This error happened to me after a migration of a dying vCenter physical box. Because the database was still on the to be decommissioned server, the new vCenter couldn't reach it due to the service VMware vSphere Profile-Driven Storage Service being started with a local user.
The solution was simple, simply change the user Log On to your vCenter admin account in our case a service account called vcenter.service
This should solve.
Techguy
Solutions I have gathered over my years of work as sysadmin. Some info may be in portuguese
Monday, 26 January 2015
Monday, 12 May 2014
Convert mailboxes from user type to room, equipment or shared
Open the Exchange Management Shell:
example: Set-Mailbox mailboxname -Type Room
You can use the following values for the Type parameter:
Regular
Room
Equipment
Shared
For detailed syntax and parameter information, see Set-Mailbox
example: Set-Mailbox mailboxname -Type Room
You can use the following values for the Type parameter:
Regular
Room
Equipment
Shared
For detailed syntax and parameter information, see Set-Mailbox
Monday, 9 December 2013
Powershell script to get last login of a host in a readable format for humans
---------Start Script------------------
# Gets host and lastLogonTimestamp in UTC of specified host
# Get hostname
$hostname = Read-host "Enter a hostname"
# find the lastLogonTimestamp attribute
Get-ADComputer $hostname -Properties lastlogontimestamp |
# output hostname and timestamp in human readable format
Select-Object Name,@{Name="Stamp"; Expression={[DateTime]::FromFileTime($_.lastLogonTimestamp)}}
pause
------------End Script---------------
Wednesday, 27 November 2013
Get specific properties with Get-ADUser and exporting to CSV
At some point we all need to obtain specific data of users to further analyze.
With this PS script you can get a specific data from a certain OU and export to csv.
Get-ADUser -Filter * -searchbase 'ou=your_ou_name,dc=yourdomain,dc=yourdomain' -Properties * | Select-Object Name, Pager | export-CSVresults.csv -NoTypeInformation -Encoding UTF8
With this script I can get the user name and the pager number on a CSV.
You can find what the objects you can use by using: Get-ADUser -Filter * -Properties *
Be aware it will display all users. So Ctrl+c in the middle of and search for your desired field. Or restrict your search base.
The file will appear on the path displayed on the powershell cmd when you open it.
With this PS script you can get a specific data from a certain OU and export to csv.
Get-ADUser -Filter * -searchbase 'ou=your_ou_name,dc=yourdomain,dc=yourdomain' -Properties * | Select-Object Name, Pager | export-CSVresults.csv -NoTypeInformation -Encoding UTF8
With this script I can get the user name and the pager number on a CSV.
You can find what the objects you can use by using: Get-ADUser -Filter * -Properties *
Be aware it will display all users. So Ctrl+c in the middle of and search for your desired field. Or restrict your search base.
The file will appear on the path displayed on the powershell cmd when you open it.
Thursday, 17 October 2013
CryptoLocker Malware
Since there is allready lots of info about this malware in English I am providing a few info in Portuguese:
Está a circular na internet um novo tipo de malware, neste
caso um ramsonware. Entitulado de Cryptolocker.
Como é que fico infectado?
1.
Por emails
falsos que fingem ser da UPS, Fedex, DHL, etc a indicar que temos uma encomenda
à espera de ser recebida ou algo do género.
2.
Através de
sites que estejam vulneráveis a este tipo de infecção.
3.
Através de
Trojans que fingem ser programas necessários para ver videos online,
típicamente encontrados em sites Porno e de SportTV online.
O que acontece quando fico infectado?
Uma vez activa a infecção no
computador vai percorrer as drives (locais e de rede) e encriptar os
seguintes tipos de ficheiros com uma mistura de encriptação RSA e AES: *.odt,
*.ods, *.odp, *.odm, *.odc, *.odb, *.doc, *.docx, *.docm, *.wps, *.xls, *.xlsx,
*.xlsm, *.xlsb, *.xlk, *.ppt, *.pptx, *.pptm, *.mdb, *.accdb, *.pst, *.dwg,
*.dxf, *.dxg, *.wpd, *.rtf, *.wb2, *.mdf, *.dbf, *.psd, *.pdd, *.eps, *.ai,
*.indd, *.cdr, ????????.jpg, ????????.jpe, img_*.jpg, *.dng, *.3fr, *.arw,
*.srf, *.sr2, *.bay, *.crw, *.cr2, *.dcr, *.kdc, *.erf, *.mef, *.mrw, *.nef,
*.nrw, *.orf, *.raf, *.raw, *.rwl, *.rw2, *.r3d, *.ptx, *.pef, *.srw, *.x3f,
*.der, *.cer, *.crt, *.pem, *.pfx, *.p12, *.p7b, *.p7cThe
Após um tempo, tipicamente o
tempo que demora a encriptar os ficheiros aparecerá uma janela semelhante a
esta abaixo, que vai pedir um resgate de 100 ou 300 US$. O pagamento pode ser
feito por Bitcoins, Moneypack, Ukash ou CashU. E aparecerá uma contagem
decrescente para o fazer!
Há alguma forma de recuperar os ficheiros?
Infelizmente não. Desencriptação por força bruta não é
possível no tempo que é disponibilizado e todas as ferramentas que têm surgido
têm-se revelado ineficazes.
A única forma de não ser infectado por este e outro tipo de malware é usar o bom senso e não abrir emails suspeitos, sites, etc.
A única forma de não ser infectado por este e outro tipo de malware é usar o bom senso e não abrir emails suspeitos, sites, etc.
No caso de se ter sido infectado a única forma de recuperar
os ficheiros é através de backups que tenham sido feitos.
Subscribe to:
Posts (Atom)