Thursday, June 25, 2009

View Email Header information in Outlook 2007/ Gmail / Windows Live Hotmail or MSN Hotmail

Outlook
1. Open Outlook
2. Inbox
3. Right Click the Email msg you want to check the header information
4. Choose Message Options
5. You can see the Internet Headers on the bottom of the “Message Options” window
Gmail
1. Log on to Gmail
2. Open the mail msg you want to check the header information
3. Click on the down arrow key next to reply button
4. Select show Original


Hotmail
1. Log on to Hotmail
2. Right Click the Email msg you want to check the header information
3. Select View message source 


Once you find the header you can analyze it using very nice one line tool box. 
http://mxtoolbox.com/

Then go to "Analyze Header" tab copy and paste the hear you collection from above
http://mxtoolbox.com/EmailHeaders.aspx


This will analyze and give you better understanding about the mail follow.

Sunday, May 24, 2009

What is Microsoft Exchange 2007

Exchange 2007 is the Microsoft messaging and collaboration server designed to help your business communicate more effectively.

Along with the rich client functionality provided by Microsoft Office Outlook, Exchange 2007 offers mobile, remote, and desktop e-mail access with state-of-the-art security and privacy.

Lower cost of ownership through the services provided by Microsoft Windows Server; high reliability and outstanding performance; e-mail-based collaboration; and easy upgrading, deployment, and administration.

http://www.microsoft.com/exchange/2007/default.mspx

Backup Your Important Data..... Why ?

Back up your data before it's too lateSadly, many individuals and even businesses don't realize how valuable their data is until they don't have it any more. It's not a matter of "if" you will experience data loss; it's a matter of "when".

It could be a simple file deletion or it could be a disaster where we have to bring the system + data. Who knows what will happen within next few hours.

If you needs to have comprehensive backup solution you can go for third-party backup tools which will cover later in this post.

Or you could use free backup utility which come with the OS, also cover later in this post.

It is very important to backup your data either using by free or third-party backup tool before it is too late....

What are the third party backup tools?

Here I am mentioning some tool which I have experience on. The product prices are based on the backup strategy. for example if you are using the product to backup Exchange/ SQL /Oracle you need to have license for each in order to have comprehensive data recovery solution.

FalconStor portfolio of data protection solutions
http://www.falconstor.com/en/pages/index.cfm?pn=DisasterRecovery&gclid=CJz9iojb1JoCFRKIxwodRiMkFg&bhcp=1
VIP Backup
http://www.vipbackup.com/index.html
ARC Serve
http://arcserve.ca.com/products/product.aspx?id=5282

Backup Exec
http://www.symantec.com/business/products/family.jsp?familyid=backupexec

What are free backup tools available?
In Windows NTbackup - Which is simple tool but, can be used to backup File server/ Exchange / SQL / etc?
In Unix - tar command
tar -zcvpf /archive/full-backup-`date '+%d-%B-%Y'`.tar.gz \ --directory / --exclude=mnt --exclude=proc --exclude=var/spool/squid

-Thanks
@Roshan

PC Tools - File Recover™

What is File Recover?
File Recover allows you to recover critically important documents, or other files, which have been lost by accidental deletion. These files may be lost by emptying the Recycle Bin, or using other deletion actions that bypass the Recycle Bin altogether. Such actions include Windows® Shift-Delete, command line deletion, deleting excessively large files or using applications that delete files without the Recycle Bin.

What happen to the Files after you delete them?
When a file is deleted from the Recycle Bin, or if the recycle bin is bypassed altogether, the file can no longer be recovered by the Windows® Operating system. The content of the file still remains on the drive, relatively intact, until the section of the drive it occupies is overwritten by another file.

How File Recovery recover your files?File Recover identifies the contents of such lost files on the hard drive and allows you to recover them. If a file has been partially overwritten, File Recover attempts to reconstruct as much of the file as possible with the remaining contents. This allows you to salvage at least part, if not all, of that recovered file to continue using it as required.

See how File recovery can save your important data once again.

http://www.pctools.com/file-recover/?ref=google_fr&gclid=COH9gNiZ1JoCFSURFQodUxgL2g

-Thanks
@Roshan

Excellent Network Monitor Tool - GFI Monitor

Automated Server and Network Monitoring Made EasyGFI Network Server Monitor™ is the software solution you need to scan your network for failures or irregularities. GFI Network Server Monitor scans automatically so you can identify issues and fix unexpected problems before your users (or managers) even know they've happened.

Maximize Network and Server Uptime
GFI Network Server Monitor maximizes network availability by monitoring all aspects of your Windows and Linux servers, plus workstations and other devices such as routers and more. When a failure is detected, GFI's network monitor will alert you by email, pager or SMS, as well as automatically taking the preconfigured corrective action by, for example, rebooting the machine, restarting the service or running a script.

Performs a Real TestGFI Network Server Monitor actually tests the status of a service, rather than deducing a service status from generated events as other products do. It is the only real way to ensure server uptime. GFI Network Server Monitor is easy to set up and use, and is competitively priced.

Built in Rules for Several Network Servers and ServicesGFI Network Server Monitor's built in monitoring rules include: Exchange Server 2000/2003, MS SQL, Oracle and ODBC databases, CPU usage, FTP & HTTP Servers Group Membership, Active Directory & NTDS, Disk Drive health, Disk Space, Event Log (with content checking), File Existence (with content checking), TCP, ICMP/Ping, SMTP & POP3 Mail servers, Printers, Processes, Services, UNIX Shell Scripts (RSH), SNMP & Terminal Server.
Custom monitor functions can be created in VBscript and ADSI and WMI. With GFI Network Server Monitor you can monitor virtually anything!

Why Choose GFI Network Server Monitor?
Monitor your network and servers for software and hardware failures
Out-of-the-box monitoring of Exchange, ISA, SQL, Web servers and more
Monitor disk space, services, processes and more on servers and workstations
Eas to learn easy to use and easy to deploy - no client component or agent

Other Features
Built-in computer monitor functions
Built in Internet service functions
Support for SQL Server/MS Access as a database backend
Monitors terminal servers by actually logging in
Monitor your database servers (SQL/ODBC)
Monitor Linux servers
View network status from anywhere in the world
Monitor remote event logs
Monitor processes, services performance and CPU usage
Custom network monitoring using VBScript and SSH
Monitor users, groups and other Active Directory information
Competitively priced
Nested folder support
Configure maintenance periods to avoid alerts being sent during scheduled maintenance
Advanced logging options to text file or event log
Configure dependencies to avoid multiple alerts for error conditions dependent on each other
Monitor network printer status
Reporting – includes reports that detail the availability of your network resources; alternatively, use Crystal Reports to access the database and create your own reports
Monitoring checks wizard that easily configures new checks for your present systems
Accommodates employee shifts: GFI Network Server Monitor can notify different people depending on the time at which the check triggered.

We are using this product and it delivers what it is supposed to .........

http://www.gfi.com/

-Thanks
@Roshan

Saturday, May 23, 2009

Windows BitLocker Drive Encryption

BitLocker Drive Encryption

Windows BitLocker Drive Encryption is a new security feature that provides better data protection for your computer, by encrypting all data stored on the Windows operating system volume.

BitLocker uses the TPM to help protect the Windows operating system and user data and helps to ensure that a computer is not tampered with, even if it is left unattended, lost, or stolen.
To use BitLocker on a computer without a TPM, you must change the default behavior of the BitLocker setup wizard by using Group Policy, or configure BitLocker by using a script.

NOTE:
When BitLocker is used without a TPM, the required encryption keys are stored on a USB flash drive that must be presented to unlock the data stored on a volume.

How does BitLocker Drive Encryption work?
During the startup process, the TPM releases the key that unlocks the encrypted partition only after comparing a hash of important operating system configuration values with a snapshot taken earlier.

This verifies the integrity of the Windows startup process. The key is not released if the TPM detects that your Windows installation has been tampered with.
For enhanced security, you can combine the use of a TPM with either a PIN entered by the user or a startup key stored on a USB flash drive.

What is a TPM ?
A TPM is a microchip designed to provide basic security-related functions, primarily involving encryption keys. The TPM is usually installed on the motherboard of a desktop or portable computer, and communicates with the rest of the system by using a hardware bus.

Additional References
Windows BitLocker™ Drive Encryption Step by Step Guide (http://go.microsoft.com/fwlink/?LinkId=53779)
Windows Trusted Platform Module Services Step by Step Guide (http://go.microsoft.com/fwlink/?linkid=67232)

-Thanks
@Roshan

Enabling AWE (Address Windowing Extensions) in SQL 2005

In Microsoft SQL Server 2005, you can use the Address Windowing Extensions (AWE) API to provide access to physical memory in excess of the limits set on configured virtual memory.

The specific amount of memory you can use depends on hardware configuration and operating system support.

By default SQL AWE setting is disabled, and need to be set following parameters to achieve this.

01) Windows Boot.ini configuration
/PAE (boot.ini)

02) Enable the Lock Pages in Memory Option (Windows)
Add SQL Service Account to "Enable the Lock Pages in memory" in Group Policy (Local)

03) SQL Configuration needs to be done in sp_configure

'AWE enabled' (sp_configure)
'max server memory' (sp_configure)
'min server memory' (sp_configure)

Read more: http://msdn.microsoft.com/en-us/library/ms189631.aspx; http://msdn.microsoft.com/en-us/library/ms190673.aspx

-Thanks
@Roshan

Windows 2008 Hyper-V

Hardware Requirements
Hyper-V requires an x64-based processor, hardware-assisted virtualization, and hardware data execution protection.

Software Requirements
Supported for Windows 2008 Ent/Std/ DataC/ Web/ HPC x64 bit version.

Step 1: Change BIOS Settings
Enabled the hardware-assisted Virtualization Technology prior to installation, you must complete a full power-cycle.

F9 à Advanced options à Processor Options à

· Intel® Virtualization Technology à Enable
· No-Execute memory Protection à Enable

Step 2: Install Hyper-V

You can install Hyper-V on either a Full installation or a Server Core installation.
You can use Server Manager to install Hyper-V on a full installation.

Start ------> Server Manager ------> click Add Roles ------> On the Select Server Roles page, click Hyper-V -----> On the Create Virtual Networks page, click one or more network adapters. ------> Confirm Installation Selections page, click Install. -----> Click Close to finish the wizard, and then click Yes to restart the computer.

To install on a Server Core installation, you must perform the installation from a command prompt. Run the following command:
Start /w ocsetup Microsoft-Hyper-V

Step 3: Create and set up a virtual machine

Click Start, point to Administrative Tools, and then click Hyper-V Manager. ------> From the Action pane, click New, and then click Virtual Machine. ------> From the New Virtual Machine Wizard, click Next. ------> Specify Name and Location -----> On the Memory page, specify enough memory to run the guest operating system ------> On the Networking page, connect the network adapter to an existing virtual network. ------> On the Connect Virtual Hard Disk page, specify a name, location, and size to create a virtual hard disk. -----> On the Installation Options page, choose the method you want to use to install the operating system. -----> Click Finish.

Note: Migrating Legacy VHD's to Hyper-V (windows 2003)
Install the latest service packs for windows 2003 (minimun service pack 1).
Make sure you uninstall virtual pc/ virtual server additions from the virtual machine.
Once you mount the VHD to Hyper-V inorder to use mouse you need to install Hyper-V Services.

Open virtual machine using Hyper-V -----> Select "Insert Integration Services Setup Disk" from the action menu -----> Restart when prompted.

Install the latest windows updates.
Make sure you uninstall virtual pc/ virtual server additions from the virtual machine and before the restart you MUST UPDATE THE HAL

Start ----> Run----->msconfig----->Boot(TAB)-----> Advanced options -----> Delete HAL (Checkbox)----->OK
Shutdown Virtual Machine -----> Mount in Hyper-V

How to Manage Hyper-v Remotely

Windows Vista
Install this update to enable remote management of a Windows Server 2008 computer that is running the Hyper-V role. Update for Windows Vista (KB952627)
Installation instructions

1. Download the update package (Windows6.0-KB952627-x86.msu or Windows6.0-952627-x64.msu) from the Microsoft Download Center.

2. Locate the folder in which you saved the downloaded package. For example, locate the following folder:
C:\Users\User_profile_name\Downloads

3. Double-click the update package. The Windows Update Stand-alone Installer (Wusa.exe) starts, and then it prepares the update package for installation. This preparation process may take several minutes.

4. Click OK to install the update.

5. When the installation is complete, click Close.

After you install this update package, the Hyper-V Manager MMC snap-in is located under Administrative Tools.

MOSS 2007

What Is SharePoint?

SharePoint is an extensible and scalable web-based platform consisting of tools and technologies that collectively form what’s known as SharePoint Products and Technologies. The total package is a platform on which you can build business applications to help you better store, share, and manage digital information within your organization. Because you can build with or without the need for code, the package empowers the average business user to create, deploy, and manage team websites, without depending on skilled resources, such as systems administrators or developers. Using lists, libraries, and Web Parts, you can transform team websites into business applications built specifically around making your organization’s business processes more efficient.

SharePoint Products and Technologies has two major offerings:

Windows SharePoint Services 3.0 is a free offering available to Windows Server 2003 and Small Business Server 2003. It contains the core functionality needed for document management and collaboration, such as document libraries and lists.

Microsoft Office SharePoint Server 2007 is a newer version of SharePoint Portal Server 2003. It offers the same features of WSS in addition to the functionality required for Enterprise Content Management as well as Excel and Forms Services, Business Data Catalog, and Business Intelligence. SharePoint also features a more robust and customizable search engine as well as special features for displaying information stored in the SharePoint environment in a more customizable and aggregated format than is possible with WSS.

-Thanks
@Roshan

Friday, May 22, 2009

Windows 2008 - Overview of Editions

Overview of Editions
Windows Server 2008 is available in multiple editions to support the varying server and workload needs of organizations. All current editions below are also supported in the upcoming Windows Server 2008 R2 family.


Windows Server 2008 Datacenter delivers an enterprise-class platform for deploying business-critical applications and large-scale virtualization on small and large servers. Improve availability with clustering and dynamic hardware partitioning capabilities. Reduce infrastructure costs by consolidating applications with unlimited virtualization licensing rights. Scale from 2 to 64 processors. Windows Server 2008 Datacenter provides a foundation on which to build enterprise-class virtualization and scale-up solutions.

Windows Server 2008 Enterprise delivers an enterprise-class platform for deploying business-critical applications. Help improve availability with clustering and hot-add processor capabilities. Help improve security with consolidated identity management features. Reduce infrastructure costs by consolidating applications with virtualization licensing rights. Windows Server 2008 Enterprise provides the foundation for a highly dynamic, scalable IT infrastructure.

Windows Server 2008 Standard is the most robust Windows Server operating system to date. With built-in, enhanced Web and virtualization capabilities, it is designed to increase the reliability and flexibility of your server infrastructure while helping save time and reduce costs. Powerful tools give you greater control over your servers, and streamline configuration and management tasks. Plus, enhanced security features work to harden the operating system to help protect your data and network and provide a solid, highly dependable foundation for your business.

Windows Server Foundation provides organizations with a foundation to run most business applications. It’s an affordable platform for the core portfolio of IT capabilities, including file and print sharing, remote access and security features. A familiar Windows experience makes it easy for organizations to get up and running. As the heart of a true local area network, Windows Server Foundation lets employees exchange data very securely, without requiring email or the Internet. An easy upgrade path to higher-end versions of Windows Server allows your IT solution to grow as your business grows.

Windows Web Server 2008 is designed to be used specifically as a single-purpose Web server, and delivers on a rock-solid foundation of Web infrastructure capabilities in the next-generation Windows Server 2008. Integrated with the newly re-architected IIS 7.0, ASP.NET, and the Microsoft .NET Framework, Windows Web Server 2008 enables any organization to rapidly deploy Web pages, Web sites, Web applications, and Web services.

Windows HPC Server 2008, the next generation of high-performance computing (HPC), provides enterprise-class tools for a highly productive HPC environment. Windows HPC Server 2008 can efficiently scale to thousands of processing cores and includes management consoles that help you to proactively monitor and maintain system health and stability. Job scheduling interoperability and flexibility enables integration between Windows and Linux based HPC platforms, and supports batch and service oriented application (SOA) workloads.

Windows Server 2008 for Itanium-Based Systems is optimized for large databases, line of business, and custom applications providing high availability and scalability for up to 64 processors to meet the needs of demanding and mission-critical solutions.

Windows Server 2008 Datacenter without Hyper-V.

Windows Server 2008 Enterprise without Hyper-V.

Windows Server 2008 Standard without Hyper-V.

-Thanks
@Roshan

Thursday, May 21, 2009

Linux FTP Server

Initial ConfigurationThe original configuration file for vsftpd is perfectly suited to a secure anonymous FTP server and makes a good basis to start customising,

It should be backed up to ensure any errors can be restored quickly from a known good file.

[bash]# cp /etc/vsftpd/vsftpd.conf /etc/vsftpd/vsftpd.conf.original
[bash]# vi /etc/vsftpd/vsftpd.conf

To display a welcome banner to every new user that connects, set the banner_file

banner_file=/etc/vsftpd/welcome.banner

This directive puts the FTP server into active mode for the data connection, the default is passive mode ("YES").

pasv_enable=YES

Starting The Server
Now that the FTP server has been configured, the runlevels should be set and checked to ensure the server will start as required.
[bash]# chkconfig --level 345 vsftpd on[bash]# chkconfig --list vsftpd

Controlling User Access
In vsftpd's initial state anonymous users are are allowed full download access to all the resources available through the FTP server, and adjustments to the configuration are required to enforce a more secure environment.
Anonymous UsersThe default setting for allowing anonymous users is YES. To disable anonymous access it is not enough to comment out the following parameter, it MUST be changed to NO, otherwise anonymous still has access.

anonymous_enable=YES
anonymous_enable=NO

If the FTP server is going to be accessible to the general public, then the anonymous account can be granted the rights to upload files to the server and create new directories inside the FTP root directory. Give serious consideration to these abilities before implementing them.

#anon_upload_enable=YES#anon_mkdir_write_enable=YES


Always avoid where possible, allowing anonymous users the ability to upload files to the FTP server. This has the potential to allow users of pirate software to abuse your system for further distribution. Always check the files on a regular basis for any sign of abuse.To restrict the upload rate of connected anonymous users, set the anon_max_rate to an appropriate value for your connection. The rate at which system account users can upload can also be restricted using the local_max_rate parameter.

Rates are in bytes per second, "0" is disabled.
anon_max_rate=10485760
local_max_rate=0

You may for some reason decide to limit the amount of users that connect to your server at anytime, and how many simultaneous connections can be maintained from each IP address.

max_clients=500max_per_ip=4

-Thanks
@Roshan

Ms Exchange 2007 Recovery

This article is covering how to recover crashed exchange server into a new server.
Understanding Setup /M:RecoverServer
One of the tools available for server recovery in Microsoft Exchange Server 2007 is the Setup /m:RecoverServer switch. Running Setup /m:RecoverServer on a server tells Setup to read the configuration information from the Active Directory directory service for a server with the same name as the server from which you are running Setup. The Exchange files and services are then installed on the server, and the roles and settings that were stored in Active Directory are then applied to the server.
Aa998656.note(en-us,EXCHG.80).gifNote:
Setup /m:RecoverServer is for recovery only. Do not use it as a repair tool, to recover from a failed install, to recover from a failed uninstall, or to reconfigure a server. It is only for recovering a server that was once fully functional, or to move a server to new hardware and maintain the same name.
Aa998656.note(en-us,EXCHG.80).gifImportant:
Setup /m:RecoverServer cannot be used across operating systems. A server that was originally running Windows Server 2003 can be recovered only on Windows Server 2003, and a server that was originally running Windows Server 2008 can be recovered only on Windows Server 2008.
http://i.technet.microsoft.com/Global/Images/clear.gif When You Should Run Setup /m:RecoverServer
There are several situations where the /m:RecoverServer switch can be of help to the Exchange administrator. Some of these situations are as follows:
  • When your server is no longer available, and you must prepare a new or existing computer to replace the failed Exchange server. This could be situations where:
·         Your hardware has failed.
·         You are performing a dial-tone recovery, where Active Directory is intact.
·         You are performing a site recovery, where Active Directory is intact.
  • When migrating a Client Access server, Hub Transport server, Unified Messaging server, or Mailbox server to new hardware.
Aa998656.note(en-us,EXCHG.80).gifNote:
Setup /m:RecoverServer will only migrate setting information stored in Active Directory. Any local customizations or databases are not migrated with this method. For information about where Exchange stores data outside of Active Directory, see What Needs to Be Protected in an Exchange Environment.
Aa998656.note(en-us,EXCHG.80).gifNote:
If the virtual directories in Internet Information Services (IIS) have been modified, there are additional steps to migrate a Client Access server to new hardware. For more information about what needs to be backed up on a Client Access server, see Client Access Server Data.
http://i.technet.microsoft.com/Global/Images/clear.gif When You Should Not Run Setup /m:RecoverServer
There are situations where it is not possible, or not a good idea, to run Setup /m:RecoverServer. Some of these situations are as follows:
  • The Edge Transport server is not a supported role for the /m:RecoverServer switch. The Edge Transport server does not use Active Directory, so there is no setting information to be applied to the server from Active Directory. Instead of running /m:RecoverServer, you can install a new Edge Transport server and restore settings from backup.
Aa998656.note(en-us,EXCHG.80).gifNote:
The Edge Transport server includes a backup and recovery script to capture Edge Transport server configuration data. For more information about this script, see Using Cloned Configuration Tasks for Edge Transport Server Disaster Recovery.
  • When the server information is no longer in Active Directory. If the server object is missing from Active Directory, there is no information that can be applied to the server.
  • When a server with the same name as the server you are trying to recover still exists on the network.
  • To repair a failed install. The Setup /m:RecoverServer option assumes a consistent configuration in Active Directory for the server. If Setup failed, the information in Active Directory might not have been fully written. In this situation, you should run Setup again.
  • To change the availability configuration of your Mailbox server. You cannot run /m:RecoverServer to convert any of the following:
·         A non-clustered Mailbox server into a clustered mailbox server, or vice versa.
·         A single copy cluster into a cluster continuous replication Mailbox server or a non-clustered Mailbox server, or vice versa.
http://i.technet.microsoft.com/Global/Images/clear.gif What to Do After Setup /m:RecoverServer Has Completed
Setup /m:RecoverServer restores the Exchange server configuration data from Active Directory, copies the Exchange files to the server, and sets default settings when alternate settings are not found in Active Directory. It does not restore customized settings that were stored on the server or end-user data stored in the Exchange databases on the server.
Each server role requires different post-recovery steps to bring it into a pre-recovery state. For a detailed list of items that need to be restored per server role, see What Needs to Be Protected in an Exchange Environment and read the topics that apply to each server role. In general, the following items must be restored:
  • The mailbox and public folder databases on a Mailbox server. If the public folders on the server are all replicated on another server, you could create a new empty public folder database and backfill it from other replicas.
  • Unified Messaging prompts and custom audio files on a Unified Messaging server, if the server was the prompt publishing point for a dial plan. Otherwise, the files are restored from the prompt publishing point server.
  • If the database is not restored and a dial tone database is used, Unified Messaging users will need the following:
·         A new personal identification number (PIN) must be issued.
·         A new greeting must be recorded.
Aa998656.note(en-us,EXCHG.80).gifNote:
The audio recording of the user's name is stored in Active Directory. As long as Active Directory is intact, the recorded name will still be there.
  • Any custom Office Outlook Web Access files or virtual directories on a Client Access server must be re-created.
  • After you recover a Hub Transport server, there may be additional steps to perform such as:
·         Restoring a saved queue database
·         Enabling agents
·         Configuring send connectors
If you are performing one or more of these tasks, the Hub Transport server should be stopped after a server recovery by default. Otherwise, the Hub Transport server will start with settings and agents in a backed-up state. The backed-up state might not represent what you had configured on the server right before the issue occurred that required the restore. Also, if you are restoring a saved queued database, you will need to place the database in the correct folder while the transport service is stopped. We recommend that you use the /DoNotStartTransport switch when restoring a Hub Transport server. The syntax for the command is as follows:
Setup /m:RecoverServer /DoNotStartTransport
  • Any custom registry settings that were configured on the servers must be re-configured.
 -Thanks
@Roshan