Vol. 23, #18 - May 07, 2018 - Issue #1180
WServerNews: This and that
- Editor's Corner
- Ask Our Readers! - Need help from the IT pro community?
- From the Mailbag
- Why Always On VPN?
- Countering cyberthreats with algorithms
- Common problems related to using third-party IDPs with Azure and Office365
- Understanding the Microsoft Intune Data Warehouse
- Are you compliant, secure, or both?
- Updated SCOM Management Pack for monitoring security
- Updated RSAT for Windows 10
- Send us your feedback
- Recommended for Learning
- Factoid of the Week - The weirdness in Tim Horton's coffee
- Admin Toolbox
- Admin Tools We Think You Shouldn't Be Without
- This Week's Tips
- Windows 10 - Disable Action Center notifications using Group Policy
- SCOM - Deleting data from the database
- Azure - VM serial console (preview)
- Events Calendar
- More upcoming events
- New on TechGenix.com
- Recommended articles from TechGenix.com
- Tech Briefing - Azure
- Azure Automation: Shutting Down Custom Tagged Virtual Machines
- Webcast: How to leverage Azure for your Windows Server environment
- How to set DPM Azure Throttling with Powershell
- Using Veeam FastSCP with Azure VMs and self-signed certificates
- Installing Azure File Sharing
- Other Articles of Interest
- Six VDI testing steps to take with any deployment
- Get to know your Windows 10 update options
- VMware Cloud on AWS pricing vs. running EC2 instances on AWS
- Check out Samsung Knox 3.0, Knox 3.1, and the new DeX dock
- WServerNews FAVE Links
- Amazing Pool Trick Shots From China
- How To Get Unlimited Chocolate From A Single Bar
- Mountain Biking Down A Ski Slope In Austria
- 1,374 Drones Light Up The Night Sky Of Xi'an, China
- WServerNews - Product of the Week
- Executive brief: how to combat ransomware with recovery solutions
- SAVE THIS NEWSLETTER so you can refer back to it later for helpful tips, tools and resources!
- SEND YOUR FEEDBACK to [email protected] if you have any comments or suggestions!
Since when did one-word sentences like that become common? Is it our fascination with smartphones, nay, our addiction to them, even our seeming evolution towards becoming man-machine cyborg-like entities where smartphone chips will be implanted inside the heads of newborn infants, that has led us to these sweeping changes in how we communicate with each other?
This. But why not that? LMK if you have the answer. Meanwhile here is Dilbert on dating in the cyborg generation:
Enjoy this week's newsletter which is just a mix of different stuff since I'm still recovering from a bad cold that knocked me down for several days. You can read about why I caught the cold in this coming Wednesday's issue of FitITproNews when it arrives in your inbox.
Ask Our Readers! - Need help from the IT pro community?
WServerNews goes out each week to more than 500,000 subscribers worldwide! That's a lot of expertise to tap into. Do you need help with some issue or need advice on something IT-related? Got a question you'd like us to toss out to our readers to try and answer? Email us at [email protected]
From the Mailbag
In Issue #1179 IT security blunders I shared briefly of a story I heard how a client of a colleague potentially shot himself in the foot when he thought he was making himself secure. I asked if any readers had similar stories they wanted to share, and several replied though not specifically on the topic of IT security. Let's start off with Jeremy who wrote to us as follows:
Your recent newsletter asked about sharing security blunders. Here is an article I wrote fresh out of High school about a backup issue. It wasn't necessarily a security blunder, but it was an IT blunder for sure:
The Expiration Date That Did Us In (MCP Mag)
Then we heard this story from Erich who lives in Switzerland:
A few years ago one of my customers wanted to add redundancy to his infrastructure running on VMWare on a Netapp storage. He bought a second storage and wanted to mirror his existing storage to the new one. Unfortunately he mirrored the new empty storage to the production storage, thus erasing his whole infrastructure with one mouse click. It took them weeks to rebuild the whole system and search through old tape storage to recover at least some data.
Owww. Any other similar stories any of you readers like to share? Email us at [email protected]
And now on to the main topic of this week's newsletter which is…this and that.
Why Always On VPN?
Read how Microsoft MVP Richard Hicks explains why Always On VPN is a worthy successor for DirectAccess:
Countering cyberthreats with algorithms
Cyberattacks have left IT professionals searching for new weapons to defend their systems. Algorithms that can spot intruders before they do damage may hold the key to IT security. Isaac Kohen, founder and CEO of Teramind explains how this works:
Common problems related to using third-party IDPs with Azure and Office365
If you are planning on integrating Azure and Office 365 services into your on-premise environment but don't plan on using ADFS as your identity strategy but a third-party federation service instead, this TechNet article by Jeffrey Harness will help you understand some of the problems you may face before you actually have to deal with them:
Be sure to continue following Jeffrey's blog as he describes other issues in further posts in his series:
Understanding the Microsoft Intune Data Warehouse
Detailed and accurate reporting is an essential part of controlling your IT environment whether on-premises or in the cloud. The Intune Data Warehouse does this for Microsoft Intune, and Peter van der Woude, senior technical consultant at KPN Consulting in The Netherlands gives us the details:
Are you compliant, secure, or both?
Because of the steady stream of cyberattacks, companies have beefed up their security programs. But don't forget about your compliance program -- or you could be safe and sorry. Andrew S. Baker of BrainWave Consulting explains how they differ:
Updated SCOM Management Pack for monitoring security
Nathan Gau, Brad Watts, and Lynne Taggart have produced a new MP for System Center Configuration Manager that provides real time notifications for security events that are worth further investigation. You can read about it here:
And this page has links to the change log and where you can download the MP:
Updated RSAT for Windows 10
There is now an updated release of the Remote Server Administration Tools for Windows 10 and you can download the version you need here:
Send us your feedback
Got feedback about anything in this issue of WServerNews? Email us at [email protected]
Recommended for Learning
VIDEO: Introduction to Windows Admin Center
Windows Admin Center (formerly Project Honolulu) is the future of server management. It's a locally deployed, browser-based GUI management solution that lets IT administrators manage Windows servers, failover clusters, hyper-converged clusters and Windows 10 machines from a simplified and integrated UI experience.
Factoid of the Week - The weirdness in Tim Horton's coffee
Last week's factoid and question was this:
In the opening scene of the movie Three Days of the Condor starring Robert Redford and Faye Dunaway you can hear the distinctive sound of a line printer as it prints out stuff in a clandestine CIA office while those who work in the office are killed off one by one by an assassin dressed as a mail delivery person. When was the last time you heard the sound of a line printer or it's smaller cousin the dot matrix printer?
Raymond from Connecticut USA replied:
Just the other day at the Avis rent a car counter… Go figure.
And since I mentioned having to retrieve my jobs from the line printer operator when I was learning Fortran programming way back in my university days, my comments triggered this outburst of nostalgia from Doug a Sysadmin in Iowa USA:
Ah, the memories your newsletter brings this week. My first computer class ever was Fortran in college (WATFIV specifically). Some of my introductory computer classes still used cards and we had the same wait you described for a print out - that would eventually be left in bins labeled A-Z for your last name initial. One night everyone from my class was still at the computer center trying to get a project done. It was due at class the next day. It required that we use a section of code provided by the professor and no one could get it to work. While comparing notes we all started to come to the conclusion that the professor's code was flawed to the point where we were not even sure what would be a fix. It was getting very late. So what could we do?
The university billed out for any job runs on the computer based on time used. Every class was given an account and funny money was added to that account to allow students to run jobs. When it got low, the professor would need to add more funny money. If it ran out, nobody using that class account ID could run a job. Wanting to sleep sometime, we decided to write some very inefficient code and drained the account of money. With the account dry, nobody could run any more jobs. So we all went home to sleep. The next day the professor realized his coding error and apologized for that and for letting the account run dry. He gave us a couple more days to turn in the project.
Ah yes, WATFIV! What a great language to code in at the time, especially for someone like me who was studying physics. Thanks for sharing!
We've also received some more responses to earlier factoids included in our newsletter. For example the factoid in Issue #1178 was this:
There are still about 100,000 payphones remaining across the USA. When was the last time you saw a phone? And when did you last use one?
There must be some real nostalgia attached to those funny boxes. Craig from Australia says:
In Australia there are still payphones but, like in the US, they are very much a threatened species. Some years ago I was staying at a little country town, population about 100. The only retail business in town is the pub. Mobile signal was very poor as it had to come from the towers in the next town. I was advised that the best place to get signal, indeed the only place, was about 100 metres from the hotel on top of the hill. Wanna have a guess what landmark is there? A public phone box. I laughed out loud at the irony.
Hah! Good one, thanks! Next here is a photo and description sent to us by Jon from Manhattan:
I came across this row of old phone booths under the 79th St. Boat Basin Cafe, right next to the Hudson River bike lane in Manhattan's Upper West Side. IIRC there are five booths, at least two of which have working phones.
Hmm, I don't think I want to go into that phone booth. Next is this comment from Howard:
Sugarland, Texas outside a convenience store on old Federal Highway Alternate 90 back in the late seventies. Used to be 10 cents for local calls. My mother (84 years) tells a story of when she was a girl. She was told to use the pay phone to call home before walking from a late session at her public school in Minneapolis, Minnesota. She was not connecting or constantly got a busy signal. What she did not know is that the phone would refund your nickle if your call didn't go through. Her father drove her back to the phone later that evening to find a Dollar's worth of change left. Very lucky, indeed!
Lucky girl indeed!
Then previous to that in Issue #1177 we presented this factoid and question to readers:
Hong Kong's richest man, Li Ka-shing, recently announced his retirement as chairman of CK Hutchison Holdings. Where did the pumping gesture used with this expression originate?
Mike from the USA speculated as follows:
Two possibilities/influences to the ka-ching sound and arm action.
- Working an old-time cash register, winding the side crank to register the purchase and open the drawer. Arm action and sound when the drawer opens.
Approximately 58 seconds into this video
- The arm action from old slot machines, pulling the level and the sound of the coins hitting the tray.
Thanks for you newsletters. Long-time reader/perpetual learner.
That first one sounds pretty reasonable to me given what might have been the point-of-sale technologies common in Hong Kong when Li Ka-shing was earning his billions. Then we have the following observation from a reader named Carl:
This is where I first heard the phase ka-ching or ca-ching and the pumping gesture.
In the southern USA, Snapps was known as Rally's. I haven't seen a Snapps or a Rally's in years.
Fascinating, thanks! Now let's move on to this week's factoid:
Fact: Tim Hortons has now slipped from 4th to 50th place in a survey of top corporate brands among consumers.
Question: I rarely drink coffee from Tim Hortons as I find it tastes weird. What do you think they put in it that gives it its unique flavor? P.S. I have my own theories but I'd rather hear from you readers first.
Email your answer to us at [email protected]
Until next week,
GOT ADMIN TOOLS or other software/hardware you'd like to recommend? Email us at [email protected]
Live demos – Veeam integration with IBM, EMC, Nimble, Pure storages – supercharge your storage platform.
Windows 10 - Disable Action Center notifications using Group Policy
Jeffrey Harness explains how you can use Group Policy to manage Action Center notifications in Windows 10 v.1607 and later:
SCOM - Deleting data from the database
While Microsoft doesn't customers manually editing the SCOM database, that doesn't mean you shouldn't do it if you know how to do it right. Kevin Holman has a new blog post that explains this:
Citrix Synergy in Anaheim, California May 8 - 10:
VeeamON 2018 in Chicago May 14 - 16:
Gartner CIO & IT Executive Summit in Toronto, Canada May 15-17:
Infosecurity Europe in London, England on June 5-9
Computex in Taipei, Taiwan on June 5-9
Cloud & DevOps World in London, England on June 12-14
OfficeCamp in Gelsenkirchen, Germany on June 18-20
HPE Discover in Las Vegas, Nevada on June 18-21
Microsoft Inspire in Las Vegas, Nevada on July 15-19
Microsoft Ignite 2018 on September 24-28, 2018 in Orlando, Florida USA
Add Your Event
PLANNING A CONFERENCE OR OTHER EVENT you'd like to tell our 100,000 subscribers about? Contact [email protected]
Banking Trojan Metamorfo targets Brazilians via 'legitimate' Windows components
A nasty banking Trojan dubbed Metamorfo uses "malspam" to exploit legitimate Windows components to make convincing phishing emails.
Simplifying the deployment of a generic virtual machine in Hyper-V
Here's an easy way to create and clone a simple, generic Windows virtual machine without the hassle of creating a VM template or traditional deployment image.
Microsoft unveils new architecture for Exchange Server
A new architecture for Exchange Server and Office 365 hybrid customers means users can unlock Enterprise Mobility + Security capabilities for Outlook on iOS and Android devices
Windows Admin Center for remote management now generally available
Windows Admin Center, a browser-based GUI platform that includes a toolset to help IT admins manage Windows Server and Windows 10 devices remotely, is now generally available.
Exploring new settings in the Windows 10 April 2018 update
The new Windows 10 April 2018 update is out, and while much of the stuff in it is mere fluff, there are several nice improvements, especially to the Settings menu.
Azure Automation: Shutting Down Custom Tagged Virtual Machines
Webcast: How to leverage Azure for your Windows Server environment
Windows Server Blog
How to set DPM Azure Throttling with Powershell
A Geek's World
Using Veeam FastSCP with Azure VMs and self-signed certificates
Daniel's Tech Blog
Installing Azure File Sharing
ELVIS'S technical blog
Six VDI testing steps to take with any deployment
Whether IT is upgrading an existing VDI deployment or implementing VDI, there are a series of tests it should run, including making sure users can access their virtual desktops. Read more here.
Get to know your Windows 10 update options
Windows as a service changes the way updates work in Windows 10 from past versions of the OS. Each of the three servicing channels handles updates in its own way.
VMware Cloud on AWS pricing vs. running EC2 instances on AWS
In this cost comparison of VMware Cloud on AWS vs. AWS EC2 instances, expert Brien Posey breaks down the pricing of each option and discusses additional purchasing considerations.
Check out Samsung Knox 3.0, Knox 3.1, and the new DeX dock
Knox 3.0 brings a new architecture, unifying Knox and Android enterprise MDM APIs. Find out more here.
This Week's Links We Like. Tips, Hints And Fun Stuff
GOT FUN VIDEOS or other fun links to suggest you'd like to recommend? Email us at [email protected]
Amazing Pool Trick Shots From China
You may have seen amazing pool trick shots, but you have never seen anything like this!
How To Get Unlimited Chocolate From A Single Bar
Take one chocolate bar, cut it into pieces and shift them around until it's the same size ... but with an extra piece!
Mountain Biking Down A Ski Slope In Austria
Austrian mountain biker Fabio Widmer launches from a helicopter, zooms down a snowy mountainside, jumps over rooftops and gets chased by the 'ski police.'
1,374 Drones Light Up The Night Sky Of Xi'an, China
1,374 drones dance over the ancient city wall of Xi'an, China, creating a new Guinness World Record
Have any other readers found similar content they'd like to recommend for our Fave Links section? Email us at [email protected]
Executive brief: how to combat ransomware with recovery solutions
WServerNews - Editors
Mitch Tulloch is Senior Editor of WServerNews and is a widely recognized expert on Windows administration, deployment and virtualization. Mitch was lead author of the bestselling Windows 7www.mtit.com.Resource Kit and has been author or series editor for almost fifty books mostly published by Microsoft Press. Mitch is also a ten-time recipient of Microsoft's Most Valuable Professional (MVP) award for his outstanding contributions in support of the global IT pro community. Mitch owns and runs an information technology content development business based in Winnipeg, Canada. For more information see
Ingrid Tulloch is Associate Editor of WServerNews and was co-author of the Microsoft Encyclopedia of Networking from Microsoft Press. Ingrid is also manages research and marketing for our content development business and has co-developed university-level courses in Information Security Management for a Masters of Business Administration program.