Tag: windows

How to identify the SAN Disk in Windows 2008?

In order to perform a storage testing, one of the server were allocated with two different storage XtremIO and FED.
Both the lun were added to server as a drive. However, we had a confusion to find which drive was from which storage. Luckily, we were able to track the luns using diskpart.

1. Open command prompt.
2. Enter “Diskpart”.
3. Enter “list volume”.
4. Type “Select volume *” (* to be replaced with volume ID Ex:C,D,E/0,1,2, etc)
5. Execute “Detail Disk”

You would now be displayed with disk details and more information, which will help you to track your lun.

Thanks,
WintelAdmin

Filed under: Storage (EMC/NetApp), Windows(2003/2008/2012)Tagged with: , , , , , , ,

How to restore Backup ROM version on HP servers using ROM Based Setup Utility.

Recently, we upgraded firmware on all our blade enclosures and servers. This time we got stuck with the Citrix servers. We were informed that the Citrix applications are not working after the recent updates. After lot of struggle it was traced out that the issue was due to the ROM version incompatibility and we had to restore the previous ROM version.

This was achieved using the “Redundant ROM Settings” available under RBSU (ROM Based Setup Utility). Please follow the below steps to restore your previous ROM without searching for the setup files.

1. Access ROM Based Setup Utility by pressing the F9 key during power on.
2. Select “Advanced Options”.
3. Select “Advanced System ROM Options”.
4. Choose “ROM Selection”.
5 Select “Switch to Backup ROM”.
6. Press the Enter key.
7. Press the Esc key to exit the current menu or press the F10 key to exit RBSU. The server restarts automatically.

Thanks,

WintelAdmin

 

Filed under: HP (Servers/products), Windows(2003/2008/2012)Tagged with: , , , , , , , , , , , , , ,

Fixing Remote Desktop (Unnecessary pop-up)

 

Microsoft Remote Desktop is a great tool for connecting to any windows machine on remote. Sometimes, when you are in need of working on many different machines, you get irritated by annoying pop-up like asking username and password before connecting to the server and annoying remote identity pop-up. This needs our manual intervention and sometime delays our task. Hence, found a suitable option to disable these pop-ups. It’s very simple, please follow the below steps:
1. Close all remote desktop connections and exit the remote desktop client.
2. Click Start, click Run, type notepad, and then click OK.
3. On the File menu, click Open.
4. In the Files of type list, click All Files.
5. In the File name box enter Default.rdp (The full path to this file would be similar to the following: C:\Users\<your username>\Documents\Default.rdp)
6. At the bottom of the Default.rdp file, add the following text:
enablecredsspsupport:i:0
authentication level:i:0
7. Save the file and exit notepad.
8. You should no longer be prompted to enter credentials before connecting to remote desktops and confirm that you do indeed intend to connect.

Thanks,
WintelAdmin.com

Filed under: Windows(2003/2008/2012)Tagged with: , , , , , , ,

Robocopy: How to copy files to a another drive, or server – only if they have changed?

With the robocopy, we can use the below syntax to copy everything from “x:\source” to “\\server\x\dest” including sub-directories:

robocopy x:\source \\server\x\dest /e /r:0 /w:0

Robocopy will look for the date and time stamp of each file. If the file has not changed, it will skip it.

Usage of parameters is as follows:

/e – This will include sub-folders, even if empty

/r:0 – Retry on failure zero times. No retries in this example. It will keep restarting the copy on failure

/w:0 – The number of seconds to wait between failures

Above won’t do is delete files on the destination if they have been deleted on the source. This can be attained by using /purge option:

robocopy X:\source \\server\X\dest /e /r:0 /w:0 /purge

Note: Usage of /purge will delete files on the destination. If you have an empty directory in source, you will end up with an empty directory on the destination.

-WintelAdmin

Filed under: Storage (EMC/NetApp), Windows(2003/2008/2012)Tagged with: , , , , , , ,

How to manually rebuild Performance Counters for Windows?

To rebuild all Performance counters including extensible and third-party counters in Windows, type the below commands at a command prompt.

cd\windows\system32

lodctr /R

Ensure that the counters are not disabled in the registry

The counters may be disabled via registry settings. Please check the following registry locations to ensure that the counters have not been disabled.

HKLM\System\CurrentControlSet\Services\%servicename%\Performance

%servicename% represents any service with a performance counter. For example: PerfDisk, PerfOS, etc.

There may be registry keys for “DisablePerformanceCounters” in any of these locations. This value should be set to 0. If the value is anything other than 0 the counter may be disabled.

A value of 1 means the counter is disabled.
A value of 2 means the 32-bit counter is disabled.
A value of 4 measn the 64-bit counter is disabled.

Thanks
WintelAdmin

Filed under: Windows(2003/2008/2012)Tagged with: , , , ,

How to Enable and disable NICs from command line?

Often when you are troubleshooting an issue with Windows Operating System, you would use the Command Prompt and there are scenarios were you would need to disable one of the NIC using command line, I often need this while troubleshooting with imaging issue. I’ve got the handy command.

C:\>wmic nic get name, index

you will find the output like
1 Broadcom NetLink (TM) Gigabit Ethernet
2 Broadcom NetLink (TM) Gigabit Ethernet #2
3 WAN Miniport (L2TP)
4 WAN Miniport (PPTP)
5 WAN Miniport (PPPOE)
6 WAN Miniport (IP)
7 Intel(R) WiFi Link 5100 AGN
8 WAN Miniport (Network Monitor)

Now, if you wish to disable “Broadcom NetLink (TM) Gigabit Ethernet #2”

Please execute the below command

C:\>wmic path win32_networkadapter where index=2 call disable

This should now disable the NIC “Broadcom NetLink (TM) Gigabit Ethernet #2”

Thanks
WintelAdmin

Filed under: Windows(2003/2008/2012)Tagged with: , , , , , ,

EMC Powerpath license registration

I was supposed to register EMC powerpath in one of the servers and I did not have an proper idea to do so. I did not have the key with myself.

Then after a lots of googling I found the command to check the EMC powerpath registration status.

C:\Users\administrator>powermt check_registration
There are no license keys now registered.

Then I logged into another server, executed the same command and got the key.

C:\Users\administrator>powermt check_registration

Key XXXX-XXXX-XXXX-XXXX-XXXX-XXXX
Product: PowerPath
Capabilities: All

I then used the same key for the server using the command.

C:\Users\administrator>emcpreg -add XXXX-XXXX-XXXX-XXXX-XXXX-XXXX
Success: License added

I succeeded in registration.

Filed under: Storage (EMC/NetApp), Windows(2003/2008/2012)Tagged with: , ,

How to change the SID and computer name of a cloned virtual machine?

In my daily life, I couldn’t imagine not having VMware Workstation to create labs or test case scenarios. On many occasions, I clone a vm in minutes to test something, but I often find that the SID remains the same. A simple utility exists that enables you to quickly change the SID and the computer name of a cloned virtual machine.

The utility is called NewSID v4.10 and is available for download free of charge.

After you download the application, extract the file to a drive and open a command prompt. Next, browse to the applicable directory.

Next, run the auto option to create a new SID and rename the computer. It takes a few minutes for the process to complete and the computer to reboot. When you log in to the computer again, the SID is brand new and the computer (Figure D) is automatically renamed.

newsid.exe /a [newcomputername]

Filed under: Windows(2003/2008/2012)Tagged with: , ,

How do I delete an orphaned share?

An orphaned share is one that the directory it shares has been deleted. If you delete a directory in Explorer that is shared any shares will automatically removed. If you delete by a different method, such as from the command prompt then the share will be left and it may result in messages in the System Event Log of the form:

You can manually update the registry to remove these “rogue” shares.

1. Start the registry editor (regedt32.exe)
2. Move to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\Shares
3. There is an entry for each share
4. Click here to view image
5. Select the entry for the share you wish to delete and select Delete from the Edit menu.
6. Click Yes to the confirmation
7. If the share had special security set it will also have an entry under the Security sub-key so move to Security (under Shares), select the share value name and delete.

The simplest way to delete a share (orphaned or not) in Windows 2k3 is to manage the computer (right click “My Computer” and then connect to another if necessary), choose Shared Folders…Shares, then right click the share and choose “Stop Sharing”.

Filed under: Windows(2003/2008/2012)Tagged with: , , ,

Track User and Computer Sessions on Windows Server.

You can use Computer Management to track all connections to shared resources on a Windows Server 2008 R2 system. Whenever a user or computer connects to a shared resource, Windows Server 2008 R2 lists a connection in the Sessions node.

To view connections to shared resources, type net session at a command prompt or follow these steps:
1. In Computer Management, connect to the computer on which you created the shared resource.
2. In the console tree, expand System Tools, expand Shared Folders, and then select Sessions. You can now view connections to shares for users and computers.

The columns for the Sessions node provide the following important information about user and computer connections:
User The names of users or computers connected to shared resources. Computer names are shown with a $ suffix to differentiate them from users.
Computer The name of the computer being used.
Type The type of network connection being used.
# Open Files The number of files the user is actively working with. For more detailed information, access the Open Files node.
Connected Time The time that has elapsed since the connection was established.
Idle Time The time that has elapsed since the connection was last used.
Guest Whether the user is logged on as a guest.

Filed under: Windows(2003/2008/2012)Tagged with: , , ,