• 07Mar

    I came across an instance where I needed to upgrade a Windows 7 image to Windows 8.1 and then capture that image for deployment with System Center Configuration Manager 2012 R2. I found out shortly after starting this task that when you upgrade an operating system you can no longer run SysPrep. So I started looking around and modifying registry keys and running commands.


    Below is the method that I found to work perfectly.

    Remove this KEY from the Registry:

    Remove this REG_DWORD from the Registry:

    Set this REG_DWORD from the Registry:
    Computer\HKEY_LOCAL_MACHINE\SYSTEM\Setup\Status\SysprepStatus\CleanupState [Set Hexadecimal Value: 7]

    Run this command as Administrator:
    slmgr /dli

    After your operating system is activated re-run SysPrep and it will work!

    – Harry Caskey

    Tags: , , , ,

  • 21Sep

    In a current environment where this works and you come across one machine or a range of machines that will not push the PXE boot advertisement. Assuming you’ve already checked off the following.

    1) You’ve set up your collection.
    2) Your machine is recognized by SCCM, and in the desired collection.
    3) Your boundaries set for the machine location are set.
    4) You’ve configured your Task Sequence with your boot image.
    5) You’ve advertisement your Task Sequence to the collection set you desire.
    5) Your advertisement is set to PXE boot.
    6) You’ve cleared the last PXE advertisement from the object.

    If you’ve determined all your configurations are correct and this same process works with other machines in other boundaries to to delete the boundary and recreate the boundary.

    – Harry Caskey

    Tags: , ,

  • 08Apr

    I thought today I would blog about an experience I had with Exchange Server 2007 last June 16th, 2008 we had a power outage early in the morning which resulted in server failures across the board.  This then caused a chain reaction when the backup domain controller went down. The Active Directory systems dropped off the network leaving computers requesting AD authentication dead in the water. Then our Exchange Server went offline causing an unexpected shutdown. As files are writing to the disk this can always cause corruption. In this case it did.

    When the system came back online there happen everything was fine and dandy. Until we noticed that the Public Folders was offline. Now we are running an Exchange Server 2007 when I signed on this machine it would not mount. To fix this problem I had to use a PowerShell command to repair the Public Folders.

    At the PowerShell command prompt I used the following command.

    First run the repair command on the database, you want to repair any damage before and defragmentation because you may make the corruption irreversible.

    repair eseutil /p “[Drive Root]\Program Files\Microsoft\Exchange\[Location of the Database]”

    Second run a defragment command, this will clean out and organize the database so it works more efficiently. I highly recommend doing a defragment after the repair this will ensure integrity and stability after the repair has complete.

    defragment eseutil /d
    “[Drive Root]\Program Files\Microsoft\Exchange\[Location of the Database]”

    Then when you remount the database in the exchange console and it should work. By reconnecting the repaired store this should automatically bring the Public Folder share back online.

    – Harry Caskey


  • 07Apr

    Active Directory is truly the heart of an organization. You might even say if a computer system were a human being it would be the brain spanning all knowledge of the system. It is a central repository for all data regarding users, groups, computers, printers, shared folders, contacts, and policies. This store all information into a database, also can be known as the hive. Which contains strings and strings of data, and meta data.

    Many applications are written to connect to the Active Directory. This is useful because when you start to implement a system you can easily integrate it with authentication. If you are a authenticated user at a certain level you can restrict other users access to other resources. Such as you don’t want your Public Relations department to be able to have access to Human Resources files.

    As a Systems Administrator or Network Administrator you can safeguard practically anything you chose. You can even specify in a group policy what programs you would want users to access or install. Let alone when a user signs on run a batch file or implement an import of internal resources of favorites into the users Internet Explorer. If you are just learning about Information Technology I would suggest you visit Microsoft’s website for a training guide. There you can also find resources such as a Virtual Machine to experiment with. You need to practice because this is something you will need to know.

    – Harry Caskey