Posts

Windows sites

 https://www.catalog.update.microsoft.com   http://windowsupdate.microsoft.com   http://*.windowsupdate.microsoft.com   https://*.windowsupdate.microsoft.com   http://*.update.microsoft.com   https://*.update.microsoft.com   http://*.windowsupdate.com   http://download.windowsupdate.com   https://download.microsoft.com   http://*.download.windowsupdate.com   http://wustat.windows.com   http://ntservicepack.microsoft.com   http://go.microsoft.com   http://dl.delivery.mp.microsoft.com   https://dl.delivery.mp.microsoft.com   http://*.delivery.mp.microsoft.com   https://*.delivery.mp.microsoft.com

Time service - time sync issue

 Time service - time sync issue w32tm /monitor w32tm /unregister net stop w32time w32tm /register net start w32time w32tm /config /manualpeerlist:<ntp ip address> /syncfromflags:manual /reliable:yes /update net stop w32time net start w32time then check w32tm /query /source w32tm /query /configuration VMwareToolboxCmd.exe timesync status

Get-process Process cmd

 Get-Process -Id 1684 | Select-Object -Property Name, Path

Script to get LUN with free space on Windows server

 Get-PhysicalDisk | Select-Object FriendlyName, @{Name="Capacity"; Expression={$_.Size/1GB}}, @{Name="FreeSpace"; Expression={($_.Size - $_.AllocatedSize)/1GB}} Get-WmiObject Win32_logicaldisk | Select-Object DeviceID, FreeSpace Get-Disk | Select Manufacturer, SerialNumber, UniqueId

DNS

  DNS scavenging  won't remove static IP addresses that are added manually to a server without a timestamp .  However, if a static record is registered as a dynamic record and then converted to a static record, it can be deleted by scavenging

AD ports

  Port Protocol Service 53 TCP/UDP DNS 88 TCP/UDP Kerberos authentication 123 UDP W32Time 135 TCP RPC Endpoint Mapper 137/138 * UDP NetBIOS 139 * TCP NetBIOS 389 TCP/UDP LDAP 445 TCP SMB 464 TCP/UDP Kerberos password change 636 TCP LDAP SSL 3268/3269 TCP LDAP Global Catalog / LDAP GC SSL 49152-65535 TCP RPC Ephemeral Ports  

Powershell to add Domain Computer group in all GPO's

  $gpos = get-gpo -all foreach ($gpo in $gpos) { Set-GPPermissions -Name $gpo.DisplayName -PermissionLevel GpoRead -TargetName “Domain Computers” -TargetType Group }