XenApp and RDS Sizing Part 1 – Methodology This article is part of a mini-series. You can find the other articles here. One of the first things you need to do after starting a XenApp farm upgrade project […] Read more
The SetACL Shirt Shop Has Opened What could be geekier than a t-shirt imprinted with actual source code from a tool that helps administrators around the world tame one of the most dreaded beasts in IT: […] Read more
What’s Missing in PowerShell 3 ISE On my quest for a decent PowerShell development tool I first tried out PowerGUI, but was not very happy with it. When the RTM version of PowerShell 3.0 along with […] Read more
Windows 7 Default HKCU Registry Permissions This is a complete listing of all Windows 7 HKEY_CURRENT_USER registry permissions. The list was generated on a 32-bit installation with SetACL. More default permission listings can be found here. Read more
AppLocker – Solutions to Common Problems This article is part of my small series about AppLocker, a technology built into Windows that enables administrators to audit and optionally block application execution. Read more
Windows 7 Default File System Permissions Listing This is a complete listing of all Windows 7 file system permissions. The list was generated on a 32-bit installation with SetACL. More default permission listings can be found here. Read more
AppLocker – Security Problems This article is part of my small series about AppLocker, a technology built into Windows that enables administrators to audit and optionally block application execution. Read more
Finding and Removing Orphaned SIDs in File Permissions, or: Busting the Ghosts Built Into Windows 7 Due to a lack of visibility permission cleanup is performed far less frequently than it could, and probably should. As a result, ghost ACEs (permissions from deleted accounts) linger in […] Read more
AppLocker – Fact Sheet This is the first in a small series of articles about AppLocker, a technology built into Windows that enables administrators to audit and optionally block application execution. Read more
HowTo: ReACLing a File Server in a Domain Migration with SetACL 3.0 When you are planning a migration of user accounts between domains one task always pops up pretty quickly: reassigning the permissions of the users in the source domain to the […] Read more
Benchmarking Windows 7 Offline Files Transparent Caching Windows 7 comes with several features that promise to greatly improve file access over a WAN. One of them is version 2 of the SMB protocol, another transparent caching. This […] Read more
Recommendation for a USB 3.0 JBOD Enclosure A drive enclosure for 4 SATA drives, connected to the host via USB 3.0 and presented as JOBDs is a great and inexpensive method of adding a lot of hard […] Read more
Benchmarking a $11,699 HP Enterprise Performance SSD [Update on 29/06/2012: added tests 5 and 6 with RAID controller cache and Atlantis Ilio] When a 400 GB SSD comes nearly at the price of a small car, you […] Read more
Solved: Deleting Copied Executable Files Fails – Temporarily I had a very interesting case recently where copied EXE files could not be deleted. They would simply remain in the folder like zombies, only to disappear a few minutes […] Read more
Setting up Mobile Broadband (WWAN) on HP Elitebook 8560p Configuring an HP Elitebook with integrated HS2340 mobile broadband module to use the 3G connection can be a little tricky. Here is how it works – without third-party dialer software! Read more
Authentication Fails Trying to Send Mail via Google Apps SMTP from PHP As you may know helgeklein.com also hosts a forum where I help people who have questions related to my software. The forum is configured to send out e-mails when new […] Read more
Removing “Eject VMware Virtual disk SCSI Disk Device” The HotPlug functionality of VMware ESX(i) 4 and 5 has the negative side effect that it is easily possible to “eject” hardware devices from inside the virtual machine, completely removing […] Read more
Solved: Disabling the BitLocker Service via GPP Fails If you want to disable the BitLocker service via Group Policy Preferences, you will find that you cannot. The service’s startup mode stays at “manual” and the following event is […] Read more
Walkthrough: Creating a UE-V Settings Location Template In this article I explain how to create a template for Microsoft User Experience Virtualization. For details on how UE-V works please see my earlier article Microsoft User Experience Virtualization […] Read more
Microsoft User Experience Virtualization (UE-V): Facts and Review 16 years after roaming profiles made their debut in Windows NT 4.0 Microsoft takes another stab at synchronizing user settings across devices – a very different one. As we will […] Read more
Windows Offline Files Survival Guide Windows Offline Files have a bad reputation. Many an administrator can tell a story where Offline Files caused issues that sometimes even required a reinstallation of the affected PC. But […] Read more
Windows 8 Storage Spaces: Bugs and Design Flaws When I first read about Storage Spaces in the Windows 8 blog, I was enthusiastic. Finally a replacement for the drive extender technology Microsoft let die so cruelly. Having used […] Read more
Dead Simple Wake-on-LAN for Your Windows Server at Home Having a server at home is a great luxury, but having a computer running 24×7 is an extreme waste of energy. Turning it on and off manually is not very […] Read more
Do Shadow Keys Still Work in Server 2008 R2? Shadow keys have been around forever, since way before Terminal Services were renamed to Remote Desktop Services (does anybody use that name?). It seemed they would stay in the OS […] Read more
Windows 8 Storage Spaces – a First(-Hand) Look at Performance Did I mention I love the new Task Manager in Windows 8? It is brilliantly designed, conveying tons of meaningful information while looking very good. This article is not about […] Read more
Building a Low Power, High Capacity Home File Server I have wanted an energy-efficient multi-terabyte home file server for a long time, but until recently such a system was too expensive for my taste, in terms of both energy […] Read more
You’ve Got a New Verisign Authenticode Certificate – Now What? The good news first: You can get a Verisign Authenticode code signing certificate for $99. Just check out https://sysdev.microsoft.com/ for details. This price even applies to the renewal when the […] Read more
Speaking Engagements 2012 As in previous years I will be speaking at several conferences this year. Read more
Get Rid of Active Setup Are you still using Active Setup to distribute per-user files or registry values? If so, stop! There are better ways to manage initial user settings. Read more
Solved: “Other” Eating Up Gigabytes of iPad Storage In preparation for next week’s MVP summit I wanted to fill my iPad with movies for in-flight entertainment when I noticed that a large part of my iPad’s storage capacity […] Read more