AppLocker - Fact SheetThis is the first in a small series of articles about AppLocker, a technology built into Windows that enables administrators to audit and optionally block application execution. Requirements AppLocker works on:SecurityJul 18, 2012
HowTo: ReACLing a File Server in a Domain Migration with SetACL 3.0When you are planning a migration of user accounts between domains one task always pops up pretty quickly: reassigning the permissions of the users in the source domain to the corresponding users in the target domain, in other words reACLing the file server.Helge's ToolsJul 11, 2012
Benchmarking Windows 7 Offline Files Transparent CachingWindows 7 comes with several features that promise to greatly improve file access over a WAN. One of them is version 2 of the SMB protocol, another transparent caching. This article describes how I measured their effectiveness.Performance/SizingJun 26, 2012
Recommendation for a USB 3.0 JBOD EnclosureFantecA drive enclosure for 4 SATA drives, connected to the host via USB 3.0 and presented as JOBDs is a great and inexpensive method of adding a lot of hard drive capacity to your computer, e.g. for backup purposes. The enclosure model I have bought is the Fantec QB-35US3. It is compact, the fan not too loud and vibrations from the four drives are kept amazingly low. It can be connected via USB 3.0 and eSATA, but USB is simpler because eSATA requires a port with a multiplier-capable chipset, which is rare. At a retail price of around € 150 the Fantec is relatively inexpensive.HardwareJun 5, 2012
Benchmarking a $11,699 HP Enterprise Performance SSD[Update on 29/06/2012: added tests 5 and 6 with RAID controller cache and Atlantis Ilio] When a 400 GB SSD comes nearly at the price of a small car, you expect a lot, performance-wise. At least I did when I got my hands on two drives from HP’s enterprise performance series. Read on to find out if that hefty price tag is justified.Performance/SizingMay 30, 2012
Solved: Deleting Copied Executable Files Fails - TemporarilyI had a very interesting case recently where copied EXE files could not be deleted. They would simply remain in the folder like zombies, only to disappear a few minutes later.TroubleshootingMay 16, 2012
Setting up Mobile Broadband (WWAN) on HP Elitebook 8560pConfiguring an HP Elitebook with integrated HS2340 mobile broadband module to use the 3G connection can be a little tricky. Here is how it works - without third-party dialer software!Windows GeneralMay 9, 2012
Authentication Fails Trying to Send Mail via Google Apps SMTP from PHPAs you may know helgeklein.com also hosts a forum where I help people who have questions related to my software. The forum is configured to send out e-mails when new posts are added or when newly registered users need to confirm their e-mail addresses. Since I use Google Apps for helgeklein.com I configured Google’s SMTP server for outgoing e-mails. All worked well until recently when I started to wonder why I had not received new forum post e-mails for several days.WebsiteMay 2, 2012
Removing "Eject VMware Virtual disk SCSI Disk Device"The HotPlug functionality of VMware ESX(i) 4 and 5 has the negative side effect that it is easily possible to “eject” hardware devices from inside the virtual machine, completely removing the respective device from the VM configuration. This is especially bad if it happens to the network card, and others have already described how to prevent that from happening (e.g. here and here).Virtualization & ContainersApr 25, 2012
Solved: Disabling the BitLocker Service via GPP FailsIf you want to disable the BitLocker service via Group Policy Preferences, you will find that you cannot. The service’s startup mode stays at “manual” and the following event is logged to the application event log:PermissionsApr 17, 2012
Walkthrough: Creating a UE-V Settings Location TemplateIn this article I explain how to create a template for Microsoft User Experience Virtualization. For details on how UE-V works please see my earlier article Microsoft User Experience Virtualization (UE-V): Facts and Review. As a sample application I used my permission management tool SetACL Studio.User ProfilesApr 11, 2012
Microsoft User Experience Virtualization (UE-V): Facts and Review16 years after roaming profiles made their debut in Windows NT 4.0 Microsoft takes another stab at synchronizing user settings across devices - a very different one. As we will see, UE-V is radically different from roaming profiles, but so similar to some other user environment management products that it seems like a best-practices implementation.User ProfilesApr 4, 2012
Windows Offline Files Survival GuideWindows Offline Files have a bad reputation. Many an administrator can tell a story where Offline Files caused issues that sometimes even required a reinstallation of the affected PC. But Microsoft has gradually improved the functionality and ironed out many of the bugs. Today - in Windows 7 SP1 with all post-SP1 fixes - Offline Files is a technology that still has its problems, but can be used in production - if you are adventurous. This article lists the gotchas I am aware of.NetworkingApr 3, 2012
Windows 8 Storage Spaces: Bugs and Design FlawsWhen I first read about Storage Spaces in the Windows 8 blog, I was enthusiastic. Finally a replacement for the drive extender technology Microsoft let die so cruelly. Having used Storage Spaces for several weeks now, I am not so sure any more.StorageMar 26, 2012
Dead Simple Wake-on-LAN for Your Windows Server at HomeHaving a server at home is a great luxury, but having a computer running 24x7 is an extreme waste of energy. Turning it on and off manually is not very appealing, either. Luckily we have to do neither. Windows can easily be configured to put the computer into sleep mode (where modern PCs consume approx. 1 Watt) and have it wake up upon access.Windows GeneralMar 22, 2012
Do Shadow Keys Still Work in Server 2008 R2?Shadow keys have been around forever, since way before Terminal Services were renamed to Remote Desktop Services (does anybody use that name?). It seemed they would stay in the OS forever, too. Yet, when installing applications on Server 2008 R2 many people notice that the shadow key area does not get populated. Let us find out why that is the case and if shadow keys still work in Server 2008 R2.Citrix/Terminal Services/Remote Desktop ServicesMar 20, 2012
Windows 8 Storage Spaces - a First(-Hand) Look at PerformanceDid I mention I love the new Task Manager in Windows 8? It is brilliantly designed, conveying tons of meaningful information while looking very good. This article is not about Task Manager, though, but about Windows 8 - its Storage Spaces functionality, to be exact. But I will be using Task Manager to analyze the performance of Storage Spaces. And with that, we are back where we started.Performance/SizingMar 14, 2012
Building a Low Power, High Capacity Home File ServerI have wanted an energy-efficient multi-terabyte home file server for a long time, but until recently such a system was too expensive for my taste, in terms of both energy consumption and purchase price. But now with affordable 3 TB drives and low power Sandy Bridge CPUs the time has come to build the system I have yearned for so long.HardwareMar 12, 2012
You've Got a New Verisign Authenticode Certificate - Now What?The good news first: You can get a Verisign Authenticode code signing certificate for $99. Just check out https://sysdev.microsoft.com/ for details. This price even applies to the renewal when the original certificate expires after a year.Software developmentMar 9, 2012
Speaking Engagements 2012As in previous years I will be speaking at several conferences this year. February WINone May Citrix SynergyConferencesMar 6, 2012
Get Rid of Active SetupAre you still using Active Setup to distribute per-user files or registry values? If so, stop! There are better ways to manage initial user settings. This article assumes basic knowledge of Active Setup. You might want to refresh your memory by reading my article Active Setup Explained.Windows InternalsMar 1, 2012
Solved: "Other" Eating Up Gigabytes of iPad StorageIn preparation for next week’s MVP summit I wanted to fill my iPad with movies for in-flight entertainment when I noticed that a large part of my iPad’s storage capacity was taken up by stuff from some unexplained “other” category. Here is my account of what I did to get rid of it and reclaim the lost gigabytes.MiscellaneousFeb 27, 2012
Half a Million Downloads of SetACLLast month SetACL reached the magic number of 500,000 downloads. That is a lot, especially for a command-line tool which is focused on a very specific aspect of system administration.Helge's ToolsFeb 21, 2012
How to Troubleshoot Failed MSI InstallsI was given the Aventail VPN client software to install on a customer’s Windows 7 x64 computer. That failed miserably. Here is what I did to find the root cause of the problem.TroubleshootingFeb 16, 2012