Archive for the ‘Windows Server 2012’ Category

Microsoft Windows Server 2012 (nicht R2) – geht in eine Update Schleife „Configuring Updates: Stage 2 of 4“

Samstag, November 30th, 2019

So lässt sich die Update Schleife vermeiden – mit der Installationsreihenfolge zwischen Servicing Stack Updates (SSU) und anderen Updates läßt sich das Problem vermeiden denn ist das neueste SSU installiert werden zumindest bekannte Microsoft Probleme die eine erfolgreiche Update Installation verhindern behoben. In der Microsoft Update Catalog-Beschreibung des Servicing Stack Update KB4523208 für November 2019 gibt Microsoft an dass dieses exklusiv installiert werden muss. Ist man in einer Update Schleife bereits gefangen helfen gegebenenfalls diese Lösungen

Microsoft Windows Update Reset via Powershell Script ‚Reset-WindowsUpdate.ps1‘ – will completely reset the Windows Update client settings

Sonntag, Oktober 13th, 2019

This Powershell Script ‚Reset-WindowsUpdate.ps1‘ – will completely reset the Windows Update client settings it has been tested on Windows 7, 8, 10, and Server 2012 R2 and it will configure the services and registry keys related to Windows Update for default settings

Microsoft Windows Client / Microsoft Windows Server – how to determine which .NET Framework versions are installed

Freitag, Oktober 11th, 2019

Users can install and run multiple versions of the .NET Framework on their computers. When you develop or deploy your app, you might need to know which .NET Framework versions are installed on the user’s computer

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full

Microsoft Windows Server 2008 R2 & 2012 R2 – applications may crash or become unresponsive if another user logs off Remote Desktop session

Montag, Oktober 7th, 2019

To resolve this issue upgrade to Windows Server 2016 the issue is fixed in this version of Windows Server

Microsoft Windows 7/8 & Windows Server W2k8/W2k12/W2k16/W2k19 – CVE-2019-1182 | Remote Desktop Services Remote Code Execution Vulnerability Security Vulnerability

Mittwoch, August 14th, 2019

A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights

Microsoft Windows 7 & Windows Server 2008 R2 – CVE-2019-1132 | Win32k Elevation of Privilege Vulnerability

Donnerstag, Juli 11th, 2019

CVE-2019-1132 | Win32k Elevation of Privilege Vulnerability

Disk Defragmentation best practice – are you looking for information on defragmentation of your vmsf datastores or defragmentation within the guest os

Sonntag, Juni 9th, 2019

vmware_logo.jpg   The answer is NO defragmentation for both – defragmentation also generates more I/O to the disk. This could be more of a concern to customers than any possible performance improvement that might be gained from the defrag. I should point out that I have read that, internally at VMware, we have not observed any noticeable improvement in performance after a defragmentation of Guest OSes residing on SAN or NAS based datastores. I also want to highlight an additional scenario that uses an array based technology rather than a vSphere technology. If your storage array is capable of moving blocks of data between different storage tiers (SSD/SAS/SATA), e.g. EMC FAST, then defragmentation of the Guest OS doesn’t really make much sense. If your VM has been running for some time on tiered storage, then in all likelihood the array has already learnt where the hot-blocks are, and has relocated these onto the SSD. If you now go ahead and defrag, and move all of the VM’s blocks around again, the array is going to have to relearn where the hot-spots are

Microsoft Windows Server 2008 R2 / 2012 R2 / 2016 – Leistungsprobleme bei Verwendung des Energiesparplan „Ausbalanciert“

Montag, Dezember 3rd, 2018

Microsoft Windows Server 2008 R2 / 2012 R2 / 2016 – Leistungsprobleme bei Verwendung des Energiesparplan „Ausbalanciert“

Microsoft Windows Admin Center – ist ein Administrationsprogramm für Microsoft Windows 10 und Windows Server Betriebssysteme das deren Verwaltung vereinfachen und zentraler machen soll

Sonntag, Dezember 2nd, 2018

Microsoft Windows Admin Center – ist eine Weiterentwicklung der integrierten Windows Server Verwaltungstools. Es ist eine zentralen Konsole die alle Aspekte der lokalen und Remoteserververwaltung konsolidiert. Als eine lokal bereitgestellte browserbasierte Managementlösung ist keine Verbindung mit dem Internet und Azure erforderlich. Windows Admin Center ermöglicht die vollständige Kontrolle über alle Aspekte der Bereitstellung einschließlich privater Netzwerke

Microsoft Windows Server 2012 R2 – support lifecycle

Donnerstag, November 15th, 2018

Microsoft Windows Server – how to create symlink’s using ‚mklink‘

Montag, Januar 1st, 2018
C:\ mklink [[/d] | [/h] | [/j]] <Link> <Target>
/d      Creates a directory symbolic link.  Default is a file symbolic link.
/h      Creates a hard link instead of a symbolic link.
/j      Creates a Directory Junction.
Link    specifies the new symbolic link name.
Target  specifies the path (relative or absolute) that the new link refers to

Microsoft Windows Server 2016, Windows Server 2012 R2, Windows Server 2012 – Resilient File System (ReFS)

Montag, Juni 5th, 2017

Das Resilient File System (ReFS) ist das neuste Dateisystem von Microsoft das die Datenverfügbarkeit maximiert, große Datasets über diverse Arbeitslasten effektiv skaliert und Datenintegrität durch Resilienz gegenüber Beschädigungen von zentraler Bedeutung bereitstellt

Microsoft Rollup Updates KB3197867, KB3197868, KB3197873, KB3197874 – released a couple of Rollup updates for Windows 7, Windows 8.1 and the corrospending Server variants at November 8, 2016

Freitag, November 11th, 2016

mswindows_logo.jpg   Microsoft Security Bulletin Summary for November 2016

Microsoft Windows – how to extend the timeout for services

Dienstag, September 20th, 2016

mswindows_logo.jpg   In Registry Editor locate and then right-click the following registry subkey:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control

Point to New and then click DWORD Value – in the right pane of Registry Editor a new value named New Value #1 will appear – type ServicesPipeTimeout to replace New Value #1 and then press ENTER
Right-click the ServicesPipeTimeout registry entry that you created in step 3 and then click Modify – the Edit DWORD Value dialog box will appear and change Base to Decimal – in the Value data text box type <TimeoutPeriod> where TimeoutPeriod is the amount of time allowed for service to start (in milliseconds) and then click OK – finally restart the machine

Microsoft Update for Windows KB3187022 – print functionality is broken after any of the MS16-098 security updates are installed

Freitag, August 26th, 2016

mswindows_logo.jpg   You can fix these issues by installing the update that is described in this article