How Automatically Fill Computer Description Field in Active Directory

Posted on September 18, 2015 · Posted in Active Directory, Powershell
populated computer description fileld in active directory

In this article we’ll demonstrate how to fill the computer information in Active Directory using PowerShell. As an example, we’ll show how to save the information about the computer model in the description field of a computer objects in Active Directory.

How to Reset Root Password in VMware vCenter Appliance

Posted on · Posted in VMWare

Let’s consider how to reset a forgotten root password on the deployed VMware vCenter Server Appliance (vCSA). We remind that vCSA is a ready virtual machine with an installed Linux OS and configured vCenter Server and additional services. Since a VM vCenter Appliance is built on SUSE Linux Enterprise Server,.. read more

Auto-Mount VHD at Startup

Posted on September 2, 2015 · Posted in Windows 8
script for mounting vhd disk

In Windows 7 and Windows Server 2008 R2 it became possible to create and mount virtual hard disk files (VHD) directly from Disk Management console. These virtual disks look like separate physical disks in the system and can be used to store any data. An essential disadvantage of these disks.. read more

KMS Server Update to Support Windows 10 Activation

Posted on September 1, 2015 · Posted in Windows 10
KB 3058168 KMS update to support Windows 10

Preparing to the official launch of Windows 10, in June Microsoft released an update KB 3058168 for Windows 8 and Windows Server 2012 to support KMS (Key Management Service) activation of Windows 10. The update installs updated versions of configuration files necessary for correct Windows 10 activation on the KMS.. read more

Kerberos Token Size and Issues of Its Growth

Posted on August 28, 2015 · Posted in Active Directory
Large Kerberos token size

Recently I’ve faced a quite interesting problem when some users are unable to authenticate on some domain services due to the Kerberos token oversize. In this article, we’ll try to consider the peculiarities of building the Kerberos token, how a user can define its size and how to extend the.. read more

How to Repair Deleted EFI Partition in Windows 7

Posted on August 27, 2015 · Posted in Windows 7
Default efi partitoions

In this article we’ll show how to manually repair accidentally deleted Windows 7 boot partitions on UEFI systems. So, suppose one of the system partitions in the EFI system has been accidentally and Windows 7 doesn’t boot constantly offering to select the boot device (Reboot and select proper boot device.. read more

Get-ADUser: Getting Active Directory Users Data via Powershell

Posted on August 21, 2015 · Posted in Active Directory, Powershell
get-aduser table view

It’s no secret that from the first PowerShell version, Microsoft tries to make it the main administrative tool in Windows. And it mostly succeeds! Using simple examples, we’ll demonstrate PowerShell features to get different information about Active Directory users and their attributes.

How to Reset a SA Password on MS SQL Server 2012

Posted on August 19, 2015 · Posted in SQL Server
MSSQL ImagePath - single mode

In this article we’ll describe the procedure of  restoring access to a MS SQL Server 2012 database if the the SA password has been forgotten or there are no users with administrative privileges to manage MS SQL 2012. We’ll show how to reset the password of the SA account, and.. read more

VMware ESXi: How to Restart a Hung Virtual Machine

Posted on · Posted in VMWare
vm's process

When working with VMWare vSphere virtual machines, a virtual machine can sometimes hang up and it’s impossible to stop or restart it from vSphere console. In these cases, the only way to turn off or restart a virtual machine is to reboot the whole ESXi server that is not always.. read more

Exchange 2013: MAPI over HTTP

Posted on August 14, 2015 · Posted in Exchange
MAPI over HTTP Exchange 2013 SP1 Architecture

In Exchange 2013 SP1 there appeared a new protocol for client connections to a mailbox — MAPI over HTTP (MAPI/HTTP). This protocol is to improve stability and reliability of Outlook connection to the Exchange server due to moving traffic to HTTP level. In this article, we’ll tell about the architecture.. read more