When you install the SCVMM 2012 you can assign some of the ports that it will use for communications and file transfers between the VMM components.
Note: Not all of the ports can be changed through VMM.
The default settings for the ports are listed in the following table: Continue reading “SCVMM 2012 communications ports”
McAfee has released the 4th version of it’s Endpoint Encryption for Files and Folders.
Endpoint Encryption for Files and Folders (EEFF) 4.0 is now available for download via the McAfee download site at http://www.mcafee.com/us/downloads.
EEFF 4.0 includes the following new features:
- Full integration with McAfee ePO (v4.5 Patch 4 or higher)
- Authentication based on Windows logon for key and policy retrieval
- User Personal Keys – each user can have an individual user key created centrally in ePO for usage as file encryption key or USB device recovery key for EERM
- Support for Windows 7 64 bit
For additional details, see the Release Notes in KnowledgeBase article PD23264: https://kc.mcafee.com/corporate/index?page=content&id=PD23264
Here’s an update from McAfee.
FAQ article for VirusScan Enterprise 8.8
If you use or plan to upgrade to VirusScan Enterprise 8.8, McAfee recommends that you review the Frequently Asked Questions in KnowledgeBase article KB71642:
This content of this article is based on questions received directly from McAfee customers via our Technical Support agents and posts in the McAfee Community (https://community.mcafee.com).
Here’s some interesting information about licensing and moving virtual machine around in Hyper-V.
Windows Server 2008 Standard
So, say we’ve bought a copy of Windows Server 2008 Standard, and we install it on the Physical box below. Continue reading “Windows server 2008 Licensing and Virtual Machines”
This post from Jeremy Moskowitz is great to centralize GPO’s.
Here’s a piece of the article.
You’ve probably heard of the Group Policy Central Store, but didn’t know what it does, or where to start.
Kind of like Dorothy’s ruby slippers, it was right under your nose, the whole time, waiting for you to use it. So, before we get into that, let’s explore first what the Central Store tries to solve and where it was born from.
Microsoft had a format to describe “what’s possible” in Group Policy using a formatted, simple language called ADM files. ADM files were great because they were simple, quite readable plain text files. They described the policy setting, what the general parameters when edited, and what registry setting to control.
Microsoft shipped a handful of these in the box with Windows XP, and added more with utilities like Office and some others.
Group Policy Template and ADM Files
Let’s explore the “physics” of what would happen with Windows XP and ADM files. Let’s assume you created a new GPO from scratch:
You’d fire up the GPMC on Windows XP.”
Read more here.
Found this post about the new vSpehere licence model.
Here a piece of the post.
“Before you upgrade to VMware vSphere 5, run the tool below to learn how much vRAM you are currently using and how much you are entitled to under vSphere 5 licensing.
Because vSphere 5 licensing is based on a per-processor basis with vRam entitlements, you need to make sure all license keys you have purchased are entered into vCenter Server.
The following vRAM entitlements will be given per license type: Continue reading “vSphere 5 License Overview”
McAfee released today version 2.5 of it’s ePO-MER tool. More information about the download and documentation can be found here.
To download ePO-MER packages, go to the WebMER site at: http://mer.mcafee.com/enduser/downloadepomer.aspx.
A Walkthrough Guide is available from the KnowledgeBase. See PD22739 (https://kc.mcafee.com/corporate/index?page=content&id=PD22739), or via the WebMER site.
Release notes are available from the KnowledgeBase, See PD22740 (https://kc.mcafee.com/corporate/index?page=content&id=PD22740/u>).
Microsoft is pleased to announce that Forefront Identity Manager 2010 R2 will be released in the first half of 2012. Following the successful release of Forefront Identity Manager 2010 last year, the R2 release will include key improvements in the areas of credential management, reporting, ease of use, and additional third party product and language support. Specifically, the areas of enhancement will include: Credential Management· Web based password resetReporting· Historical reporting for managed resources· System Center Service Manager data warehouse integrationEase of Use· Enhanced initial load performance· Improved diagnostics· Enhanced load and scale performanceAdditional Support· Support for Office Outlook 2010 and SharePoint Foundation 2010· New Extensible Connectivity Management Agent Framework for MA development
After you install Windows 2008 R2 Core Server from media, you notice that powershell is installed by default. PowerShell is essential in Core environment to administer core operating system. So, it is recommended to install powershell after you install Core operating system to take full advantage of this powerful programming language in configuring the several OS parameters. Today, I installed a core server and thought of writing a articles on how to install powershell in Core. Continue reading “How to install powershell on Windows 2008 R2 Core Server”
On Jeff Wouters’s blog I saw this script and it is very usefull.
All credits go to Jeff and here’s the info. Continue reading “Take ownership of files and folders”