SCCM Component Server role lingering object removal – Fix

Imagine you have one of your SCCM distribution server is crashed or it has been decommissioned. You will require to remove them from the Central console to get rid of the stale records. We will see how to do such cleanup on the SCCM. If you have removed all the other roles of the SCCM […]

12 Features that makes Vembu BDR 360 the favorite of Managed Service Providers

What is Vembu BDR360? It is a centralized management and reporting platform for the datacenter.  It offers end-to-end visibility to all the backup jobs configured using the Vembu BDR Suite. Also The centralized monitoring offered by BDR360 helps you keep track of all configured backup jobs and also it helps service providers enhance their productivity […]

How Vembu can help to cut cost on your virtual infrastructure backup

Vembu has recently released their new product named Vembu BDR Essentials. It is released after considering the financial constraints of the small business companies. The BDR essentials will address the an SMB’s virtual infrastructure backup strategy by cutting the capex cost by 50% when compared with the cost of the Vembu BDR Suite. The BDR […]

Troubleshooting a Sharepoint 2013 Search service database backup error

We would be specifically looking at couple of event logs and the troubleshooting will be based on that. So the error event IDs are these ID 6482 and ID 6398. The context is the sharepoint 2013 backup configured with CommVault is partially failing. The failed databases are related to a search service application. You can perform a […]

How to get free 3 months Pluralsight subscription

**** THIS IS NOT AVAILABLE AT THE MOMENT. WE WILL UDPATE THE POST ONCE PLURALSIGHT START OFFERING THE SAME AGAIN IN FUTURE.   There are different ways you can get the Pluralsight free subscription. One is by getting any of the below accreditation. If you have any of the below titles then visit this page. […]

How to configure Mimecast Impersonation Protection Bypass policy

Here is the step by step process to configure the Mimecast Impersonation Protection Bypass policy. If you are not sure what is Impersonation Protection is here is the definition (Courtesy Mimecast.com) The increasing number of “whaling” attacks, usually targeting an organization’s senior management, means additional protection is required against email threats that do not contain attachments or URLs. […]

Troubleshooting a failed Hyper-V Replica Virtual Machine

You may come across a situation were your Hyper V Replication state may say Resyncronization required. and the replication health may also say that “Resyncronization is required for the virtual machine “ServerName” resume replication to start syncronization. There are different ways we can fix this sync issue but that depends on various reasons to go […]

How to upgrade the AD Connect

You might have come across an issue of AD Connect services taking up the CPU resources to 100%. Well there is a fix from Microsoft and it can be resolved by upgrading your AD Connect version to 1.1.880.0 I have observed this issue on AD Connect version 1.1.819.0 So here we are discussing the step by step […]

How to create a new ECS instance in a VPC on Alibaba Cloud

Before we create a VPC let’s see what is a VPC in Alibaba Cloud and it benefits. Virtual Private Cloud is a private isolated network within the Alibaba cloud. You get a full control over the IP Addressing and provisioning the subnets for your private cloud instances. It also gives the flexibility of connecting the […]

How to get Skype for Business license usage details

Today we will look at various Skype for business PowerShell commands to gather various details related to licensing. Just like Microsoft exchange, Skype for business clients required to have Microsoft CALs in order to provision the users. There are three types of CALs available : Standard CAL – Instant Messaging and Presence Features Enterprise CAL – Audio, Video […]