The Microsoft’s current documentation you’ll still need to shutdown your guest OS. First up, unless your Guest OS is also R2, you’ll need to install the hotfix noted above. However, rather than having to note the cluster’s MAC address, you’ll simply need to change the Hyper-V guest settings to enable MAC Spoofing on the NIC which you configured for NLB:
Category: Microsoft
BitLocker Active Directory Recovery Password Viewer on Windows Server 2008 R2
You can find BitLocker Password Recovery tool on Windows Server 2008 R2 under Features. You can install the tool by opening Server Manager and under »Add Features« look for »Remote Server Administration Tools« »Feature Administration Tools«. Here select »BitLocker Diver Encryption Administration Utilities« and follow the wizard.
Once install process completes you can open Active Directory Users and Computers and right click on domain level. You should now see »Find BitLocker Recovery Password…«
Recovering USB Stick that is encrypted with Bitlocker
Migrate a DFS Namespace to Windows Server 2008 Mode
When you plan to use to upgrade your DFS domain namespace to 2008 Mode there are some requirements:
– The forest uses the Windows Server 2003 or higher forest functional level
– The domain uses the Windows Server 2008 or higher domain functional level
– All namespace servers are running Windows Server 2008 or (2008 R2)
1. Installing latest DFS Hotfix on servers where Distributed File System (DFS) technologies is installed
2. Dfsutil root export \\domain\namespace path\filename.xml
3. Remove all Namespace Servers
4. Dfsutil root remove \\domain\namespace
5. Dfsutil root adddom \\server\namespace v2
6. Dfsutil root import merge path\filename.xml \\domain\namespace
7. Add all Namespace servers
8. Tuning replication performance in DFSR (especially on Win2008 R2)
MDT 2010 Update 1 Beta Released
The Solution Accelerators Team have released Microsoft Deployment Toolkit 2010 Update 1 Beta and would like your feedback.
Download the beta now at https://connect.microsoft.com/site14/Downloads/DownloadDetails.aspx?DownloadID=8689
MDT 2010 Update 1 provides new capabilities, such as:
· Support for Microsoft Office 2010.
· A new User-driven Installation (UDI) deployment method (formerly known as “Modena”) for Microsoft System Center Configuration Manager 2007. UDI gives information technology (IT) staff control over the deployment experience while empowering users to interact with and customize their operating system deployment through an easy-to-use wizard.
· Improvements to the Deployment Workbench driver import process, detecting each driver’s true supported platforms.
· Many bug fixes and other small improvements.
This release supports the deployment of the Windows® 7; Windows Vista®; Windows XP; Windows Server® 2008 R2; Windows Server 2008; and Windows Server 2003 operating systems. See the Microsoft Deployment Toolkit Documentation Library, which is included with MDT 2010 Update 1, for the complete documentation for this release.
BitLocker to Go & Save the Recovery key in Active Directory
Before you start wit Bitlocker to Go your domain controllers must be 2008 R2. You must upgrade your Schema.
After done that I made a group policy named Bitlocker to Go.
You can find the Bitlocker Policy under: Computer Configuration | Policies | Administrative Templates: Policy Definitions | Windows Components | BitLocker Drive Encryption | Removable Data Drives.
I enabled the following policies:
Choose How BitLocker Removable Drives Can Be Recovered
At first you must select the Allow Data Recovery Agent option. This option should be selected by default, but since this option is what makes the entire key recovery process possible, it is important to verify that the option is enabled.
Next, you will enable the Omit Recovery Option From The BitLocker Setup Wizard option. This prevents users from saving or printing their own copies of the recovery key.
Next, you will have to select the Save BitLocker Recovery Information to AD DS for Removable Data Drives. This is the option that actually saves the BitLocker recovery keys to the Active Directory.
Finally, you should select the Do Not Enable BitLocker Until Recovery Information Is Stored To AD DS For Removable Data Drives option. This option forces Windows to confirm that the recovery has been written to the Active Directory before BitLocker is allowed to encrypt the drive. That way, you do not have to worry about a power failure wiping out the recovery key half way through the encryption process.
Windows XP SP2 & SP3 can only read the bitlocker usb stick.
MDT HP,Lenovo,Dell tools for getting the right drivers for a specific model
When you search a driver for a specific model you always go to the HP, Dell, Lenovo, Dell site and then you go to download section and chose the model of your pc/laptop and os version and download the drivers.
The Are some handy tools for you:
Dell Tool:
Dell makes drivers driver CABs which incluse all your drivers for your model and OS.
HP Tool:
HP SoftPaq Download Manager provides a simple, powerful way to download software updates for the HP client PC models in your environment. HP SDM can significantly reduce the amount of time it takes to locate and download updates. SoftPaqs can be downloaded in as few as three easy steps from a single user interface after initial setup.
Lenovo Tool:
ThinkVantage Update Retriever enables you to download update packages from the Lenovo Help Center Web site to a network share repository folder.
This is a search tool. You give the model nummer en os and Update Retriever and scan the Lenovo Help Center Web site for the latest driver
WAIK Add Drivers to a Wim File
Some handy Windows 7 Waik commands to add drivers to a wim file.
Before you start copy the wim file to your harddisk
1. Some information about the Wim:
Dism /Get-WimInfo /WimFile:d:\boot.wim
2. Mount the wim file to a folder:
Dism /Mount-Wim /index:1 /WimFile:d:\boot.wim /MountDir:d:\mountpe
3. Add the Driver:
Dism /Image:d:\mountpe /Add-Driver /Driver:d:\nic\b57nd60x.inf
4. Close the wim file and saving the file:
Dism /Unmount-Wim /MountDir:d:\mountpe /Commit
Defrag your Virtual Machines (VMs’)
Just like any other operating system, over time, a disk will become fragmented. Virtual machines are no different. The time that it takes for a disk to become fragmented depends on what data is being added to and removed from the virtual machine hard drive.
Why use MyDefrag instead of the standard Windows defragger?
- Much faster.
- Totally automatic, extremely easy to use.
- Optimized for daily use.
- Disk optimization, several strategies.
- Directories are placed together.
- Reclaims NTFS reserved areas after disk-full.
- Maintains free spaces for temporary files.
- Can defragment very full harddisks.
- Can defragment very large files.
- Can defragment individual directories and files.
- Can be run automatically with the Windows Scheduler.
- Can be used from the commandline.
- Can be used as a screen saver.
- Can be run from cdrom or memory stick.
- Script language, can be customized.
- Better voor VCB, VDR, DPM & Snapshots.
When you run MyDeFrag.exe with /verysilent it detect automatically the OS and then install x86 or x64 version from MyDefrag. It’s always installed at c:\program files. You can deploy it with MDT 2010 automatically when installing the OS. Or run it from a network share.
Best Practices Analyzer Updates for Server 2008 R2
Update for Best Practices Analyzer for HYPER-V for Windows Server 2008 R2 x64 Edition (KB977238) You can use Hyper-V Best Practices Analyzer to scan a server that is running the Hyper-V role, and help identify configurations that do not comply with the best practices of Microsoft for this role.
Update for Best Practices Analyzer for DHCP Server for Windows Server 2008 R2 x64 Edition (KB977236) You can use DHCP Best Practices Analyzer to scan a server that is running the DHCP role and help identify configurations that do not comply with the best practices from Microsoft for this role.
Update for Best Practices Analyzer for Network Policy and Access Services for Windows Server 2008 R2 x64 Edition (NPAS) (KB977239) You can use the Network Policy and Access Services update for Best Practices Analyzer to scan a server that is running one or more of following the role services: Network Policy Server, Health Registration Authority, and Routing and Remote Access Service.
Update for Best Practices Analyzer for File Services for Windows Server 2008 R2 x64 Edition (KB981111) You can use File Services Best Practices Analyzer to scan a server that is running the File Services role and one or more of following role services: DFS Namespaces, DFS Replication, File Server, File Server Resource Manager, Services for Network File System.
Update for Best Practices Analyzer for Active Directory Rights Management Services for Windows Server 2008 R2 x64 Edition (KB981391) You can use Active Directory Rights Management Services Best Practices Analyzer to scan a server that is running the AD RMS role and help identify configurations that do not comply with the best practices of Microsoft for this role.
Update for Best Practices Analyzer for Windows Server Update Services for Windows Server 2008 R2 x64 Edition (KB981390) You can use the Windows Server Update Services (WSUS) update for Best Practices Analyzer to scan a server that is running WSUS.
Update for Best Practices Analyzer for Application Server for Windows Server 2008 R2 x64 Edition (KB981392) You can use the Application Server update for Best Practices Analyzer to scan a server