Jump to content

samsam

Members
  • Gesamte Inhalte

    492
  • Registriert seit

  • Letzter Besuch

Alle erstellten Inhalte von samsam

  1. zuerst danke aber hier sind sehr gute articles Für Windows Server 2003 WDS How to set up Windows Deployment Services on 2003 SP2 Servers for Installs of Windows Deploy XP Images in the Computer Lab with Windows Deployment Services on Server 2003 Für Windows Server 2008 WDS Windows Server 2008 WDS Implementations - Full Deploying Windows 7 Using Windows Deployment Services (WDS): Step-by-Step F11 “Server Selection” Feature in Windows Deployment Services - WDS WDS ohne Active Directory Using WDS without Active Directory – Configuring a standalone WDS WDS Troubleshooting PART 1 PART 2 mfg
  2. Install Windows 2008 R2 NPS for RADIUS Authentication for Cisco Router Logins Using Windows Server 2008 as a RADIUS Server for a Cisco ASA Windows Server 2008 R2 as a RADIUS Server for a Cisco ASA-step by step mfg
  3. SBS2008 Migration: Active Directory replication is taking longer than expected mfg
  4. hallo ich denke du brauchst diese hotfix, download und install Fehler 1789, wenn Sie die Funktion "LookupAccountName auf einem Computer verwenden, auf dem Windows 7 oder Windows Server 2008 R2 ausgeführt wird mfg
  5. hallo du kannst von dsget user command nutzen dsget user <Benutzer-DN> -effectivepso Beispiel: dsget user "CN=u1,CN=Users,DC=corp,DC=contoso,DC=com" -effectivepso Schritt 4: Anzeigen eines resultierenden PSO für einen Benutzer oder eine globale Sicherheitsgruppe und du muss Fine-Grained Password auf Domain Contorler dass PDCe (Primary Domain Controller Emulator) FSMO role hat konfigurieren. mfg
  6. samsam

    Ereignis ID 12289

    hallo ich hoffe hilft dir Windows 2008 shadow copies error - EVENT ID: 12289 - Source: VSS regards
  7. hallo NilsK ich habe eine frage und diese frage ist für mich richtig. ich möchte wiessen dass ich richtig gelernt oder nicht also die frage: wenn mann hat keine probleme mit server(hardware) und internet leitung, ich meine, mann kann viele server benutzen und hat keine probleme. ist besser für jede ort (z.b, users in orts zwichen 10 bis 20 und in zentrale 200 user) AD setzen (wegen global catalog und ...) oder eine AD in zentrale mit additional DC setzen und die orte mit normale server(Join AD) ehrlich gesagt, das war eine frage in 70-297, aber die frage war nicht genau so.wenn mann antworte für diese frage weis, dann kann 70-297 frage einfach antworten. ich danke dir, wenn du antwortest (einmal mit und einmal ohne exchange) und bitte sag es mir auch wieso, weil wieso ist für mich richtig. danke regards *snuskhammer sorry, dass ich in deine frage , meine frage stellt regards
  8. ich hoffe hilft dir, diese information What information is available when UPGRADING from W2K/E2K to W2K3 (R2)/E2K3? Linksammlung regards
  9. samsam

    DFS - Migration

    hallo vielleicht hilft dir diese link Microsoft File Server Migration Toolkit http://www.microsoft.com/windowsserver2008/en/us/fsmt.aspx Download http://www.microsoft.com/downloads/details.aspx?displaylang=de&FamilyID=d00e3eae-930a-42b0-b595-66f462f5d87b best regards
  10. Fehlermeldung: Windows konnte nicht gestartet werden, da ein Festplattenkonfigurationsproblem vorlag http://support.microsoft.com/kb/314477/de best regards
  11. Source http://blogs.technet.com/b/kleine-unternehmen-und-mittelstand/archive/2010/09/22/microsoft-security-essentials-ab-oktober-kostenfrei-f-252-r-kleine-unternehmen.aspx Heute morgen hat Microsoft angekündigt Anfang Oktober die Security Essentials für kleine Unternehmen kostenlos zur Verfügung zu stellen. Bisher war diese Sicherheitslösung nur für private Endanwender kostenlos, ab Anfang Oktober darf die Software in Unternehmen auf bis zu 10 Computern eingesetzt werden. Sie erhalten mit Microsoft Security Essentials eine Anti-Viren und Malware Lösung für Ihre Windows PCs, die auf der gleichen Basis aufbaut, die die Sicherheits-Lösungen von Microsoft für Großunternehmen. Wenn Sie die Sicherheitlösung zentral adminitrieren möchten oder über Gruppenrichtlinien im Netzwerk steuern wollen, dann sollten Sie Microsoft Forefront Client Security in Betracht ziehen. Wenn Sie sich nicht sicher sind, fragen Sie am besten einen zertifizierten Microsoft Händler. http://www.microsoft.com/germany/kmu/pinpoint/?WT.mc_id=MSCOMDE_SMB_KMUNewsletter Mehr zu der Ankündigung finde Sie hier (englisch). http://blogs.msdn.com/b/mssmallbiz/archive/2010/09/22/announcing-microsoft-security-essentials-available-free-to-small-businesses-in-october.aspx Microsoft Security Essentials http://www.microsoft.com/security_essentials/ können Sie heute bereits für den privaten Gebrauch herunterladen, und bald auch für den kommerziellen Einsatz im kleinen Unternehmen.
  12. hallo vielleicht hilft dir diese information Back up your NTFS security permissions http://blogs.technet.com/b/justinturner/archive/2009/02/26/quick-tip-back-up-your-ntfs-security-permissions.aspx
  13. Hallo Leute ich habe seit 1 woche angefangen SCOM 2007 zulernen. gestern nacht in technet website habe eine excellent resource für anfänger gefunden. habe gedacht vielleicht hilft diese resource andere leute , dass SCOM 2007 lernen wollen. hier ist download link and orginal link. Source Link http://blogs.technet.com/b/kevinholman/archive/2010/09/02/operations-manager-101-download.aspx This is a great document for people starting out with SCOM implementations or even people experienced in the product. 100+ pages of great documentation from Microsoft Premier Field Engineers who live in the product. Table of Contents * Where do I see Views / Monitoring / Alerts etc. for my technology? * Something shows as Red. How do I figure out why it is showing as Red? * How do I get more detail on what is in my Technology’s Management Pack? * How do I disable or tune something in Ops Mgr? * How do I create a rule to be alerted on a scenario such as a user being added to domain admins? * How do I create a Subscription which will notify when a given alert occurs. * How do I know if OpsMgr is collecting a specific performance counter? * How do I create a rule to collect performance data that is not already collected in a management pack, and show it in the graphs in Operations Manager? * How do I create a performance monitor to monitor if a performance counter sample exceeds a threshold? * How do I run a report for a performance counter that OpsMgr is collecting? * How Do I Generate a Top ‘n’ Performance Report? * How do I know what parameters are available in an event to monitor off? * Appendix - Best Practices: Credits to Antoni Hanus and Jesse Harris from Microsoft PFE. Download http://blogs.technet.com/cfs-file.ashx/__key/CommunityServer-Components-PostAttachments/00-03-35 regards
  14. http://blogs.technet.com/b/keithcombs/archive/2009/05/16/windows-server-2008-interop-with-linux-and-os-x.aspx We’re a little over halfway done with the Interop Road Show I helped create. Last week Matt Hester did a simulcast of the live event from Chicago. Although he did a great job, I wanted to capture the demos with Camtasia v6.0.2 and provide some high quality audio and video of the demos, so here they are. A Party of Protocols There are a number of ways to invite Linux, UNIX, and OS X to the Windows Server Active Directory party. The operating systems we use today will interoperate in many ways because each includes some level of common protocol support. Support for HTTP is an obvious protocol they all share. SMB is also commonly used for access to Windows file system shares. In the UNIX world, NFS ruled the ether for years. Thankfully directory and security protocols like LDAP and Kerberos have also become common in the desktop and server operating systems. There are pros and cons to any approach to integrating heterogeneous environments. Usually this means there will be tradeoffs on functionality. Thankfully, there is a robust market out there to lower the number of tradeoffs and attempt to provide near seamless coexistence and integration. For those of you that get TechNet Magazine, you probably noticed the December 2008 issue devoted to this subject. You also probably noticed it isn’t necessarily trivial to do everything you might set out to accomplish. As Matt likes to say, get some sleep, get up early, and eat your Nerdflakes because you are going to need them. I shopped the partner market. I wanted to see if there were some products you should consider that ease the pain. There are and you should by all means evaluate the products from Centrify, Quest, Likewise and others. You’ll notice I am using Centrify DirectControl. The main reason for that is simple. Linux, OS X and UNIX and Windows include support for authentication, directories and file sharing. That capability is built into the OS. However, if you want to do desktop management, you really need help from an additional set of agents and code. You’ll see what I mean in demo number three below. Adding SUSE Linux to Active Directory (AD) In the video just below, we are going to add a SLED 10 SP2 virtual machine to the contoso.com domain. We’ll first check and verify the vm is able to find the domain controllers and that we have good connectivity. Then we’ll join the domain and reboot the vm. Check it out. Security Security Now that our workstation vm is a citizen of the contoso.com domain, we can start doing the stuff that would be a normal next step. For instance, we would want to verify user principals from AD can login on the Linux machine and use it. We would also want to check the security model and verify share and file permissions are working as expected. Checkout this next video on that subject. Bow to Group Policy Now that we can see networking, authentication and security is working properly, we can start to take advantage of the management infrastructure. For this demo, we are going to make a simple change to the SLED 10 SP2 GNOME settings to verify Group Policy Object (GPO) settings are flowing from Windows to Linux. Summary There is obviously a lot more to this subject, but as you can see, interoperability between Windows Server 2008 and a number of other server and desktop operating systems is quite good. You can do this the easy way, or you can do it the not so easy way. It’s really going to depend on your needs. If you have no need for desktop management via group policies, then you should investigate the native integration possibilities. If you have more advanced management needs to get the wild wild west tamed, then I would highly recommend looking at the partner tools. Enjoy
  15. Kostenlose Clips von Exchange 2007&2010 Experten http://www.exclusivelyexchange.com/exchange.html Step-by-Step Free Clips and Free Articles best regards
  16. https://msevents.microsoft.com/CUI/AdvancedSearch.aspx?culture=en-US#culture=en-US;sortKey=;sortOrder=;pageEvent=false;hdnInitialCount=;kwdAny=technet%20webcast%3A%2024%20Hours%20of%20exchange%20server%202007;eventType=0;searchcontrol=yes;s=1 wenn man Exchange Server 2007 richtig lernen möchte und will genau wissen wie soll man Exchange Server 2007 konfigurieren, muss mann diese videos sehen. ich hoffe usefull for die leute dass Exchange Server 2007 lernen möchten sein. best regards
  17. https://msevents.microsoft.com/CUI/AdvancedSearch.aspx?culture=en-US#culture=en-US;pageNumber=2;sortKey=relevance;sortOrder=ASC;pageEvent=true;hdnInitialCount=1;kwdAny=technet%20webcast%3A%2024%20Hours%20of%20Windows%20Server%202008;eventType=0;searchcontrol=yes;s=1 wenn man Windows Server 2008 richtig lernen möchte und will genau wissen wie soll man Windows server 2008 konfigurieren, muss mann diese videos sehen. ich hoffe usefull for die leute dass Windows Server 2008 lernen möchten sein. best regards
  18. http://blogs.technet.com/b/yungchou/archive/2009/01/12/20-part-webcast-series-on-microsoft-virtualization-solutions.aspx Our team of IT Pro Evangelists including: Kevin Remde, Matt Hester, Chris Avis, Chris Henley, and Yung Chou is getting ready to start delivering a 20-part webcast series on Microsoft Virtualization Solutions on January 14, 2009. The objectives of this series are not only to help you develop technical depth on various virtualization solutions with level 300 sessions, but to appreciate the essentials of a typical virtualization project in a real world implementation. The following is a list of the sessions with links to the event registration pages. What a great opportunity to get yourself well informed on the trends, the technologies, the solutions, and how to get your IT environment strategically aligned and integrated with virtualization. At same time, if you need to develop a business case for proposing your virtualization project, reference the virtualization ROI tool to realize the business values. To help you accelerating your deployment of Microsoft virtualization technologies, there are developed methodology and readily available tools in Microsoft Virtualization Solution Accelerators. And a free eBook, Understanding Microsoft Virtualization Solutions, by Mitch Tulloch is also available and highly recommended. The download informaiton is here. Session List 1. 01/14/2009, TechNet Webcast: Virtualization in a Nutshell 2. 01/16/2009, TechNet Webcast: Selecting the Right Candidates for Virtualization 3. 01/21/2009, TechNet Webcast: Virtualizing Test and Development Environments for a Quick Return on Investment 4. 01/23/2009, TechNet Webcast: Managing the Virtualized Test and Development Environment 5. 01/28/2009, TechNet Webcast: If I Virtualize It, How Do I Manage It? 6. 01/29/2009, TechNet Webcast: Consolidation and Rapid Provisioning 7. 02/04/2009, TechNet Webcast: Building on Your Existing Virtual Environment 8. 02/06/2009, TechNet Webcast: Virtualization Solutions for High Availability 9. 02/11/2009, TechNet Webcast: Client-Side Virtualization 10. 02/13/2009, TechNet Webcast: Using Presentation Virtualization 11. 02/18/2009, TechNet Webcast: Scaling Terminal Services Out (1/2) 12. 02/20/2009, TechNet Webcast: Scaling Terminal Services Out (2/2) 13. 02/25/2009, TechNet Webcast: Running Legacy Applications with Virtualization (1/2) 14. 02/27/2009, TechNet Webcast: Running Legacy Applications with Virtualization (2/2) 15. 03/04/2009, TechNet Webcast: Creating a Virtual Desktop Infrastructure 16. 03/06/2009, TechNet Webcast: Securing the Virtual Environments 17. 03/11/2009, TechNet Webcast: Virtualization with Centralized, Policy-Based Management 18. 03/13/2009, TechNet Webcast: Virtualization Solutions in Branch Offices 19. 03/20/2009, TechNet Webcast: Road Map for the Future of Virtualization 20. 03/24/2009, TechNet Webcast: Managing Virtual Solutions Regardless your role and responsibilities, session 1 TechNet Webcast: Virtualization in a Nutshell on 01/14/2009 is the one you absolutely do not want to miss. This session gives you an overview of all Microsoft virtualization solutions, so you get the big picture and know the context of a solution. You will know “Why virtualize?” and “Why Microsoft?” This session is to advance and facilitate your understanding on virtualization in general, and help you recognizing a virtualization opportunity when it presents itself. Above all, register early, join us, and take this opportunity to ramp up your skill set with virtualization. We look forward to meeting you all in the air. Enjoy
  19. zum beispiel wir haben eine App und braucht IE6 zu öffnen, und wir haben Win7 und hat IE8 mann kann so konfigurieren wenn App addresse auf IE8 schreibst, automatik IE6 öffnet oder man konfiguriert eine Virtual machine mit mehrer App und mann kann für jede benutzer paar programme konfigurieren und alle benutzer arbeiten gleich mit diese virtual machine und jede sieht nur seine eigene programme, aber du siehst nicht virtual machine, du siehst nur programme in start menu wie normale andere programme. aber sorry, meine deutsch ist nicht so gut, aber ich hoffe du verstehst was ich meine. best regards
  20. Habe schon geschrieben und habe gedacht vielleicht ist usefull für leute
  21. Hallo leute ich habe diese video gesehen, für mich war sehr usefull ich hoffe für andere leute auch usefull sein. Overview AppLocker is a new feature of Windows7 that allows administrators to define policies that can allow or deny a user’s ability to run or install executable, MSI, or script files. Microsoft Application Virtualization (App-V) separates the application from the operating system preventing application conflicts and enabling the ability to run multiple versions of an application of the same desktop. Virtual applications can be delivered in many ways – streaming by assigning applications to user, delivering to machines via Configuration Manager or by using file streaming from removable media. Using App-V and Applocker together ensures that no matter how the application is delivered or what format is takes, physical or virtual, it will respect the policies defined by IT. Watch these demonstrations to learn how to configure App-V; create, update, and publish virtual applications; and create and manage policies for virtual applications. App-V_Configuration_Options.wmv App-V_with_AppLocker_Executable_Rules.wmv App-V_with_AppLocker_Windows_Installer_Rules.wmv Create_Virtual_App.wmv Deprovision_Virtual_App.wmv Launch_Virtual_App.wmv Manage_App_Licences.wmv Publish_Virtual_App.wmv Run_Office_Virtual.wmv Update_Virtual_App.wmv Use_Dynamic_Suiting.wmv Download http://www.microsoft.com/downloads/details.aspx?familyid=E0CCA44A-F522-48C3-837F-85493B3734A9&displaylang=en regards
  22. Hallo leute ich habe diese video gesehen, für mich war sehr usefull ich hoffe für andere leute auch usefull sein. Overview The Microsoft Enterprise Desktop Virtualization (MED-V) video series is designed to help IT professionals wishing to learn more about the administrative and management tasks in MED-V. This series provides step-by-step guidance around common tasks that would be performed by IT professionals to deploy MED-V. Intended to be consumed sequentially, these videos will help you get up to speed with key MED-V administrator tasks and accelerate the deployment of MED-V in your organization. This series covers the following topics: 1 - Preparing a MED-V Image - Learn how to prepare a virtual PC image for use with MED-V. 2 - Testing, Packing, and Uploading a MED-V Image - After completing the preparation, an image will be tested, then packaged, and finally uploaded to the MED-V Server for distribution. 3 - MED-V Workspace Walkthrough - See how to configure a MED-V workspace (policies for the virtual machine) and watch a demonstration of the key features so that you can evaluate and learn the key capabilities of MED-V. 4 - Publishing Different Applications to Different Users of the Same MED-V Image - This demonstration will show you how to use a common MED-V image to serve multiple users or groups while presenting different applications. 5 - Creating a MED-V Installation Package - Deploying MED-V packages can be streamlined by creating an installation package that includes all of the prerequisite technologies (Virtual PC, VM Additions update, and MED-V client) as well as a MED-V Workspace. 6 - MED-V First Time Setup with Domain Join - Taking workspace images and configuring them to join the organization Active Directory domain is a critical part of managing, controlling and updating the virtual machines deployed, and is easy with MED-V first time setup. 7 - Monitoring and Troubleshooting Tools in MED-V - Having the right tools to gain status, detect errors, and analyze problems is important when planning a MED-V infrastructure. 8 - Updating a MED-V Image - MED-V workspaces will require updates as any other machine on the network, this walkthrough of updating the master image and distributing to users can be used if machines are not joined to the domain and managed by typical system management tools. Download http://www.microsoft.com/downloads/details.aspx?FamilyID=1f0d3e54-25d1-4ec1-a844-3b508bd63ffa&displaylang=en#filelist More Information http://www.microsoft.com/windows/enterprise/products/mdop/med-v.aspx Regards
  23. Moin NilsK leider habe keine option zu verschieben regards
  24. ich habe schon geschrieben, http://www.nullsession.com aber wenn du genaue addresse möchtest (Video) http://www.nullsession.com/2008/07/12/using-the-directory-service-comparison-tool/ Directory Service Comparison Tool 2.0 B3 http://lindstrom.nullsession.com/?page_id=11 ich hofe usefull sein regards
  25. A list of new features and improvements in DSCT 2.0 can be found in this post. Have fun and keep in mind that this is a beta version! Special thanks to Daniel Brad for some real world testing. Download * DSCT 2.0 Beta 3 x64 http://lindstrom.nullsession.com/download/DSCompareSetup_2.0_beta3_x64.zip * DSCT 2.0 Beta 3 x86 http://lindstrom.nullsession.com/download/DSCompareSetup_2.0_beta3_x86.zip Previous versions available at the bottom of this page. Getting Started 1. Start MMC and add the Directory Service Comparison Tool via the Add/Remove Snap-in dialog. 2. Open the Connection Settings dialog and connect to your DC and snapshot. Don’t forget to specify the portnumber for the snapshot host. No objects will be displayed in DSCT unless differences are detected between the DC and the snapshot. 3. Click the Resync button if you have just modified an object in Active Directory and want to compare it to it’s former state in the snapshot. Requirements * .NET 3.5 or higher * MMC 3.0 * Data sources: Active Directory and a mounted Active Directory Snapshot on Windows Server 2008 or Windows Server 2008 R2 * Active Directory audit integration: domain controllers must be Windows Server 2008 (R2 supported). Active Directory auditing must be enabled. RODCs and domain controllers running on older operating systems will be ignored. * DSCT does not have to be installed on a domain controller nor does it have to be installed on a domain joined machined. A functional DNS infrastructure is recommended. * DSCT can be installed and run on Windows Server 2008, Windows Server 2008 R2. Windows Vista and Windows 7 should work fine although this has not been tested. Testing so far * x86 and x64 versions installed and tested on Windows Server 2008 x64 * Active Directory and snapshots on Windows Server 2008 and Windows Server 2008 R2 tested as data sources * Locally on a DC and on a separate (non domain joined) machine * Restore attribute values has been tested on several attributes including ntSecurityDescriptor, multi-value attributes like member and more normal ones like givenName, sn, accountExpires, etc. * Group membership restore has been tested on users, computers and groups * Reanimation functionality has been tested on users, groups and organizationalUnits. * Active Directory audit integration tested with 10 domain controllers and a total 1.2 million event log entries in the security event logs. 6 of these spread over several domain controllers were of interest. DSCT, running on a dual core machine, retrieved these in roughly 6 seconds. Known issues * Full membership restore of very large groups (20k+) fails on a DC running Windows Server 2008. I have not been able to reproduce this error on Windows Server 2008 R2. Needs some more investigation * Due to a bug in the Windows Server 2008 snapshot feature recently created snapshots will appear to be more up to date than the Active Directory instance. DSCT has a workaround for this scenario. Read this post for further information. This issue does not affect Windows Server 2008 R2. I hope enjoy and usefull for people Regards
×
×
  • Neu erstellen...