Knowledge Base / Troubleshooting

  • Find / Display UID or GID in Linux

    Goal / Scope

    Provide examples of effective ways to determine and display the UID and / or GID of an account.

    Methodology / Process Steps

    The id command is used to display a user UID / GID in Linux and / or Unix.  To obtain the UID of an account, the -u switch is used as shown in ... Continue Reading

  • Extracting Certificate and Private Key Files from a .pfx File

    Purpose

    There may be scenarios when a certificate file and private key file are required, but only a single .pfx file is available.  A Microsoft based Windows platform doesn’t provide a way to complete this process.

    It is still possible to obtain the required files.  By exporting the certificate from the Windows Certificate ... Continue Reading

  • Power Broker (formerly Likewise)

    Goal / Scope

    Successful Active Directory Authentication using Power Broker Open, formerly Likewise and configuration of settings.

    Background

    Likewise has been around for quite a while now and can be used to join a Linux or Mac computer to an Active Directory domain.  It makes quick and easy work of configuration that used to take a long time ... Continue Reading

  • Troubleshooting WSUS Connection Issues

    Problem

    The configuration has been completed for client computers to connect to a WSUS server, but are not reporting in after a period of days.  Computers may show up in the WSUS console, but will not be reporting in or will not have reported in for several days

    Background / Cause

    Some client computers have been affected ... Continue Reading

  • Networking 101

    Purpose

    Proper flow of network traffic and solid network connectivity is critical to any network.  Past experiences have shown while it is acceptable to leave the advanced configurations to the network team, a basic understanding and the ability to configure the basics is important for anyone at just about any level.  The ability to ... Continue Reading

  • Update GPO Templates

    Goal / Scope

    How to install additional GPO templates into an Active Directory environment.  This is limited to environments running Server 2008 or later

    Background

    Additional templates for managing devices and endpoints are often very useful.  The method for importing GPO templates into Group Policy for use has changed from previous versions of Windows server and Active Directory.  ... Continue Reading

  • Linking to existing articles directly from pages without using menus in Joomla! 3+

    Goal / Scope

    This article will provide a step by step process for creating links to existing articles on a Joomla! website without displaying menus.

    Background

    Joomla! has no method for associating a link to an existing article unless a menu item has been created for that article.  There may be times when a user simply wants to ... Continue Reading

  • Joomla! Definitions

    Goal / Scope

    The goal of this article is to define some of the key terms and concepts used in Joomla! websites.

    Background

    After being pushed into working with Joomla! for clients, I had to get some of the terms and concepts straight to be able to effectively help my clients.  I put this together as a reference ... Continue Reading

  • Setup SNMP on VMware ESXi Hosts

    Goal / Scope

    Enable the ability to monitor and report on ESXi servers using SNMP

    Background

    By default the SNMP functionality is disabled in ESXi servers.  Also, simply attempting to start the service via the GUI interface fails with an error.  A little tweaking is required to get the SNMP service up and running on an ESXi host.

    Methodology ... Continue Reading

  • Multiple Password Policies in an Active Directory Environment

    Goal / Scope

    This information will identify the proper process for implementing fine-grain password polices, or implementing several different password policies in a single Active Directory domain.  By default, only a single password policy can only be set per domain.  Beginning in Windows 2008 Active Directory domains, the ability to set several password policies was enabled. ... Continue Reading

  • Delay Tasks Using Group Policy

    Goal / Scope

    Create a Group Policy Object or modify an existing Group Policy Object to run a scheduled task once a user has logged on to the system.

    Background

    This will only be affective using Window Vista or later Operating Systems.

    Methodology / Process Steps

    Edit the Group Policy Object to be used for pushing the new task.  Expand ... Continue Reading

  • Fields in Word Are / Are Not Being Highlighted

    Goal / Scope

    The option to allow the field formatting in Microsoft Word can be difficult to locate.  This process will allow the “shading” of a field to be set, or allow the behavior of the shading of a field to be changed.

    Background

    Fields are a great way of making a repeatable form in Word.  It allows ... Continue Reading

  • Setup Best Case for End-Users

    Goal / Scope

    Setup BestCase software for end-users

    Background

    • The Best Case Shortcut needs to be copied from the Best Case network location to the desktop to allow easy access to the software
    • When opening Best Case, if the permissions on a couple of files is not set correctly, Best Case will fail to open with the following error:

    [insert ... Continue Reading

  • Office 365 System Requirements

    For the best experience using Office 365, Microsoft recommends that the latest browsers are always used, Office clients, and apps. Microsoft also recommend that you install software updates when they become available.

    Office 365 is designed to work with the following software:

    • The current or immediately previous version of Internet Explorer ... Continue Reading
    • Exchange 2010 and Single Name Certificates

      Goal / Scope

      The purpose of this article is to provide a method for leveraging a single name certificate with Exchange 2010 without getting errors and warnings and potentially having some services fail altogether.  Please NOTE:  It is Microsoft recommended best practice to use a SAN (Subject Alternative Name) certificate with Exchange.  However, if for some ... Continue Reading

    • Unable to Remove / Hide Gnome Desktop Icons

      Problem

      On the latest version of the Gnome desktop the desktop icons remain on the desktop.  By default the desktop icons are hidden, but the icons are still showing even when checking the settings and verifying the configuration is to hide the desktop icons.

      Background / Cause

      The cause of this is installing additional packages that interfere ... Continue Reading

    • Organizing A WordPress Website

      Goal / Scope

      WordPress can be a very powerful tool if used correctly.  It can be a great content management system as well.  Organization is the key to success with WordPress.  The following article outlines what has been determined as best practices for setting up a site and presenting material to users.

      Background

      After several years of “off ... Continue Reading

    • How To Use MobileIron Assemble

      Goal / Scope

      This is a quick reference guide intended to provide the basics for using the add-on utility for MobileIron call Assemble.

      Background

      MobileIron has been a leader in MDM (mobile device management) and has built the MobileIron suite of products from the ground up to make a stable, secure, and functional platform capable of managing many ... Continue Reading

    • Create a specific size file for testing

      Goal / Scope

      The goal of this document is to provide a method for quickly creating a file with a specific size.

      Background

      There are times when a file of a specific size may be required to test functionality of a specific solution.  An example of this would be testing file attachment size limitations when sending email.  Many ... Continue Reading

    • Active Directory Group Policy Preferences

      Goal

      Microsoft released a great new set of tools for Active Directory with the release of Windows Server 2008 called Group Policy Preferences.  Group Policy Preferences was introduced in the 2008 release of Microsoft Windows Server.  It was the opinion of most members of the systems administration community that we should have seen these incorporated ... Continue Reading

    • MobileIron Wireless Configuration for Certificate Authentication Troubleshooting Topics

      Problem

      Setting up certificate based authentication can be extremely difficult and frustrating.  It is great when it works, but getting to that point can be a slow and painful process if inexperienced with implementation and general knowledge of certificates.  This document is meant to serve as a guide for troubleshooting the “simple” things that seem ... Continue Reading

    • Send messages through Office 365 using devices which don’t support TLS

      Goal / Scope

      When moving to cloud services, challenges will always be present.  Office 365 is no exception.  Aside from potential compatability issues (see this link for more details), other issues like sending email messages from a printer / scanner device can also be problematic if the printer / scanner doesn’t support TLS for example.  ... Continue Reading

    • How To Install And Configure SMTP Virtual Servers In IIS 6.0

      Problem

      In order to send email from an ASP.NET Web application, you must have the Simple Mail Transfer Protocol (SMTP) service of Internet Information Services (IIS) installed and configured on your server. The IIS SMTP service is a simple component for forwarding email messages to an SMTP server for delivery.

      Background / Cause

      This was defined as ... Continue Reading

    • Clean Up Active Directory Domain Controller Manually (when dcpromo fails or isn’t an option)

      Problem

      There are times a domain controller cannot be removed per Microsoft recommended best practices using dcpromo.  When this occurs the following guide has been the definitive method to properly and cleanly remove a domain controller from active directory.

      Background / Cause

      There are a number of reasons that a domain controller needs to be manually removed ... Continue Reading

    • Error: Site [domain.com] does not exist when attempting to enable site on Apache

       

      Problem

      Issuing the command a2ensite on an Apache web server results in the following error:

      Error:  Site  does not exist

      where is the name of the configuration file / domain name to be enabled.

      Also, attempting to manually link the configuration file to the sites-enabled directory also fails to load the configuration successfully.

      Background / Cause

      If all of ... Continue Reading

Leave a Reply