Author: Derek Seaman

SQL 2008 R2: Temp Database Configuration (Part 6)

One of the last things I do during a SQL installation is configure the temp databases. Temp databases are very important to some applications, as they are used as a scratch or buffer space. Other applications may not use them hardly at all, so it really depends on your environment.One...

SQL 2008 R2: Windows Firewall (Part 5)

One of the best things Microsoft did with Windows Server 2008 and later is the built-in firewall. Unlike previous OS releases where the firewall was pretty much a joke, Microsoft started from scratch and came up with a very robust two-way firewall. SQL is one of the prime targets for...

PXE Booting a Wyse zero client, Part 2

Yes, time for part 2 of the Wyse PXE booting series. Part 1 described the general concept and why you might want to PXE boot your Wyse zero client instead of having embedded flash for the ThinOS. The remainder of this post will cover the technical details on how to...

SQL 2008 R2: Lockdown Script (Part 4)

This is the final part of my SQL 2008 R2 Secure and Automate your Installations series. The first two scripts, covered here, and here perform an unattended installation of SQL 2008 R2 and then modify some key SQL parameters. The final script to make all of this work is below....

SQL 2008 R2: Unattended Install Script (Part 2)

Note: For my updated version for SQL Server 2012, see my new article here.Many of you probably do frequent SQL 2008 R2 installation. Be it in a development environment, or deployment in production environments. For years Microsoft has given people the ability to perform unattended installations of SQL. Starting with...

WMI GPO Filters for Operating System Types

As a standard practice in the environment I support we use WMI filtering on GPOs to ensure a GPO only gets applied to the right operating system type. This can prevent accidents such as applying a client GPO to a server, or a GPO for Server 2003 to a Server...

VDI Smackdown..who wins?

If your organization is looking at deploying VDI (Virtual Desktop Infrastructure), I highly recommend you check out the VDI Smackdown report by PQR. It has a very lengthy and highly detailed feature comparison matrix of leading VDI solutions such as Citrix XenDesktop 4.0 SP1, Microsoft Server 2008 R2 Remote Desktop...

RMS Automatic Template Downloading on Windows 7

Recently the project I'm supporting is looking at RMS to provide information rights management (IRM) on some documents. Windows RMS provides two means to let users protect content. First, there is the ad hoc method that lets a user specify what protections they want to put on their content, and...

PowerShell command to change Windows Cipher Suite Order

While journying down the whole cipher suite road this weekend, I put together a little one liner that reconfigures the cipher suite order that Windows will try and use. As I mentioned in a previous blog, you can configure this via GPO. But, maybe you want to build in the...

Easily configure your Windows Cipher Suites!

After many hours of digging around the Windows registry and experimenting with various keys to enable TLS 1.2 on Windows Server 2008 R2 and Windows 7 (see my blog post here), I found this free tool that gives you one click access to configuring your Windows Cipher Suites. The Harden...

Page 38 of 46 1 37 38 39 46