Posts

Solution for gpupdate /force won't apply the new filter group GPO, but computer restart will

  Solution for gpupdate /force won't apply the new filter group GPO, but computer restart will We’ve observed that machines recently added to a new group may not receive the updated Group Policy settings when running gpupdate /force. However, the policies apply successfully after a system restart. This behavior is typically due to group membership token caching. When a machine is added to a new group, the updated group membership isn’t immediately reflected in the current session. A restart forces a refresh of the security token, allowing the correct policies to apply. In this specific case, the affected machine was added to a group two days ago, and the GPO was applied to that group via Security Filtering. To ensure the updated group membership is recognized, the Kerberos ticket on the client machine needs to be purged. This can be achieved by running the following command: klist purge -li 3e7 Alternatively, a system reboot will also refresh the token and apply the correct policie...

Offline install NuGet package provider and then install .nupkg package

Below command won't install NuGet Package provider if we don't have direct internet from the servers:  Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force Solution: Download below dll from : https://cdn.oneget.org/providers/nuget-2.8.5.208.package.swidtag https://onegetcdn.azureedge.net/providers/Microsoft.PackageManagement.NuGetProvider-2.8.5.208.dll Copy & paste to C:\Program Files\PackageManagement\ProviderAssemblies

GPO for "Use my sign-in info to automatically finish setting up my device after an update or restart"

  GPO for "Use my sign-in info to automatically finish setting up my device after an update or restart" gpedit.msc Computer Configuration  >  Administrative Templates  >  Windows Components >  Windows Logon Options "Sign-in and lock last interactive user automatically after a restart" To enable automatic sign-in, select the  Enabled   option. To disable it, choose   Disabled . Reg:  "DisableAutomaticRestartSignOn" (a.k.a. "ARSO") under the [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System] registry key.

WireShark filters

WireShark filters Below are few WireShark filters ip.addr == <IP address>      : To filter by IP address tcp.port == <Port no>           : To filter by port number dns or http                                     : Displays dns and http traffic frame matches "<string>"      : Strings search tcp.analysis.flags                          : Shows the problems like packet loss, windows problem !(arp or dns or icmp)                    : removes arp, dns and icmp from the traces Follow TCP stream                    : Any packets that are related to the tcp conversation tcp.stream eq 32           ...

Uninstall Internet Explorer in Windows server 2012 using DISM command

Image
 Summary: In Windows 2012 server, Internet Explorer won't be listed in ADD/Remove programs. Also Tun Windows feature on or off won't work. Internet explorer can be uninstalled by below steps: Solution steps: Execute below command and verify Internet Explorer feature is enabled dism /online /get-features Look for below output from above command: Feature Name : Internet-Explorer-Optional-amd64 State : Enabled Execute below command to uninstall Internet explorer dism /online /Disable-Feature /FeatureName:Internet-Explorer-Optional-amd64 C:\>dism /online /Disable-Feature /FeatureName:Internet-Explorer-Optional-amd64 Deployment Image Servicing and Management tool Version: 6.2.9200.22807 Image Version: 6.2.9200.22807 Disabling feature(s) [==========================100.0%==========================] The operation completed successfully. Restart Windows to complete this operation. Do you want to restart the computer now? (Y/N) n Server needs to be restarted for change to take effect...

Capture Network Packet trace in Windows 2016

#Initial command : netsh trace start persistent=yes capture=yes IPv4.Address=X.X.X.X tracefile=c:\temp\nettrace-boot.etl  #Stop command: netsh trace stop Open the ETL file in Microsoft Message Analyzer Ref : https://techcommunity.microsoft.com/t5/iis-support-blog/capture-a-network-trace-without-installing-anything-amp-capture/ba-p/376503

Get startup folder of current user and all users - Windows 2012, 2016,2019

Run -> shell:startup - for current user Run -> shell:common startup - for all users