Tuesday, January 11, 2011

Microsoft.com IP adresses

In my cases I wanted to filter outbould traffic from my servers. especially http traffic. But they do need access to the microsoft server. Below is the IP spans i have found being used by Microsoft.com and windowsupdate.com

207.46.0.0/16
213.0.0.0/8
65.52.0.0/14
94.245.64.0/18

Thursday, January 6, 2011

Determine listening ports (and associaeted processes)

Scenario: You want to determine which ports are listening on an Microsoft server and the belonging process

Run the command netstat -ano |find /i "listening"

The last column shows the PID (ProcessID) the port belongs to. Use Process Explorer (http://technet.microsoft.com/en-us/sysinternals/bb896653) to find out the name of the executable that belongs to the PID .

Monday, November 15, 2010

Sharepoint configuration wizard hangs at step 5

Scenario: The Sharepoint Products and Technologies Configuration Wizard hangs at step 5.

Nothing really happens, step 5 just won’t finish. I managed to  get the wizard to at least crash by starting and stopping the Windows Sharepoint Search Service. This way, i also got an link to the log file. The last log entry before the wizard crashed was:

Calling SPServiceInstance.Provision for instance Microsoft.SharePoint.Search.Administration.SPSearchServiceInstance, service Microsoft.SharePoint.Search.Administration.SPSearchService

My solution was to simply delete all registry keys under 

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shared Tools\Web Server Extensions\12.0\WSS\Services\

that had the term “search” in the key name, such as:

 Microsoft.SharePoint.Search.Administration.SPSearchService

When i ran the wizard again it ran like a charm.

Monday, November 1, 2010

Sharepoint–reduce number of logons

Tired of having to logon at least twice when opening a document from a Sharepoint document library?

This solution will significally reduce that number:

  1. Add the Sharepoint site to the zone Local Intranet (if this is appropriate for your environment): Open Internet explorer, navigate to the sharepoint site, choose Internet Options, tab Security, mark Local Intranet, click on Sites, click on Advanced.
  2. Turn off the service WebClient (Open the run prompt, enter services.msc, find Webclient, right-click and choose Stop.
  3. Open a document from a sharepoint library (you have to enter you credentials). Keep the document open while you open another document. This time you won’t have to login at all!

Wednesday, October 27, 2010

How to use WLAN securely

WLAN is in many ways an insecure way to communicate. However, here is a few things to think about when surfing on WLAN to avoid connecting to a rouge hot-spots (main article, see http://www.esecurityplanet.com/features/article.php/3908596/article.htm).

1. Make sure the name of the WLAN is expected.

2. When connecting, make sure that the WLAN is not marked as “Ad Hoc”, this means that the hotspot i actually a computer with a network card in “infrastructure” mode. This is a common man in the middle attack.

3. If you suddenly gets disconnect when having a good signal, be careful when reconnecting – it might be an attack that caused the disconnect, and when you reconnect you connect to a rouge hotspot with the same name.

4. Commersial hotspot suppliers almost always make you pay in some way. If you suddenly can surf without paying, something is probably wrong.

5. If the websites you visit looks unfamiliar in any way, small unexpected changes etc, be careful, it might not be the real website.

6. If websites with certificates that is usually marked as “green” suddenly is marked as “red”, be careful.

7. If you plan to login to a webpage such as Facebook, go to https://www.facebook.com instead of http://www.facebook.com to prevent eavesdropping. When on an public WLAN, avoid using sites that don’t support https.

Thursday, June 24, 2010

Make a graphical instruction notice to your sharepoint library or list

Scenario: The ordinary document library description does not offer any graphical customization. As a result, it is often overlooked by most users.

image

 

Solution: Add some html code with a simple border

image

Step by step:

  1. Open the document library (or list) and pick Site actions –> Edit page
  2. Click Add Web Part
  3. Add the Content Editor Web Part
  4. Click the Open the tool pane
  5. Open the Source Editor
  6. Paste the following html code:

<TABLE BORDER=1 RULES=NONE FRAME=BOX BORDERCOLOR=RED>
<TR> <TD><b>Instructions</b></TD> </TR>
<TR> <TD>Choose suitable template under the New menu</TD> </TR>   
</TABLE>

  1. Customize the html to fit your needs.

Thursday, June 10, 2010

MS Access – Import Word table with line break

Scenario: You want to import an Word table to Access without loosing line break within the table.

MS Access - How to keep line break when importing from Excel

Scenario: You have an Excel sheet with one column containing text that also has line breaks with the cell, for example bullet lists. You want to import this table to Access and keep the line breaks untouched.

Solution

  • Copy and paste the data into Access (or use the import wizard)
  • Make sure that the current column is of type Text or Memo/PM and also check that the field property Unicode Comporession is set to No and the property Text Format is set to Plain Text.
  • Create an update query, where you set the field Update to to Replace([ColumnName];Chr(10);Chr(13) & Chr(10))
  • Run the query

Wednesday, June 9, 2010

Paste Word table to excel with line breaks

Scenario: You have a table in Word that you want to paste to Excel. However the Word table contains line or paragraph breaks, for example bullet lists within the cells. These cause the Word table rows to be slit over several rows in Excel.

Solution

  • Paste the Word table into a new Word document
  • Open “Search and replace”, search for ^p and replace with ;
  • The new lines will now replaced with a ; sign.
  • Copy the table and Paste into Excel
  • Open “Search and replace” in Excel, search for ; and replace with *Hold down Alt key and press 010” (ASCII for new line).
  • Done!

I did have som trouble with the search and replace in Exel. It did not insert a new, it inserted like three new lines for each ; . Changing to a different computer did help, so really don’t know what the problem was.

Tuesday, June 1, 2010

Installing and using Jolicloud OS on NC10

Scnario: You want to dual boot a Samsung NC10 running Windows 7 with Jolicloud OS.

1. Download the Jolicloud installer (.exe)

2. Run it and follow the instructions. I chose to install om the same Partition that were Systemdisk for Windows 7 (C:\).

3. Everything went fine, but were not able to register with Jolicloud using Facebook (got ‘Server is Down’, reported it several times and waited for weeks without any change)

4. Created a ordnary account (without using facebook), went well.

5. Used the Jolicloud ‘app store’ to install my favorite apps, such as Spotify, Dropbox, Chrome etc.

6. For those applications that I use but weren’t available on the app store (Pwd Safe, Jungledisk, I used Wine to run them on the Linux Ubuntu system. For a simple guide for how to use Wine, see http://frankscorner.org/index.php?p=quickstart

Tuesday, May 18, 2010

Change folder background in exlorer (Win XP)

Scenario: You want to change the explorer background of a folder on an Windows XP computer.

Step 1.

Open a command prompt and run the command attrib +s c:\test

Where C:\test should be replaced with the path to folder of your choice.

Step 2.

Browse to the folder, open the Tools menu, choose Folder options. Pick the tab View. Make sure Show hidden files are checked and Hide protected operating system files are unchecked.

Step 3.

You should now see a file called system.ini (otherwise, just create it using notepad).

Add the following lines to it.

[ExtShellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC} = {BE098140-A513-11D0-A3A4-00C04FD706EC}

[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
Attributes=1
IconArea_Image=path_of_the_wallpaper
IconArea_Text=0x00000000

Save and close notepad. Close the folder and open it. The background should now have changed.

Friday, May 14, 2010

Kerberos pre-authentication failed on DC from 127.0.0.1

Scenario: You recieve a large amount of Event ID 675 on a DC where client Adress is 127.0.0.1. It is usally from the administrator account.

This can be a result of a number of issues, first check that no service or process is using the particular account.

In my case it was problem with the DHCP DNS registration that were set to use the Administrator account. So, go look at:

Manage Your Server –> Manage this DHCP server –> In the DHCP dialog; right click the server and choose Properties –> Advanced tab –> Credentials. Make sure the account entered there have necessary rights and that the password is correctly entered (see http://support.microsoft.com/kb/816592 for details).

Wednesday, May 5, 2010

Wake computers to enable remote management

Scenario: You want to remotely administrate client computers but can’t connect because they have went to sleep.

Step 1. Enable WOL.

Open the properties for the network card, choose Power Management, make sure Allow this device to bring the computer out of standby and Only allow management stations to bring the computer out of standby are both checked. In Windows 7 the latter refers to a “magic packet”.

Note that only enabling WOL in windows will not make it possible to wake a turned off computer or computer hibernating, only wake a computer in “sleep mode”. To be able to wake a turned off computer you need BIOS support. Enter BIOS and look for WOL / Wake on LAN, it is usually under “Power options”.

Step 2. Send a magic packet

This can be carried out in a number of ways. Here is an easy to use tool: http://www.gammadyne.com/cmdline.htm#wol

Wednesday, April 21, 2010

Get MAC adress from computer name

getmac /s [machinename]

Get computer serialnumber from windows

Useful command:

‘wmic bios get serialnumber’

read more at http://support.microsoft.com/kb/558124

‘net send’ vs msg.exe

This article aims to investigate the possibilities, limitations and differences between the old NT command “net send” and the newer msg.exe utility.

net send (usage: net send [computername] [message]

Conditions:

  • The machine must be running XP or 2003 Server (net send is not available in Vista, Win7 or Server 2008
  • The service “Messenger” must be running (sending and receiving machine) It is disabled by default from XP sp2 and later
  • NetBIOS must be enabled (sending and receiving machine)
  • The ports 137/UDP and 139/TCP must be open (receiving machine)
  • Domain-independent

msg.exe

Conditions

  • Available in 2003 Server, XP sp2/sp3, 2008R2, Vista, Win7
  • Sending and receiving machine must be members of the same domain
  • Not NetBIOS dependent
  • Only uses port 445/TCP (SMB)
  • Possible to use IP instead of machinename
  • Not dependent on the messenger service.

Note: If you have trouble with “Access denied” problems, try this registry hack: Locate the DWORD key “AllowRemotePRC” in HKLM/System/CurrentControlSet/Control/Terminal Server. it should be set to “1”. 

If none of these meet your requirements, the following third party softwares are available:

Wednesday, March 24, 2010

Word templates

How word documents and word templates relates to each other.

When a word document is created, it is created from an template, normally the normal template.

It inherits three things:

  • -Styles
  • Content (incl headers)
  • Page settings

These three parts are now copied to the document and the relation between the template and the document is lost.

How to change the template:

Styles:

Update the document with it’s template’s styles. Tools –> Tempaltes and Add-ins. Tick the Automatically Update Document AStyles. Apply and then untick the box.

Content:

No other way den manually copy and paste

Page Settings

As with content.

Wednesday, March 17, 2010

Give users from different domain local administrator rights

Scenario: You have a trust between two domain and wants the domain admins of the remote domain to have local administrator privileges on the computers in the local domain.

Use GPO: Computer Settings –> Windows Settings –> Security Settings –> Restricted Groups. Add a group named “Administrators” (referring to each computers local group). Under “Members”; add the following accounts and groups:

  • “Administrator” (referring to each computer’s local administrator account).
  • [local domain]\Domain Admins (referring the local domain’s domain admins)
  • [remote domain]\Domain admins (referring to the remote domain’s domain admins.

Important notice: The member you add are exactly the ones that will be member on each computer; existing local exceptions will be overridden.

Friday, February 19, 2010

Saturday, February 13, 2010

Account lockout problems

Scenario: User accounts are continuosly being locked out as a result of numerous failed password attempts.

 

Microsoft tool “Account Lockout and Management Tools” (http://www.microsoft.com/downloads/details.aspx?FamilyId=7AF2E69C-91F3-4E63-8629-B999ADDE0B9E&displaylang=en) kan användas.

Documentation: http://technet.microsoft.com/en-us/library/cc738772(WS.10).aspx

Check functions that be configured to use specific user accounts to run under, for example:

Mapped shares/drives

Services

Scheduled tasks

Software that uses cashed credentials.

Tuesday, December 8, 2009

Installera Win 7 på Dell E4200

 

  • Gör backup (förslagsvis pÃ¥ extern hÃ¥rddisk). Kom ihÃ¥g:
    o    Ev. TrueCrypt-volym
    o    Skrivbordet och Mina dokument
    o    Bokmärken
    o    E-mail
    o    Certifikat (SVN, ev mjukt certifikat FMV
  • Om du saknar CD-rom:
    o    skapa en bootbar USB-sticka enligt http://www.intowindows.com/how-to-install-windows-7vista-from-usb-drive-detailed-100-working-guide/. OBS! Kräver att USB-stickan skapas frÃ¥n en dator som redan har Windows Vista eller Windows 7.
    o    Kontrollera att USB ligger först i boot priority i BIOS
    o    Starta datorn med stickan och kör installationsprogrammet (tar knappt 10 min (!))
    o    kom ihäg att ta ut sticka när datorn startar om efter installationen
  • Ã…terställ TrueCrypt volymen
    o    Av nÃ¥gon anledning blev TrueCrypt-volymen Write only för mig, därför fick jag skapa en ny TrueCrypt volym, mounta bÃ¥da och kopiera över filerna till den nya.
    •    Installera office
    o    Ladda ner Office 2007 Professional frÃ¥n microsoft, välj engelsk eller svensk version. Om du väljer svensk version kan du behöva aktivera licensen över telefon istället för över Internet.
  • Ã…terställ mail
    o    Spara mail pÃ¥ TrueCrypt colymen
        Lägg Outlook mappen med e-mail pÃ¥ TrueCrypt-volymen/partitionen.
        Konfigurera Outlook enligt fredriks dokument.
        När det är klart och den börjar synka mail, stäng av outlook. Kolla även i task manager att processen Outlook.exe försvunnit ur processlistan. Öppna outlooks vanliga mapp för mailfiler och flytta dem till papperskogen. GÃ¥ till Kontrollpanelen –> mail. Dubbelklicka pÃ¥ respektive datafil, den kommer dÃ¥ klaga att den inte hittar filen och du fÃ¥r möjlighet att navigera till filen du sparade pÃ¥ TrueCrypt volymen. Gör sedan likadant med övriga datafiler.
  • Installera drivrutiner
    o    ladda ner och installera drivrutiner för bluetooth och TouchPad frÃ¥n Dells hemsida

Tuesday, November 24, 2009

Move outlook 2007 data files to other location, including IMAP accounts like Gmail.

Scenario: You want to move your outlook datafiles to another location for some reason, in my case, store them on an encrypted drive. Another reason would be to keep them on a file share for the sake of backup.

Locate the files, usually in C:\Documents and Settings\User\Local Settings\Application Data\Microsoft\Outlook. Move all the files to the new preferred location.

If you have an IMAP account like GMAIL, go to Control Panel –> E-amil –> Data files. Double click the one associated with the Gmail account. It says it can’t find, press OK and navigate to the new location. Click OK.

Now you can open Outlook. If you use any other data files you will now be prompted for their new location.

Wednesday, November 4, 2009

Access 2003 Listbox: Items invisible

Scenario: Some or all of the items in a Listbox are invisible:

Cause: The properties from the field in the original table from which the data are pulled have format setting in it’s properties.

Solution: Track from which table data are pulled in the SQL statement that populates the listbox. Open the table in design view and check the properties for the current field and make sure that the format propery are empty.

Thursday, October 22, 2009

Turn 3 dimensional (pivot) table to junction table

Scenario: You have a "three dimensional table" in Excel where the rows are articles and the columns are suppliers, and each cell in the table are marked with an x (or number indicating something) indicated which articles and suppliers that are related. You have decided to create a database instead with one table with articles and another with suppliers. Let's say one article can have multiple suppliers and one supplier can deliver multiple articles, i.e. you need an junction table. How do you create a junction table from this three dimensional table?

My Solution: Search thorugh each row in the table fro a value larger than zero (anything but zero or empty) , for each hit write a line in a textfile with the supplier, article and cell value. Then use the text file to create your junction table.

The code
Sub ConvertTable()
Dim str, strForb As String
Dim col As Integer

Sheets("Sheet1").Select

Dim objFSO, objFile
Set objFSO = CreateObject("Scripting.FileSystemObject")
Set objFile = objFSO.CreateTextFile("Rows.txt")

For i = 2 To 5 'enter which row that contains data
strArticle = Range("A" & i).Value
For Each Cell In Range("B" & i & ":E" & i)
If Cell.Value > 0 Then
col = Cell.Column
str = strForb & "," & Range(ColNo2ColRef(col) & 1) & "," & Cell.Value
objFile.WriteLine (str & cbrlf)
End If
Next Cell
Next i
objFile.Close

End Sub

Function ColNo2ColRef(ColNo As Integer) As String
If ColNo <> 256 Then
ColNo2ColRef = "#VALUE!"
Exit Function
End If
ColNo2ColRef = Cells(1, ColNo).Address(True, False, xlA1)
ColNo2ColRef = Left(ColNo2ColRef, InStr(1, ColNo2ColRef, "$") - 1)
End Function

Tuesday, October 13, 2009

Macro to paste unformatted text in word

This macro gives you the possibility to easily paste text into a word document without formatting.

  • Copy a bit of text
  • Choose the Developer tab
  • Record macro (save in the norma.dotm template)
  • Choose a smart keyboard combination, for example ctrl + shift + v
  • Paste the text somewhere in the document
  • Stop the macro
  • Edit the macro and replace the one line with
  • Selection.PasteSpecial Link:=False, DataType:=wdPasteText

Monday, October 12, 2009

Create domain trust

Scenario: You want to be able to use your domainA account to log in to domain B. I.e. you wan't domain B to trust domain A.

First thing, open firewall ports (both directions on all fw between the domains)
Kerberos 88 TCP & UDP
LDAP 389 TCP & UDP
LDAP GC 3268 TCP
LDAP GC SSL 3269 TCP
LDAP SSL 636 TCP
RPC 135 TCP
SMB 445 TCP & UDP
NetBIOS 137-139 TCP & UDP
WINS 1512 TCP & UDP
WINS Replication 42 TCP
 
make sure the DNS in the domain controllers for both domains are properly setup. The own domain shall be setup as a primary zone while the other shall be a secondary zone. and vice versa. Same thing for reverse lookup zones. Also make sure that the DNS zone for domain B has a folder named _msdcs. If not, restart netlogon, and run ipconfig /flushdns and ipconfig /registerdns.
 
Make sure the clocks are in sync, preferably syncronized to the same external time server.
Make sure RPC is working by entering "\\DC1.domainA.com" in explorer on a computer in domainB and vice versa.

Create trust
On a DC in domainA.
Administrative tools --> Active Directory Domains and Trust --> Right click domainA.com, choose Properties --> Tab Trusts --> Create new Trust --> enter DomainB.com -->
--> "External Trust" --> "One way incoming" --> "Both this domain and the specified domain" --> enter credentials for an account with administrator privileges in domainB --> "Domain-wide authentication" --> "Trust creation complete".
Validate Trust
Log on to a DC in domainB
Administrative tools --> Active Directory Domains and Trusts --> Right click DomainB.com and choose Properties --> tab Trusts --> mark domainA --> Validate.
Permissions
Permissions are not inherited between domains. This are solved by adding a domainA account to a domainB secureity group (for example the built in group "Administrators"). If you want to add a domainA account to a custom group in domainB, the group must be a security group of type "local", not "global".

Local admins
Even if you add a domainA account to the Administrators group in domainB, the account will not be local administrator on the computers in domainB. The only solution i now off is to manaulle make the DomainA account to local administrator on each server/host using a domainB or local account.

Wednesday, October 7, 2009

Server 2003, 2008 log references

http://www.windowsecurity.com/articles/Event-IDs-Windows-Server-2008-Vista-Revealed.html

Useful tools for Active Directory

netdiag

dcdiag

nltest

nslookup

Tool for restoring deleted files

Recuva

NIST firewall policy

Google sp800-41.pdf

Enable anonymous access in Sharepoint.

Enabling anonymous access to a sharepoint site requires to separate activities.

1. Enable in Central Administration: Application management --> authentication providers --> Default --> Enable anonymous access

Note: DO NOT CHANGE ANYTHING IN IIS

Navigate to the site where you want to enable anonymous access: Site actions --> Site settings --> Advanced permissions --> Settings --> Here you should see an option for Anonymous access.

Cool tool for recording streamed multimedia

http://sdp.ppona.com/

Translate business security needs to the configuration and management of security devices.

Reliable process for security policy development

“We focus in this paper on the problem of configuring and managing network security devices, such as Firewalls, Virtual Private Network (VPN) tunnels, and Intrusion Detection Systems (IDSs). Our proposal is the following. First, we formally specify the security requirements of a given system by using an expressive access control model. As a result, we obtain an abstract security policy, which is free of ambiguities, redundancies or unnecessary details. Second, we deploy such an abstract policy through a set of automatic compilations into the security devices of the system. This proposed deployment process not only simplifies the security administrator's job, but also guarantees a resulting configuration free of anomalies and/or inconsistencies.”

Schedule backup with synctoy

http://www.mydigitallife.info/2008/01/01/schedule-synctoy-to-run-and-automatically-and-repetitively/

Schedule SyncToy Sync Task in Windows Vista

  1. Click on the Start menu, then select All Programs - Accessories - System Tools - Task Scheduler.
  2. Click on Create Basic Task in the “Actions” pane on the right.
  3. In the “Create Basic Task Wizard”, type in a Name and Description. For example, SyncToy Synchronization.
  4. Click on Next button.
  5. Choose the frequency of when do you want the task to start. If you always make changes to the files, Daily is a good choice.
  6. Click on Next button.
  7. Choose date and times (if applicable) to trigger and run the task.
  8. Click on Next button.
  9. In the “Action” step, select Start a Program as the option for the task to perform.
  10. Click on Next button.
  11. Under “Program/Script”, click on Browse button and locate the SyncToyCmd.exe. Normally it’s located in “C:\Program Files\SyncToy 2.0 Beta\SyncToyCmd.exe” for SyncToy 2.0 Beta.
  12. In the “Add Arguments” textbox, type -R. –R will run all folder pairs that are active for run all. If you want to run just a single folder pair, add –R”folder pair name” to the end of the command line.

    Note: there is a space before the hyphen but not one after the R. If the folder pair name contains a space, surround it with quotation marks, as the example above shows. For another example, assume that SyncToy is in the folder named C:\Program Files\SyncToy 2.0\ and that you want to run a folder pair named “My folder pair.” Enter the command line as follows, including the quotation marks: “C:\Program Files\SyncToy 2.0\SyncToyCmd.exe” -R”My folder pair.” Note that there are two sets of quotation marks in this case: one is around the path to the SyncToy program file and the other surrounds the folder pair name.

Schedule a SyncToy Task in Windows XP

  1. Go to the Start menu, select All Programs - Accessories - System Tools - Scheduled Tasks.
  2. Select Add scheduled task to start the Scheduled Task Wizard. You will see a list of possible programs to run.
  3. SyncToy may appear as an option in the list. If SyncToy does not appear in the list, click Browse and locate the SyncToy executable. Normally it’s installed in Program Files directory.
  4. The wizard will next prompt you to enter how often you want to run the scheduled SyncToy (for example, daily, weekly, et cetera). Select a frequency.
  5. The next page asks when to start the task. Select a start time.
  6. The next page asks for the user name and password to run the program under. Enter your user name and password. However, in SynToy 2.0, it’s not necessary for the defined user to log in to the computer. Different user or no one logged on is possible to have the task running too.
  7. The final page contains an option to open the properties dialog when the wizard ends. Select this checkbox.
  8. Modify the Run textbox to include the –R command line option. –R all by itself will run all folder pairs that are active for run all. If you want to run just a single folder pair, add –R“My Pair” to the end of the command line.

    Note: there is a space before the hyphen but not one after the R. If the folder pair name contains a space, surround it with quotation marks, as the example above shows. For another example, assume that SyncToy is in the folder named C:\My Folder and that you want to run a folder pair named “My folder pair.” Enter the command line as follows, including the quotation marks: “C:\Program Files\SyncToy 2.0\SyncToyCmd.exe” -R”My folder pair.” Note that there are two sets of quotation marks in this case: one is around the path to the SyncToy program file and the other surrounds the folder pair name.

Install EventSentry on a 64 bit Sharepoint server

Scenario: You want to install Eventsentry on a 64 bit server hosting sharepoint. The problem is that the web reports in Eventsentry, in the case of 64 bit, require IIS to run in 32 bit mode, which is not an option an an 64 bit SP install. The approach was to put the web reports on a different server.

  1. Make sure to have an ES config export file as well as an export only including filter packages and an export file for the custom web reports.
  2. Install MySQL as outlined in the ES documentation
  3. Install ODBC driver (wait to configure)
  4. Install ES without DB support and web reports
  5. Run modify wizard and add MySQL support.
  6. From the Management interface, add an db action to test the database.
  7. Configure ODBC System DSN with the eventsentry_svc user. Test if it works
  8. Import the config XML file. Restart the GUI.
    1. Check if everything seems properly done.
      1. In particular, reconfigure the DB action if needed.
  9. Copy the Eventsentry folder under Program Files to the server used for the web reports (use the same place). Set permissions on the folder to only allow admininstrator access (and the System account).
  10. Make sure that Active Server Pages is added in Windows Componenents (Application Server --> Details, Internet Informations Service --> Details, World Wide Web Service --> Details, Check Active Server Pages
  11. On the web server, create a new web site, point it to the copied Eventsentry folder (eventsentry/web).
  12. Add “index.asp” as “document” in the properties for the web site (in IIS).
  13. Check Windows integrated authentication in IIS Manager.
  14. The first time you access the web reports, choose to disable authentication (trust the NTFS permissions).
  15. You propably need to reconfigure the database setting on the Default Profile.

Move Sharepoint to 64 bit server

Scenario: A Sharepoint stand-alone (Basic Install with SQL Express) environment needs to be moved from a 32 bit server to a 64 bit server. The orignal installation is done from a Swedish installer while the new installation is done from a english installation.

This is what worked for me:

  1. Install Win Server 2003 64 bit.  I had to use a Dell CD to manage to install on the RAID setup.
  2. Install MOSS 2007 English from CD (Install from a downloaded copy did not work, the config wzard hung)
    1. Choose basic installation
    2. Run the config wizard
    3. Download language pack (.img opens with WinRAR)
    4. Install language pack (make sure it is the right one, swedish, 64 bit, moss 2007 etc.)
    5. Run the config wizard again
  3. Run Microsoft Update. Make sure to get the latest SP updates. At least newer than the environmnet your moving from.
  4. Delete the site collection via Central Adminstration and create a new one with the right language pack. Use the same template as the site you want to move.
    1. You can check what template was used by creating a aspx site. Google “determine site template”
  5. In my case the site template used was now deprecated. My solution was to create a custom site template, upload it to the created site and create is as an subsite. However, I got “File not found”-error on the new site.
  6. At this point, i used STSADM to make a backup of the original site
  7. Restored the backup to the faulting subsite using STSADM
  8. Voila, an exact copy was now up and running on the new server!
    1. It did bring up a login dialog when browsing on the local server, but not browsing from a arbitrary client (or other server).
  9. Added a hostname “temp” and created a DNS A record “temp@domain.com” pointing to the IP adress of the new server.