Go Premium for a chance to win a PS4. Enter to Win

x

Microsoft Legacy OS

55K

Solutions

42K

Contributors

The Microsoft Legacy Operating System topic includes legacy versions of Microsoft operating systems prior to Windows 2000: All versions of MS-DOS and other versions developed for specific manufacturers and Windows 3/3.1, Windows 95 and Windows 98, plus any other Windows-related versions, and Windows Mobile.

Share tech news, updates, or what's on your mind.

Sign up to Post

Windows 10
When you start your Windows 10 PC and got an "Operating system not found" error or just saw "Auto repair for startup" or a blinking cursor with black screen. A loop for Auto repair will start but fix nothing. You will be panic as there are no backup of your document. How can you fix the problem?
1
 
LVL 1

Expert Comment

by:harry for
Comment Utility
well addressed !
0
 
LVL 1

Expert Comment

by:Littleman
Comment Utility
In addition, the first thing that you should do is chkdsk c: /r
and let that scan. Usually the damage is from windows shutting down incorrectly and corrupting the hard drive or files on the drive. The rest if that may not be necessary. If that fails, then proceed to the mbr repair.
0
[Webinar] Cloud and Mobile-First Strategy
LVL 11
[Webinar] Cloud and Mobile-First Strategy

Maybe you’ve fully adopted the cloud since the beginning. Or maybe you started with on-prem resources but are pursuing a “cloud and mobile first” strategy. Getting to that end state has its challenges. Discover how to build out a 100% cloud and mobile IT strategy in this webinar.

Citrix XenApp, Internet Explorer 11 set to Enterprise Mode and using central hosted sites.xml file.
3
When you upgrade from Windows 8 to 8.1 or to Windows 10 or if you are like me you are on the Insider Program you may find yourself with many 450MB recovery partitions.  With a traditional disk that may not be a problem but with relatively smaller SSD's every byte counts.
0
 
LVL 2

Expert Comment

by:Ralph Scharping
Comment Utility
So in the end we still remain with two partitions.  Can we do the same thing again to end up with only one?
0
 
LVL 84

Author Comment

by:David Johnson, CD, MVP
Comment Utility
My intent was to recover the (450mb of space x 7) from 3GB used to just 450MB.
If you don't want the recovery partition you can certainly remove it. But you will lose the functionality that it performs. If you have made a recovery disk or recovery USB drive then you don't need it.

The original disk had the normal EFI partitions, windows 8.1 and then windows server 2012R2 with the disk space fully partitioned. Each upgrade of the operating system carved out 450MB before the WS2012R2 partition

I think you could use the recovery partition the one at the far left by simply using the recovery agent command line tool.

reagentc /setreimage  /path \\?\GLOBALROOT\device\harddisk2\partition1\Recovery\WindowsRE
Directory set to: \\?\GLOBALROOT\device\harddisk2\partition1\Recovery\WindowsRE
0
Ever notice how you can't use a new drive in Windows without having Windows assigning a Disk Signature?  Ever have a signature collision problem (especially with Virtual Machines?)  This article is intended to help you understand what's going on and fix some common problems.
3
 
LVL 57

Expert Comment

by:McKnife
Comment Utility
Sure. But I suppose that for each platform there will be a way and to copy and re-use a disk file using explorer is not the supported way in the first place.
0
 
LVL 96

Author Comment

by:Lee W, MVP
Comment Utility
I can see an argument could be made to provide advice on proper ways of copying VHDs... but my point to the article was handling collisions and correcting them when they occur... With virtual disks being the easiest way to demonstrate the issue (and often to have it).  Feel free to post in links of "proper" ways to copy virtual disks (I've never seen one from MS, but I haven't looked either).
0
Since the demise of Windows XP each version of the operating system (client and server) have their own unique way of using user profile information. This information applies to all windows operating systems not just the operating systems outlined in the sourced articles
7
 
LVL 8

Expert Comment

by:Senior IT System Engineer
Comment Utility
Thanks David.

I never knew about this before until you've shared this great article :-)

WHat's the impact in sharing or overwriting the user Roaming profile home directory ?
0
 
LVL 84

Author Comment

by:David Johnson, CD, MVP
Comment Utility
WHat's the impact in sharing or overwriting the user Roaming profile home directory ? it is already a share.. so I don't understand the question
0
Users of Windows 10 Professional can disable automatic reboots using the policy editor. This tool is not included in the Windows home edition. But don't worry! Follow the instructions below to install (a Win7) policy editor on your Windows 10 Home edition.
0
 
LVL 1

Author Comment

by:Joost Kuin
Comment Utility
Take back control of your Windows Updates!
0
 
LVL 40

Expert Comment

by:evilrix
Comment Utility
This comment is in no way meant to shine a negative light on this article nor the author and is just a general message of caution and advice that careful computer user should consider before making changes that may modify their machine or running a binary from an unknown source.

CAUTION: Anyone who wishes to try this please be aware that it is your responsibility to make sure you back up your machine first and that the risks of any damage caused by attempting this is entirely your own. You should also be aware that running an executable from an unknown source (remember, EE neither supplies nor advocates the execution of the binary achievement in the article) should always be met with a high level of caution and so you are strongly encouraged to scan the file with an up-to-date and reputable anti-virus tool (both before unzipping it and after) before running.
0
Hi all.
 
The other day I had to change the passwords for a bunch of users on the fly. Because they were so many, I decided to do it in an automated way and I would like to share it with you all.
 
If you are not doing it directly in a Domain Controller (DC) you need to install and import the Active Directory (AD) module and you also need the required privileges to change passwords.
 
This script will check the users in a specified Organizational Unit (OU) without specifying any user, so be careful if you decide to use it.
 
Warning: If you decide to use this script test it first in a lab environment. Do it at your own risk.
 
This script will check the users in a specified Organizational Unit (OU) and then generate a random alphanumeric password with 8 char length.
Of course we can do more stuff but I don't want to complicate and I just want to show you how it can be done. This is just one way of doing it.
 
#This is the file that will be generated with the users account ID and the password generated.
[String]$path= ".\NewPass.txt"

#This will check if the file exist and will delete that file so a new one can be created from the scratch
#If the doesn't exist will through an error saying that the file doesn't exist and will continue.
if ($path -ne $null){Remove-Item $path}


<# Required Assembly to Generate Passwords #>
Add-Type -Assembly System.Web
#In my case I created a OU for test purposes here it is.
#You need to change it to meet your requirements.

Open in new window

2
 
LVL 12

Author Comment

by:David Paris Vicente
Comment Utility
Hi all,

Thank you all for your comments.
@robert for you to be able to do that with the code above you will need to use regexp, but I believe you can achieve it in a more easy way, check the example below.

In my code I have:
$NewPassword=[Web.Security.Membership]::GeneratePassword(8,3)

Open in new window


If you change it to:
$NewPassword = -join ((97..122) | Get-Random -Count 10 | % {[char]$_})

Open in new window


This will generate a random char only with lower cases.

If you also want to capital letters you need use the ASCII table to check the value of each char, lets see an example.

$NewPassword = -join ((65..90) + (97..122) | Get-Random -Count 10 | % {[char]$_})

Open in new window


The output will be a random string.

Now if you want to add numbers, you can do it by adding the ASCII value related with numbers. Lets check it.

$finalpass=''
$NewPassword =  ((0..8) + (65..90) + (97..122) | Get-Random -Count 10 | % {[int32]$_}) 
Foreach($pass in $NewPassword){
 if ($pass -le 8){
    $finalpass+= $pass 
 }else {
 $finalpass+= [char]$pass 
 }
}
Write-Host $finalpass

Open in new window



I believe this can do the trick, I didn't had to much time to tested it, but I can see that some random passwords could only have letters.

Then you can export it to a csv file piping the  variable $finalpass
$finalpass|Export-CSV c:\NewPass.csv -Append  

Open in new window


With this little code you already have the tools to start tweaking and accomplish your goal.

I hope it helps.

Cheers.

D.
1
 

Expert Comment

by:rob ert
Comment Utility
alright i managed to make it generate lowercase letter + letters using ur code and it works perfectly thanks alot ..
i have another question i hope im not being annoying ... the exported csv shows like Capture.PNG ... how can i make it like this Capture2.PNG ... if you notice the users and not consecutive they should be ige1 ige2 ige3 ige4 ige5 etc instead of userID: and password: in every row... plus is there a way to select specific users from that OU ?
your help is much appreciated ...
0
Exchange Server 2016
Microsoft has announced the release of the successor of Exchange 2013 i.e., Exchange Server 2016, a new member of the Exchange family. At the Ignite Fest held in Chicago, Microsoft has introduced the Exchange Server 2016 & illustrated some of its awesome qualities. A preview version is now available for download but the final release is planning to ship in the second half or later this year. You can install the preview version to get hands-on experience of the newest member.

Basically, the  newest Exchange Server 2016 is something different because of its discovery in the cloud. There are lots of key improvements  that can be explored by trying out the Preview Release. Let’s check out some of the changes driven in Exchange 2016 at a high scale. From this release, Microsoft has brought up innovation from their datacenters to the general crowds.

Advanced Architectures

The Architecture of the Exchange Server 2016 is an advancement of the architecture which was delivered in Exchange 2013. The best Architecture has been deployed in the Exchange 2016. Most important changes to look at is, CAS Roles & Mailbox Server Roles have been combined that will offer an advanced building block to build up an Exchange environments.

Enhanced Reliability

Exchange 2016 is made with improved reliability so that you can …
19
In a recent article here at Experts Exchange, I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to running Nuance's PaperPort 14.5. I received a private message from a fellow PaperPort user who read the article asking me if I'm aware that Windows 10 is using my computer to help distribute itself. I was not aware of it!

Perhaps I missed this during my nine-month experimentation with the W10 Technical Preview, or maybe Microsoft added that feature only in the official release (Build 10240), but when I checked it out, it is true. I was very surprised to find that W10 is, in essence, using my PC as a peer-to-peer server in distributing updates and apps, and I figured that other Experts Exchange members may also not be aware of it. So I decided to write this article, which also shows how to disable it.

Sidebar:  During the article review process, an EE Page Editor (MASQ) pointed out that this feature was introduced in March with Build 10036 — I did, indeed, miss it! My thanks to MASQ for this information, and for providing a link to Leaked Windows 10 build hints at peer-to-peer patching, an interesting article about it in The Register.

First, I'll explain how to find the feature (the screenshots in this article are from Version 10.0, Build 10240, created via an automatic update from the Technical Preview version of the Windows Insider Program):

51
 

Expert Comment

by:MtHolly
Comment Utility
So, does turning off WUDO "Updates From More Than One Place" stop my system from distributing Windows 10 and updates?  Or, just stop it from getting updates from unknown sources?
0
 
LVL 56

Author Comment

by:Joe Winograd, EE MVE 2015&2016
Comment Utility
Hi MtHolly,
Turning it off does both — (1) stops your system from getting updates and apps from other PCs (meaning it gets them just from Microsoft) and (2) stops your system from distributing/sending updates and apps to other PCs. Regards, Joe
0
I don't know if many of you have made the great mistake of using the Cisco Thin Client model with the management software VXC. If you have then you are probably more then familiar with the incredibly clunky interface, the numerous work arounds, and the awful customer support. I can not tell you the countless hours i have spent on the phone with Cisco attempting to fix issues.

Well I have good and bad news for you all. Cisco has "End of Lifed" this platform and will no longer continue to support or sell it. The official timeline for this is below. But for some of you who have invested a lot of time and more importantly money into the product are probably pretty upset.

http://www.cisco.com/c/en/us/products/collateral/collaboration-endpoints/virtualization-experience-client-manager/eos-eol-notice-c51-731181.html

Well, there is a solution out there: the Dell Wyse Platform. The VXC platform was "purchased" from Wyse and simply branded by Cisco and they made a few coding changes but all in all the source code is the same. Even the asthetic look of the software is almost identical to the VXC. However, Wyse takes much better care of the software and has had out for quite some time a version of the management software that is compatible with Windows Server 2012 R2, that is something those of us with Cisco have been waiting for, for a while.

Wyse also releases patches much more quickly and has much better support, as well as an FAQ with discussion boards and forums. And the…
0
 
LVL 2

Author Comment

by:Bradley Bishop
Comment Utility
How much are the Clients? We can get Wyse clients for around 300 and they are pretty good machines.
0
 
LVL 1

Expert Comment

by:jbla9028
Comment Utility
We are looking at Wyse with Cloud Client Manager. Are you aware if it's able to manage both WyseOS and Windows Embedded TCs? We're also looking at the desktop extender LinuxOS to load on old laptops to keep them from going obsolete. Working with a rep there but haven't gotten answers yet. Looking for a way to manage all the ThinClient settings from one management interface. Switching from the Teradici zero client  model .
0
Technology Partners: We Want Your Opinion!
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

On July 14th 2015, Windows Server 2003 will become End of Support, leaving hundreds of thousands of servers around the world that still run this 12 year old operating system vulnerable and potentially out of compliance in many organisations around the world.

A recent survey by Spiceworks shows that in Asia Pacific alone, almost 60% of organisations are still running at least one instance of Windows Server 2003 (as of March 2015). Although this figure has dropped from almost 65% in June 2014, it is still a huge number of 2003 servers with only 3 weeks to go.

Gartner states that there are over 8 million Windows Server 2003 instances in operation and 20% of those will miss the EOS date. That will leave around 1.6 million servers with no more security patches, no vulnerabilities fixed, and no more support for problems that may arise.

AppZero surveyed Fortune 1000 companies and reports that the majority of these companies won't finish their migration from Windows Server 2003 before the EOS date. Other key figures from the AppZero survey showed:
 
  • Almost half (47%) are not aware of the EOS date or have no plans (yet) for remediation
  • Only 21% of respondents have a remediation plan in place
  • Security compliance and vulnerability management remains the largest concern (>50%)
  • Fully one quarter (25%) of respondents still have more than 500+ Windows Server 2003 machines
 
I work at a firm who also still have around …
4
 
LVL 3

Expert Comment

by:awed1
Comment Utility
Some bright programmer should figure out a process to envelop older but in every way adequate Operating Systems into a security shell/sandbox? that will protect them from security vulnerabilities and still allow them to run. I imagine that many of the owners of those 1.6 million 2003 servers would rather pay for such a sandbox/shell than migrate. An enterprising person or team could make 100 million overnight, and free a lot of clients from some of the stranglehold that they find themselves in. If after you make the 100 million mark and want to thank me for the idea, I'd be glad to take a cut!
0
This article will review the basic installation and configuration for Windows Software Update Services (WSUS) in a Windows 2012 R2 environment.  WSUS is a Microsoft tool that allows administrators to manage and control updates to be approved and installed in their environment.

We will cover the following topics:
  • Installing the WSUS Role
  • Securing WSUS with SSL
  • Configuring WSUS
  • Configuring Group Policy
  • Managing Updates
  • Viewing Reports
  • Using PowerShell
  • Using wsusutil

For our test environment, we will use 3 Windows 2012 R2 servers with the following roles:
  • Domain controller
  • CA server (enterprise root)
  • WSUS

We already have a domain controller (DC1) and Certificate Authority (CA1) for mydomain.local in place.
A Windows 7 Enterprise system will also be used for this environment.
We will start with installing the WSUS role on the WSUS server.




Installing the WSUS Role


Login to the server with an account having local administrator rights.
Open Server Manager and go to Add roles and features.

WSUS-2015-06-03-20-47-32.pngClick next on the 'Before you begin' then next again on the 'Installation Type' pages.
On the Server Selection page, select the current server if it isn't already; click next.
For Server Roles, scroll to the bottom and check Windows Server Update Services.  This will bring up a dialog box to install dependent features.  Click add features.
WSUS-2015-06-03-21-08-00.pngWSUS-2015-06-03-21-08-14.png
28
 
LVL 41

Expert Comment

by:footech
Comment Utility
You may want to add the content from https://support.microsoft.com/en-us/help/3159706/update-enables-esd-decryption-provision-in-wsus-in-windows-server-2012-and-windows-server-2012-r2 to your article.

Just recently I configured a WSUS (on Server 2012 R2) for SSL and no clients could connect (not just Win10 clients) until I had edited the web.config file in "C:\Program Files\Update Services\WebServices\ClientWebService" (I hadn't made the changes when the update was installed).

I think it's also important to note that the order of steps is important when configuring WSUS for SSL.  As in the order you've shown, the IIS changes have to made before running the wsusutil configuressl <fqdn> command (if the output doesn't show the https with the 8531 port you know something isn't right).
0
 

Expert Comment

by:Knowledgeable
Comment Utility
What steps do I need to follow to set the "Enable client-side targeting" value for all Windows 7 and Windows 10 domain joined computers so that their "Target group name for this computer" value will be set to "Workstations"?

I have already followed these steps within my Server 2016 AD Domain and have given the two Server 2016 servers the "Target group name for this computer" the value of "Servers".

How can this value be added to all of the workstations within my domain through group policy without me having to manually add this value to each computer?

Enable-client-side-targeting
0
The biggest nightmare for any Exchange Server Administrator is to keep the server running without any issue. But the problems often come and they need to be resolved efficiently and timely. Here are important troubleshooting points:

Define the Problem & its Scope


In order to begin troubleshooting in Exchange Server, you need to understand what the problem really is. This will require gathering information by asking questions from end users. After collecting information, the next thing is to find out the scope (how many clients have been affected, what are the common characteristics etc.

Understanding Error Code 


Most of when something goes wrong with the Server it returns some error code. There are built-in tools that make Microsoft Exchange truly powerful. Based on which Admin/User can have some idea about the problem. 
Check out Different Exchange Error Codes and their Solution: http://www.pcvita.com/blog/category/exchange-server
Here is the list of tools available on Exchange Server: 

Use of Tools in Exchange Server for Troubleshooting



Screenshot-2.jpg



(1) Event Viewer
The Event Viewer stores detailed information about the recent system state and application errors. Using the event logs in Event Viewer one can obtain information about system hardware, software, and problems. In the Event Viewer, both application log and system log contain errors, informational events and warnings that can be used in the process of troubleshooting.
Read More about Event Viewer:
17
Unless you've been hiding under a rock you know that Microsoft will be releasing a new version of Windows this summer (2015). As administrators of Active Directory and managers of group policy we use WMI filtering to set and apply group policy objects to different versions of Windows, clients / servers, desktops and laptops. For instance, we want the policy to be applied only to laptops and not desktops, or to client operating systems and not server operating systems.

The examples below might be familiar as it is a common way to apply a GPO to all Versions of Windows after 7. It would also automatically work for Windows 8 and Windows 8.1 but it will fail for Windows 10.
select * from Win32_OperatingSystem where Version >= “6.1”
Unfortunately, WMI does the comparison as a string and not a number. This means that Version “10” is actually lower than “6.0” as 1 is lower that 6. So now we have to change our previously working WMI filter to:
select * from Win32_OperatingSystem where Version like “10.%” or Version >=”6.1″
Note: The same is also true for Windows Server 2016 as it has the same OS version number. This is why I've created this new article

WMI Filtering is another tool to put in your active directory toolbox. Order of execution of Group Policy Objects
Policies in hierarchy are located. (L-S-D-OU)
WMI Filters are checked.
Security settings are checked.
Only then after everything has passed does the policy …
5
Computer running slow? Taking forever to open a folder, documents, or any programs that you didn't have an issue with before? Here are a few steps to help speed it up.

The programs mentioned below ALL have free versions, you can buy them if you want, but I suggest using the free version in this case.
 
Antivirus

First step is to check, and clean up, any viruses / malware you might have installed on your computer. Any good antivirus will help with this. There are many out there, if you don’t have any currently installed, you should do this right away. Many of the big names have free 30 day trials to find one you like. There are also many free ones, but they may only give you a quarter of the feature or not have real-time scanning as an option. The only downside is this could slightly slow your computer as it will be running in the background at all times. However, it is very important you have an antivirus program installed to help prevent you from becoming infecting and losing personal information.

Once installed run a full system scan and clean up any viruses it may find.

One suggested antivirus program to run is MalwareBytes found at (www.malwarebytes.org). Use the free version (this does not do real time scans unless you buy it. However it is free to do on demand scans for this case. However, I highly recommend buying a antivirus program from your favorite antivirus vendor (or do some research and pick which one is best for you).

 
AntiSpyware
30
 

Expert Comment

by:Rochelle Adsitt
Comment Utility
Also - ninite.com is a fabulous resource for installing the latest version of utilities and other software we've come to depend on (Adobe Reader, Flash, Java, Malwarebytes, etc.) cleanly and quickly. It installs the software for me and doesn't allow any of the extra junk (like toolbars) to get installed or enabled.
0
 
LVL 7

Expert Comment

by:gudii9
Comment Utility
CCleaner I mentioned above can be found at (https://www.piriform.com/ccleaner) use the free version

i installed and analyzed saw 9243 mb worth of files. now cleaning them.

when i open the windows explorer (windows key+E)it is closing by itself in few seconds saying 'windows enountered a problem..windows trying to find solution etc) not sure why
0

From Coral's  "So You Want To Play With Computers" Series


A bit of background first, so this story will make a little sense.

One day, probably because he needed a good laugh, Finagle hooked me up with a church to upgrade/run their Media Booth. {Yeah, I know. I've been to "Hell and back" so many times, I already have my spot picked out and homesteaded}.
Anyhow, getting time to work on their system is hard to do, so I've been dual booting to a clone of their hard drive, so I can check the music, fix/add lyrics, and set up the music schedules, at my place. Then copy the schedules for a couple of weeks to a USB stick to take in with me, and copy to their computer.
But lately they have been throwing new music at me, and booting back and forth between Vista (nic is blocked) and W7, to go online to chase down lyrics, is getting to be a pita.

So I thought I would move Vista to a VM, then I could just toggle between them. Which brings me to what follows:

After firing up my Googlefu, and doing some research, I had a few points I wanted clarified, so I posted a Q on EE, which Finagle promptly kept the VM Gurus from posting in. Looks like I'm on my own.
That's alright. I can do this. After all, I'm a self taught computer geek. I've been mucking with computers for over 25 years. And I recently took a ComTIA  A+  Cram Course, and set the new high A+ test score for that class. As a bonus, it kind of irritated the college boys …
6
 
LVL 32

Author Comment

by:_
Comment Utility
added screenshot of Vista running in MS Virtual PC.    ; )
0
How to remove superseded packages in windows w60 or w61 installation media (.wim) or online system to prevent unnecessary space.

w60 means Windows Vista or Windows Server 2008.
w61 means Windows 7 or Windows Server 2008 R2.

There are various guides found on the internet on how-to integrate updates into Windows installation media using dism.
This article is a post-integrate how-to to this numerous articles.
This article is addressed to users, who are comfortable using dism to mount, update, manage and unmount Windows Image files for deployment of Windows Systems.
So mounting and dismounting images is intentionally left out.

Problem:
Administrators often include windows update packages into their deployment images to save time when deploying.
In Windows 8 dism.exe has built-in command-line extensions to remove superseded updates from Windows 8 image files.
Earlier versions of Windows do not have this feature.
So when you integrate packages into a windows installation media (w60 or w61), superseded or outdated packages reside in the deployment image and use unneccessary space. This guide shows how to list and remove superseded packages from the command-line or by batch.

Short description for what you have to do before:
- Download Windows Updates for Windows (w60 or w61).
  Best practice is using wsus offline update.
- Mount Windows installation media.
- Apply packages to the mounted image.

The listings below offers two options.
The first option …
1
How can this article save you time AND money?  In just a few minutes you may discover something you didn't know existed that is easy enough for you to fix yourself!
7
 

Expert Comment

by:Douglas Oerly
Comment Utility
There are other things that, I feel, should be mentioned here.

When removing unwanted or unused programs from your computer, the standard windows uninstaller frequently leaves files and registry entries that should have been removed.  This is also true for some 3rd party uninstallers.  One program that consistently removes everything, and gives you an option for uninstalling in safe, medium and advanced modes is the Revo uninstaller.  It will present a list(s) of left-over items and allow you to select the ones you want to remove.  Even Microsoft Help Desk personnel use this program when remotely working on someones pc.  It begins by using the standard uninstaller (either the software's own or windows) then collects left-over information and presents it to you.  Very user-friendly.  Left-over registry entries are included in items presented to remove.

You can go to the start menu and click or type run and a window will open.  Type in %temp% and click <ok>.  A window will be opened that presents a list of files.  Select all of them and delete them.  Some may be open and so just skip their deletion.

Go to your C:\ drive icon in My Computer or the file explorer and right click on it and run Disk Clean up.  Here, you can clean up system files as well, such as, windows log files, left-over windows update files, and others.

Additionally, just running the defragmentation program does not ensure that all files have been defragmented.  Go to the start menu or search programs and enter cmd and select the program.  A Command prompt window will appear that you may be familiar with if you have ever used the old DOS prompt, which is basically what this is.  Type in defrag ? and <ENTER>.  A list of defrag options will be presented that you can specify when you run the defrag command from this window.  Specify the ones you want and run the program.  NOTE: you may need to run this with administrator privileges.  Do this by right clicking the cmd prompt program and then click run as administrator.

Always remember, your computer may never become faster than it was when you first purchased it and opened the box.  If it was slow to start with, barring pre-installed software, it will usually be this slow to end with and you may need to just go ahead and purchase one with a faster processor etc.  One item that may make a difference here is more RAM.
0
 

Expert Comment

by:Les Finch
Comment Utility
The following comes from Wikipedia.
 "A myth has arisen that RDC significantly slows local file transfers and should be switched off; a Microsoft TechNet Web page by a Microsoft Directory Services Team member comprehensibly debunks this with detailed timings, additional to the fact that a service which is not invoked by software cannot have any effect, detrimental or otherwise"
 I did not find the TechNet page but would like to see Microsoft's comments on RDC.

I have found the most common causes of slow computers are
1- malware
2 - slow hard disks especially 2.5" drives. They do not report as faulty but the tests take an exceptionally long time to complete. We use Spinrite to test them
3 - as mentioned earlier, all the crap software the manufacturer has auto starting on boot. Ccleaner is great for disabling them.
4 - also mentioned earlier - not enough RAM
0
I consult and manage a number of small businesses with no IT staff and staff who could do some serious damage if they were given the ADUC interface.  Sure, I can delegate rights and still give access to the ADUC interface but truly believe that less is best.  

You may already know about these command-line tools.  All I have done is to place them into .cmd scripts, and since the environments have terminal servers, I created .rdp files so all they have to do is launch the scripts and get to the tools they need for some basic day to day user management.

The way this works:
  1. The scripts below will need to be placed into a directory that is accessible by your admins.  I used c:\AD Scripts.
  2. I then configured Remote Apps and created a .RDP file and shared with my local power users.
  3. The next step is to use the AD delegation wizard and provide permissions to allow password changed by specific users.
I hope this helps anyone who consults and supports small businesses as I do.

The main user management script copy this into a file named usermgmt.cmd:
  • This script has three menu items; Lock AD Account, Unlock AD Account and Change AD password.
  • At line four, you can add information to for IT support such as your email address or telephone number.
 
@echo off
CLS
:MENU
ECHO.
ECHO ...............................................
ECHO ..Please select an option
ECHO ..for any questions

Open in new window

1
Free Tool: SSL Checker
LVL 11
Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

The Diagnostic and Recovery Toolset (DART) is used to troubleshoot and repair Windows 7 and later operating systems, including Windows 2008 and R2 64-bit servers.  More information about DART can be found at http://technet.microsoft.com/en-us/windows/jj190826.aspx.   

Versions:
DART 7.0: Windows 7, Windows Server 2008 R2
Latest version of DART: 8.1: Windows 8.1 and 2012 R2.

You need to customize the DART / ERD ISO images by updating drivers / Debug tools etc. Once you have this image, mount this ISO image to defective Virtual machine or Physical server (try connecting Remote consoles like DRAC /iLO / Vcenter).

Boot server from mounted ISO (Boot from CD / DVD option you need to select)

You need to wait until Windows loads the boot files.
Win-Load-Screen.jpgClick on “Yes” to initiate network connectivity in the background.

DART-Network.jpg
Click on “Yes” to Remap the drive letters.
DART-Map-drives.jpgClick Next to continue. Select the Operating system from below screen and click on “Yes”.

DART-OS-Selection.jpg
Below image shows for Windows Server 2003 / Win XP

DART-2003-OS.jpg
You need to click on Microsoft Diagnostics and Recovery Toolset.

DART-Selection-Window.jpg
You will get below screen which contains all the troubleshooting tools, Based on your problem you need to select the tools,

DART-Home.jpg
Most of the Reboot or OS problems are loading issues, or there might be a problem with Services / Drives, Click on Computer management to get services window. You can select the Problematic service and disable that service / Driver.

DART-Computer-Management.jpg
2
 
LVL 57

Expert Comment

by:McKnife
Comment Utility
Hi Manjunath Sullad.

I think you should add
-how to aquire Dart (as far as I can see, only volume license customers get it, right?)
-That additional steps are needed to use it on encrypted hard drives (manage-bde on the command line can unlock the drive if bitlocked, but what do we do for drives encrypted with something else if we don't want to decrypt it first)
0
 
LVL 11

Author Comment

by:Manjunath Sullad
Comment Utility
Hi McKnife,

Thanks for suggestions; I will update this article with above recommendations.
0
Are you getting those annoying warnings of Service Principal Name (SPN) incorrect in your System Center Operations Manager (SCOM)?

I call this warnings annoying because they don't affect the monitoring or operation, but you will see them every time you check the SCOM console, and that makes it hard to find real and important warnings. So, if you don't need the SPN for your server you can disable this monitor since SCOM is working properly. What follows is an example and the steps on to how to disable this warning.

First go to your SCOM console and check for alerts:

SCOM-warning.gifDouble-clicking on Stats of Server3 you will see the SPN incorrect warning:
SPN-incorrect.jpg
Well, you can avoid the problem by creating the correct SPN, but imagine if you have dozens or hundreds of servers that need to have the SPN created? And you need to remember that new servers will need the correct SPN to be created.

So the best and quick way to get rid of those warnings is to disable the SPN monitor. This monitor comes with the respective Management Pack. Below is an example for this monitor in SQL Server Management Pack that you can find in Authoring tab / Management Pack Objects / Monitors in Operations Manager Console.
SPN-monitor.gif
After overriding this monitor you should see a healthy Stat (it may needs few minutes to SCOM realize it):
SCOM-healthy.gif
NOTE: Only disable the SPN monitor if you don't need it. This monitor comes enabled by default but as you could see it raises only a warning and not a critical error.
0
 
LVL 15

Administrative Comment

by:Eric AKA Netminder
Comment Utility
Vitor,

Congratuations; your article has been Accepted.

ericpete
Page Editor
0

SYMPTOMS


During one of Operating System deployment project, I face issue when I tried to deploy image with Microsoft Windows 7 x86 Professional with service pack 1 and Internet Explorer 10.

The error occur in specialize phase:
Windows could not parse or process unattend answer file [C:\windows\Panther\unattend.xml] for pass [specialize]. A component or setting specified in the answer file does not exist.

Sysprep Error
I was using Microsoft Deployment Tool 2012, but I think the issue may occur also in case you use Microsoft System Center 2012 Configuration Manager or any other deployment tool  

Additional Information:
I didn't receive any error message when I deploy Microsoft Windows 7 x86 Professional with service pack 1 and Internet Explorer 9.

Troubleshooting Steps

Usually I'm always looking for "%systemroot%\Panther\setupact.log" log file when I'm facing issue in specialize phase or during "Setup is applying system settings" as showing in the above snapshot. And found the following:

Error [setup.exe] SMI data results dump: Source = Name: Microsoft-Windows-IE-InternetExplorer, Language: neutral, ProcessorArchitecture: x86, PublicKeyToken: 31bf3856ad364e35, VersionScope: nonSxS, /settings/IEWelcomeMsg

Error [setup.exe] SMI data results dump: Description = Setting is not defined in this component.

Error [0x060432] IBS The provided unattend file is not valid; hrResult = 0x80220001

Error
3
 

Expert Comment

by:hgkgsupport
Comment Utility
This worked like a charm.  Not sure why all of a sudden I am getting bad  unattend files but this fixed it.  Also, my file must have gotten corrupt and wouldn't open from the deployment workbench.  I had to open another task and open it's unattend.xml and then open the one in the task I was working with.
0
For Windows XP, see my earlier EE article titled, Windows XP Profile Copying

Revised for Windows 7

This article is for non-techies, using Windows 7 who just want to copy their existing Windows 7 settings to a new computer which is also running Windows 7, or for users who want to replace their existing desktop profile with a new profile.

Note: haven’t figured yet figured how to migrate the printer/drive mappings if not mapped automatically.  The previous Windows XP article explained how to do this so make sure to do print screens of the printer/drive mappings if needed before recreating/creating the user profile.

These are the steps used to copy over existing Windows 7 user's desktop profile settings from their old Windows 7 computers to a new (or second) Windows 7 computer--or to recreate a user's profile on an existing Windows 7 computer if the existing profile is corrupt and needs to be replaced.

1) Reboot the computer then login as the local Administrator or as another user who has Administrative privileges.

2) First Make a profile backup of some type either manual or via the GUI.
Personally prefer option “B” the manual profile backup as you do not copy over a ton of unneeded temp files etc., or in the situations where the profile is corrupt you don't bring over corrupted files. I'd also
0
Log Name:      System
Source:        NETLOGON
Date:          10/28/2013 6:24:29 PM
Event ID:      5719
Task Category: None
Level:         Error
Keywords:      Classic
User:          N/A
Computer:      DC1.Contoso.local

Description:
This computer was not able to set up a secure session with a domain controller in domain CONTOSO due to the following:
There are currently no logon servers available to service the logon request.
This may lead to authentication problems. Make sure that this computer is connected to the network. If the problem persists, please contact your domain administrator.

Applies to: All Windows OS machines in Network

Minimum Permissions: Administrator

Netlogon Event ID 5719, this event ID occurs in all Microsoft Operating System machines. Netlogon 5719 occurs due to many reasons and we need to be careful while fixing this issue. Most of the time it occurs due to intermittent network problems.

If this occurs on Client Machines:

1. Check the NIC drivers and keep them upto date.
2. Check domain controller's NIC drivers and upgrade them as well.
3. From client access domain controller's shares.
4. No access of shares then unjoin and rejoin clinet machine to domain.

If this occurs on Servers:

1. Check NIC drivers and upgrade them.
2. Check domain controller's NIC drivers and upgrade them as well.
3. If upgrading NIC drivers doesn't fix issue, uninstall NIC completely and …
0
I wish to provide a solution that took me months to find for my Live VM backup on a Server 2008 R2 running 2 VM/s (SBS 2011 & Server 2008 R2/SQL Server 2008R2).

If you recieve an error EVENT ID 521 with the included error code (2155348129) in the event details in your hyper-v host system - and you have exhausted all other possibilities - then have a look at this solution. It may be the hidden gem that will let you sleep at night.

I had been unable to find a solution for performing a FULL BACKUP (Using Microsoft Windows Backup) with my VM's running, and all persons, help tickets, advice, etc., just kept me running in cricles around the same solutions that everyone else seems to have tried - some with success and some without.

Most seemed to come down to the Sharepoint psconfig.exe command needing to be run. Not my problem nor was any thing else I could find. Some including setting your system reserved as an "ACTIVE" partition - DON'T DO THAT!!!!! You will likely end up with a non-bootable system!

Others wanted you to create the VSSACCESSGROUP in your registry and then alter your DIAG key permissions (although all this does is help you clear out some Microsoft "benign" critical errors that may be safely ignored. And the list goes on. None of which worked in my situation to resolve my failed backups.

Well, yesterday, in searching for information on an unrelated issue - I stumbled across this article (mentioned below) that was my salvation.

Finally a solution …
1

Microsoft Legacy OS

55K

Solutions

42K

Contributors

The Microsoft Legacy Operating System topic includes legacy versions of Microsoft operating systems prior to Windows 2000: All versions of MS-DOS and other versions developed for specific manufacturers and Windows 3/3.1, Windows 95 and Windows 98, plus any other Windows-related versions, and Windows Mobile.