Microsoft Network Monitor Tool

Download Microsoft Network Monitor Tool from the following link and install it on the client. http://www.microsoft.com/downloads/details.aspx?FamilyID=983b941d-06cb-4658-b7f6-3088333d062f&displaylang=en Start Network Monitor at Start -> Program -> Microsoft Network Monitor 3.4 -> Microsoft Network Monitor 3.4 on the client. On the left-panel, check the LAN connection and unchecked the other unnecessary connections on the client. Click Tools, click Options, switch to the Capture tap, and set the Temporary capture file size (MB) to 200 on the client. Click Create a new capture tap, click Start on the Capture menu in the Network Monitor window. After you have captured what you need, click Stop on…

Windows 7 & Windows 8 laptop comes out of sleep

My Windows 7 laptop and Windows 8 Surface Pro kept waking up from sleep while in my bag and causing it to heat up and drain the battery. So I ran the following command in command prompt: powercfg /lastwake This told me the last device that woke my laptop up, it was wuauserv. Windows Update. Change Windows Update to anything but Automatically download and install updates. I changed mine to manually install. If nothing shows up from running the command above then have a look at other devices that might be set as an option to wake up the computer….

Threat Management Gateway (TMG) 2010 Tunnel Port Ranges–SSL, FTP, NNTP

There are times when you need to change the default tunnel port ranges on TMG 2010, to allow an internal client to connect to an external resource such as an FTP site. You might get the following error when connecting to an external FTP server. HTTP/1.1 502 Proxy Error (The specified Secure Sockets Layer (SSL) port is not allowed. ISA server is not configured to allow SSL requests from this port. Most Web browsers use port 443 for SSL requests.) To access FTP sites through ISA server’s HTTP proxy, access to all ports must be allowed. FTP’s control connection port…

Build an Offline Root CA with a Subordinate CA

Install Root CA Build new stand-alone root CA, not attached to domain and give unique name. Log on to the server as the administrator and install Certificate Services to create a stand-alone root certification authority. Install Certificate Authority service only, IIS is not needed. Create a new private key Ensure the common name for the CA is unique. Change the validity period for the CA’s certificate to 20 years Install Sub CA Build new enterprise subordinate CA and add to domain. Add the following role services Certification Authority Certification Authority Web Enrollment Online Responder Certificate Enrollment Policy Web Service (Might…

Windows Server 2008 R2 Server Core unattended setup from command line

build, to a dc running a brand new domain. I figured out a set of commands that achieve this, so thought I would share them with the world. Rename the Host Netdom renamecomputer <OldName> /NewName:<NewName>Netdom computername [origcomputername] /add Core.contoso.comNetdom computername [origcomputername] /makeprimary core.contoso.com See all the network adaptors Make a note of the number shown in the Idx column of the output for your network adapter. If your computer has more than one network adapter, make a note of the number corresponding to the network adapter for which you wish to set a static IP address. netsh interface ipv4 show…

Group Policy WMI filtering

This is from hhttp://technet.microsoft.com/en-us/library/cc947846.aspx and http://technet.microsoft.com/en-us/library/cc758471.aspx but I have added more information with examples or WMI filters and a table of Windows version numbers and Product Types. WMI filters can take significant time to evaluate, so they can slow down logon and startup time. The amount of time depends on the construction of the query. To restrict the query to only clients or only servers, add a clause that includes the ProductType parameter. To filter for client operating systems only, such as Windows 7 or Windows Vista, use only ProductType="1". For server operating systems that are not domain controllers, use…

Auto Reply in Exchange 2007 for single mailbox

This is split into two parts, Server & Client. Server: On the Exchange server itself, open the Exchange 207 management console. Right click on the default remote domain, and choose properties   Click on the second tab, and confirm ‘Allow automatic replies’ is checked.   Client: Using Outlook, log into the mailbox where you want to set the auto reply, and create a new rule.   Select Apply rule on messages I receive, and click next.   Under the conditions, leave this blank and click next, this will apply to all email.   Click Yes. On the next step, select…

Setting up Proxy .pac files in IIS7 for proxy use

If you want the clients to connect using an automatic configuration script to connect to your proxy server, which will work if it is accessible, and won’t work from else where, e.g. laptop users at home. If the location (http://pac/proxy.pac) can’t be reached, IE will skip over the script and go direct out to the internet. To setup your proxy .pac file on a Windows Server 2008 server. Create your proxy.pac file (follow the examples below) Copy your .pac file to (C:\inetpub\pac) of your IIS server which will host the .pac file In IIS, right click on sites, choose Add…

SCCM 2007 R2 – SQL Queries

To get an accurate list of computers to usernames vice versa, change the part in RED to suit SELECT     v_R_System.Netbios_Name0, v_R_System.User_Name0, v_RA_System_IPAddresses.IP_Addresses0, v_RA_System_IPSubnets.IP_Subnets0,                       v_GS_COMPUTER_SYSTEM.UserName0FROM         v_R_System INNER JOIN                      v_RA_System_IPAddresses ON v_R_System.ResourceID = v_RA_System_IPAddresses.ResourceID INNER JOIN                      v_RA_System_IPSubnets ON v_R_System.ResourceID = v_RA_System_IPSubnets.ResourceID INNER JOIN                      v_GS_COMPUTER_SYSTEM ON v_R_System.ResourceID = v_GS_COMPUTER_SYSTEM.ResourceIDWHERE     (v_RA_System_IPSubnets.IP_Subnets0 = ‘10.10.35.0‘) Or………. From two subnets SELECT     v_R_System.Netbios_Name0, v_R_System.User_Name0, v_RA_System_IPAddresses.IP_Addresses0, v_RA_System_IPSubnets.IP_Subnets0,                       v_GS_COMPUTER_SYSTEM.UserName0FROM         v_R_System INNER JOIN                      v_RA_System_IPAddresses ON v_R_System.ResourceID = v_RA_System_IPAddresses.ResourceID INNER JOIN                      v_RA_System_IPSubnets ON v_R_System.ResourceID = v_RA_System_IPSubnets.ResourceID INNER JOIN                      v_GS_COMPUTER_SYSTEM ON v_R_System.ResourceID = v_GS_COMPUTER_SYSTEM.ResourceIDWHERE     (v_RA_System_IPSubnets.IP_Subnets0 = ‘10.10.35.0‘)OR     (v_RA_System_IPSubnets.IP_Subnets0 = ‘10.10.65.0‘)

Users & Computers Inventory

This is to create an accurate inventory of user names to computer names and vice versa On a server, create a shared folder. Grant the share permission and NTFS permission for the folder to allow Full Control for the group Everyone. On your domain controller, create a new GPO at domain level. Edit the policy. Locate the entry: User Configuration –> Windows Settings –> Scripts (Logon/Logoff). Create the logon script which contain the following command: @echo off date /t >> "%userprofile%\logonlog.txt"time /t >> "%userprofile%\logonlog.txt"echo ————— Network Drives >> "%userprofile%\logonlog.txt"echo. >> "%userprofile%\logonlog.txt"net use | find /i "\\" >> "%userprofile%\logonlog.txt"echo ————— Username…