From 2 years ago, I decided to take part in VMware certification. last year, I have achieved the first certificate. Subsequently, I have got familiar with the next stage to complete your understanding and knowledge on VMware technologies and therefore, starting to study for VCAP-DCV exam. I’m of the opinion that, it is more difficult than all VMware certification in VCP level. I have read many articles and blogs about VCAP and it has always been a very elusive goal. […]
What’s New in vSphere 6.0 Fault Tolerance FT support upto 4 vCPUs and 64 GB RAM Fast Check-Pointing, a new Scalable technology is introduced to keep primary and secondary in Sync by replacing “Record-Replay” vSphere 6.0, Supports vMotion of both Primary and Secondary Virtual Machine With vSphere 6.0, You will be able to backup your virtual machines. FT supports for vStorage APIs for Data Protection (VADP) and it also supports all leading VADP solutions in Market like symantec, EMC, HP […]
In this link you can check the useful method to reset root password in ESXi. http://www.vm-help.com/esx/esx3i/Reset_root_password.php
I am reading a new article about the most important challenge in IT environments, i suddenly found this article which has covered significant issue in 2015 . Also i have posed to top 10 IT issue in 2015 after this link source Top 10 IT Issues, 2015 Hiring and retaining qualified staff, and updating the knowledge and skills of existing technology staff Optimizing the use of technology in teaching and learning in collaboration with academic leadership, including understanding the appropriate […]
when i am trying to find an article related to virtual machine performance, I suddenly saw this article with top 10 vmware myths on virten website. you could read these useful article now. Top 10 vmware myths Esxi tips
I find myself quite often trying to keep straight all the different replication activities that can occur within an Active Directory (AD) domain. There is: Intrasite Replication Urgent Replication Intersite Replication Intersite Change Notification Replication Reciprocal Replication Immediate Replication Manual Replication
With the advent of Windows Server 2012 R2, Microsoft has worked diligently to provide support for virtualization and allow corporations to reduce costs by virtualizing as much hardware as possible. New features in 2012 R2 help prevent USN rollback and/or Lingering objects via the new VM-Generation ID. If a guest o/s is restored from a snapshot the VM-Generation Id that is stored in the DIT (msDS-GenerationID attribute on the DC’s computer object) is compared to the value on the Host. If […]
Ace here again. I thought to touch base on DNS zones, and more so, focus on what AD integrated zones are and how they work. This blog almost mimics my class lecture on this topic. Check back for updates periodically, which I will notate with a timestamp above with whatever I’ve added or modified. This topic was also briefly discussed in the following Microsoft Technet forum thread: Technet thread: “Secondary Zones?” http://social.technet.microsoft.com/Forums/en-US/winserverNIS/thread/c1b0f3ac-c8af-4f4e-a5bc-23d034c85400 source: http://blogs.msmvps.com/acefekay/2013/04/30/dns-zone-types-explained-and-their-significance-in-active-directory/
There are some specific concepts in active directory which may put your environment in trouble if you do not attend to fix them as soon as you notice. One of them is Lingering objects. Defining the meaning of Lingering Objects (LO) is not difficult. Basically if an object in your active directory partitions exist in one or more domain controllers and not exist in the rest of the domain controllers in the same partition. So you may ask yourself how […]
Group Policy can be difficult to design, implement, and troubleshoot unless you are fully aware of the foundational concepts that drive Group Policy with Active Directory. There are many moving parts with Group Policy, not to mention the reliance that Group Policy has on Active Directory functioning properly. When making changes within a Group Policy Object (GPO) in hopes for a desired outcome, only to have Group Policy not working correctly can be very frustrating. many article is founded in […]
last week , i try to work with Windows 2008 R2 server but my system restart frequently . after research i find Reboot problem. If these servers are using File Share or SMB v.2, srv2.sys may cause this problem. Srv2.sys driver is root cause of this problem. This is SMB 2.0 server driver. You can download hotfix KB2552033 for Windows Server 2008 R2 SP1 with your own risk until Microsoft officially release it.
I was searching for a virtualization software that i met the following article . there are 101 useful application virtualization in this table, you can check them :
If you plan to do the P2V conversion operation , you can use the following tools Method A: VMware vCenter Converter Standalone Use a converter software product by VMware which is free to download using the link below: http://downloads.vmware.com/d/
The annual voting for the top 50 virtualization blogs for 2014 is now open. Every year Eric Siebert takes a lot of time and puts this together over at vSphere-land. I have contributed to the voting over the years and now this year for the first time my blog is part of this great list. I encourage each of you to head over here to cast your votes again this year or for your first time. Voting is only open […]
Now that both Microsoft and VMware have officially announced the new released of their virtualization products it’s possible make an homogenous comparison between Hyper-V 2012 R2 (the fourth generation of Hyper-V) and vSphere 5.5. VMware vSphere 5.5 introduces several news and scalability improvements, on the other side Microsoft Hyper-V 2012 R2 consolidate its features and improve what was already existing in the 2012 version, with a limited (but significant) new features. For example now, finally, some VMware old date features […]
I am sure you must have experienced VPN reconnect – a new IKEv2 based VPN tunnel that is added in Windows 7 that allows automatic and seamless switchover of an active VPN connection when the underlying Internet interface (connection) changes thus maintaining application persistence. Isn’t that COOL – like VPN user moving from Wifi to WWAN and back – giving a true mobile connectivity to corpnet ! Yes it is… This means, Windows7 in-built VPN client and Windows 2008 R2 […]
About each folder under the SYSVOL share in Domain Controller SYSVOL folder used to store a copy of the domain’s public files like system policies, Group Policy settings and logon/logoff scripts, which are replicated to all other domain controllers in the Active Directory domain through File Replication Services (FRS), You can find many folders inside the SYSVOL share, I would like to explore and explain each folder by how it’s used in the process of SYSVOL replication.
trusting domain and the trusted domain For the diagram above, we have the following summary: When you create a trust from the Account Domain (trusted), the type of trust will be “incoming trust”. When you create a trust from the Resource Domain (Trusting), the type of trust will be “outgoing trust”. Remember that Direction of Trust is the opposite to Direction of Access.
Last night , I was looking for an article that i saw an article on virtualization . I read this article . it will be useful for you and other friends I ‘m going to run in this version soon. And the complete results will be announced . for the full list please take a look at VMware’s document. 1. vCenter Server appliance gets bigger For a while now VMware has offered a Linux based appliance version of the Windows […]
Here is the list of all articles about Direct Access Technologies. i need to configure Direct access for students , so they must reading articles. this article is useful for helping Is Direct Access Really That Hard To Setup (No) or are we becoming IT Complacent (Yes)? Direct Access http://www.labo-microsoft.org/articles/Direct_Access/1/
This is a guest post from David Malmborg who is working with Dell. Here are the 10 things to know about server virtualization and why your company should think about it. Recently I have shared my personal working experience on advantages of server virtualization. The below points are similar to earlier article but with different view and explanation. [source article] 1. Server Virtualization Closes the Gap Seen in Traditional Server Model Traditional server model uses one piece of hardware for […]
“Cloud computing has changed the rules of the game between the companies expanding their services using cloud computing.” In recent years cloud computing services has growing continuously. Google has been one of the strongest company have providing a large range of cloud services, spearheaded Gmail, and a long list of solutions around covering virtually all areas (Maps, Reader, News, storage etc.). Microsoft , the other large consumer market, has also invested heavily in the full range of services and providing cloud computing services. Using […]
What is Cisco PPDIOO? PPDIOO (Prepare, Plan, Design, Implement, Operate, and Optimize) is the network life cycle that is defined by Cisco . PPDIOO has the six phases or steps for designing a network and these design phases are as following: Prepare Plan Design Implement Operate Optimize source article
When you are facing slow logons into domain and you also get events 1030 and 1006 you need to look into your network. By default Kerberos uses UDP packets to communicate. You need to force Kerberos to use TCP instead of UDP by changing registry key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\ Kerberos\Parameters If it doesn’t exists just create it Create DWORD key called MaxPacketSize and set it to value 1. For more infor there is official KB http://support.microsoft.com/kb/244474/en-us
Just a quick image about differences between “old” Software Restricion Policy and “new” AppLocker: Now it’s easy to describe and remember.
Although the specifics of being a system administrator may change from platform to platform, there are underlying themes that do not. These themes make up the philosophy of system administration. The themes are: Automate everything Document everything Communicate as much as possible Know your resources Know your users Know your business Security cannot be an afterthought Plan ahead Expect the unexpected
List of Ports
In this article you can see how to enable audit logging for Windows Firewall with Advanced Security. Windows Firewall with Advanced Security can log firewall activity such as dropped packets or successful connections. By default the firewall log is: %windir%\system32\logfiles\firewall\pfirewall.log You can configure firewall logging by using Group Policy if desired. But what if you want to collect more detailed logging of firewall activity such as kernel mode connections/drops and other filtering activity? You can do this by enabling Windows […]
A few days ago I read an article that was interesting.May be faced with reduced performance When you run the virtualization platform. Here I give you some tips in this regard: Optimizing vSphere Performance: Why and How 1. Use capacity analysis tools 2. Right-size virtual machines 3. Replace your hardware 4. Utilize Storage I/O Control (SIOC) and Storage DRS (SDRS) 5. Reduce VM snapshots 6. Consider SSD 7. Utilize Distributed Resource Scheduler (DRS) 8. Run the latest version of vSphere 9. […]
Unfortunately there is a problem when you try to add .Net Framework 3.51 to Windows Server 2012 using Server Manager! In order to fix that issue and get .Net Framework 3.51 installed issue following command from Command Prompt: dism /online /enable-feature /all /featurename:NetFX3 /source:x:\sources\sxs In order to assign static IPv4 address to Windows Server 2012 Core using power shell use: New-NetIPAddress -IPAddress 192.168.1.10 -InterfaceAlias “Ethernet” -DefaultGateway 192.168.1.1 -AddressFamily IPv4 -PrefixLength