Monday, December 31, 2012

Enable Ping in Windows Server 2008 R2


By default Windows 2008 does not respond to pings. To enable:
Administrative Tools
Windows Firewall with Advanced Security
Inbound Rules
File and Printer Sharing (Echo Request - ICMPv4-IN)
Enable Rule
You should now be able to ping your server from the LAN.

Sunday, December 30, 2012

Restore Points doesn’t exist in Windows 2008


Restore Points doesn’t exist in Windows 2008

 If the tab "System Protection" is missing.. then we need to do the below first:
(1)Open Command line as admin.i.e. Right click CMD -> RUN AS ADMIN
(2) type the below commands..

dism /online /enable-feature /featurename:WindowsServerBackup
dism /online /enable-feature /featurename:WindowsServerBackupCommandlet
shutdown -r

The first two commands will enable the backup role, the third will reboot your system

(1) Right Click your "Computer" on Win 2K8, open "Properties", "Advanced Settings" and there you'll find "System Protection" tab.
(2) There will be a option.. CREATE A RESTORE POINT..

Wednesday, December 26, 2012

OWA 2010 - Create An Email Signature


This article explains how to create a personalized email signature when using Outlook Web App (OWA) running on an Exchange 2010 server.

  1. Click on Options in the upper-right.
  2. Select See All Options from the drop-down menu.
    owa2010faq02.PNG
  3. Select Settings.
    owa2010faq03.JPG
  4. Compose your signature in the E-Mail Signature text box. If you have an existing signature in your mail client, copy and paste it here.
  5. Click Automatically include my signature on messages I send if you want the signature to appear by default on your outgoing email.
    owa2010faq04.JPG
  6. Click Save in the lower-right portion of the screen.
  7. If you did not choose to automatically include your signature on outgoing email, you must manually insert it. In the new email window, Click the Insert Signature button. Your signature will appear in the text of your message.
    owa2010faq05.PNG

Saturday, December 8, 2012

File Services Role: Access-based Enumeration


Applies To: Windows Server 2008
Access-based enumeration displays only the files and folders that a user has permissions to access. It is a feature that was previously available as a downloadable package for the Windows Server® 2003 operating system (it was also included in Windows Server 2003 Service Pack 1). Access-based enumeration is now included in the Windows Server 2008 operating system, and you can enable it by using Share and Storage Management.
Access-based enumeration displays only the files and folders that a user has permissions to access. If a user does not have Read (or equivalent) permissions for a folder, Windows hides the folder from the user’s view. This feature is active only when viewing files and folders in a shared folder; it is not active when viewing files and folders in the local file system.
  • IT administrators who want to control which files and folders are visible to network users
  • IT administrators who want to control the user's experience
For example, if you enable access-based enumeration on a shared folder that contains many users’ home directories, users who access the shared folder can see only their personal home directories; other users’ folders are hidden from view.
Microsoft made the following changes to the functionality of shared folders to enable the use of access-based enumeration:
On a computer that is running Windows Server 2008, access-based enumeration is enabled by default on every folder that is shared by using the File Sharing feature. (This is the default sharing feature that is available through Windows Explorer).
However, access-based enumeration is not enabled by default on the following types of shared folders:
  • Shared folders that are created with Share and Storage Management, Advanced Sharing in Windows Explorer, or the net share command
  • Volumes
  • Folders or volumes that are shared for administrative purposes, such as C$ and ADMIN$
Access-based enumeration can be manually enabled or disabled on individual shared folders and volumes by using Share and Storage Management. This snap-in is available after a folder or volume has been shared. You can access Share and Storage Management in the File Services server role in Server Manager, and in Administrative Tools. You can also install it manually in Server Manager by adding the File Server role service to File Services.
There are two ways to enable and disable access-based enumeration by using Share and Storage Management:
  • Share a folder or volume by using the Provision a Shared Folder Wizard. If you select the SMB protocol on the Share Protocols page of the Provision a Shared Folder Wizard, the advanced settings options on the SMB Settings page includes the option to enable access-based enumeration on the shared folder or volume. (To see the advanced settings options, on the SMB Settings page of the wizard, click Advanced).
  • Change the properties of an existing shared folder or volume. To change the properties of an existing shared folder or volume, on the Shares tab of Share and Storage Management, click the shared folder or volume, and then click Properties in the Action pane. The information under Advanced settings displays whether access-based enumeration is enabled. Click Advanced and then select or clear the Enable access-based enumeration check box.

Backup Exec cannot connect to the Remote Agent because a trust relationship was not established between the Remote Agent and the Media Server.


Problem



Backup Exec 2010 R3 job fails with the error: 0xe0009b86 - Backup Exec cannot connect to the remote agent because a trust relationship was not established between the remote agent and the media server. 


Error



0xe0009b86 / V-79-57344-39814 - Backup Exec cannot connect to the remote agent because a trust relationship was not established between the remote agent and the media server.  To establish a trust relationship, add the remote agent to the Favorite Resources in the backup selections tree.

 

Environment



Backup Exec 2010 R3 & Backup Exec 2012.

Cause



Backup Exec 2010 R3 and above now uses stronger network security protocols to secure communication between media servers and Remote Agents, reducing the possibility that backup or restore operations can be compromised.
When connecting to a remote computer from the media server, a trust relationship must be established between the media server and the remote computer.  In certain situations the trust must be established manually.
Examples:
1. If the Backup Exec 2010 R3 or above Remote agent for Windows (RAWS) is installed manually, the Trust must be established before selecting the remote computer for backup or an existing selection list / job can run.
2. An alternate or new media server is attempting to backup a remote computer where no trust is established.
3. A trust relationship for a remote Linux or UNIX computer must be established first before a backup. 
Note: This error also occurs if Backup Exec Server is trying to backup another media server with same version of RAWS. Ensure that BE is not installed on the target remote server. 

Solution



The trust relationship between the media server and a remote computer can be established manually in a number of ways:

A. Add the remote computer to Favorite Resources
1. Browse to the remote computer in backup selections from the Active Directory Domains orMicrosoft Windows Network domain
2. Browse to the remote computer after adding it to User‐defined Selections
3. Use the Remote Agent Utility on the remote computer to configure publishing option.

B. Manually establishing a trust relationship with a remote computer by adding to Favorite Resources:
1. On the navigation bar, click the arrow next to Backup.
2. Click New Backup Job.
3. On the View by Resource tab, right-click Favorite Resources and choose Add Windows System.
4. Enter the remote computer name in the System Name field.
5. Choose the option to Add a system that already has the Remote Agent installed.
6. Choose or create a Logon Account with appropriate credentials for the remote computer, then clickOK.
7. Click Yes at the prompt to establish the trust relationship.
8. Click OK at the message indicating the system was added successfully.

C. Manually establishing a trust relationship with one or more remote computers by browsing to the domain:
1. On the navigation bar, click the arrow next to Backup.
2. Click New Backup Job.
3. On the View by Resource tab, expand Domains.
4. Do one of the following:
  • To select the remote computer from an Active Directory domain, expand Active Directory Domains, and then expand the Active Directory domain where the remote computer resides.
  • To select the remote computer from a Microsoft Windows Network domain, expand Microsoft Windows Network, and then expand the domain where the remote computer resides.
5. Do one of the following:

To establish the trust relationship with a single remote computer:

a. Select or expand the remote computer.
b. Click Yes at the prompt to establish the trust relationship.

To establish a trust relationship with more than one remote computer in the same domain:

a. In the results pane on the right, click on the first remote computer to highlight it, but do not select the checkbox.
b. Use the or keys while you click on other remote computers that you want to select.
c. Right‐click the selected computers, and then click Establish trust relationship.

D. Manually establishing a trust relationship with one or more remote computers by adding to User-defined Selections:
1. On the navigation bar, click the arrow net to Backup.
2. Click New Backup Job.
3. On the View by Resource tab, right‐click User‐defined Selections, and then click Manage User‐defined Selections.
4. Type the name or IP address for the remote computer in the Name field and click Add
5. After adding remote computers to the list, click Close.
6. Expand User‐defined Selections in the tree.
7. Do one of the following:

To establish the trust relationship with a single remote computer:a. Select or expand the remote computer.
b. Click Yes at the prompt to establish the trust relationship.
To establish a trust relationship with more than one remote computer in the same domain:a. In the results pane on the right, click on the first remote computer to highlight it, but do not select the checkbox.
b. Use the or keys while you click on other remote computers that you want to select.
c. Right‐click the selected computers, and then click Establish trust relationship.

E. Manually establishing a trust relationship with a remote computer using the Remote Agent Utility:
1. Open the Backup Exec 2010 Remote Agent Utility from the program menu.
2. On the Publishing tab, click Change Settings.
3. After the utility closes and reopens, click the Publishing tab and click Add.
4. Type the name or IP address of the media server, user name, and password in the corresponding fields.
NoteThe user must have administrative privileges on the specified media server.
5. Click OK.
6. Click the Security tab and verify that an entry appears for the specified media server.
7. Click OK to close the Remote Agent Utility.

F. Establishing a trust relationship while configuring a remote computer for deduplication
If a trust relationship with the remote computer has not already been established, establish it while configuring the remote computer for deduplication:
1. Open the Tools menu, then choose Configure Remote Agent for Deduplication... from theConfigure Devices submenu.
2. Type the name of the remote computer in the Server field.
3. Choose the port your remote computer is configured to use (default is 10000).
4. Type a description if one is desired.
5. Check or clear the Enable ICMP ping operations checkbox, depending on the network configuration.  If a firewall blocks ICMP, the checkbox will need to be cleared.
6. Choose or create a Logon account with the correct credentials for accessing the remote computer.
7. Click OK.
8. Click Yes at the prompt to establish the trust relationship.
9. Click Restart Now or Restart Later
Note: The Backup Exec services on the media server must be restarted before the remote computer can be used for client-side deduplication.