Posts

Showing posts from January, 2020

Logon types in Windows Server and User failure Status Codes

Logon types in Windows Server : Logon type Logon title Description 2 Interactive A user logged on to this computer. 3 Network A user or computer logged on to this computer from the network. 4 Batch Batch logon type is used by batch servers, where processes may be executing on behalf of a user without their direct intervention. 5 Service A service was started by the Service Control Manager. 7 Unlock This workstation was unlocked. 8 NetworkCleartext A user logged on to this computer from the network. The user's password was passed to the authentication package in its unhashed form. The built-in authentication packages all hash credentials before sending them across the network. The credentials do not traverse the network in plaintext (also called cleartext). 9 NewCredentials A caller cloned its current token and specified new credentials for outbound connections. The new logon session has the same local identity, but uses differ...

Checklist - Checking the Boot issue in HP server

Checking the Boot issue in HP server: 1. Check the health status of HDD, RAM. 2. Check whether gives any sound while boot. 3. Analyse the issue based on error find in iLO logs. 4. Check the boot order in Bios. 5. Last Know good configuration. 6. Safe mode try. 7. Power cable unplug. 8. Remove network cable if its boot from Network. 9. Remove the HDD cable and try. https://www.youtube.com/watch?v=-1x0sM28c0k https://www.youtube.com/watch?v=O7n8t9C9CKs https://www.youtube.com/watch?v=qHoq0vSnH3w Press F9  for ROM-based Setup Utility. Press F10 for System Maintenance Menu. Press F11 for Default Boot Override Options. Press F12 for Network Boot.

Powershell - Copy the folder with Permission (ACL)

The below script will copy the folder with ACL. Beauty is it will create the folder in the destination path if already not there, where as we can't do this from ROBOCOPY. $finalreport = @() $servers = Get-Content -Path "C:\Delete\directories.txt" Foreach ($server in $servers) { ROBOCOPY "$server" "D:\TEST\$server" /MIR /SEC /pf /R:3 /v /LOG:C:\Delete\nameoflogfile123.txt }