Thursday, October 17, 2013
Powershell: Restart a Remote Machine
CLS $cname = Read-Host "Enter Machine Name or IP Address" Restart-Computer -computerName $cname -Force
Option 2: Enter the name directly in the code. cls Restart-Computer -computerName "EnterMachineNameHere" -Force
Option 3: Reboot multiple Machines
cls $cname ="Server01, Server02, Server03" Restart-Computer -computer $cname -force
Joe Piggee
Powershell: List services on remote machine
#Joe Piggee
--- Begin Code----
cls
gwmi win32_service -comp (gc c:\servers.txt) | select __server,name,startmode,state,status | Out-Gridview
--- End Code ---
Disable IPv6
By Joseph Piggee Sr.
http://support.microsoft.com/kb/929852
IPv6 can be disabled either through the DisabledComponents registry value or through the check box for the Internet Protocol Version 6 (TCP/IPv6) component in the list of items on the Networking tab for the properties of connections in the Network Connections folder. The following figure shows an example.
The DisabledComponents registry key affects all interfaces on the host. However, the check box on the Networking tab affects only the specific interface. The DisabledComponents registry value does not affect the state of the check box. Therefore, even if the DisabledComponents registry key is set to disable IPv6, the check box in the Networking tab for each interface can still be checked. This is expected behavior.
Note Unchecking the checkbox on a network adapter will not disable IPv6 on the host. It will unbind IPv6 from this adapter. To disable IPv6 on the host, follow the steps below.
To use the DisabledComponents registry value to check whether IPv6 was disabled, run the following command at a Windows command prompt:
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters /v DisabledComponents
You may receive the following error message:
ERROR: The system was unable to find the specified registry key or value.
If you receive this error message, the DisabledComponents registry value is not set. If the DisabledComponents value is set, it overrides the settings in the connection properties.
To enable or to disable IPv6 or to selectively enable or disable components of IPv6 automatically, click the Fix this problem link. Then, click Runin the File Download dialog box, and follow the steps in this wizard.
Backup Active Directory
Joe Piggee
- Open NTBACKUP by either going to Run, then NTBACKUP and pressing Enter or by going to Start / Accessories / System Tools. Or my personal method, Click Start/ Run/ Type NTBACKUP.
- If you are prompted by the Backup or Restore Wizard, I suggest you un-check the "Always Start in Wizard Mode" checkbox, and click on the Advanced Mode link.
- Inside NTBACKUP's main window, click on the Backup tab.
- Click to select the System State checkbox. Note you cannot manually select components of the System State backup. It's all or nothing.
- Enter a backup path for the BKF file. If you're using a tape device, make sure NTBACKUP is aware and properly configured to use it.
Press Start Backup. - The Backup Job Information pops out, allowing you to configure a scheduled backup job and other settings. For the System State backup, do not change any of the other settings except the schedule, if so desired. When done, press Start Backup. After a few moments of configuration tasks, NTBACKUP will begin the backup job.
- When the backup is complete, review the output and close NTBACKUP.
Windows Activation Error - 0x80072EE2 & 0x8007EFE
Joe Piggee
Error x80072EE2 & 0x8007EFE
This error normally indicates a connection issue. Very vague, but true. To fix this try the following:
Turn off the firewall, and retry activation
Check Date & time settings. If you needed to change anything on the date or time, restart the server before retrying the activation
Finally, make sure you aren't using a KMS key without a KMS server.
And verify the key code is correct.
To View or Change the Tombstone LifeTime
*To perform the following steps you'll need to be a member of the Enterprise Admins group.
To view or change attribute values by using ADSIEdit:
- On the Start menu, point to Run and then type ADSIEdit.msc and press Enter.
- In the next window, click Action-> Connect to
- In the center, change the connection point to "Select a well known Naming Context"
- Click the drop down menu, and select Configuration, then click OK
- Navigate to Configuration->CN=Services->CN=Windows NT->CN=Directory Service, Right click, and select properties
- Scroll down to "tombstoneLifetime" and double click to edit. It will be displaying the current value, which will be in days.
- When done just click OK.
- Click OK and then close ADSIEdit.
Query Active Directory for a particular User
--- Begin code -----
cls
# sending LDAP query to Active Directory
#Change sAMAccountName for your query
$searcher = [ADSISearcher]'(&(objectClass=User)(objectCategory=person)(sAMAccountName=jpiggee*))'
# finding first match
$searcher.FindOne()
# finding ALL matches
$searcher.FindAll()
#This would find all user accounts with a SamAccountName that starts with "tobias". You can now use this approach to easily find out where an account is located:
# find account location
$searcher.FindAll() | Select-Object -ExpandProperty Path
---End Code ----
Joe Piggee
Get More Detailed Information Using GetDirectoryEntry()
Wednesday, October 16, 2013
List machines with thier FQDN
<#
Reference URL: http://blogs.technet.com/b/heyscriptingguy/archive/2010/03/11/hey-scripting-guy-march-11-2010.aspx
This file will read Machinelist from a file, try to get their DNS information,
and append that output to a txt file.
You can use the above mentioned URL for more information and exaples of the Try\Catch\Finally
#>
ForEach ($entry in (Get-Content c:\scripts\machinelist2.txt)) {
Try {
[net.dns]::GetHostEntry($entry).Hostname | Out-File -FilePath c:\systems.txt -Append
} Catch {
$entry | Out-File -FilePath c:\scripts\Machine_WithFQDN.txt -Append
}
}
Joe P.
Friday, September 20, 2013
How to enable the Disk Cleanup tool on Windows Server 2008 R2
- Installing the Desktop Experience feature will not only install Disk Cleanup, but a lot of other crap you don't need or want on your server.
- Installing the Desktop Experience feature will require a server reboot
Operating System
|
Architecture
|
File Location
|
Windows
Server 2008 R2
|
64-bit
|
C:\Windows\winsxs\amd64_microsoft-windows-cleanmgr_31bf3856ad364e35_6.1.7600.16385_none_c9392808773cd7da\cleanmgr.exe
|
Windows
Server 2008 R2
|
64-bit
|
C:\Windows\winsxs\amd64_microsoft-windows-cleanmgr.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b9cb6194b257cc63\cleanmgr.exe.mui
|
Windows
Server 2008
|
64-bit
|
C:\Windows\winsxs\amd64_microsoft-windows-cleanmgr.resources_31bf3856ad364e35_6.0.6001.18000_en-us_b9f50b71510436f2\cleanmgr.exe.mui
|
Windows
Server 2008
|
64-bit
|
C:\Windows\winsxs\amd64_microsoft-windows-cleanmgr_31bf3856ad364e35_6.0.6001.18000_none_c962d1e515e94269\cleanmgr.exe.mui
|
Windows
Server 2008
|
32-bit
|
C:\Windows\winsxs\x86_microsoft-windows-cleanmgr.resources_31bf3856ad364e35_6.0.6001.18000_en-us_5dd66fed98a6c5bc\cleanmgr.exe.mui
|
Windows
Server 2008
|
32-bit
|
C:\Windows\winsxs\x86_microsoft-windows-cleanmgr_31bf3856ad364e35_6.0.6001.18000_none_6d4436615d8bd133\cleanmgr.exe
|
- Copy Cleanmgr.exe to %systemroot%\System32.
- Copy Cleanmgr.exe.mui to %systemroot%\System32\en-US.
System Center 2012: Cannot Access the Web Console . Error MSG Access Denied
Thursday, May 30, 2013
Windows Diagnostic tools
Most of these tools can be easily launched if you know their names — just open your Start menu or Start screen, search for the name of the program, and press Enter. On Windows 8, you may have to select the Settings category on the search screen first. There are a few more, but these are the most common.
Windows Memory Diagnostic
Windows includes a Memory Diagnostic tool that can restart your computer and test your memory for defects, like the popular MemTest86 application. If you want to check your computer’s memory for errors, you don’t need a third-party tool — just open the Windows Memory Diagnostic tool.
Resource Monitor
The Resource Monitor application offers a detailed look at your computer’s resource usage. You can view computer-wide CPU, disk, network, and memory graphics, or drill down and view per-process statistics for each type of resource.
This means that you can see which processes are using your disk or network heavily, view which processes are communicating with which Internet addresses, and more. The Resource Monitor provides much more detailed resource statistics than the Task Manager does.
You can launch the Resource Monitor by opening the Task Manager, clicking the Performance tab, and selecting Resource Monitor. It can also be accessed by searching for Resource Monitor at the Start menu or Start screen.
Performance Monitor
The Performance Monitor application allows you to collect performance reports and view them. It can be used to log performance data over time, including determining how system changes affect performance, or to monitor the performance of a remote computer in real-time.
Computer Management and Administrative Tools
The Performance Monitor is actually one of many Microsoft Management Console (MMC) tools. Many of these can be found in the Administrative Tools folder, but they can be opened in a single window by opening the Computer Management application. Among other things, this window contains the following tools:
- Task Scheduler: A tool that allows you to view and customize the scheduled tasks on your computer, in addition to creating your own custom scheduled tasks.
- Event Viewer: A log viewer that allows you to view and filter system events — everything from software installation to application crashes and blue screens of death.
- Shared Folders: An interface that displays the folders shared over the network on your computer, useful for viewing what folders are being shared at a glance.
- Device Manager: The classic Windows Device Manager that allows you to view the devices connected to your computer, disable them, and configure their drivers.
- Disk Management: A built-in partition manager you can use without downloading any third-party tools.
- Services: An interface that allows you to view and control the background services running in Windows.
The Administrative Tools folder also contains other useful utilities, such as the Windows Firewall with Advanced Security application that allows you to create advanced firewall rules.
Advanced User Accounts Tool
Windows contains a hidden User Accounts utility that provides some options not present in the standard interface. To open it, press WinKey+R to open the Run dialog, type eithernetplwiz or control userpasswords2, and press Enter.
This window also contains a shortcut to launch the Local Users and Groups tool, which offers more user management tasks, but can’t be used on Home or standard versions of Windows.
Disk Cleanup
Windows’ Disk Cleanup utility isn’t quite as hidden as some of the other utilities here, but not enough people know about it. It will scan your computer for files that can be deleted, from temporary files and memory dumps to old system restore points and leftover files from Windows upgrades. It does the same job a PC cleaning utility does, but it’s free and doesn’t try to extract any money from you. Advanced users may prefer CCleaner, but Disk Cleanup does a decent job.
Access it by searching for Disk Cleanup at your Start screen or Start menu.
Group Policy Editor
The Group Policy Editor is only available on Professional or Ultimate editions of Windows, not the standard or Home editions. It provides a wide variety of settings that are designed for use by system administrators to customize and lock down PCs on their networks, but the local group policy editor also contains some settings that average users might be interested in. For example, on Windows 8, the group policy editor can be used to disable the lock screen and skip directly to the log-in screen.
To open it, type gpedit.msc at the Start menu or Start screen and press Enter.
Registry Editor
Sure, everyone knows about the registry editor — but it’s still hidden, with Microsoft not even providing a Start menu shortcut to it. It must be launched by typing regedit into the Start menu or Start screen and pressing Enter.
Many tweaks that can be made in the Group Policy Editor have equivalent tweaks that can be made in the registry editor. For example, on Windows 8, users with the standard edition of Windows 8 can’t disable the lock screen via the Group Policy Editor — but they can disable the lock screen with a registry hack.
MSConfig
The System Configuration window is another classic tool that many people know about. Prior to Windows 8, which features a startup-program manager built into its Task Manager, this tool was the only included way of controlling startup programs on Windows. It also allows you to customize your boot loader, which is particularly useful if you have multiple versions of Windows installed.
Launch it by typing msconfig into the Start menu or Start screen and pressing Enter.
System Information
The System Information utility allows you to view information about the current computer — everything from the model number of its CD-ROM drive to its attached peripherals, configured environment variables, and startup programs. It doesn’t provide the slickest interface, nor does it provide all the information a third-party system information tool like Speccy does, but it will display a lot of system information without forcing you to install another program.
Open it by searching for System Information at your Start menu or Start screen.
Once you know these utilities exist, you can do more with the tools built into Windows. These tools are available on any Windows computer, so you can always use them without downloading and installing software.
Wednesday, May 22, 2013
Add a New Virtual Machine to Inventory from a Datastore
By Joe Piggee
If you present new storage to vSphere that already has VM’s stored on it, you can add them to inventory so you can power them on, manage them etc by following these steps.
- Open the vSphere/VMware Infrastructure (VI) Client and log in with appropriate credentials.
- If connecting to vCenter Server, click on the desired host.
- Click the Configuration tab.
- Click Storage.
- Right-click on the appropriate datastore and click Browse Datastore.
- Navigate to the folder named after the virtual machine, and locate the <virtual machine>.vmx file.
- Right-click the .vmx file and click Add to inventory. The Add to Inventory wizard opens.
continue to follow the wizard to add the virtual machine.
If the device is something like an external USB drive, prior to completing the steps above complete the following:
If you have some shared storage, install vCenter 5.1, then connect the External hard drive to the PC you are working from(the one you have the vSphere client installed on) browse to the appropriate datastore, and upload the VM's to the shared storage, or to the local datastore that the ESXi host has. Then complete the steps needed to import the discovered VM's listed above.
What Is vShield?
by Joe Piggee
vShield is a group of networking and security products for virtualized IT infrastructures.
vShield is comprised of vShield Manager, vShield Edge, vShield Zones, vShield App, vShield Data Security and vShield Endpoint. Products in the vShield Suite operate under the centralized management of vShield Manager.
VShield Zones - provides basic virtual networking security and firewalls to vSphere.
VShield App - adds a firewall for applications in the virtual data center.
VShield Edge - operates on the network edge, securing isolated virtual machines (VMs) and virtualized networks and providing their gateway services.
VShield Data Security - protects sensitive data in the virtual and cloud infrastructure, tracking any violations.
VShield Endpoint - supports agentless antivirus protection for guest OSes, in a secure virtual appliance.
Wednesday, May 15, 2013
Verify ESXi Licensed Featured
By Joe Piggee
Sometimes you’ll see errors, even though everything is configured correctly. I can’t tell you how many times I’ve gone to a clients site and performed troubleshooting tasks, just to findout they aren’t licensed for a particular function. So Verify first before getting to deep.
To verify which features are licensed, make sure that the vSphere Client/VMware Infrastructure is connected to vCenter Server/VirtualCenter.
- Select the ESX/ESXi host from the inventory in vCenter Server.
- Click the Configuration tab.
- Click the Licensed Features link.
Ensure that the feature appears on the list and that there are enough CPU licenses. If the feature is not listed, click Edit and enable the feature
vSphere 5.x Firewalls
By Joe Piggee
By default, when ESXi is installed, the firewall is enabled. The default configuration is to permit only the required operational traffic and to deny all others. As a note, the command esxcfg-firewall was retired and replaced by esxcli network firewall in vSphere 5.
To enable the firewall:
esxcli network firewall set –enabled true
To disable the firewall
esxcli network firewall set –enabled false
Enable/Disable pre-configured services
- List the services and record the proper ruleset ID for your service
- esxcli network firewall ruleset list
- To enable:
- esxcli network firewall ruleset –enabled true –ruleset-id rulesetName
- To disable:
- esxcli network firewall ruleset –enabled false –ruleset-id rulesetName
Configure service behavior automation
- Login to vSphere client
- Enter the Hosts and Clusters View (Ctrl + Shift + H)
- Select a host
- Click the Configuration tab
- Under the Software view, select Security Profile
- Under Security Profile > Services, click Properties
- Highlight a service
- Click Options
- The service operational controls are listed
- Start automatically if any ports are open, and stop when all ports are closed
- Start and stop with host
- Start and stop manually (Select this to effectively disable the service)
Open/Close ports in the firewall
- Login to vSphere client
- Enter the Hosts and Clusters View (Ctrl + Shift + H)
- Select a host
- Click the Configuration tab
- Under the Software view, select Security Profile
- Under Security Profile > Firewall, click Properties
- Highlight a service
- To enable a firewall rule, check the check box next to the traffic label
- Click Options to set the service start automation settings as described above
- Click the firewall button to define what connections can be made to the services. All connections may be allowed or it can be restricted to a single IPv4 or IPv6 addresses and/or IPv4 or IPv6 networks.
Alternatively, to define the allowed IP addresses, you may configure this from the command line:
esxcli network firewall ruleset allowedip add –ruleset-id RulesetName –ip-address IPAddress/Network
esxcli network firewall ruleset allowedip add –ruleset-id RulesetName –ip-address IPAddress
esxcli network firewall ruleset allowedip remove –ruleset-id RulesetName –ip-address IPAddress/Network
esxcli network firewall ruleset allowedip remove –ruleset-id RulesetName –ip-address IPAddress
esxcli network firewall ruleset allowedip list –ruleset-id RulesetName
Note that you may edit the /etc/vmware/firewall/services.xml file for the pre-configured services. After you update any port numbers, remember to refresh the firewall:
esxcli network firewall refresh
ESXCLI Firewall Commands
By Joe Piggee
esxcli firewall commands
Command | Description |
esxcli network firewall get | Returns the enabled or disabled status of the firewall and lists default actions |
esxcli network firewall set –defaultaction | Update default actions |
esxcli network firewall set –enabled | Set to true to enable the firewall, set to false to disable the firewall |
esxcli network firewall load | Load the firewall module and rule set configuration |
esxcli network firewall refresh | Refresh the firewall configuration by reading the rule set files if the firewall module is loaded |
esxcli network firewall unload | Destroy filters and unload the firewall module |
esxcli network firewall ruleset list | Set the allowedall flag |
esxcli network firewall ruleset set –allowedall | Enable or disable the specified rule set |
esxcli network firewall ruleset set –enabled | Enable or disable the specified rule set |
esxcli network firewall ruleset allowedip list | List the allowed IP addresses of the specified rule set. |
esxcli network firewall ruleset allowedip add | Allow access to the rule set from the specified IP address or range of IP addresses |
esxcli network firewall ruleset allowedip remove | Remove access to the rule set from the specified IP address or range of IP addresses. |
Configuring VLANs on UCS and VMware
By Joe Piggee
These are the steps required to add VLANs to both UCS and VMware. In UCS each VLAN is identified by a unique ID. The VLAN ID is a number that represents that particular VLAN. The name that you assign to a VLAN ID adds a layer of abstraction that allows you to globally update all servers associated with service profiles that use the named VLAN. You can also create more than one named VLANs with the same VLAN ID. Note that the name of a VLAN is known only within the UCS environment, and outside of the UCS the VLAN is represented by the unique ID.
VLAN Configuration on the UCS
Depending on how the UCS infrastructure is configured, VLAN availability for physical hosts may have to be configured on either a port group or individual host basis. The same applies in the VMWare environment.
Follow the steps to configure VLAN on UCS:
a) Open UCS manager. In the Navigation pane on the left of the application, select the LAN tab.
b) Expand the navigation tree so that the VLANs branch is visible. Right click on the VLANs branch and select Create VLAN(s).
c) Provide a meaningful name for the VLAN, this name cannot be changed once saved. For most situations the Common/Global radio button should be selected to ensure the same configuration is applied to both Fabrics. Enter the VLAN ID(s), then press the Check Overlap button to ensure there is no conflict with existing configuration and if unique, press OK.
.
d) Check that the newly created VLAN appears in the list of configured VLANs in the navigation pane.
e) If the platform is using vNIC templates then the next step is to add the created VLAN to the required templates. Expand the vNIC Templates branch of the navigation pane (LAN -> Policies -> root -> vNIC Templates) and select the template which should have the VLAN available.
f) On the General tab for each Template click Modify VLANs.
g) In the window that opens add the new VLAN.
Repeat this for each Template.
h) Switch to the servers tab in the Navigation Pane and expand the Service Profiles and the root node, the service profiles for each Chassis/Blade should be visible.
.
i) Expand each service profile in turn so that the vNIC for the Chassis/Blade is visible. If the vNIC is bound to one of the templates modified earlier then the VLAN will be listed under the vNIC.
j) If the VLAN is not listed then select the vNIC and in the main panel click the Modify VLANs link. For vNICs bound to templates, this link will be greyed out.
k) In the window that opens select the new VLAN.
Repeat this process for each vNIC that is not bound to a template.
Once all the vNICs have the VLAN available to them, exit UCS Manager.
VLAN Configuration on VMware
Follow these steps to add VLAN on VMware:
a) Open vSphere Client and connect to the VCENTER server. Navigate to the blade that the VLAN is required on (Home -> Inventory -> Hosts and Clusters). Expand the Navigation tree, to locate the server name and then select the Configuration tab in the main window. From within the Configuration window, select Networking.
b) Click on the Properties link for the Virtual Switch, then in the opened window click on the Add button.
c) In the next window select Virtual Machine in the Connection Types and click next.
d) Under Port Group Properties enter a Network Label and the VLAN ID, then click Next
e) Now the new VLAN should show under Host networking vSwitch, click Finish.
f) To add a virtual machine to the VLAN, edit the machine configuration, select the Network Adapter and from the Network Connection drop down list select the new VLAN.
That’s it. You should be all set.
Monday, April 29, 2013
EMC VNX CLI Reference – VNX 5300, VNX5500
By Joe Piggee
*Please note that EMC advises using the GUI, or opening a SR prior to using CLI. These commands have been gather from multiple sites and is pretty straight forward
Server specific commands:
server_cpu server_<x> -r now Reboots a datamover
server_ping <IP> ping any IP from the control station
server_ifconfig server_2 –all View all configured interfaces
server_route server_2 {-list,flush,add,delete} Routing table commands
server_mount Mount a filesystem
server_export Export a filesystem
server_stats Provides realtime stats for a datamover, many different options.
server_sysconfig Modifies hardware config of the data movers.
server_devconfig Configures devices on the data movers.
server_sysstat Shows current Memory, CPU, and thread utilization
server_log server_2 Shows current log
vi /nas/jserver/logs/system_log Java System log
vi /var/log/messages System Messages
server_ifconfig server_2 <interface_name> up Bring up a specific interface
server_ifconfig server_2 <interface_name> down Take a specific interface down
server_date Sets system time and NTP server settings
server_file FTP equivalent command
server_dns Configure DNS
server_cifssupport Support services for CIFS users
To view HBA Statistics:
.server_config server_2 -v “printstats fcp reset” Toggles the service on/off
.server_config server_2 -v “printstats fcp full” View the stats table (must wait a while for some stats to collect before viewing)
To Join/Unjoin a CIFS Server from the domain:
server_cifs server_2 -Join compname=SERVERNAME,domain=DOMAIN.COM,admin=ADMINID
server_cifs server_2 -Unjoin compname=SERVERNAME,domain=DOMAIN.COM,admin=ADMINID
To view the current domain controllers visible on the data mover:
.server_config server_2 -v “pdc dump”
To enable or disable a domain controller on the data mover:
.server_config server_2 -v “pdc enable=<ip_address>” Enable a domain controller
.server_config server_2 -v “pdc disable=<ip_address>” Disable a domain controller
To stop and start the CIFS service:
server_setup server_2 -P cifs -o stop Stop CIFS Service
server_setup server_2 -P cifs -o start Start CIFS Service
To stop, start or check the status of the iSCSI service:
server_iscsi server_2 -service -start Start iSCSI service
server_iscsi server_2 -service -stop Stop iSCSI service
server_iscsi server_2 -service -status Check the status of the iSCSI service
To enable/disable NDMP Logging:
Turn it on:
.server_config server_x “logsys set severity NDMP=LOG_DBG2″
.server_config server_x “logsys set severity PAX=LOG_DBG2″
Turn it off:
.server_config server_x “logsys set severity NDMP=LOG_ERR”
.server_config server_x “logsys set severity PAX=LOG_ERR”
For gathering performance statistics:
server_netstat server_x -i Interface statistics
server_sysconfig server_x -v Lists virtual devices
server_sysconfig server_x -v -i vdevice_name Informational stats on the virtual device
server_netstat server_x -s -a tcp Retransmissions
server_nfsstat server_x NFS SRTs
server_nfsstat server_x -zero Reset NFS stats
Filesystem specific commands:
fs_ckpt Manage Checkpoints
fs_dhsm Manage File Mover
fs_group Manage filesystem groups
Complete List of “nas_” Commands:
This is just for reference, you can easily pull up this list from a Celerra by typing nas_ and hitting the tab key.
nas_acl
nas_ckpt_schedule
nas_dbtable
nas_emailuser
nas_inventory
nas_pool
nas_slice
nas_task
nas_automountmap
nas_cmd
nas_devicegroup
nas_event
nas_license
nas_quotas
nas_stats
nas_version nas_cel
nas_copy
nas_disk
nas_fs
nas_logviewer
nas_replicate
nas_storage
nas_volume
nas_checkup
nas_cs
nas_diskmark
nas_fsck
nas_message
nas_server
nas_symm
nas_xml
Complete list of “server_” Commands:
This is just for reference, you can easily pull up this list from a Celerra by typing server_ and hitting the tab key.
server_archive
server_cifssupport
server_file
server_log
server_name
server_ping6
server_sysconfig
server_vtlu
server_arp
server_cpu
server_ftp
server_mgr
server_netstat
server_rip
server_sysstat
server_cdms
server_date
server_http
server_mount
server_nfs
server_route
server_tftp
server_cepp
server_dbms
server_ifconfig
server_mountpoint
server_nfsstat
server_security
server_umount
server_certificate
server_devconfig
server_ip
server_mpfs
server_nis
server_setup
server_uptime
server_checkup
server_df
server_iscsi
server_mpfsstat
server_param
server_snmpd
server_usermapper
server_cifs
server_dns
server_kerberos
server_mt
server_pax
server_standby
server_version
server_cifsstat
server_export
server_ldap
server_muxconfig
server_ping
server_stats
server_viruschk
Complete list of “fs_” Commands:
This is just for reference, you can easily pull up this list from a Celerra by typing fs_ and hitting the tab key.
fs_ckpt
fs_dedupe
fs_dhsm
fs_group
fs_rdf
fs_timefinder
*reference sites: http://emcsan.wordpress.com/2011/06/03/useful-celerra-commands/
Thursday, April 25, 2013
Check my Exchange Server Version
by Joe Piggee Sr.
1. Open EMS
2. Type Get-ExchangeServer | fl name,edition,admindisplayversion
Thursday, April 18, 2013
How To Add Holidays to Outlook 2010
By Joe Piggee Sr.
1. Open Outlook and Click on the File Tab. | |
2. Scroll Down and Select “Options” | |
3. Click Calendar 4. Click Add Holidays |
Wednesday, April 17, 2013
How to Remove a Domain Controller
By Joe Piggee Sr.
Removing a domain controller by using the Windows interface
You can use the Active Directory Domain Services Installation Wizard to remove a domain controller from an existing domain.
Administrative credentials
To perform this procedure, you must be a member of the Domain Admins group in the domain.
Click Start, click Run, type dcpromo, and then press ENTER.
-
On the Welcome to the Active Directory Domain Services Installation Wizard page, click Next.
-
If the domain controller is a global catalog server, a message appears to warn you about the effect of removing a global catalog server from the environment. Click OK to continue.
-
On the Delete the Domain page, make no selection, and then click Next.
-
If the domain controller has application directory partitions, on the Application Directory Partitions page, view the application directory partitions in the list, and then remove or retain application directory partitions, as follows:
- If you do not want to retain any application directory partitions that are stored on the domain controller, click Next.
- If you want to retain an application directory partition that an application has created on the domain controller, use the application that created the partition to remove it, and then click Refresh to update the list.
-
If the Confirm Deletion page appears, select the option to delete all application directory partitions on the domain controller, and then click Next.
-
On the Remove DNS Delegation page, verify that the Delete the DNS delegations pointing to this server check box is selected, and then click Next.
-
If necessary, enter administrative credentials for the server that hosts the DNS zones that contain the DNS delegation for this server, and then click OK.
-
On the Administrator Password page, type and confirm a secure password for the local Administrator account, and then click Next.
-
On the Summary page, to save the settings that you selected to an answer file that you can use to automate subsequent operations in Active Directory Domain Services (AD DS), click Export settings. Type a name for your answer file, and then click Save. Review your selections, and then click Next to remove AD DS.
-
On the Completing the Active Directory Domain Services Installation Wizard page, click Finish.
-
You can either select the Reboot on completion check box to have the server restart automatically or you can restart the server to complete the AD DS removal when you are prompted to do so.
-
Open Server Manager. Click Start, point to Administrative Tools, and then click Server Manager.
-
In Roles Summary, click Remove Roles.
-
If necessary, review the information on the Before You Begin page, and then click Next.
-
On the Remove Server Roles page, clear the Active Directory Domain Services check box, and then click Next.
-
On the Confirm Removal Selections page, click Remove.
-
On the Removal Results page, click Close, and then click Yes to restart the server.
*http://technet.microsoft.com/en-us/library/cc771844(v=ws.10).aspx