Enable SNMP in ESXi 6.5 via SSH

I was trying to enable SNMP on a few stand-alone ESXi 6.5 hosts the other day. Unfortunately, when attempting to enable this service using the vSphere Host Client, I received a very unhelpful error:   I wasn’t able to find any helpful information in the logs that could help identify the cause. Interestingly enough, enabling…

Continue reading

Auditing Exchange Online Transport Rule Use

I recently came across a transport rule being unnecessarily used in Exchange Online. The transport rule in question was used for DLP, and encrypted messages based on the content. It searched message bodies for strings of characters matching credit card numbers, SSN’s, etc.  I was surprised to see that there was no way to easily…

Continue reading

vSphere – Unable to Apply DRS Resource Setting on Host

I noticed this error on one of my hosts today. After reading the full error message on the Events tab, and paying particular attention to the “Error Stack” section, it was obvious what the problem was. “The configuration file of the virtual machine is corrupted”. Well, that helps narrow things down, but what virtual machine…

Continue reading

Migrate Windows Deployment Services to New Server

We have been making a great effort to move all of our internal services to Windows Server 2016. This past week, it was WDS’ turn to get migrated. Migrating this role is extremely simple. Here are the steps that I took: Create new server and install WDS role. Stop WDS Service on old server Stop…

Continue reading

Windows 8 File History

File History File history in Windows 8 allows users to automatically “backup” files that are in their libraries, contacts, favorites, Skydrive, and on the desktop. If the files are lost, they can be quickly restored. You can also restore a file from a specific point in time, being that File History creates a complete history…

Continue reading

User Account Control

User Account Control Many people rarely pay close attention to those pesky User Account Control prompts that pop up when attempting to run a program as an administrator. When a user logs into her account, she is assigned a security token based on the level of access that she has (basic user or admin). This…

Continue reading