Direct access technology

Posted Posted in Server 2008

Here is the list of all articles about Direct Access Technologies. i need to configure Direct access for students , so they must reading articles. this article is useful for helping Is Direct Access Really That Hard To Setup (No) or are we becoming IT Complacent (Yes)? Direct Access http://www.labo-microsoft.org/articles/Direct_Access/1/

10 Things to Know About Server Virtualization

Posted Posted in Virtualization

This is a guest post from David Malmborg who is working with Dell. Here are the 10 things to know about server virtualization and why your company should think about it. Recently I have shared my personal working experience on advantages of server virtualization.  The below points are similar to earlier article but with different view and explanation.  [source article] 1. Server Virtualization Closes the Gap Seen in Traditional Server Model Traditional server model uses one piece of hardware for […]

7 Advantages of Cloud Computing

Posted Posted in Virtualization

“Cloud computing has changed the rules of the game between the companies expanding their services using cloud computing.”  In recent years cloud computing services has growing continuously. Google has been one of the strongest company have providing a large range of cloud services, spearheaded Gmail, and a long list of solutions around covering virtually all areas (Maps, Reader, News, storage etc.). Microsoft , the other large consumer market, has also invested heavily in the full range of services and providing cloud computing services. Using […]

Slow logging into domain

Posted Posted in Server 2008

When you are facing slow logons into domain and you also get events 1030 and 1006 you need to look into your network. By default Kerberos uses UDP packets to communicate. You need to force Kerberos to use TCP instead of UDP by changing registry key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa\ Kerberos\Parameters If it doesn’t exists just create it  Create DWORD key called MaxPacketSize and set it to value 1. For more infor there is official KB  http://support.microsoft.com/kb/244474/en-us

The Philosophy of System Administration

Posted Posted in Internet & News

Although the specifics of being a system administrator may change from platform to platform, there are underlying themes that do not. These themes make up the philosophy of system administration.  The themes are: Automate everything Document everything Communicate as much as possible Know your resources Know your users Know your business Security cannot be an afterthought Plan ahead Expect the unexpected  

Enabling Firewall audit logging in windows

Posted Posted in Server 2008

In this article you can see how to enable audit logging for Windows Firewall with Advanced Security. Windows Firewall with Advanced Security can log firewall activity such as dropped packets or successful connections. By default the firewall log is: %windir%\system32\logfiles\firewall\pfirewall.log You can configure firewall logging by using Group Policy if desired. But what if you want to collect more detailed logging of firewall activity such as kernel mode connections/drops and other filtering activity? You can do this by enabling Windows […]

Optimizing vSphere 5 Performance

Posted Posted in VMWare Technology

A few days ago I read an article that was interesting.May be faced with reduced performance When you run the virtualization platform. Here I give you some tips in this regard: Optimizing vSphere Performance: Why and How 1. Use capacity analysis tools 2. Right-size virtual machines 3. Replace your hardware 4. Utilize Storage I/O Control (SIOC) and Storage DRS (SDRS) 5. Reduce VM snapshots 6. Consider SSD 7. Utilize Distributed Resource Scheduler (DRS) 8. Run the latest version of vSphere 9. […]

tip in server 2012

Posted Posted in Server 2012

Unfortunately there is a problem when you try to add .Net Framework 3.51 to Windows Server 2012 using Server Manager! In order to fix that issue and get .Net Framework 3.51 installed issue following command from Command Prompt: dism /online /enable-feature /all /featurename:NetFX3 /source:x:\sources\sxs   In order to assign static IPv4 address to Windows Server 2012 Core using power shell use: New-NetIPAddress -IPAddress 192.168.1.10 -InterfaceAlias “Ethernet” -DefaultGateway 192.168.1.1 -AddressFamily IPv4 -PrefixLength

vSphere 5.1 What’s New

Posted Posted in VMWare Technology

VMware announced a new version of VMware vSphere 5.1 at VMworld USA. I created a nice summup of all new features to give you nive clean overview if you are going to upgrade vsphere 5.1 please read this links and notic changes them   vSphere 5.1 What’s New What’s New in VMware vSphere 5.1 What’s New in VMware vSphere 5.1 – Storage What’s New in VMware vSphere 5.1 – Performance What’s New in VMware vSphere 5.1 – Platform What’s New in VMware vSphere […]

Granting Users Password Change Ability

Posted Posted in Server 2008

We want a user to be able to change your password. However, there is operation is possible with delegation. but in the following article we will look at The process of transferring power to the network users for change password This is a two part operation, firstly you need to give the user(s) the rights to change passwords, then give them the tools to do so. http://www.petenetlive.com/KB/Article/0000503.htm

System Center 2012 – VMM networking Poster

Posted Posted in System Center

I was surfing the web. I found a nice poste about virtualization and its infrastructure. I think it is interesting to see the poster. The issue of networking in System Center Virtual Machine Manager 2012 SP1 is more complex and offers several features so it is classified first. Microsoft has now released a poster that summarizes the most important information. This poster for Virtual Machine Manager Networking helps … … In planning the networks with the use of VMM VM Networks, […]

TCP / IP Reference Page

Posted Posted in Microsoft

There are some days that I’m going to study.Principles of Network and raw materials is very important And that’s exactly what other fail in a new search i found a new site about TCP/IP refrence. I suggest you read this site: http://www.protocols.com/pbook/tcpip1.htm#Application

Compare Hyperv 3.0 & Vsphere 5.0

Posted Posted in Virtualization

1) Scalablity To start the comparison, we would choose scalability and  config maximums as these are the important aspects to look for while choosing the platform for your cloud. Microsoft Windows 2012 RC’s Hyper-V 3.0 seems to be promising on scalability than VMware vSphere 5.0. The maximum supported clustered nodes increased to 64 with increase in support of running VM’s i.e 4000 VM’s, more logical processors per host and more Physical RAM per host as compared to VMware.

10 most powerful cloud companies

Posted Leave a commentPosted in Virtualization

Virtually every vendor has a cloud story to tell. But here are 10 companies that have distinguished themselves as the leaders in cloud computing, either by being first to market, by offering the broadest and deepest set of cloud services or by taking a leadership role in the cloud revolution. Other articles in this issue of Enterprise Cloud Services: 1. Amazon: The IaaS gold standard The online retailer came out of nowhere in 2006 to offer up idle compute cycles […]

Read-Only Domain Controller (RODC)

Posted Leave a commentPosted in Server 2008

Windows Server 2008: Read-Only Domain Controller (RODC) A Read-Only Domain Controller (RODC) is a new type of domain controller in Windows Server 2008. Its main purpose is to improve security in office branches. In this post, I summarize the functionality of RODC. In office branches, it is often not easy to provide sufficient physical security for servers. It is not a big deal to manipulate a Windows system if you can get physical access to it. Since Domain controllers store […]

10 things about AD domain trusts

Posted Leave a commentPosted in Microsoft Products

Domain trusts can be complicated to administer, and it’s important to implement changes correctly the first time. Here are some key points to keep in mind to help ensure that your trusts are configured effectively with a minimum of headaches. 1: Determine what kind of trust you should use Before deploying a domain trust, you should ensure that the type(s) used are correct for the tasks at hand. Consider the following dimensions of a trust:

Active Directory Topology Diagrammer

Posted Leave a commentPosted in Microsoft Products

I need to design a plan for Active directory . in this way visio and Edarw are two software that help me .today i find a new software that automatically generate a diagram like as Visio ! The Microsoft Active Directory Topology Diagrammer reads an Active Directory configuration using LDAP, and then automatically generates a Visio diagram of your Active Directory and /or your Exchange Server topology. The diagramms may include domains, sites, servers, organizational units, DFS-R, administrative groups, routing […]

8 Study Tips for MCITP Certification

Posted Leave a commentPosted in IT Certifications

We have prepared 8 mcitp study tipsfor you so you can tackle your MCITP certification study in the most effective way. 1. Plan your MCITP certification path Gaining a MCITP certification may be the ultimate goal, but which flavor? Most people aim to get MCITP: Server Administrator or MCITP: Enterprise Administrator, but these are only a couple of the MCITP specializations on offer. It is important to set a goal, and then you can choose the best exam path to […]