This article focuses on tools that will help us to identify and resolve IP connectivity problems between hosts. Windows Server 2016 includes a number of command‑line tools that can help you diagnose network problems. These tools were commonly used in earlier Windows Server editions.
Ipconfig:- Ipconfig is a command‑line tool that
displays the current TCP/IP network configuration. Additionally, you can
use the ipconfig command to refresh DHCP and DNS settings. The
following command‑line options for ipconfig.
Ipconfig /all:- View detailed configuration information.
Ipconfig /release:- Release the leased configuration back to the DHCP server.
Ipconfig /Renew:- Renew the leased configuration.
Ipconfig /displaydns:- View the DNS resolver cache entries.
Ipconfig /flushdns:- Purge the DNS resolve cache.
Monday, 16 April 2018
Saturday, 10 March 2018
Friday, 9 March 2018
Traditionally, Microsoft SQL Server, being part of Microsoft’s back office platform, has always run on Windows operating systems. However, Microsoft has made a commitment to enable customers to choose any platform. As part of this commitment, for SQL Server 2017,
The requirement was to Secure Remote Access to Server in a private cloud infrastructure, where the customer wanted to provide RDP of Microsoft Windows Server with different RDP port other than the default one which shipped with default Windows installation.
Monday, 5 March 2018
The recent years have witnessed a distinct and consistent escalation in cyberattacks’ scope, scale, and sophistication, impacting organizations across all verticals and locations. This escalation is manifested not only in increasing proliferation of threat-actor groups, but also in the diversity of the utilized attack Tools Techniques and Procedures (TTPs), ranging from zero-day exploits to weaponized antimalware and publicly available toolkits.
This threat landscape is driving a change in the common security paradigm, bringing security stakeholders to realize that a resourceful and determined attacker will at a certain point succeed in bypassing the traditional prevention and detection controls.
To proactively respond to these threats, there is a need for a security layer that operates following the successful bypass of these controls and is tasked with detecting the malicious activity consecutive to this bypass.
Active Directory is one of the most widely used services on enterprise networks. In addition to providing basic authentication and authorization services, Active Directory enables so many other capabilities that its popularity is no surprise.
Most of the people are still running Windows Server 2008 in the network and wants to safely migrate to Windows Server 2012 R2 edition. Windows Server 2012 R2 adds some significant new features to both Active Directory Domain Services (AD DS).