Monday, 16 April 2018

Tools for Troubleshooting IPv4 in Windows Server 2016.

This article focuses on tools that will help us to identify and resolve IP connectivity problems between hosts. Windows Server 2016 includes a number of command‑line tools that can help you diagnose network problems. These tools were commonly used in earlier Windows Server editions.

Ipconfig:- Ipconfig is a command‑line tool that displays the current TCP/IP network configuration. Additionally, you can use the ipconfig command to refresh DHCP and DNS settings. The following command‑line options for ipconfig.

Ipconfig /all:- View detailed configuration information.

Ipconfig /release:-  Release the leased configuration back to the DHCP server.

Ipconfig /Renew:-  Renew the leased configuration.

Ipconfig /displaydns:-  View the DNS resolver cache entries.

Ipconfig /flushdns:- Purge the DNS resolve cache.

Read More

Friday, 9 March 2018

Step by Step MS SQL 17 Installation on CentOS Linux Release 7.4

Traditionally, Microsoft SQL Server, being part of Microsoft’s back office platform, has always run on Windows operating systems. However, Microsoft has made a commitment to enable customers to choose any platform. As part of this commitment, for SQL Server 2017,

Step by Step Changing Default Windows RDP Port with Advance Firewall

The requirement was to Secure Remote Access to Server in a private cloud infrastructure, where the customer wanted to provide RDP of Microsoft Windows Server with different RDP port other than the default one which shipped with default Windows installation.

Step by Step SharePoint Administration For Anyone

A fundamental responsibility concerning site security is to manage who can access resources on your site. SharePoint enables you, as a site owner, to control

Monday, 5 March 2018

Introducing Azure Advanced Threat Protection

The recent years have witnessed a distinct and consistent escalation in cyberattacks’ scope, scale, and sophistication, impacting organizations across all verticals and locations. This escalation is manifested not only in increasing proliferation of threat-actor groups, but also in the diversity of the utilized attack Tools Techniques and Procedures (TTPs), ranging from zero-day exploits to weaponized antimalware and publicly available toolkits.

This threat landscape is driving a change in the common security paradigm, bringing security stakeholders to realize that a resourceful and determined attacker will at a certain point succeed in bypassing the traditional prevention and detection controls.

To proactively respond to these threats, there is a need for a security layer that operates following the successful bypass of these controls and is tasked with detecting the malicious activity consecutive to this bypass.

Step by Step Domain Migration Windows 2008 to Windows 2012.

Active Directory is one of the most widely used services on enterprise networks. In addition to providing basic authentication and authorization services, Active Directory enables so many other capabilities that its popularity is no surprise.

Most of the people are still running Windows Server 2008 in the network and wants to safely migrate to Windows Server 2012 R2 edition. Windows Server 2012 R2 adds some significant new features to both Active Directory Domain Services (AD DS).