Entradas

Mostrando entradas de junio, 2018

Update group policy (or run any command) remotely using Powershell

Thanks to: https://wiseindy.com/ This script allows you to run any command remotely using Powershell on your network. I usually use this to update group policy configurations on all PCs on my network remotely. Note: In  Windows Server 2012  &  Windows Server 2012 R2 , you can run the  Invoke-GPUpdate  PowerShell cmdlet ro refresh group policy on any  Windows 8  computers on your network.  More information here . What you will need: PsTools Download PsTools from here:  https://technet.microsoft.com/en-us/sysinternals/bb896649.aspx Domain admin permissions This small script PsExec.exe \\* -s cmd /C echo N | gpupdate /force What this script does: Remotely runs  gpupdate /force  on all workstations Selects "N" if it asks to logoff user When you run it, you’ll see some output like:  Starting cmd on PC1-USRNAME... on PC1-USRNAME... cmd exited on PC1-USRNAME with error code 0. “ error code 0 ” means it has completed successfully without any errors

Etherchannel (Port Channel) on Cisco ASA

Imagen
Thanks to: http://www.amirmontazeri.com/ Generally Cisco ASA has one Management interface and four Gigabit Interfaces, but in modern systems and scalable Infrastructures you will need more than four Interfaces. To overcome this limitation you can configure some VLANs and trunk them to an Interfaces. This was a standard solution to this problem, however since ASA version 8.4.2 you are able to use Ether Channel to solve this problem. The benefit of Ether Channel or Port Channel is that you are able to configure redundancy and load balancing in the same time; all four ASA Interfaces will be bundle to a link in the Layer 2 then you assign all VLANs directly to the Port Channel and so they applied to all Interfaces of ASA . The ASA distributes the traffics to all Interfaces, which means you have the functioning Load balancing, furthermore if you lost one or two Interface the whole traffics will be distribute to the Interfaces which are available. If you run the Port Channel on th

How to link existing WSUS with new SCCM server

Thanks to: https://www.experts-exchange.com You need to install WSUS console on Configuration Manager server first and Install and configure a software update point on Configuration manager. You can run the PS command "Install-WindowsFeature -Name UpdateServices-Ui" 1. Install WSUS server on server. 2. Add computer account of SCCM server to local Administrators group on WSUS server. 3. Go to SCCM console, Administration workspace, under Site Configuration, right click Servers and Site System Roles and select Create Site System Server. 4. Wizard will open, where you should first specify FQDN of WSUS server and in next step select role "Software Update Point". Did you use ports 8530 and 8531 for WSUS Installation? If you didn't, specify ports 80 and 443. After SUP installation is complete, you can configure your update settings under Administration workspace, now select Site under Servers and Site System Roles. Select your hierarchy and you can config