With this policy settings, you can provide a default experience for your users while still allowing each user to customize their theme. For example, if an end-user has already changed their theme, their setting will take precedence over a theme that is applied via Group Policy.
Today I had to change some settings on the HP iLO interface on a server. When I applied the changes I was notified that the settings would take place after the iLO interface was reset, but how do you reset it?
Today I had to deploy a new Windows Server 2012 VM. Because In VMware you can Clone a VM I used this option. But when it comes to Server 2010, the cloned VM will have a duplicate copy of the SID of the machine from which it was cloned.
This duplicate SID can cause a lot of issues so each machine must have an unique SID. In this post I will show you the steps to generate a new SID in Windows Server 2012.
First log on to the Windows Server 2012 VM. Now open Windows Explorer, and browse to C:\Windows\System32\Sysprep
Right-click sysprep application and click Run as Administrator
No the sysprep (System Preparation) tool will open as shown below. Choose Enter System Out-of-the-box Experience (OOBE) option, check Generalize option, choose Reboot as shutdown options and click OK.
For more information about the different switches see (https://technet.microsoft.com/en-us/library/cc721973(WS.10).aspx)
When you click OK, the application will generate new SID and perform all the required actions and will reboot.
After the reboot is complete, you will be asked to enter the product key, accept License terms, and enter a new Administrator password.
This is how you can generate a new SID on Windows Server 2012.
Windows 2008 (R2) and 2012 (R2) all include the Windows Server Backup feature, which is a reliable but basic backup utility. I only use Windows Server Backup when the server is a physical server. The Windows Server Backup allowing you to restore data or the entire server as necessary. The only downside in WSB is the lack of a reporting function.
Because it is very important to see the status of a back-up job,so that any failures are addressed immediately. WSB doesn’t natively allow you to configure notification emails that advise on the success or failure of each backup.

Windows Server Backup writes operational events to its own event log, located at Logs > Applications and Services Logs > Microsoft > Windows > Backup > Operational. Successful or unsuccessful completion of the backup is logged at this location, so we can use these events as a trigger to send ‘success’ or ‘failure’ email to a particular backup admin user.

Create success email task
The goal is to trigger the notification on backup completion. Because it is more practical to set up two notification (failure of success) we need two tasks.
Click on ‘Create Task’ and configure as follows:
- Name: Backup Success Email Task
- Description: Notifies backup admin of scheduled backup successful completion
- Run whether user is logged on or not
- Go to the trigger tab, press “New”, choose “On an event”, select “Custom” and then “New Event Filter”
- Select “By log”, then navigate to “Applications and services logs”, then “Microsoft, then “Windows” then find “Backup” and tick it
- Use the following Event ID’s
1 |
4 |
- Save your changes and navigate to the actions tab of the task
- Action: Send an email (configure email settings, subject, body etc as required)
Create failure email task
After you configured the correct settings you can save this task and create another one to be triggered on backup failure. This one has more event triggers, because there are multiple backup failure event codes. Configure the task as follows:
- Name: Backup Failure Email Task
- Description: Notifies backup admin of scheduled backup failure
- Run whether user is logged in or not
- Go to the trigger tab, press “New”, choose “On an event”, select “Custom” and then “New Event Filter”
- Select “By log”, then navigate to “Applications and services logs”, then “Microsoft, then “Windows” then find “Backup” and tick it
- Use the following Event ID’s
1 |
5,8,9,17-22,49,50,52,100,517,518,521,527,528,544,545,546,561,564,612 |
- Save your changes and navigate to the actions tab of the task
- Action: Send an email (configure email settings, subject, body etc as required
If you want to test your email notifications, be sure to check the “Allow task to be run on demand” option under the Settings tab.
Today I finally bought a Google Chromecast. The Chromecast is a handy, inexpensive way to stream media from online to your TV over your home WIFI network, using your computer or mobile device as a bridge. It’s pretty simple to setup, but for those who need a little more help this guide can walk you through each step and make sure you get everything working properly on the first try.
To decomission an Active Directory Domain Controller (Windows Server 2003/2008) is a fairly straight forward task as long as you make sure nothing is relying on that server.
What to check before decomissioning your DC
The most important thing to check before you are decomissioning your DC are the following components that are either running or registrered against the system:
- Global Catalog
- FSMO Roles
- Bridgehead server
- General server health
- Enterprise admin credentials
This script was originally created to run as a scheduled task. All variables will have to be updated to fit with your own environment i.e. $hostname, $smtpserver. Once run it will complete the following –
1. Send an e-mail to whichever address/s that you specify within the $recipients variable. In my case this was used to inform the alert monitoring team that they can ignore alerts for this service over the next 10 mins.
2. Stop the service specified within the $service variable. A do..Until loop was used to confirm the service had stopped before continuing with the script.
3. Start the service. Again, a do..Until loop was used to confirm the service had started.
4. Send an e-mail to the same recipients informing them that the service has restarted successfully.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 |
# Author: Simon Rowe # Created: 6th Feb 2014 # Description: 1. Sends an e-mail informing relevant parties that the service is about to restart. # 2. Stops the service and confirms the status as stopped. # 3. Starts the service and confirms the status as Running. # 4. Sends an e-mail informing support that the service has restarted successfully. # Send e-mail to alert users of Apache service restart $hostname = hostname $smtpServer = 'mail.domain.local' $from = "Service.$hostname@domain.com" $recipients = 'support@domain.com','operations@domain.com' $Subject = "Restarting msiserver Service on $hostname" $body = "This is an automated message to confirm that the msiserver service on $hostname is about to be restarted as part of scheduled maintenance, please ignore any alerts for the next 10 minutes from this service." Send-MailMessage -To $recipients -Subject $Subject -Body $body -From $from -SmtpServer $smtpServer # Stop service $service = 'msiserver' Stop-Service -name $service -Verbose do { Start-sleep -s 5 } until ((get-service $service).Status -eq 'Stopped') # Start service start-Service -name $service -Verbose do { Start-sleep -s 5 } until ((get-service $service).Status -eq 'Running') # Send confirmation that service has restarted successfully $Subject = "msiserver Service Restarted Successfully on $hostname" $body = "This mail confirms that the msiserver service on $hostname is now running. Operations, please restart your IXP GUI on your monitoring workstations to confirm they are showing correct information" Start-Sleep -s 5 Send-MailMessage -To $recipients -Subject $Subject -Body $body -From $from -SmtpServer $smtpServer |
This tip explains the simplest way to check FSMO Roles availability in an Active Directory Forest environment.
FSMO (Flexible Single Master Operations) Roles are very critical for Active Directory to run smoothly. As part of the daily Active Directory health tasks, you need to run several command lines tools or customized scripts to check the status of various Active Directory components which includes checking availability of the FSMO Roles.
To check the availability of FSMO Roles in an Active Directory environment, you can run following command line tools (available by default with Operating System installation):
1 |
Netdom Query FSMO |
Advantage using NetDom command is that it returns the list with FSMO name and the server holding that FSMO role as shown in the below output. The server name is returned in the FQDN format.
1 2 3 4 5 |
Schema master TEST-DC01.brainpulse.nl Domain naming master TEST-DC01.brainpulse.nl PDC TEST-DC01.brainpulse.nl RID pool manager TEST-DC01.brainpulse.nl Infrastructure master TEST-DC01.brainpulse.nl |
I hope this post will help you to find out the FSMO roles in a simple way.