Microsoft Enterprise

Microsoft Dynamics is a line of enterprise resource planning (ERP) and customer relationship management (CRM) software applications. Dynamics can be used with other Microsoft solutions, such as SharePoint, Yammer, Office 365, Azure and Outlook. Dynamics ERP comprises a group of enterprise-resource-planning products includes Dynamics AX (formerly Axapta), a multi-language, multi-currency enterprise software with business management features for financial, human resources, and operations management; Dynamics GP (formerly Great Plains Software); Dynamics NAV (formerly Navision) for financials, supply chain, and people; Dynamics SL (formerly Solomon IV)for project-driven organizations; Dynamics C5 (formerly Concorde C5) for manufacturing, supply chains, analytics and electronic commerce; and Dynamics CRM.

Share tech news, updates, or what's on your mind.

Sign up to Post

I have a failed DB that we have restored and in the process we have users access to another DB we now need to merge the data from the recovered DB to the temp DB
0
OWASP Proactive Controls
LVL 13
OWASP Proactive Controls

Learn the most important control and control categories that every architect and developer should include in their projects.

I have been requested by my network engineer to add self signed certificate from Palo Alto firewall to the trusted root certification authority store of computers through group policy.
Palo Alto is going to do the URL filtering and will show error message web-page when end user goes to a blocked website.
This certificate is going to be used by these error message web-pages. At the moment clients do not trust this certificate so they get untrusted certificate message. And thus the network engineer wants to add this certificate to the trusted root certification authorities.
 
My initial thought is that the network engineer should request a certificate from our on-premises Microsoft enterprise Issuing Certificate authority.
And use that certificate for these web-pages as that certificate can be revoked in case of compromise.

But as Palo Alto sits on the edge of the network then if that is compromised then the network is already compromised.
Is it worthwhile getting the network engineer to obtain a certificate from our CA or should I just add the Palo Alto self signed certificate to the trusted root certification authorities?
0
I am using Office 365 security and compliance. I would like to know if there are tools to help me get more insight into the exports I am doing, for example:
- Status of Export Requests: Are they hanging, progressing. Some of the requests seem to not be moving percentage wise
- Details on limitations, eg: concurrent, size, etc.
- Automated ways to create requests without using the web front end (eg cmdlets)

Regards, George
0
Hi Team,

Please help me to resolve this issue.


Please Check attached .jpg diagram of my infoblox environment.


Working:-
1)      Earlier they had Microsoft server in all their location all individually working as primary and in sync with each other using Replica feature
2)      Now After infoblox when we make Microsoft role as secondary then only zone sync happens
3)      So traffic flows from Microsoft to infoblox, then from infoblox to DNS Proxy Forwarding and then to cloud
4)      We have told to install DNS Proxy Forwarding to get visibility of user based logs
5)      Also we have installed Reporting VM


Issues:-
1)      They are using infoblox just for DNS purpose only and not for DHCP
2)      They have individual DHCP servers on their different locations and their Microsoft DNS servers are acting as AD as well
3)      So whenever a new PC is added in domain or any PC changes its IP address a record is added in Microsoft but not on infoblox
4)      So for that we configured Updates on infoblox as suggested by TAC support
5)      Now the issue happening is that, when PC changes IP its earlier record is also present in infoblox and new records is also present, due to which when client connects to RDP he is redirected to another PC.

 For eg: - If A had ip-1.1.1.1 and after new lease allocated he has now ip as 2.2.2.2 and 1.1.1.1 is allocated to B, then there are four records present in infoblox
A-1.1.1.1 as static
A-2.2.2.2 as dynamic
B-1.1.1.1 as dynamic
B-earlier IP of B as static

So…
0
I need to do an Enterprise Architecture maturity assessment using TOGAF framework. Can anyone who has done something similar give me guidance on best way to approach this.
Over all approach
Red flag points
Action points

Thank you for your help.

J
0
Hi all, just wanted to say after some significant difficulty I managed to get BizTalk access in my organisation. My head and I know that our BizTalk team controls all integration and we all find it very difficult to deal with them, My head and I discussed that I learn BizTalk, which has been my long term interest and on the path in learning a thing or two about this. I know I won't get any support from that team but only hope I had when I had that discussion with my head was that I could count on all your expertise on this site. So hoping you guys may be able to help me :-) for now if somebody can help me where I should start to learn the tool that is much appreciated....I am a newbie and never seen BizTalk yet!
0
We currently use Visual Studio 2008 v9.0.  When one user opens a proc on Monday (but does not check it out as they have no intention at that time to make changes) if another user checks out the proc on Tuesday , makes changes and checks it in.  There is nothing to stop the first user from making changes to the proc as he/she  has it in front of him (fro  Monday) and overwrite the changes that user 2 made on Tues.
Is there a way to prevent this - e.g. automatically refresh, or not allow changes checked in if not using the latest file or the problem seems to be that if you have a proc open, you can directly make changes and it will then get flagged as checked out, perhaps if this could be disabled so that the only way to check out a proc would be to reopen from scratch
0
Hi expert

What is the best practise to troubleshoot failover cluster
Is there any scripts out there that I can run to see why it has failed over.

List of checks I can check to pin point the failover

Thanks in advance for your help
0
I inadvertently posted timecards to January without December being closed, so they are posting to Dec.  Is there anyway to reservse those time cards, once they are posted?
0
We have a working S4B setup and are trying to add Director role.
We deploy new Director VM, add it to S4B topology, deploy necessary certs.
We change DNS to point lyncdiscover to Director, redirect TCP/443 to Director instead of FE (same port 4443).
But authentication does not go through.

Any clue how to troubleshoot?
0
Learn Ruby Fundamentals
LVL 13
Learn Ruby Fundamentals

This course will introduce you to Ruby, as well as teach you about classes, methods, variables, data structures, loops, enumerable methods, and finishing touches.

Hi,

I am getting the following error:

DPM cannot protect E:\ on  xxx.yyy.edu because case-sensitive support is not enabled on the DPM server. (ID 30194 Details: Internal error code: 0x80990AB3)

How do I enable case sensitive support on the DPM server?

Thanks
0
I need to find a way to confirm that all my laptops have a user certificated issued from my internal CA installed on them.  Is there a SCCM report, tool, or script that can show me this?  I also want to confirm if they all have a computer certificate installed as well.


Thanks in advance!
0
Hello

I'm hoping someone has been using Microsoft  Intune to deploy Java to workstations.

I have multiple clients who use an application that requires the most recent version of Java to be deployed. (which is a good thing in itself)

That leads to frequent requests for the latest version of Java which increments monthly if not more frequently

It would be great to automate this process

Microsoft Intune can deploy the java client but can it be made to uninstall existing java clients? (which would otherwise have to be done manually

Are there any smart tricks for streamlining this process.

Hoping someone out there uses Intune to deploy Java
0
Best ways to manage logging under 1gb
0
how to allow pop-ups with in IE11 Enterprise?
0
I have a customer who has an internal domain, with no sub domains. The customer wants to heighten the security and have asked for the below scenario.

The customer wants the following:
1. Every administrator on the system must have it's own administrative account, because the customer wants the main administrator account credentials to be known only by a few people, and not everybody. But still some administrative accounts needs local administrator on the servers, so fx. I will have one called administrator1 and I will add this user as a local admin to each server, or is there another way?

2. No other users than Administrator, must be able to change Administrator password, memberships and so on. As far as I know, you cannot grand a user local admin rights on a DC, without making them Domain Admin aswell?

3. Some administrator users still need the ability to add, remove, change users, but without the ability to change the administrator account, how to, if possible?

4. I need a system(3rd party is okay) that can log EVERY change made in AD and on each server. I have been looking on some software from Netwrix, but what do you propose?

I hope this is clear enough, otherwise I will try to be more specific :)

Thank you in advance for your time
0
Short description: new client, old hardware and "duh" software.  upgrade is/was scheduled for next week

The server shutdown yesterday and exchange would not start.  Tried doing ese /r but file was continually "in use".

skipped to ese repair, then ese defrag

now ese shows databases are "clean shutdown"

trying to run isinteg -s <servername> -fix -test alltest, but no luck.  

Had lots of trouble getting Exchange System Attendant and Exchange Info Store services to start.
Services are now started.

Questions:  
Should the databases be offline or online for isinteg to work?  
Where is a detailed log file?  ( I tried using -l c:\logfile.txt, but no luck)

When I try to mount the stores they say they can't find the database, but when I browse from System Manager the files are there.  

Thanks for the help, I'll keep searching.
0
Is there a Microsoft authorized 'Media Creation Tool' for installing Microsoft Windows 10 Enterprise? Microsoft site doesn't mention about availability of Media Creation Tool for Microsoft Windows 10 Enterprise.
0
Hi Gents

I was wondering if anyone could assist me with the following.
I am running Exchange 2007 STD

Event ID:1005
Source: MSExchangeSA

Unexpected error The endpoint format is invalid. Facility: Win32 ID no: c00706aa Microsoft Exchange System Attendant  occurred.

For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.
0

Microsoft Enterprise

Microsoft Dynamics is a line of enterprise resource planning (ERP) and customer relationship management (CRM) software applications. Dynamics can be used with other Microsoft solutions, such as SharePoint, Yammer, Office 365, Azure and Outlook. Dynamics ERP comprises a group of enterprise-resource-planning products includes Dynamics AX (formerly Axapta), a multi-language, multi-currency enterprise software with business management features for financial, human resources, and operations management; Dynamics GP (formerly Great Plains Software); Dynamics NAV (formerly Navision) for financials, supply chain, and people; Dynamics SL (formerly Solomon IV)for project-driven organizations; Dynamics C5 (formerly Concorde C5) for manufacturing, supply chains, analytics and electronic commerce; and Dynamics CRM.

Top Experts In
Microsoft Enterprise
<
Monthly
>