IT


Free Azure IaaS Webinar with Microsoft’s Thomas Maurer   Recently updated !

Implementing Infrastructure as a Service is a great way of streamlining and optimizing your IT environment by utilizing virtualized resources from the cloud to complement your existing on-site infrastructure. It enables a flexible combination of the traditional on-premises data center alongside the benefits of cloud-based subscription services. If you’re not making use of this model, there’s no better opportunity to learn what it can do for you than in the upcoming webinar from Altaro: How to Supercharge your Infrastructure with Azure IaaS.

The webinar will be presented by Thomas Maurer, who has recently been appointed Senior Cloud Advocate, on the Microsoft Azure Engineering Team alongside Altaro Technical Evangelist and Microsoft MVP Andy Syrewicze.

The webinar will be primarily focused on showing how Azure IaaS solves real use cases by going through the scenarios live on air. Three use cases have been outlined already, however, the webinar format encourages those attending to suggest their own use cases when signing up and the two most popular suggestions will be added to the list for Thomas and Andy to tackle. To submit your own use case request, simply fill out the suggestion box in the sign up form when you register!

Once again, this webinar is going to presented live twice on the day (Wednesday 13th February). So if you can’t make the earlier session (2pm CET / 8am EST / 5am PST), just sign up for the later one instead (7pm CET / 1pm EST / 10am PST) – or vice versa. Both sessions cover the same content but having two live sessions gives more people the opportunity to ask their questions live on air and get instant feedback from these Microsoft experts.

Save your seat for the webinar!

Altaro_Webinar.png

 


Unable to connect to share (System error 1272)

I noticed that I ran into a system error 1272 error to connect to a share residing on my NAS.  In Windows 10, version 1709 and higher (also Windows Server versions 1709 and higher) SMB2 guest access is disabled by default.

SMBv2 has the following behavior in Windows 10, version 1709, Windows Server version 1709, and Windows Server 2019:
  • Windows 10 Enterprise and Windows 10 Education no longer allow a user to connect to a remote share by using guest credentials by default, even if the remote server requests guest credentials.
  • Windows Server 2016 Datacenter and Standard edition no longer allow a user to connect to a remote share by using guest credentials by default, even if the remote server requests guest credentials.
  • Windows 10 Home and Professional editions are unchanged from their previous default behavior.

How to enable SMB2 guest access

If you want to enable insecure guest access, you can configure the following Group Policy settings:
Computer configuration\administrative templates\network\Lanman Workstation
“Enable insecure guest logons”
Note By enabling insecure guest logons, this setting reduces the security of Windows clients.

SMB03


Review Altaro VM Backup V8   Recently updated !

In this blogpost I’m going to take a closer look to the latest version of Altaro VM Backup.  Altaro is a loyal sponsor of vWorld.nl for some years now and I’m using their product since version 6. Recently Altaro released their latest version (V8) and I thought that would be a great time to post about it!

When you have any questions please leave a comment!

Introduction

Altaro VM Backup was founded in 2009 and was one of the first with a VM Backup product for Hyper-V.  Now 10 years later…, the product has made several improvements and is now used by over 40,000 businesses all over the world. The product supports both Hyper-V and VMware Hypervisors and has backup integrations for Microsoft Azure offsite backup repositories (!). Especially the support for Microsoft Azure offsite storage is a nice feature! There are not many other backup vendors out there who offer this functionality.

More info about how to use Azure for Offsite Cloud Backup in Altaro VM Backup here.

You can find out more about the features of Altaro VM Backup here.

Why Altaro

Altaro simplifies the backup and recovery experience by removing the traditional complexity. The user interface is very easy to use. For example, adding backup repositories is a simple drag and drop process and running backup jobs has been designed so that you simply select the VM’s you would like to back up and click the red button “Take Backup”.

During the version upgrades and the several improvements, Altaro VM Backup keeps their easy to use GUI and doesn’t require extensive support & training. My experience is that any system administrator with simple backup knowledge has enough knowledge to install, configure and troubleshoot Altaro VM Backup.

When you need support, you can easily contact Altaro (telephone/mail/chat) and my own experience is that they respond quickly and adequate. I’m curious about your experiences, please leave a comment!

Pricing

Altaro has an interesting pricing strategy, offering a per host license and not the traditional per CPU license(!). This simplifies the licensing process making it easy for especially SMB customers. The overall cost is of note and could possibly be one of the most affordable backup and recovery products on the market.

  • Standard – per host, but limited to 5 VMs
  • Unlimited – per host no limit on the number of VM’s (Exchange item restore, deduplication, and boot from backup.
  • Unlimited Plus – access to Cloud Management Console, Backup to Azure, Continuous Data Protection (CDP), and WAN-optimized replication.

I’m using the Unlimited Plus license btw 😊😊

Continuous Data Protection (CDP)

One of the most useful features added to Altaro VM Backup is CDP. Since each VM has a different role in IT infrastructure, backing up once a day is not enough in many cases. By enabling t CDP for your ‘vital’ VMs, you can achieve better Recovery Point Objective (RPO) results. The options for taking a backup starts from 12 hours and can be reduced to 5 minutes. Although you can enable CDP for all VMs of a host, it’s best to use it only for those that need it.

Things to consider with CDP:

  • Maximum frequency depends on resource capacity and throughput.
  • Large amounts of change on a virtual machine could cause the CDP frequency to be reduced.
  • Enabling multiple VM’s on high-frequency CDP could result in Hypervisor performance degradation.
  • Storage should be considered when completing more frequent backups (CDP).

Grandfather-Father-Son (GFS) Archiving

GFS now enables you to archive backup versions rather than deleting backups that pass a retention window.

With GFS Archiving enabled, Altaro VM Backup will keep:

  • 1 backup per week for 12 weeks
  • 1 backup per month for 12 months
  • 1 backup per year for 2 years

Point to note, you can still use retention policies, this feature has not been removed. Essentially, you are able to configure three separate backup cycles to store three new backup versions every week, every month and every year. This enables you to retain weekly, monthly and yearly backup versions outside of the retention policy. In previous versions, you were only able to delete old backups not “Archive Old Backups”

Change Block Tracking

The use of Change Block tracking reduces the backup time by scanning the virtual machine for any changes (on block level). This decreases the backup duration from hours to minutes. There have been many improvements resolving the challenge relating to rebooting hypervisors.

CBT v2 for Windows Server 2012 and 2012 R2 leverages Microsoft’s Volume Shadow Copy Service (VSS) on the hosts. VSS has been part of all versions of Microsoft Windows for over a decade and is extremely reliable in maintaining a point-in-time snapshot of a specific volume.

CBT v2 for Windows Server 2012 and 2012 R2 no longer requires the installation of a kernel-mode filesystem driver to track changes. The previous method of using filesystem drivers in VM Backup may affect I/O performance on some systems, and this will now be completely avoided with CBT v2 for Windows Server 2012 and 2012 R2.

With CBT v2 for Windows Server 2012 and 2012 R2, change tracking keeps working reliably across host reboots, system upgrades etc. CBT v2 for Windows Server 2012 and 2012 R2 also fully supports VMs migrating across cluster nodes and there is no longer the need to perform a full scan when a VM migrates or changes state etc.

Boot from Backup

This is an interesting feature… Through the boot from backup section, you can start a VM directly from the backup location without having to restore it using the normal procedure. In this case, there are two types, Verification Mode and Recovery Mode. Using this feature you can quickly be up and running with your VM.

Concurrent Backup and Restore Operations

Parallel backup and restore operations have been added preventing queuing jobs like an offsite backup copy. You can now take offsite copies and restore backups without the delay of any scheduled backup or CDP operations.

WAN-Optimized Replication

Version 8 of Altaro VM Backup introduces WAN-Optimized Replication enabling users to replicate

VM’s (ongoing copy) to a remote site. This allows It admins to failover mission-critical systems to a remote site. This new feature enables businesses to be back up and running with minimal downtime if a disaster strikes or major incident occurs, hence reducing the Recovery Time Objective (RTO) as much as possible.

Things to consider with Replication:

  • You need to have the same version Hypervisor at both the local and remote site.
  • The maximum replication frequency is 5 minutes.
  • You can only use local disks for replication, network shares are not currently supported.
  • 2008R2 Hyper-V hosts are not supported.
  • If the last successful replication version is not equal to the last successful backup version, then recovery is required.

WAN Optimized Replication is currently only available with Hyper-V (VMware support is coming soon)

Summary

Altaro VM Backup has clearly listened to the industry’s backup and recovery pain points and challenges. They have created a product that is simple to use, effective and used by many. The product is feature rich and offers three simple tiers for pricing (Standard, Unlimited and Unlimited Plus).

I have found some product limitations, however, this does not impede the product’s ability to back-up the majority of SMB businesses Hyper-V & VMware infrastructures. Altaro clearly invests heavily into development and I do look forward to seeing features like cloud replication in 2019.

You can download Altaro VM Backup and enjoy forever free backup for your VMs. Any questions, please use the comments box below….

More information

Altaro 10 min setup & configure

What’s new in Altaro VM Backup V8

An Introduction to Altaro VM Backup V8


How to locate your missing emails (IPM_subtree)

Today I ran into a little problem. For some reason I moved all my emails from a particular folder into a unknown other folder. I could find the email(s) using the search option and found out that the specific files were located in the IPM_Subtree folder.

After some investigating I found out that it was quite easy to locate these files and move them back again to their old location.

First download MFCMAPI here.

Assuming the missing emails are in the IPM_SUBTREE folder, do the following.

  1. Download the MFCMapi program above, and run it from the client PC that the user connects from (no installation necessary). MFCMapi uses Outlook profiles to get server information and connect. You can connect directly using your Outlook profile.
  2. Go to the Session menu, then “Logon”.
  3. Choose the Outlook profile and click OK.
  4. Locate the main mailbox to open, and double-click it to open.
  5. Expand “Root Container” and locate “IPM_SUBTREE”.
    subtree1
  6. Right-click on “Top of Information Store” and select “Open Contents Table”. Note: You may see an entry called “IPM_SUBTREE” instead, this is the same folder as “Top of Information Store”.
    subtree2
  7. A new window will open, and will show any messages in the “IPM_SUBTREE” folder. Select all that show up, and right-click and select Copy.
  8. Navigate to the Inbox (or alternative folder), under the Root Container / Top of Information Store / Inbox. Other folders will appear here as well.
  9. Right-click and select Paste to move the messages found in to the Inbox folder.
    You can choose to move the emails instead of copying them.
  10. The messages should now show up in Outlook once again.

 


PatchMyPC to the rescue!

Recently I looked into PatchMyPC for Microsoft SCCM purposes (more info about that in another blog post). But I found out that the Home Edition of PatchMyPC did a hell of a job also!

This version is free to download and use and it instantly updates all your installed programs like Notepad++, Winrar etc.

PatchMyPCHome

The program supports hundreds of programs. Great tip: selecting a program you currently have not installed automatically installs that program (latest version!) for you!

I found this tool a great addition to keeping my device updated!

More info here


Ignite 2018 by Tony Krijnen

Wil je weten wat je hebt gemist van Ignite? Tony Krijnen van Microsoft praat je bij in deze TechCast van LogIn!

Deze alweer 7e extra TechCast gaat over de nieuwste ontwikkelingen die zijn gepresenteerd op Microsoft Ignite 2018. Tony Krijnen, IoT technologie strateeg bij Microsoft, bezocht dit mega tech-event in Orlando USA en praat Sander Noordijk en Eric van Klaveren bij over wat hem opviel. Hij vertelt over wat er vanuit Microsoft zit aan te komen en welke sessies zijn de moeite waard om terug te kijken.


How to fix Remote Desktop DPI scaling with high resolution laptops

More and more laptops are equipped with high-resolution screens, like the Microsoft Surfaces and (in my case) the Dell XPS devices. Do you also have a very high-resolution display on your laptop like I do? And is everything too small to see within your Remote Desktop Connection, I found the following solution very useful.

This issue is caused by lack of not being DPI scaling aware of the Remote Desktop Client. If you open a Remote Desktop connection to a server or other computer the native resolution of the computer is used instead of the scaling to 1920×1080, so you’ll get very small icons etc. There are (Remote Desktop/Management) tools available who seems to fix this issue also. But I was looking for a solution that works with my current mstsc.exe. The solution is to create a manifest file. A manifest file is a (XML) configuration file to configure special settings, in this case for mstsc.exe. Follow the steps below :

First, tell Windows to look for a manifest file for an application by default. This can be done by setting a registry entry.

Open regedit and navigate to the registry key:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide
Right-click, select NEW -> DWORD (32 bit) Value
Type PreferExternalManifest and then press ENTER.
Right-click PreferExternalManifest, and then click Modify.
Enter Value Data 1 and select Decimal.
Click OK. Exit Registry Editor.

Next step is to make the manifest file, mstsc.exe.manifest. Copy the contents below and put it in Notepad or similar tool and save it to a file as %SystemRoot%\System32\mstsc.exe.manifest. Download of the file is also available, here. Important is that you save the file in the same directory as the Remote Desktop Client executable (mstsc.exe).

You can also copy/paste the following code into the manifest file :

There are a couple of things you have to keep in mind. The mouse pointer still stays small. I found this not so big an issue and still haven’t found a workaround for this. I’ve heard that updates like Microsoft 1709 overwrites the manifest file. So you have to re-apply the manifest file. I’ve also noticed that the warning do you trust this certificate warning doesn’t appear any longer 🙂

 


How to boot Windows 10 into Recovery Mode

It’s very easy to boot a Windows 10 machine into the Recovery Mode. Yust power on the Windows 10 machine and wait for the login screen. Hold down the Left Shift and choose the restart option (hit the Power icon at the bottom right)

Windows 10 Recovery Boot

So choose the restart option and after a couple of seconds you notice that you’re booted into the Recovery Mode :

Recovery Mode 1

Recovery Mode 2

Now you are ready to restore a system image (see previous post) or go to safe mode or command prompt.


How to export your Windows 10 product key

The product key for new computers that come preinstalled with Windows 10 has the product key stored within the motherboard firmware. Users can retrieve it by issuing a command from the command prompt.

  1. Press Windows key + X
  2. Click Command Prompt (Admin)
  3. At the command prompt, type wmic path SoftwareLicensingService get OA3xOriginalProductKey

This will reveal the product key.

Windows 10 Key