Posts

Showing posts from May, 2018

WSUS find wo approve the pathces in WSUS server

You'll find approvals and who/when it occurred in the CHANGE.LOG contained in %ProgramFiles%\Update Services\Logfiles.

TROUBLESHOOTING CMD Taskkill

Task kill https://technet.microsoft.com/en-in/library/bb491009.aspx Ends one or more tasks or processes. Processes can be killed by process ID or image name. Syntax taskkill  [ /s   Computer ] [ /u   Domain\User   [ /p   Password ]]] [ /fi   FilterName ] [ /pid   ProcessID ]|[ /im   ImageName ] [ /f ][ /t ] Top of page   Parameters /s       Computer       :   Specifies the name or IP address of a remote computer (do not use backslashes). The default is the local computer. /u       Domain   \   User       :   Runs the command with the account permissions of the user specified by   User   or   Domain \ User . The default is the permissions of the current logged on user on the computer issuing the command. /p       Password       :   Specifies the password of the user account that is s...

AD EVENT ID 10016 THE APPLICATION-SPECIFIC PERMISSION SETTINGS DO NOT GRANT LOCAL ACTIVATION PERMISSION FOR THE COM SERVER APPLICATION WITH CLSID

Image
Source:        Microsoft-Windows-DistributedCOM Event ID:      10016 Level:         Error User:          SYSTEM Description: The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID {D63B10C5-BB46-4990-A94F-E40B9D520160} and APPID {9CA88EE3-ACB7-47C8-AFC4-AB702511C276} to the user NT AUTHORITY\SYSTEM SID (S-1-5-18) from address LocalHost (via LRPC) running in the application container not available SID. This security permission can be modified using the Component Services administrative tool. --- Step 1: Open your event viewer, and make note of the ID’s. In my example, the id’s are: CLSID :  {D63B10C5-BB46-4990-A94F-E40B9D520160} APPID:  {9CA88EE3-ACB7-47C8-AFC4-AB702511C276} Also make note of the permission required. In my example, these are: ...

AD User Account Lockouts Possible Root Causes

Possible Root Causes for Account Lockouts ? Persistent drive mappings with expired credentials ? Mobile devices using domain services like Exchange mailbox ? Service Accounts using cached passwords ? Scheduled tasks with expired credentials ? Programs using stored credentials ? Misconfigured domain policy settings issues ? Disconnected Terminal Server sessions

POWERSHELL to check the remote servers RDP session status

Powershell to check the remote servers RDP session status:     $ComputerName = Get-content c:\servers.csv     $username = 'clusteradmin'     foreach ($Computer in $ComputerName) {         try {             quser /server:$Computer 2>&1 | Select-Object -Skip 1 | ForEach-Object {                 $CurrentLine = $_.Trim() -Replace '\s+',' ' -Split '\s'                 $HashProps = @{                     UserName = $CurrentLine[0]                     ComputerName = $Computer                 }                 if ($CurrentLine[2] -eq 'Disc') {                         $HashProps...