Since by design, you cannot recover from a CA root certificate expiring, sometimes you need to limp along, and continue to issue certs even though you cannot necessarily revoke them, because the CRL published in Active Directory is now incorrect, or offline.
While we can argue all day about the benefits/detractors of this, here it is:
To bring the CA Root back online after the Root certificate expires, issue these commands in an elevated powershell:
certutil –setreg ca\CRLFlags -CRLF_REVCHECK_IGNORE_OFFLINE
net stop certsvc && net start certsvc
Now, go back to the drawing board, and PLAN your PKI implementation, and DON’T LET YOUR CA ROOT CERTIFICATE EXPIRE!!!
Terminal Services can only print to your LPT printers (with proper driver installed on the server). In order to print to network printer or USB printer,
1. Install the printer normally (connecting via TCP port or USB port) and make it a shared printer (ie. \\COMPUTERNAME\PRINTER)
2. Install ANOTHER instance of the printer, using the LPT1: (or LPT2:) port
3. Launch an administrative command prompt, and map the LPT port to the shared printer instance:
net use lpt1: \\COMPUTERNAME\PRINTER /persistent:yes
Now, you have an LPT: printer. If you set it as your default printer you can print locally, and Terminal services should now allow you to print from your TS session, as well.
If you have a network of hundreds of servers and workstations, and JUST ONE of your systems gets a drive-by infection, CenturyLink will BREACH YOUR CONTRACT, and DROP YOUR CONNECTIVITY!!
Never mind that you pay thousands monthly for high-speed connectivity, never mind that you’ve got people on staff to deal with infections as they’re found, never mind that almost ALL AV solutions are *CLOUD-BASED* and REQUIRE connectivity to be effective. They will drop your connection, and you’ll have to call and beg them to restore it, and then they’ll threaten to do it again, if they see any more infected traffic.
Hey CenturyLink, YOU SUCK!!
If I find any of my clients using your shitty service, I’m going to tell them that I can no longer support them, until they’ve moved to a new ISP.
DIAF, CenturyLink. Contract-breaching losers….
To setup a reverse DNS record for a Comcast IP address, please contact the Enterprise Care Center (ECC) at 1-800-741-4141 (option 2, and then option 1).
I’ve run into this a couple times recently after clients have been migrated to Office 365. Office 365 by default sends messages in the Transport Neutral Encapsulation Format (TNEF) format. This is a rich text format and some email servers aren’t able to interpret it, and will therefore replace attachments with winmail.dat files (very common with clients on Macs). The fix is to use PowerShell to change disable TNEF. There is a TechNet article that shows you how to disable TNEF for when sending to specific domains or email addresses, but in my opinion that’s not acceptable for a client because they will need to contact us to have it changed every single time they encounter someone who cannot receive attachments from them. The fix is to connect to Office 365 via PowerShell and then do one of the following…
Option 1: Disable for Specific Domain (example uses wyldehare.com as the domain you are sending to)
1. New-RemoteDomain -DomainName wyldehare.com -Name WyldeHare
2. Set-RemoteDomain -Identity WyldeHare -TNEFEnabled $false
3. Get-RemoteDomain -Identity WyldeHare| Select TNEFEnabled (This step just confirms that the change was accepted – should show you “false” for the output.)
Option 2: Disable for Specific Email Address
1. No point in doing this since the email server is usually what causes this.
Option 3: Disable Globally (recommended)
1. Set-RemoteDomain Default -TNEFEnabled $false
2. Get-RemoteDomain -Identity Default| Select TNEFEnabled (This step just confirms that the change was accepted – should show you “false” for the output.)
The change does not take immediately. I have not seen it documented anywhere, but I do know it doesn’t take place immediately. I had a client test this right after I made the change and it didn’t work, so I had them try again in the morning and it worked. I would guess at somewhere between 15 minutes and a few hours.
We’ve also run into some issues recently where users have been receiving winmail.dat attachments. This is usually caused in cases where the client has the SMTP proxy enabled on their WatchGuard. By default, the SMTP proxy strips some of the headers out of the email that identify it as a Rich Text Formatted email. If the email client does not have the header information needed to interpret the winmail.dat attachment, the email client cannot display the proper formatting of the email, and incorrectly displays the attachment as a winmail.dat file. To resolve, do the following…
- Start Policy Manager for your XTM device.
- Double-click the SMTP-Proxy used for inbound email.
Or, right-click the SMTP-proxy and select Modify Policy.
The New/Edit Policy dialog box appears with the Policy tab selected.
- Adjacent to the Proxy action drop-down list, click View/Edit Proxy.
The SMTP Proxy Action Configuration dialog box appears.
- From the Categories tree, select Headers.
- In the Pattern text box, type each of these patterns and click Add to add them to the Rules list.
- From the If matched drop-down list, select Allow.
- From the Categories tree, select Content Types.
- In the Pattern text box, type application/ms-tnef and click Add.
The pattern appears in the Rules list.
- From the If matched drop-down list, select Allow.
- From the Categories tree, select Filenames.
- In the Pattern text box, type winmail.dat and click Remove.
The winmail.dat pattern is removed from the Rules list.
- From the None matched drop-down list, select Allow.
Now, having said that, we had a client *not* using the SMTP proxy have a similar issue. This client has Securence for SPAM filtering and there is a feature you can enable within Securence that attempts to extract the contents of Winmail.dat when necessary. To enable, go to Settings -> Filters -> Winmail.dat Extraction.
(shamelessly ripped from an email from ChrisV, who rules.. thanks, man!)
On this day in 1989, British computer scientist Tim Berners-Lee presented to CERN management a proposal for a “universal linked information system” called Mesh, meant to help staff at the Swiss research center coordinate their work. Today, what we now know as the World Wide Web turns 25. Berners-Lee gave several interviews for the occasion. Looking back on his creation, he told CNet he’s glad the Web has developed as a “non-national” entity but deplores that most people on the Web still stick to their own cultures and their own ways, using the technology to reinforce their biases rather than open their world:
“I’d like it if developers on the Web could tackle the question of how to make Web sites that actually make us more friendly to people we don’t know so well,” he said.
I’m almost *giggling* while I post this..
THANK YOU, Archive!!
People are always asking me which time server to use. Here’s the list of time servers hosted by the NIST. You *should* use time.nist.gov, in order to let them round-robin your requests across all of their servers, for load-balancing purposes.
Upgrading Your Skills to MCSA Windows Server 2012
Lots of Hyper-V, lots of DAC, and lots of powershell.
Learn it, know it, live it. ;)
Finally, I can use Windows 8 without feeling like I’m trying to work from a smart phone.
Microsoft, stop forcing the results of your focus groups on me, and stop screwing around with UI dev. You’re not helping. At all. I don’t care what the study says.
I understand the whole touch-screen thing, there’s still no excuse for your assumption that I’m giving up my mouse because you want me to.
Knock it off. For the rest of you stuck with Windows 8, download and install this. You’re welcome. ;)