ntbackup logs missing
Normally when you run ntbackup logged on as "Administrator" backup logs are saved in "C:\Documents and Settings\Administrator\Local Settings\Application Data\Microsoft\Windows NT\NTBackup\data"
If backup logs are not in the expected location check following:
If you run ntbackup from the command line or a script make sure you include log option: /l:s (summary log) or /l:f (full log).
If you run ntbackup as a scheduled task, check "Run As" option in scheduled task properties. For example if you run the scheduled task as "backup-operator" your ntbackup logs will be saved in "C:\Documents and Settings\backup-operator\Local Settings\Application Data\Microsoft\Windows NT\NTBackup\data".
Windows Server 2003
List all files on the server
Sometimes it could be useful to have a text file listing all files on your server or in a particular directory. If content is relatively static this can be used to perform a
quick file searches based on file names. Similar search using Windows search toll could take hours, whereas search inside a large text file is pretty much instant.
You can use robocopy utility to create this list:
1. Download and extract robocopy.exe. If you use Windows 7 - robocopy is already on your system.
2. Run robocopy.exe in command prompt (CMD) with following command:
robocopy.exe "\\path\to\your\folder" "TMP" /E /CREATE /TEE /LOG:FileList.txt
Basically this command will "copy" all files in "\\path\to\your\folder" and all subfolders to the folder "TMP", however instead of copying actual files it will only create a folder structure and zero lenght files. Additionally, it will create a log file "FileList.txt" listing all "copied" files and directories.
3. Delete "TMP" directory.
If you having problem deleting "TMP" due to long file/path names, delete it in command prompt:
rmdir "\\path\to\your\folder\TMP" /Q /S
Outlook 2010 exchange proxy settings automatically changes to incorrect details
Exchange 2007 Autodiscover Service can automatically change Outlook 2010 "Exchange Proxy Settings" to incorrect parameters if Exchange Outlook Anywhere is not configured correctly.
Even if you manually set correct details after restarting the Outlook changes get reverted back.
This only affects computer in the domain.
You have 3 options to fix this:
Force settings via group policyRead this article for detailed instructions.
Disable Autodiscover on Exchange server
- In Exchange Management Shell (EMS) run: Get-outlookprovider -identity EXPR | remove-outlookprovider
- On Exchange Client Access Server - IIS Manager > Application Pools > MSExchangeAutodiscoveryAppPool > Actions > Recycle
To restore Autodiscover functionality:
- In Exchange Management Shell (EMS) run: New-OutlookProvider -Name:EXPR
You may need to reconfigure Autodiscovery as per instructions below.
Configure Autodiscover to push correct settings to all clients
- Exchange Management Console (EMC) > Server Configuration > Client Access > [servername] > Properties > Outlook Anywhere - Enter correct external exchange host name. E.g. mail.mydomain.com and select appropriate "Client authentication method". E.g. "Basic authentication".
This will populate "Use This URL to connect to my proxy server for Exchange" and "Use this authentication when connecting..." in MS Outlook
You can also check this information using Exchange Management Shell (EMS)
Get-OutlookAnywhere -Server [servername] |fl
- Outlook Anywhere will also automatically populate "Only connect to proxy servers that have this principal name in their certificate" in MS Outlook. By default Outlook uses external exchange host parameter (configured in step 1). E.g. msstd:mail.mydomain.com
If this matches the principal name in your certificate you can leave it as it is. Otherwise you need to change it using EMS.
Run: Get-OutlookProvider -Identity EXPR | fl
If CertPrincipalName is set, it will populate "Only connect to proxy servers that have this principal name in their certificate" field in Outlook and override the default value. To set it run:
set-OutlookProvider -id EXPR -Server "[servername]" -CertPrincipalName "msstd:server.domain.com"
Make sure server.domain.com matches principal name in your certificate.
Also run following to reset Server value (it should be empty)
set-OutlookProvider -id EXPR -server $null
Double check your settings:
Get-OutlookProvider -Identity EXPR | fl
MS Exchange 2007
MS Outlook 2010
Windows Server 2003 domain
Export private key and certificate from IIS .pfx file
If you need to move or copy a certificate from Windows IIS6 to Linux Apache server (or other device requiring .key and .crt formats) perform following steps:
1. Export IIS6 certificate into into .pfx format
On Windows Server machine
Start > Run MMC
File > Add/Remove Snap-in
Add > Certificates > Add > Computer Account > Local Computer
Navigate to Certificates > Personal > Certificates
Right click your certificate > All Tasks > Export
Yes, export private key
Personal Information Exchange (.pfx) - clear all checkboxes
leave password blank
Choose where to save file
2 . Extract private key and certificate file
You need OpenSSL to extract private key and certificate from .pfx
If you have Linux web server in place you should already have openssl there.
Alternatively you can download and install Windows version. For more info and latest versions check here
If you installed Windows version run openssl.exe from C:\OpenSSL-Win32\bin
In Linux version just type openssl in terminal
Export private key and certificate:
pkcs12 -in "C:\your\path\filename.pfx" -out "C:\your\path\cert.pem"
Enter Import Password: leave blank
Enter PEM pass phrase: 1234 (or anything else)
Created cert.pem file will have encrypted private key and all certificates (identity, root, intermediate) in a plain text.
To extract certificates or encrypted private key just open cert.pem in a text editor and copy required parts to a new .crt or .key file. If formatting doesn't look right in Windows notepad use Notepad++ or similar text editor.
If you need private key in not encrypted format you can extract it from cert.pem removing encryption:
rsa -in "C:\your\path\cert.pem" -out "C:\your\path\PrivateKey.key"
Enter pass phrase (1234 or somethinkg else you set previously) to remove encryption.
Windows Server 2003