Posts Tagged ‘Tips’

Configuring Anti-Virus for VDI

Monday, May 15th, 2017

While this article is specific to Microsoft Defender, it does give good recommendations as to how to configure any vendors A/V for a VDI environment.

https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus

Display make and model of server hardware

Tuesday, May 9th, 2017

Ever been in that place where you need to know that is the make and model of a server ? For documentation or planning purposes for example ?

You know, the time when you might have to work out what the power draw is of your hardware before moving into a hosted data center or know which spares to hold for physical servers ?

A quick way to get the make and model of the hardware is to run the command below:

wmic computersystem get Name, domain, Manufacturer, Model, NumberofProcessors, PrimaryOwnerName,Username, Roles, totalphysicalmemory /format:list

Getting the cluster size of CSV disks in Hyper-V

Saturday, April 23rd, 2016

If you want to check the cluster size of NTFS formatted disks used for Cluster Shared Volumes, here’s some handy code below. Just change the names of the hyper-v clusters you want to check in red and run from an administrative level powershell prompt.

If you want another row of information from the fsutil command, just change the number where it says $arr[9]

Import-Module FailoverClusters

$Clusters = (“My-CLUSTERNAME01“,”My-CLUSTERNAME02“,”My-CLUSTERNAME03“)

#Get CSVs foreach cluster

foreach($Cluster in $Clusters){

      $c = Get-ClusterSharedVolume -Cluster $Cluster 

     $csvs += $c

}

foreach ($csv in $csvs) {

     invoke-command -ComputerName $csv.ownernode -scriptblock {

                 param ($name,$node)

                 $Clustersize = fsutil fsinfo ntfsinfo “C:\ClusterStorage\$name” 

                $arr = $Clustersize -split ‘`n’

                write-host $name ” on ” $node ” has ” $arr[9]    

         }   -argumentlist $csv.name, $csv.OwnerNode

}

 

The output reports against the owner node for the CSV. As the underlying disk for the CSV is the same on all nodes, I report against the owner node to limit the output to one row per CSV.

Delaying DHCP Offer (80/20 rule)

Friday, January 3rd, 2014

When setting up a split scope DNS solution you may want to delay the offer of IP addresses from the 20% scope so that it acts as a true standby. To do this, just click on the advanced tab on the scope and set the subnt delay value.

 

How does my computer know that it is connected to the internet ?

Saturday, July 7th, 2012

The answer is surprisingly simple for Windows computers. It attempts to connect to

http://www.msftncsi.com/ncsi.txt

If it receives a HTTP 200 (if it receives the text “Microsoft NCSI” in the file) then you are on the internet – if it does not receive this text then you receive the warning symbol on the network item in the system notification area.

So, if you don’t have internet connectivity but need your computer to think you have for some reason (because a piece of sofwtare requires it for a lab or some toher reason) then yuo can simply create your own version of the abve site and file using your internal servers and DNS and fool your computers into thinking that they are indeed internet connected.

Opening an Explorer session from within Powershell

Thursday, June 14th, 2012

If you want to make the move to replacing a command prompt with t he powershell prompt you may at times want to open an explorer session from the powershell command line.

To do this just type ii.

If you want to open explorer at a specific location just enter that location e.g.

ii c:\MyFolder

SSL Security Check

Wednesday, May 9th, 2012

Nice little wizard at https://www.ssllabs.com/ssltest/index.html if you want to check how secure you’re SSL protected web site is

Quick Access to System Properties

Saturday, February 18th, 2012

Tired of having to go around the houses to look at the system properties on a server or workstation ? The quickest way to gain access is to use the built-in shortcuts. Just enter the below at the start menu search box to gain fast access:

Advanced Tab – systempropertiesadvanced
Remote Tab – systempropertiesremote
Hardware Tab – systempropertieshardware
Computer Name Tab – systempropertiescomputername
System Protection Tab – systempropertiesprotection
Data Execution Prevention – systempropertiesdataexecutionprevention
Performance Options – systempropertiesperformance

Of course, you don’t have to remember all of the above, just using systempropertiesadvanced will get you straight to a single tab so that you can navigate from there.

List Users who have logged on to XenApp

Friday, October 7th, 2011

Want to know who has logged on to your Citrix server ?

You can just look in the security log in event viewer and filter down but it’s so much easier using the command line. Just open up a cmd prompt and enter

auditlog (all one word)

This will let you list all the sessions from the event log and even pipe them out to a text file for later analysis or reporting.

How to create masses of data for testing

Tuesday, January 25th, 2011

If you ever want to test something that requires lots of files to be created, whether it is is configuring Robocopy of writing files to disk to test throughput or for alert generation then HP have a great free tool you can use, CreateData.exe. Download it here.

If you want a similar tool to generate “read” type access then the ReadTool can be downloaded here.