Business Case I recently had a scenario at a customer where we needed to very quickly enroll machines into Intune but in an automated way without user intervention. After a few days of testing and troubleshooting please find my tips below. In the current scenario Co-Management has already been set up in MEMCM. This is … Continue reading Intune – “Steps for Windows 10 Automated MDM Enrollment into Microsoft Intune”
In this blog post series, we will cover some useful scripts and methods which will help you to organize and maintain your GPOs, and clean up the mess surrounded in your Group Policy environment.
The Issue Recently I was posed a question where a customer wanted their users to experience a more advanced or informative when software gets installed. They also required that data be saved so that users work are not affected. Requirements: The Mimecast for Outlook add in had to be installed (This requires Outlook to close) … Continue reading Infrastructure – System Center Configuration Manager – “Deploying applications with the PowerShell Application Deployment Toolkit”
With Windows Server 2008 R2 reaching end of life in January 2020, many organizations have been migrating their workloads to Windows Server 2016 or newer. This period is also an opportunity for some to decommission and consolidate domains to reduce complexities where possible. I posted about an upgrade blocker when the File Replication Service is … Continue reading Field Notes: Access denied when removing Active Directory integrated DNS Zones
With Windows Server 2008 R2 reaching end of life in January 2020, many organizations have been migrating their workloads to Windows Server 2016 or newer. Unfortunately with Active Directory (AD), an attempt to introduce a first Windows Server 2019 or version 1709 domain controller (DC) in a domain that still uses the File Replication Service … Continue reading Field Notes: A quick tip on DFSR Automatic Recovery while you prepare for an AD domain upgrade
Security auditing is one of the most powerful tools that you can use to maintain the integrity of your system. As part of your overall security strategy, you should determine the level of auditing that is appropriate for your environment. Auditing should identify attacks (successful or not) that pose a threat to your network, and … Continue reading Field Notes: The case of buried Active Directory Account Management Security Audit Policy events
I paid a customer a visit a while ago and was requested to assist with a SQL Server Failover Cluster issue they were experiencing. They had internally transferred the case from the SQL team to folks who look after the Windows Server platform as they could not pick up anything relating to SQL during initial … Continue reading Field Notes: The case of the failed SQL Server Failover Cluster Instance – Binaries Disks Added to Cluster
Windows Activation and KMS have been around for many years - and still - a lot of people don't understand the basics of Windows activation, what are the differences between KMS and MAK, and how to choose the best Volume Activation method that meets the organization’s needs. In this blog post, we'll shed some light on these … Continue reading Understanding Volume Activation Services – Part 1 (KMS and MAK)
Introduction In this post, I take you through a process of troubleshooting high pool usage using free tools available in the Windows Sysinternals suite and the Windows Performance Toolkit (WPT). I also show you how to resolve the issue by properly configuring the Cluster Shared Volume (CSV) cache using PowerShell command-lets available in the Failover … Continue reading Field Notes: The case of accidentally misconfigured Hyper-V Failover Cluster CSV cache
Introduction: In this blog I will not cover why we have to remove SMB v1 from production network, this have been already covered, probably one of the best articles covering this is https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/ I will cover how you can audit the usage of SMB v1 in your network, so you can disable it safely without … Continue reading Step by Step: Safely disabling SMB v1 from your production environment.