Skip to main content

TechEd 2012 Day 2

Where to start? Microsoft clearly listened to its customers with the development of Sever 2012. After sitting through a presentation on the new features of Active Directory, it was clear that Microsoft addressed many issues. These issues involved problems with large AD deployments, interfaces for the administrator, and also deployment of new domain controllers. Several of the these I was very happy to see. Now I can demonstrate to my students what aspects of Windows Server 2008 R2 management they want in a GUI, is now in a GUI.
I also had a chance to sit in a seminar on MDT and Windows 8 as well as a chance to do a hands on lab with the new MDT version. With the continued march towards IPv6, I also took an opportunity to expand my knowledge of IPv6 and to try out the IPAM (IP Address Management).
By far the highlight of my day was meeting with June Blender Rogers, Senior Programming Writer for Windows PowerShell. We had a very energetic conversation over the feedback from my students and I hope I can get her conferenced called into one of my upcoming PowerShell classes to get direct feedback from people just starting out with PowerShell.  Her contribution to PowerShell is of keen interest not only to beginners, but seasoned professionals as well.
2012-06-12_12-52-28_356
Hard at work on a hands on lab.
2012-06-12_08-11-06_213
Yes, those are arcade games from the 80’s.  The lines to play them are so long, I have not been able to get to a single one all week.
 
2012-06-12_08-12-57_979
Windows 8 Keynote.
 
2012-06-12_09-53-09_198
 
2012-06-12_12-30-19_445
Now this is a door prize.

Comments

Popular posts from this blog

How to list all the AD LDS instances on a server

AD LDS allows you to provide directory services to applications that are free of the confines of Active Directory.  To list all the AD LDS instances on a server, follow this procedure: Log into the server in question Open a command prompt. Type dsdbutil and press Enter Type List Instances and press Enter . You will receive a list of the instance name, both the LDAP and SSL port numbers, the location of the database, and its status.

How to run GPResult on a remote client with PowerShell

In the past, to run the GPResult command, you would need to either physically visit this client, have the user do it, or use and RDP connection.  In all cases, this will disrupt the user.  First, you need PowerShell remoting enabled on the target machine.  You can do this via Group Policy . Open PowerShell and type this command. Invoke-Command –ScriptBlock {GPResult /r} –ComputerName <ComputerName> Replace <ComputerName> with the name of the target.  Remember, the target needs to be online and accessible to you.

Where did a User’s Account Get Locked Out?

Updated: May 15, 2015 When this article was originally published, two extra carriage returns were add causing the code to malfunction.  The code below is correct.   My client for this week’s PowerShell class had a really interesting question. They needed to know where an account is being locked out at. OK, interesting. Apparently users hop around clients and forget to log off, leading to eventual lock out of their accounts. The accounts can be unlocked, but are then relocked after Active Directory replication. This problem is solved in two parts. The first one is to modify the event auditing on the network. The second part is resolved with PowerShell. The first part involves creating a group policy that will encompass your Domain Controllers. In this GPO, make these changes. Expand Computer Configuration \ Policies \ Windows Settings \ Security Settings \ Advanced Audit Policy Configuration \ Audit Policies \ Account Management Double click User Account Management C...