Author: Derrick
-
Unable to install Microsoft-signed ClickOnce application
—
by
I use this blog myself as my own personal reference for fixes to annoying problems. One such issue is being unable to install a Microsoft-signed ClickOnce application. If you get the following error, Your security settings do not allow this application to be installed on your computer. Run this command in Powershell as an Administrator.…
-
Meraki Split Tunnel Client VPN
If you need to do split tunnel with a Meraki VPN use the following commands so Windows knows where to send the traffic. I use this often so I can do split tunnel with a client’s Meraki Client VPN. In the example 192.168.1.0/24 is the remote network.
-
Microsoft RDS Licensing Activation Issues
Just a small problem but considering I ran into it twice in one week with two different customers I thought I would post a fix for Microsoft Remote Desktop Service Licensing Activation problems. Normally you get your licenses through Open, Select, Retail or something like an MPSA agreement. To activate them you just login to…
-
Replacing a Meraki Firewall
It came time to replace my Mother in Law’s old Meraki Z1 with a Z3. Like I said in Replacing a Meraki Switch this is one of the great things about Meraki. The process couldn’t be simpler. There is a link below to the Meraki documentation. https://documentation.meraki.com/MX/Other_Topics/MX_Cold_Swap_Replacing_an_Existing_MX_with_a_Different_MX
-
Replacing a Meraki Switch
My Meraki rep gave me an offer I couldn’t refuse to replace my Meraki MS220-8P with a new MS120-8LP. One of the things I love about Meraki is the ease of configuring hardware before it even arrives. When Meraki Hardware ships you get an email with an Order number that when you import it in…
-
Tracking down Failed Login Attempts in Active Directory
I had a recent experience with a client where a user account was getting locked out but the but the logs on the domain controller weren’t very helpful. Basically besides telling us the account was locked out they did nothing, no location, nothing. After quite a bit of research on google I found this blog…
-
Who do you use for upstream DNS?
There are so many good options for upstream DNS other than your internet provider I figured I would ask everyone, please post a comment below. Here are some of my favorites but its by no means an inclusive list. Wikipedia has a longer list here Public Recursive Name Server . My current favorite is 1.1.1.1…
-
SQL 2016 Won’t Send Mail
I’ve come across this problem a few times and always end up googling it so I figured I would make a post for my own benefit and also to help anyone else running into the issue. Basically the RTM version of SQL Server 2016 has a bug in it where it doesn’t reference the correct…
-
Cisco Firepower Threat Defense Packet Flow
Early in my days of learning Cisco FTD it could be hard to get my mind around how packets were flowing and where and when they were dropped. Cisco has some good images showing the packet flow but the one below by Todd Lammle is even better. Posted with permission from the author Todd Lammle…
-
SQL DB Execute to a Role
Have you ever needed a less privileged user to execute Stored Procedures? Me too. Here is how you do it. Run this against the database — Create a db_executor role CREATE ROLE db_executor — Grant execute rights to the new role GRANT EXECUTE TO db_executor Then add the db_executor role to the users you want to be…
-
iSCSI and SQL Corruption
I’m a heavy user of iSCSI and frequently advocate its use. For me its been reliable and has saved money. However Steve and I have over the last year worked with to clients where the use of iSCSI has caused an interesting corruption situation. The first was a database corruption repair engagement where the database…