of the processors time spent in user mode. User mode is the processor mode in which applications like IIS 5.0 services run.

Process\ % Processor Time

The processor use attributable to each processor, either for a particular process or for the total for all processes. (These are shown in the list of instances.)

1.1 Server

CPU:

Processor\% Processor Time\_Total - just a handy idea of how 'loaded' the server is at any given time.

Processor\% Processor Time\_Instance - just a handy idea of how 'loaded' any particular CPU is at any given time.

System\Processor Queue Length - number of threads queued and waiting for time on the CPU. The number of non-running ready threads in the processor queue. There is a single queue for processor time even on computers with multiple processors. If a computer has multiple processors, you need to divide this value by the number of processors servicing the workload. A sustained processor queue of less than 10 threads per processor is normally acceptable, depending on workload. Divide this by the number of CPUs in the system. If the answer is less than 10, the system is most likely running well.

Processor(_Total)\Interrupts/sec
An indirect indicator of the activity of hardware devices that generate interrupts, such as the system clock, the mouse, disk drivers, data communication lines, network interface cards, and other peripheral devices.

Memory:

Process (All processes)\Working Set
the set of recently touched memory pages for all processes. If free memory in the computer is above a threshold, pages are left in the Working Set of a process even if they are not in use. When free memory falls below a threshold, pages are trimmed from Working Sets. If they are needed they will then be soft-faulted back into the Working Set before leaving main memory.
(more)

Memory\Pages/sec
the rate at which pages are read from or written to disk to resolve hard page faults. This is a primary indicator of the kinds of faults that cause system-wide delays. It includes pages retrieved to satisfy faults in the file system cache.

Memory\ Page Reads /sec – The rate of page faults, although it cannot be used in isolation, is should be less than 20% of the I/O throughput capacity.

Process\Working Set\_Total (or per specific process) - this basically shows how much memory is in the working set, or currently allocated RAM.

Memory\Available MBytes - amount of free RAM available to be used by new processes.

Memory\Pages Input/Sec - The best indicator of whether you are memory-bound, this counter shows the rate at which pages are read from disk to resolve hard page faults. In other words, the number of times the system was forced to retrieve something from disk that should have been in RAM. Occasional spikes are fine, but this should generally flat line at zero.

Memory\%Committed Bytes in Use – Sum of main memory and paging file size and reflects what % of that total is in use.

Disk:

Available Disk Space - Self explanatory

PhysicalDisk\% Disk Time
the percentage of elapsed time that the selected disk drive was busy servicing read or writes requests.

PhysicalDisk\Bytes/sec\_Total (or per process) - shows the number of bytes per second being written to or read from the disk.

PhysicalDisk\Current Disk Queue Length\driveletter - this is probably the single most valuable counter to watch. It shows how many read or write requests are waiting to execute to the disk. For single disks, it should idle at 2-3 or lower, with occasional spikes being okay. For RAID arrays, divide by the number of active spindles in the array; again try for 2-3 or lower. Because a shortage of RAM will tend to beat on the disk, look closely at the Memory\Pages Input/Sec counter if disk queue lengths are high.

\%Idle Time

Shows the percentage of elapsed time during the sample interval that the selected disk drive was idle

The recommended counter for measuring disk utilisation

\ Avg. Disk Queue Length

Shows the average number of both read and write requests that were queued for the selected disk during the sample interval

As a guide, a disk bottleneck may be identified when the average disk queue length is consistently greater than 2 * number physical disks and %Idle Time is consistently less than 20%

\ Avg. Disk sec/Transfer

Average response time across the disk subsystem in seconds

Includes all subsystem layers, e.g. device driver layer, I/O bus and I/O channel

Includes queuing time at these layers

Does not pinpoint where delays are occurring

\% Free Space

Shows the percentage of the total usable space on the selected disk that is free

As a guide for NTFS volumes, usable capacity is exhausted when this counter reaches 15%

\ Free Megabytes

Shows the unallocated space, in megabytes, on the disk

Should be employed with the previous counter in order to assess disk space capacity

Network

Network Interface\Bytes Total/Sec\nic name - Measures the number of bytes sent or received.

Network Interface\Output Queue Length\nic name – is the number of packets in queue waiting to be sent. If there is a sustained average of more than two packets in queue, you should be looking to resolve a network bottleneck.

Network Interface\Packets Received Errors\nic name - packet errors that kept the TCP/IP stack from delivering packets to higher layers. This value should stay low.

1.2 Network SNMP counters

Packet drop rates

Router CPU – CPU utilisation on router

Router memory – CPU memory utilisation

Latency – Measure of time taken for traffic to be sent and return from a given point. High latency may indicate congestion.

Errors- Measure of data packets dropped by network may indicate malfunctioning equipment.

Link Up/Link Down – Change in port status

Up time – Router availability

% availability – Availability over time

How to Install Windows 2008 Core on VMware Server (2007).pdf

http://musumeci.blogspot.com/2007/07/vmware-how-to-install-microsoft-windows.html

Script for adding shares from one machine to another machine (rather than just overwriting existing ones!)

@ECHO OFF
:: Check Windows version -- Windows 2000 or later
IF NOT "%OS%"=="Windows_NT" GOTO Syntax
VER | FIND.EXE "Windows NT" >NUL
IF NOT ERRORLEVEL 1 GOTO Syntax
 
:: Check command line arguments -- none required
IF NOT "%~1"=="" GOTO Syntax
 
:: Save a list of ALL shares found on the source server
NET.EXE SHARE > "%~dp0%ComputerName%_originalshares.txt" 2>&1
 
:: List only the shares that should be recreated on the target server
:: Note: Remove the FINDSTR filters for VPHOME and VPLOGON
::       if Norton AntiVirus is not installed on the servers
NET.EXE SHARE | FIND.EXE /I /V " Spooled " | FINDSTR.EXE /I /V /R /B /C:"PRINT\$" | FINDSTR.EXE /I /V /R /B /C:"IPC\$" | FINDSTR.EXE /I /V /R /B /C:"ADMIN\$" | FINDSTR.EXE /I /V /R /B /C:"[A-Z]\$" | FINDSTR.EXE /I /V /R /B /C:"VPHOME" | FINDSTR.EXE /I /V /R /B /C:"VPLOGON" > "%~dp0%ComputerName%_netshares.txt"
 
:: Add a prompt for confirmation to the automatically generated batch files
>  "%~dp0%ComputerName%_recreate_shares.bat" ECHO @ECHO OFF
>> "%~dp0%ComputerName%_recreate_shares.bat" ECHO CLS
>> "%~dp0%ComputerName%_recreate_shares.bat" ECHO ECHO.
>> "%~dp0%ComputerName%_recreate_shares.bat" ECHO ECHO You are about to recreate %ComputerName%'s shares.
>> "%~dp0%ComputerName%_recreate_shares.bat" ECHO IF /I NOT "%%ComputerName%%"=="%ComputerName%" ECHO This server is NOT the one that generated this batch file.
>> "%~dp0%ComputerName%_recreate_shares.bat" ECHO PAUSE
>> "%~dp0%ComputerName%_recreate_shares.bat" ECHO VER ^| FIND.EXE "Windows 2000" ^>NUL
>> "%~dp0%ComputerName%_recreate_shares.bat" ECHO IF ERRORLEVEL 1 (SET Grant=/GRANT:Everyone,FULL) ELSE (SET Grant=)
>> "%~dp0%ComputerName%_recreate_shares.bat" ECHO ECHO ON
 
>  "%~dp0%ComputerName%_delete_shares.bat" ECHO @ECHO OFF
>> "%~dp0%ComputerName%_delete_shares.bat" ECHO CLS
>> "%~dp0%ComputerName%_delete_shares.bat" ECHO ECHO.
>> "%~dp0%ComputerName%_delete_shares.bat" ECHO ECHO You are about to delete all shares migrated from %ComputerName%.
>> "%~dp0%ComputerName%_delete_shares.bat" ECHO IF /I NOT "%%ComputerName%%"=="%ComputerName%" ECHO This server is NOT the one that generated this batch file.
>> "%~dp0%ComputerName%_delete_shares.bat" ECHO PAUSE
>> "%~dp0%ComputerName%_delete_shares.bat" ECHO ECHO ON
 
:: Read the list of shares to be migrated and generate the required batch files
FOR /F "skip=4 tokens=1" %%A IN ('TYPE "%~dp0%ComputerName%_netshares.txt" 2^>NUL ^| FINDSTR.EXE /R /B /I /V /C:"The command completed successfully\." ^| FINDSTR.EXE /R /B /V /C:" " ^| SORT') DO CALL :ReadShare %%A
 
:: Done
TITLE Ready
GOTO:EOF
 

:ReadShare
:: Display progress.
TITLE %~1
:: Retrieve the path associated with the share name and add the share to both batch files
FOR /F "tokens=1*" %%a IN ('NET.EXE SHARE %1 2^>NUL ^| FINDSTR.EXE /R /B /I /C:"Path"') DO (
 >> "%~dp0%ComputerName%_recreate_shares.bat" ECHO NET.EXE SHARE %1="%%~b" %%Grant%%
 >> "%~dp0%ComputerName%_delete_shares.bat"   ECHO VER ^| NET.EXE SHARE %1 /DELETE
)
GOTO:EOF
 

:Syntax
ECHO.
ECHO ShareMig.bat,  Version 1.00 for Windows 2000 / Windows Server 2003
ECHO Prepare a migration of all shares from the current server to a new one.
ECHO.
ECHO Usage:  SHAREMIG.BAT
ECHO.
ECHO When run on a server, this batch file will generate 4 files:
ECHO.
ECHO   %%COMPUTERNAME%%_ORIGINALSHARES.TXT         text file listing ALL shares;
ECHO   %%COMPUTERNAME%%_NETSHARES.TXT              list of shares to be migrated;
ECHO   %%COMPUTERNAME%%_RECREATE_SHARES.BAT        use this batch file to recreate
ECHO                                             the shares on the new server;
ECHO   %%COMPUTERNAME%%_DELETE_SHARES.BAT          undo and test batch file to delete
ECHO                                             the migrated shares again;
ECHO.
ECHO where %%COMPUTERNAME%% is the name of the server this batch file was executed on.
ECHO Usually %%COMPUTERNAME%%_RECREATE_SHARES.BAT is the only file you'll need on the
ECHO new server; %%COMPUTERNAME%%_DELETE_SHARES.BAT is for testing purposes only.
ECHO If all else fails, use the generated text files as a reference for manual
ECHO (re)creation of the shares.
ECHO.
ECHO Written by Rob van der Woude
ECHO http://www.robvanderwoude.com
 
 

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Getting the most out of virtual PCs

 
 

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

vmware silent install - could be good for core installs

 
 

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Virtualise / virtualize SBS

 
 

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Good blog on ShadowProtect and SBS

http://blog.mpecsinc.ca/search/label/ShadowProtect

VSS hotfixes for SBS and 2003

 
 

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

POP3 connector for exchange 2007

 
 

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Possible Useful exchange tip

Out Of Office Suppression

Those of you who subscribe to mailing lists will no doubt have periodically received a bunch of Out Of Office replies from fellow subscribers when you have posted to the mailing list.

Previously, the best way to handle this has been to subscribe both your normal mailbox address and a public folder to the mailing list. The idea is that you subscribe your normal mailbox address with the 'NOMAIL' option that many lists provide. The mailing list posts are delivered into your public folder, but replies are sent from your mailbox address. The 'NOMAIL' option set on your normal mailbox address prevents the mailing list messages from being delivered to your mailbox. Therefore, no Out Of Office responses are sent back to other list members when set on your normal mailbox.

In Exchange 2003, it is now possible to modify the Out Of Office behaviour to help in these situations. A new registry key exists that prevents the sending of Out Of Office responses unless the recipient is explicitly listed in either the TO: or CC: fields of the message. Since mailing list posts aren't addressed explicitly to list members, the suppression of Out Of Office responses to mailing list members is achieved.

To enable this feature, add the DWORD parameter SuppressOOFsToDistributionLists with a value of 1 into the following registry location:

HKLM\System\CurrentControlSet\Services\MSExchangeIS\ParametersSystem

This key should help some mailing list members from upsetting others!


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

FYI a handy list: What exclusions should I use for Antivirus software with SBS 2003?

 
Note: This is missing SQL exclusions.
 
 
Title:
What exclusions should I use for Antivirus software with SBS 2003?
FAQ Answer:
This question is asked regardless of the AV software that you use.  Below I've compiled the standard exclusions that you should use for SBS 2003.  These are the ones that we use on our clients.
 
Server Folder Exclusions
The exclusions listed here should be applied to your SBS server, and where applicable to other servers that host similar applications in your domain.
 
 
Exchange related Exclusions
First up you need to be aware, that the default installation of CSM for SMB v3.0 will exclude the Exchange database folders from file level scanning.  Therefore I am NOT recommending including these in your exclusions.  However there are some other Exchange related exclusions that you need to add to ensure that things operation smoothly.
 
Listed below are the items and their default locations - your installation may be different.
 
Exchange Server Database = C:\Program Files\Exchsrvr\Mdbdata  (see note above)
Exchange MTA files = C:\Program Files\Exchsrvr\Mtadata  
Exchange Message tracking log files = C:\Program Files\Exchsrvr\server_name.log  
Exchange SMTP Mailroot = C:\Program Files\Exchsrvr\Mailroot  
Exchange working files = C:\Program Files\Exchsrvr\Mdbdata  
Site Replication Service (not normally used in SBS but should be excluded anyway) = C:\Program Files\Exchsrvr\srsdata  
C:\Program Files\Exchsrvr\Conndata  
 
IIS related Exclusions
IIS System Files = C:\WINDOWS\system32\inetsrv
IIS Compression Folder = C:\WINDOWS\IIS Temporary Compressed Files
 
Domain Controller related exclusions
Active Directory database files = C:\WINDOWS\NTDS
SYSVOL C:\WINDOWS\SYSVOL
NTFRS Database Files = C:\WINDOWS\ntfrs
 
Windows SharePoint Services
Temporary SharePoint space = C:\windows\temp\Frontpagetempdir
 
Additional Exclusions
Removable Storage Database (used by SBS Backup) = C:\Windows\System32\ntmsdata
SBS POP3 connector Failed Mail = C:\Program Files\Microsoft Windows Small Business Server\Networking\POP3\Failed Mail
SBS POP3 connector Incoming Mail = C:\Program Files\Microsoft Windows Small Business Server\Networking\POP3\Incoming Mail
Windows Update Store = C:\WINDOWS\SoftwareDistribution\DataStore
DHCP Database Store = C:\WINDOWS\system32\dhcp
WINS Database Store = C:\WINDOWS\system32\wins
 
 
Desktop Folder Exclusions
These folders need to be excluded in the desktops and notebooks clients.
 
Windows Update Store = C:\WINDOWS\SoftwareDistribution\DataStore
 

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Using Vista with 2K3 but it runs like a dog accessing the server?

A Windows Server 2003-based computer responds slowly to RDP connections or to SMB connections that are made from a Windows Vista-based computer
 
 
 

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Tool for helping remote users....

.... Could be handy for some situations.
 
 

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Send SMS messages through an attached GSM phone from Outlook

 
Could be useful for monitoring etc.

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Some good SBS/Windows 2003/Shadow Protect tips here

 
 

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Important WSUS related Update with Vista SP1 looming

You cannot distribute or install a software package in Windows Server 2003 if the software package contains a very large signed file

 
 
 
 

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Gary's BES (Blackberry Enterprise Server) install guide for SBS 2003 or Domain Controller (to be tested!)

 
1. Ensure port 3101 TCP is open on the firewall (Outbound ONLY).

2. Create a new user called BESadmin and ensure you create a mailbox. Ensure this user is ONLY a member of "Domain users"

3. Make BESadmin a local Administrator of the server. This is done in AD via the "Built-in" Administrators group

4. Go to Admin Tools on open "Domain Controller Security Policy" and expand the "Local Policies" and "User Right Assignment". You need to add BESadmin to "Log on Locally" and "log on as Service".

5. Open Exchange System Manager and right mouse click on "DOMIANNAME (Exchange)" and select Delegate Control. Follow the steps and add BESadmin as an Exchange View Only Administrator.

6. In Exchange manager expand the servers folder and right mouse click on your server and select properties. On the properties windows select BESadmin and add the permissions "Administer Mailbox Store, Receive As, Send As"

7. Open Active Directory and from the View menu select "Advanced Features". Then go to each user that will be added to the BES and open their properties, go to the security tab and add the user BESadmin and add the security permission "Send As". (This will overcome some MS patches that prevent BES sending emails)

8. Log on as BESadmin and install the BES software, normally you just install "BlackBerry Enterprise Server" as most sites don't use the MDS services (MDS is a much heavier install). Follow the prompts of the install and the server will be required to restart half way through the install. Restart the server and log back on as BESadmin and the install will continue. (Make sure the Connect Test works and the SRP ID etc is validated during the install)

9. After the install is finished open BlackBerry Manager, an error will appear about MAPI client which you can just hit OK. The MAPI setting windows will appear so just add the server name back in and select "Check Name", if it resolves just hit OK and the manager will start.

10. Within Blackberry Manager click on Blackberry Domain in the left column and then the users SERVERS tab in the centre section, select your server within this tab and view the properties below. Ensure that "SRP Status:" is Connected (This can take a few minutes the first time so refresh the screen a few times). Once your status is connected you can start adding users.

11. Within Blackberry Manager click on you server name in the left column and then the users TAB in the centre section, just add a user and the click on that user. You will see all the users’ properties and a drop down menu called "Service Access” and select “Set Activation Password” and set a password of “a” for example.

12. Turn on you BlackBerry device and ensure Wireless is enabled. Go into “Options/Settings” and “Time & Date” and set the correct zone and time etc. Then from the home screen go to enterprise activation and enter the users email address and enter the password that was set in step 10. Press the track wheel and select Activate. Within a minute you should get data returned which indicates the process is functioning correct.


Extra

a. Also ensure you review the IT Policy in BlackBerry Manager. This can be found in BlackBerry Domain > Global TAB > Edit properties. It is recommended that in the IT Policy you go into “Device Only Items” and set “Enable WAP config” to FALSE, this will force user to use the free browser (It uses the internet connection of your BES server). It is also highly recommended that you configure a password policy prior to rolling out any handhelds.

b. If you are unable to activate devices wirelessly you can test your connectivity to Blackberry buy running the following app from the command prompt:

C:\Program Files\Research In Motion BlackBerry Enterprise Server\Utility\BBSrpTest.exe

This will send a signal to BB and wait for a response, it this fails check your firewall settings (open and/or direct port 3101 TCP to you BES server)

c. If you have Domain Admins using BlackBerry devices you may have to run the following script if you are unable to send email for those users devices:

dsacls "cn=adminsdholder,cn=system,dc=domainname,dc=c om " /G "DOMAINNAME\BESadmin:CA;Send As"

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

MS must have been busy yesterday...


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Installing WSUS Sp1 onto 2k8

 
 
After several frustrating hours on the weekend....... note that SQL is included with WSUS 3 SP1

Software Requirements for Installing WSUS 3.0 on Windows Server 2008

To install WSUS 3.0 on Windows Server 2008, you must have the following installed on your computer. If any of these updates require restarting the server when installation is completed, restart your server before installing WSUS 3.0.

Ensure that the following components are enabled:

  • Microsoft Internet Information Services (IIS) 7.0
  • Windows Authentication
  • ASP.NET
  • 6.0 Management Compatibility
  • IIS Metabase Compatibility
  • Microsoft Report Viewer Redistributable 2005. To download this software, go to the Download Center (http://go.microsoft.com/fwlink/?LinkID=70410).
  • Microsoft SQL ServerTM 2005 Service Pack 1. To download this software, go to the Download Center (http://go.microsoft.com/fwlink/?LinkID=66143).
  • The .NET Framework 2.0 and BITS 2.0 update are available on Windows Server 2008 as part of the operating system.

 

http://learn.iis.net/page.aspx/239/wsus-30/



______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

hehe, had to happen - a GUI for Server 2008 Core


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

Installation MOSS 2007 - should it ever come up!

Shadow Protect Firewall GPO settings

 
 

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________

VMware Server ver 1.x on server 2008 x64 - Cannot access localhost

 
Using this in my test lab. Tried VMware 2.x beta but it's a dog so went back to 1 -arrgh, can't access localhost!. Noted that it uses unsigned drivers so won't work on 2K8 x64 (driver protection)
 
Download and run this tool:
 
 
Sets 2K8 to boot into unsigned driver mode automatically. At your own risk of course!
 
VM now working.
 
 

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email
______________________________________________________________________