Mindcore Techblog

Let’s talk about Client Management, Security and IT Infrastructure

DCPROMO error

When demoting a DC I ran into this error: The operation failed because: Active Directory Domain Services could not configure the computer account <hostname>$ to the remote Active Directory Domain Controller account <fully qualified name of helper DC>. “Access is denied” I found a possible explanation dealing with missing security

Continue to read »

Failed to insert OSD binaries into the WIM file

I have seen this problem when trying to create a MDT task sequence or MDT boot image in System Center Configuration Manager 2012 SP1. Started processing. Creating boot image. Copying WIM file. Mounting WIM file. WIM file mounted. Setting Windows PE system root. Set Windows PE system root. Set Windows

Continue to read »

Windows 8 Delete Confirmation

When you delete a file on Windows 8 it will go to the recycle bin without a confirmation box. If you want the confirmation box back, you must right click on the recycle bin and select properties. Select the option Display delete confirmation dialog. And the confirmation dialog is back.

Continue to read »

Citrix pass-through and NTLM

When using Citrix pass-through on the web interface with Kerberos authentication, everything seems to work very well at first. But then you might discover that some of your applications running on the XenApp server depend on NTLM for authentication. This is where the fun part starts, how do you disable

Continue to read »

Compressing Windows 2003 Profiles

After cleaning yet another Windows 2003 Terminal server for Excessive Registry Entries in the users HKCU caused by the HP universal Printer Driver, we noticed that the ntuser.dat file in there roaming profile still was very large up to 20 MB. The reason for this is that even though we

Continue to read »

Remote desktop prompting for credentials

This is actually a very old tip, but I tend to forget the keyword myself, so now I will know were to look the next time I need it Newer versions of the Remote Desktop protocol will require you to enter credentials before the client can establish a connection to

Continue to read »

Lync schema version

Just like Exchange we are able to check our Lync schema version with adsiedit.msc. Connect to the Schema context: Expand the nodes and drill down to the name ms-RTC-SIP-SchemaVersion. Right click on ms-RTC-SIP-SchemaVersion and select Properties.     Now find the attribute rangeUpper     The possible rangeUpper values are

Continue to read »

Windows Installer coordinator hangs

You might experience this when you install MSI packages on your RDS/Terminal and XenApp servers. The installation will hang and display the message: Please wait while the application is preparing for the first use I have seen this with the following software packages: Google Chrome (Enterprise) IBM i Access One

Continue to read »

Exchange Schema Version

After you have updated the schema with the Exchange 2010 changes (RTM or service packs), you can check the current version with adsiedit.msc. First connect to the Schema: Expand the nodes and drill down to the name CN=ms-Exch-Schema-Version-Pt. Right click on CN=ms-Exch-Schema-Version-Pt and select Properties. Now find the attribute rangeUpper

Continue to read »

KMS caching

By default a KMS client will cache the KMS host that it was able to activate with and will communicate directly with this host when it is time to reactivate (instead of querying DNS). If the client cannot contact the cached KMS host, discovery with DNS will be used. You

Continue to read »
Search blog posts
Search
Authors
Modern Workplace consultant and a Microsoft MVP in Enterprise Mobility.

Modern Workplace consultant and a Microsoft MVP in Windows and Devices.

Infrastructure architect with focus on Modern Workplace and Microsoft 365 security.

Cloud & security specialist with focus on Microsoft backend products and cloud technologies.

Cloud & security specialist with focus on Microsoft 365.

Cloud & Security Specialist, with a passion for all things Cybersecurity

Cloud and infrastructure security specialist with background in networking.

Infrastructure architect with focus on design, implementation, migration and consolidation.

Infrastructure consultant with focus on cloud solutions in Office365 and Azure.

Modern workplace and infrastructure architect with a focus on Microsoft 365 and security.

follow us in feedly
Categories

Follow on SoMe