Memorise

How to renew a self signed certificate in Exchange Server 2007

How to renew a self signed certificate in Exchange Server 2007
When a new Exchange Server 2007 role is installed on a computer the server automatically generates a self signed certificate to be used with services like transport (SMTP), POP,  IIS (OWA and Exchange Web Services) and IMAP. This certificate expires right after the completion of one  year from the date server was installed or the certificate was reassigned manually. To check the status of the certificate using Exchange Management Shell. Executing the cmdlet Get-ExchangeCertificate |FL displays all relevant information about all the certificates assigned, enabled and being used or not used by Exchange Services.

You may see more than one certificate listed on your exchange server(s) and that may be simply because you or someone else from your team have already tried working with certificates on the server.
If you see the above picture, you will notice that the certificate I have on my server is valid till 24th March 2010. NotAfter holds the value in mm/dd/yyyy h:mm:ss format. NotAfter – means this certificate will not be valid after the time stamp listed in this field. On the other hand the value NotBefore – means that this certificate will not be valid before the time stamp mentioned.
So once you cross the date listed in field NotAfter the certificate becomes invalid and indeed may open up doors to many other troubles like connectivity to web services, SMTP transport, POP and IMAP retrieval, etc. To renew the certificate you can simply run a cmdlet and get a new self signed certificate. But, this is just not as simple as simply running a cmdlet and get a new certificate, there is a procedure to do it. Check the following steps:
1. Run Get-ExchangeCertificate |FL – This will list details of all certificates that you have assigned to Exchange Services. Please understand, this cmdlet does not retrieve any information about any other certificate from local certificate store which is not used by Exchange. Once you get the output printed on the screen; note down the Thumbprint of certificate into a notepad.
2. Run Get-ExchangeCertificate –Thumbprint “58C846DEEA2865CA9E6DD4B42329A9AC994EBF63” | New-ExchangeCertificate . This renews the certificate. You will notice the moment you press enter on keyboard you may be prompted to confirm if you want to use the same certificate for SMTP service.

3. Check if the certificate is renewed. This can be simply examined by looking at the changes in thumbprint of the certificate after running the cmdlet mentioned in step 2. You can see the changed thumbprint in below picture.

4. Looking correctly to the above picture you will also notice that the certificate is not being used to secure IIS based services anymore though the NotAfter and NotBefore dates have changed. To enable this renewed certificate for IIS as well run Enable-ExchangeCertificate – Thumbprint “E0BB201793DC74D0F94F3275E6AA53BA75907565” –Services IIS
5. Verify all the services are working correctly after renewing and enabling the certificate.
6. Remove old certificate by running Remove-ExchangeCertificate –Thumbprint “58C846DEEA2865CA9E6DD4B42329A9AC994EBF63”


How To Reduce Size of WinSXS

A bit more research later and I found that Vista SP2 has a similar Service Pack Cleanup Tool in the same C:WindowsSystem32 directory called COMPCLN.exe. You can start the program by using the following instructions:

  1. Click Start > Run
  2. Type in CMD and press [enter]
  3. At the command prompt, type COMPCLN and press [enter]
  4. Press Y when prompted to continue
    (the application will now start cleaning up the old files)

2010-01-04_105040

The size of the WinSXS folder (and potentially others?) should now have been reduced. On my computer, I found that the WinSXS folder was only reduced by 1 GB, but others have seen 3-4 GB reductions.


Enable the Built-In Windows 7 Administrator Account

You can hover over the CMD line and press CTRL + SHIFT + ENTER to invoke the “Run as Administrator” shortcut.

In the Command Prompt window, type:

net user

Note how the Administrator account is there, yet the new user account has not been yet created.

To set the Administrator’s account password:

net user *
net user Administrator *

Then enter the required password and confirm it.

To enable the Administrator’s account:

net user administrator /active:yes


Handy Light – Instruction

Handy Light – Instruction

Do this after the setup below, Blue, yellow, Red then touch top right corner, screen should change to purple.

  1. Set up an ad hoc Wi-Fi network on your computer (network name and password requirement are not important).
  2. Connect to the Wi-Fi network you just created on your iPhone through the Settings/Wi-Fi menu.
  3. Tap on the blue arrow to the right of the selected Wi-Fi network, click Static in the IP Address menu and enter the following IP address and chuckle at its geek quotient: 13.37.13.37
  4. Next, enter 255.255.255.0 in the Subnet Mask field.
  5. Back out of the Settings menu to ensure these settings are saved (though hitting the Home button right away shouldn’t change them).
  6. Go to your Mac or PC and change the network settings to use the SOCKS Proxy and enter 13.37.13.37 as the Socks Proxy Server address and 1337 as the port. On our Mac laptop, this is what the resulting screen looks like: I will upload a screen shot.
  7. Be sure to apply/save these settings.
  8. Go back to your iPhone and open the Handy Light app and tap the flashlight colors at the bottom in the following sequence: blue, yellow, red. Then tap the top right corner of the screen and the color should change to purple. Your iPhone is now capable of sharing its internet connection with the computer you set up.
  9. Leave the app open and go to your computer and start browsing. As the video describes, we found that it took a few seconds for the connection to kick in but then it worked like a charm. Though many variables affect network speed tests, a quick test using Speedtest.net yielded 3.92 Mb/s down and 0.38 Mb/s up while tethered to our iPhone 4 through Handy Light.

Fix For Outlook 2007 Constantly Asking for Password on Vista

If you are encountering problem where Outlook constantly asks you for your password even though you check the “Remember my password” box every single time, then you are in luck because this tip shows how to fix the problem.

This fix should theoretically help with Windows Mail as well, but I haven’t been able to verify that yet.

Before you do anything else, close Outlook. You should also note that we’ll be modifying system generated files here, so proceed with caution or not at all.

Open up windows explorer window and then paste the following text into the address bar, which should bring you to a folder with a single folder inside with a really long name.

%userprofile%\AppData\Roaming\Microsoft\Protect

just rename that folder to something else (I suggest appending -old)

Now re-open Outlook, and then type in your password hopefully for the last time, making sure to check the box to remember it. You should now see that the original folder was re-created again.

At this point Outlook should remember your passwords, but you can close Outlook and reopen it to make sure. If you encounter problems with this, you can remove the new folder and then rename the -old folder back to the original name to put everything back the way it was.

couple moe idea:
http://www.petri.co.il/save-your-exchange-password-in-microsoft-outlook-2003-or-2007.htm

http://support.microsoft.com/kb/290684

Check registry for:
“HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User
Shell Folders\AppData” If the key is missing, you have to add a new registry key. Leave the Local AppData Key unaltered. You have to create a new Expandable String Value called “AppData” with the data value “%userprofile%\Application Data”. This solved the problem for me.


You can create a site to site VPN as last option if you are using on a Main office and Branch Office.


Increase an existing LVM

Increase an existing LV

Taken from my LVM management notes. I had first used this when I imaged an 80GB drive to a 120GB drive and wanted to make use of the 40GB of free space.

1. fdisk /dev/sda then press p

Code:
Disk /dev/sda: 40.0 GB, 40020664320 bytes
255 heads, 63 sectors/track, 4865 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes

   Device Boot      Start         End      Blocks   Id  System
/dev/sda1   *           1          13      104391   83  Linux
/dev/sda2              14        1188     9438187+  8e  Linux LVM

2. Press d then 2 to remove the partition
3. Press n then primary p start cylinder 14 last cylinder 4865 to add the newly re-sized partition. WARNING: Make sure the old and new partition start at the same cylinder position, not doing so will destroy your data.
4. Press t partition 2 Hex code 8e
5. Press p

Code:
Disk /dev/sda: 40.0 GB, 40020664320 bytes
255 heads, 63 sectors/track, 4865 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes

   Device Boot      Start         End      Blocks   Id  System
/dev/sda1   *           1          13      104391   83  Linux
/dev/sda2              14        4865    38973690   8e  Linux LVM

6. Finally press w write table to disk and exit and reboot
7. Use vgdisplaypvdisplay, or lvdisplay to show the current and later ending size of your LV
8. Run pvresize /dev/sda2 to expand the PV on /dev/sda2 after enlarging the partition with fdisk
9. You could also extend the volume group across disks and partitions: pvcreate /dev/hdb1; vgextend videovg /dev/hdb1; vgdisplay videovg. With this method use fdisk to create a new partition instead of recreating the original one. This is certainly safer since there is less risk to your existing data and it makes it easier to break up volume groups in the future.
10. Use vgdisplay to find the Free PE / Size

Code:
  --- Volume group ---
  VG Name               SystemVG
  System ID
  Format                lvm2
  Metadata Areas        1
  Metadata Sequence No  7
  VG Access             read/write
  VG Status             resizable
  MAX LV                0
  Cur LV                2
  Open LV               2
  Max PV                0
  Cur PV                1
  Act PV                1
  VG Size               37.17 GB
  PE Size               4.00 MB
  Total PE              9515
  Alloc PE / Size       2176 / 8.50 GB
  Free  PE / Size       7339 / 28.67 GB
  VG UUID               Bl4LEQ-R70i-3Qse-9z1p-BRcK-ibd7-2aelYx

11. Use lvdisplay to display current logical volumes

Code:
  --- Logical volume ---
  LV Name                /dev/SystemVG/RootLV
  VG Name                SystemVG
  LV UUID                dxB6Fs-6sQr-AaLg-1zQ6-Q1f9-AN6V-cbSovF
  LV Write Access        read/write
  LV Status              available
  # open                 1
  LV Size                8.00 GB
  Current LE             2048
  Segments               1
  Allocation             inherit
  Read ahead sectors     0
  Block device           253:0

  --- Logical volume ---
  LV Name                /dev/SystemVG/SwapLV
  VG Name                SystemVG
  LV UUID                vSRWGx-zy8N-FrXK-3HP5-7pwW-F6SQ-IRJNeA
  LV Write Access        read/write
  LV Status              available
  # open                 2
  LV Size                512.00 MB
  Current LE             128
  Segments               1
  Allocation             inherit
  Read ahead sectors     0
  Block device           253:1

12. lvextend -l +7339 /dev/SystemVG/RootLV (you can use the following to reduce again lvreduce -l –7339 /dev/SystemVG/RootLV)
13. lvdisplay /dev/SystemVG/RootLV to see the result

Code:
  --- Logical volume ---
  LV Name                /dev/SystemVG/RootLV
  VG Name                SystemVG
  LV UUID                dxB6Fs-6sQr-AaLg-1zQ6-Q1f9-AN6V-cbSovF
  LV Write Access        read/write
  LV Status              available
  # open                 1
  LV Size                36.67 GB
  Current LE             9387
  Segments               2
  Allocation             inherit
  Read ahead sectors     0
  Block device           253:0

14. ext2online /dev/SystemVG/RootLV while the filesystem is mounted or to be safe use resize2fs /dev/SystemVG/RootLV while the filesystem is unmounted. Note:resize2fs may require running e2fsck -f /dev/SystemVG/RootLV first.


Repair and Reset Windows TCP/IP Winsock Catalog Corruption

To repair and reset the Windows Vista

  1. Click on Start button.
  2. Type Cmd in the Start Search text box.
  3. Press Ctrl-Shift-Enter keyboard shortcut to run command prompt as Administrator. Allow elevation request.
  4. Type netsh winsock reset in the Command Prompt shell, and then press the Enter key.
  5. Restart the computer.

    What netsh winsock reset command does are it resets Winsock Catalog to a clean state or default configuration. It removes all Winsock LSP (Layered Service Providers) previously installed, including the potential malfunctioned LSP that causes loss of network packets transmission failure. So all previously-installed LSPs must be reinstalled. This command does not affect Winsock Name Space Provider entries.

Reinstall and Reset TCP/IP (Internet Protocol) in Windows Vista, 2003 and XP

reinstall and reset the TCP/IP stack (Internet Protocol) to its original state as same as when the operating system was installed in Windows XP and Windows 2003, simply use the following command in command prompt shell. A log file name must be specified where actions taken by netsh will be recorded on newly created or appended if already existed file..

netsh int ip reset [ log_file_name ]

Example:

netsh int ip reset resetlog.txt

For Windows Vista, things work a little different due to introduction of UAC (Guide: Disable UAC). Use this guide to perform a reinstalling of TCP/IP protocol in Vista:

  1. Click on Start button.
  2. Type Cmd in the Start Search text box.
  3. Press Ctrl-Shift-Enter keyboard shortcut to run Command Prompt as Administrator. Allow elevation request.
  4. Type netsh int ip reset in the Command Prompt shell, and then press the Enter key.
  5. Restart the computer.

The command will remove all user configured settings on TCP/IP stack and return it to original default state by rewriting pertinent registry keys that are used by the Internet Protocol (TCP/IP) stack to achieve the same result as the removal and the reinstallation of the protocol. The registry keys affected are:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\

and

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DHCP\Parameters\


The location of the NK2 file of Outlook

The location of the NK2 file of Outlook

The location of the NK2 AutoCompelete file created by Outlook might be different from one computer to another, depending on the operating system and the version of Outlook.
Here’s the rules for finding the location of your NK2 file:

  • For Outlook 2003/2007 with Windows 2000, Windows XP, or Windows Server 2003:
    The location of the nk2 file is C:\Documents and Settings\[User Profile]\Application Data\Microsoft\Outlook
    The name of the NK2 file is identical to the Outlook profile name, with .nk2 extension. 
  • For Outlook 2003/2007 with Windows Vista, Windows 7, or Windows server 2008:
    The location of the nk2 file is C:\Users\[User Profile]\AppData\Roaming\Microsoft\Outlook
    The name of the NK2 file is identical to the Outlook profile name, with .nk2 extension. 
  • For Outlook 2010 with Windows Vista, Windows 7, or Windows server 2008:
    The nk2 file is located in C:\Users\[User Profile]\AppData\Local\Microsoft\Outlook\RoamCache
    The name of the NK2 file is in the following format: Stream_Autocomplete_X_AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.dat The X is the file index (usually 0) and AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA is a random 16-byte key in hexadecimal format. 
  • For Outlook 2010 with Windows XP:
    The nk2 file is located in C:\Documents and Settings\[User Profile]\Local Settings\Application Data\Microsoft\Outlook\RoamCache
    The name of the NK2 file is in the following format: Stream_Autocomplete_X_AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.dat The X is the file index (usually 0) and AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA is a random 16-byte key in hexadecimal format. 

When you use the NK2Edit utility, you don’t have to worry about locating the NK2 filename, because NK2Edit automatically open the default NK2 file for you.


Configuring NSRP clusters for failover between Juniper SSG 140

This config assumes that you are using ports 0/8 and 0/9 for trust and untrust.  Plus you need to define 2 HA ports as well to connect the firewalls heartbeat and session information I used ports 0/0 and 0/1.

 

SSG1

set interface “ethernet0/0” zone “HA”
set interface “ethernet0/1” zone “HA”
set nsrp cluster id 1
set nsrp cluster name Cluster
set nsrp rto-mirror sync
set nsrp vsd-group master-always-exist
set nsrp vsd-group id 0 priority 100
set nsrp arp 20
set nsrp secondary-path ethernet0/8
set nsrp monitor interface ethernet0/8
set nsrp monitor interface ethernet0/9

 

SSG2

set interface “ethernet0/0” zone “HA”
set interface “ethernet0/1” zone “HA”
set nsrp cluster id 1
set nsrp cluster name Cluster
set nsrp rto-mirror sync
set nsrp vsd-group master-always-exist
set nsrp vsd-group id 0 priority 150
set nsrp arp 20
set nsrp secondary-path ethernet0/8
set nsrp monitor interface ethernet0/8
set nsrp monitor interface ethernet0/9

 

If you have backup firewall that not in sync for few days or was switched off then to sync logon to firewall and type

exec nsrp sync global-config save

Reboot the backup firewall to bring the config to sync, you should see message as below.

Cluster:SSG140(B)-> exec nsrp sync global-config save
Cluster:SSG140(B)-> load peer system config to save
Save global configuration successfully.
Continue to save local configurations ... Save local configuration successfully.
done.
Please reset your box to let cluster configuration take effect!

Under certain conditions, the failure of NSRP monitored objects can cause both devices in a cluster to become inoperable. A CLI command is available to ensure one device is still elected as master and can forward traffic.

set nsrp vsd-group master-always-exist

also check the link for more info
http://kb.juniper.net/InfoCenter/index?page=content&id=KB11331

Outlook blocked access to the following potentially unsafe attachments

You may receive an “Outlook blocked access to the following potentially unsafe attachments” message in Outlook

Advanced troubleshooting

If you do not use Outlook with an Exchange server or if the Exchange server administrator lets users change the Outlook attachment security behavior, use method 1: “Customize attachment security behavior.”

If you use Outlook with an Exchange server and the Exchange Server administrator has disallowed changes to the Outlook attachment security behavior, use method 2: “Configure Outlook in an Exchange environment.”

Method 1: Customize attachment security behavior

Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:

322756  How to back up and restore the registry in Windows

Important Before you can customize the attachment security behavior in Outlook 2000 SR1 and Microsoft Outlook 2000 SR1a, you must first apply either Microsoft Office 2000 Service Pack 2 or Microsoft Office 2000 Service Pack 3.

Follow these steps to modify the registry and change Outlook’s attachment security behavior.

  1. Exit Outlook if it is running.
  2. Click Start, and then click Run. Copy and paste (or type) the following command in the Open box, and then press ENTER:
    regedit
  3. Verify that the following registry key for your version of Outlook exists.
    Microsoft Office Outlook 2010

    HKEY_CURRENT_USERSoftwareMicrosoftOffice14.0OutlookSecurity

    Microsoft Office Outlook 2007

    HKEY_CURRENT_USERSoftwareMicrosoftOffice12.0OutlookSecurity

    Microsoft Office Outlook 2003

    HKEY_CURRENT_USERSoftwareMicrosoftOffice11.0OutlookSecurity

    Microsoft Outlook 2002

    HKEY_CURRENT_USERSoftwareMicrosoftOffice10.0OutlookSecurity

    Microsoft Outlook 2000

    HKEY_CURRENT_USERSoftwareMicrosoftOffice9.0OutlookSecurity

    If the registry key exists, go to step 5.

    If the registry key does not exist, follow these steps to create it:

    1. Locate, and then click the following registry key:
      HKEY_CURRENT_USERSoftwareMicrosoft
    2. Under Edit, click New, and then click Key.
    3. Type Office, and then press ENTER.
    4. Under Edit, click New, and then click Key.
    5. For Outlook 2010, type 14.0, and then press ENTER.
      For Outlook 2007, type 12.0, and then press ENTER.
      For Outlook 2003, type 11.0, and then press ENTER.
      For Outlook 2002, type 10.0, and then press ENTER.
      For Outlook 2000, type 9.0, and then press ENTER.
    6. Under Edit, click New, and then click Key.
    7. Type Outlook, and then press ENTER.
    8. Under Edit, click New, and then click Key.
    9. Type Security, and then press ENTER.
  4. Under Edit, click New, and then click String Value.
  5. Copy and paste (or type) the following name for the new value:
    Level1Remove
  6. Press ENTER.
  7. Right-click the new string value name, and then click Modify.
  8. Type the file name extension of the file type that you want to open in Outlook. For example:
    .exe

    To specify multiple file types, use the following format:

    .exe;.com
  9. Click OK.
  10. Exit Registry Editor.
  11. Restart your computer.

When you start Outlook, you can open the file types that you specified in the registry.

Note We recommend that you enable only the file types that you have to have. If you rarely receive a particular file type, we recommend that you give Outlook temporary access to the file type that is in question. Then, reconfigure Outlook to block the file type by undoing the changes to the registry. For more information about how you can configure Outlook to block attachment file name extensions that Outlook does not block by default, click the following article number to view the article in the Microsoft Knowledge Base:

837388   How to configure Outlook to block additional attachment file name extensions

Method 2: Configure Outlook in an Exchange environment

If you run Outlook in an Exchange environment, the Exchange server administrator can change the default attachment security behavior. For more information about how to configure Outlook in an Exchange environment, click the following article numbers to view the articles in the Microsoft Knowledge Base:

290499  Administrator information about e-mail security features
263297  Administrator information about the Outlook E-mail Security update: June 7, 2000
Back to the top

Attachment Behavior

Attachments are divided into three groups based on their file name extension or file type. Outlook handles each group in a specific way.

Level 1 (Unsafe)

The unsafe category represents any file name extension that may have script or code associated with it. You cannot open any attachment that has an unsafe file name extension. For a list of the unsafe file name extensions, visit the following Microsoft Web site:

http://office.microsoft.com/en-us/outlook/HA012299521033.aspx

The following list describes how Outlook behaves when you receive or send an unsafe file attachment:

  • You cannot save, delete, open, print, or otherwise work with unsafe files. A message at the top of the e-mail message indicates that Outlook has blocked access to the unsafe attachment. The attachment is inaccessible from Outlook. However, the attachment is not actually removed from the e-mail message.
  • If you forward an e-mail message that has an unsafe attachment, the attachment is not included in the forwarded e-mail message.
  • If you send an e-mail message that contains an unsafe attachment, you receive a warning message that states that other Outlook recipients may be unable to access the attachment that you are trying to send. You can safely ignore the warning message and send the e-mail message, or you can decide not to send the e-mail message.
  • In Outlook 2003, if you save or close an e-mail message that contains an unsafe attachment, you receive a warning message that states that you will be unable to open the attachment. You can override the warning message and save the e-mail message.
  • You cannot use the Insert Object command to open objects that are inserted in Microsoft Outlook Rich Text e-mail messages. You see a visual representation of the object. However, you cannot open or enable the object in the e-mail message.
  • You cannot open unsafe files that are stored in an Outlook or an Exchange folder. Although these files are not attached to an Outlook item, they are still considered unsafe. When you try to open the unsafe file, you receive the following error message:
    Can’t open the item. Outlook blocked access to this potentially unsafe item.

Level 2

Level 2 files are not unsafe. However, they do require more security than other attachments. When you receive a Level 2 attachment, Outlook prompts you to save the attachment to a disk. You cannot open the attachment in the e-mail message. By default, file name extensions are not associated with this group. However, if you use Outlook with an Exchange server and your mail is delivered to an Exchange mailbox, the Exchange server administrator can add file name extensions to the Level 2 list.

Other Attachments

When you try to open an attachment that has a file name extension other than those in the Level 1 or the Level 2 list, Outlook prompts you to either open the file directly or save it to a disk. You can turn off future prompts for that file name extension if you clear the Always ask before opening this type of file check box.

Note If a program associates itself with a new file name extension, Outlook treats that file name extension as safe until you add the file name extension to the list of Level 1 or Level 2 file name extensions.

For example, if you install a program on your computer that uses files that have a .xyz file name extension, when you open an attachment that has a .xyz file name extension, the program opens and runs the attachment. By default, the .xyz file name extension does not appear on the Level 1 or the Level 2 list. Therefore, Outlook treats it as a safe file name extension. If you want Outlook to treat attachments that have the .xyz file name extension as unsafe, you must add the .xyz file name extension to the list of Level 1 file name extensions.