Paul Rausch, CISSP-ISSMP, CISA, PMP, ITIL]]>
Before we get started you need to install Server 2012.
Make sure you have:
Installed all available updates
Set the clock
Set the time zone
Set a static IP (if applicable)
Tied the machine to the domain (if applicable)
Clear any pending reboots
Run this command from an elevated Powershell Window in order to satisfy the prerequisites.
Install-WindowsFeature AS-HTTP-Activation, Desktop-Experience, NET-Framework-45-Features, RPC-over-HTTP-proxy, RSAT-Clustering, RSAT-Clustering-CmdInterface, RSAT-Clustering-Mgmt, RSAT-Clustering-PowerShell, Web-Mgmt-Console, WAS-Process-Model, Web-Asp-Net45, Web-Basic-Auth, Web-Client-Auth, Web-Digest-Auth, Web-Dir-Browsing, Web-Dyn-Compression, Web-Http-Errors, Web-Http-Logging, Web-Http-Redirect, Web-Http-Tracing, Web-ISAPI-Ext, Web-ISAPI-Filter, Web-Lgcy-Mgmt-Console, Web-Metabase, Web-Mgmt-Console, Web-Mgmt-Service, Web-Net-Ext45, Web-Request-Monitor, Web-Server, Web-Stat-Compression, Web-Static-Content, Web-Windows-Auth, Web-WMI, Windows-Identity-Foundation
After this completes you’ll need to restart. Be a pro and do it right from powershell.
The next prerequisite we’ll need to install is the “Unified Communications Managed API (UCMA) 4.0”, download it here.
and run another
You should also make sure that your other Exchange Servers that you may be migrating from have the appropriate Service Packs installed. For example Exchange 2007 servers must be at SP3 or newer or 2013 cannot be installed.
Most people will be getting their media from a volume license entitlement. We also sell these if you don’t already have a reseller. Once you’ve purchased your entitlement you should get a license number. You’ll then need to create an account at the Volume Licensing Service Center. Once you’ve created an account, you may also then add the entitlement.
Once you have the entitlement registered you can then download the software and acquire your licensing key.
You can either use the automated downloader (recommended) or traditional http download (pictured)
Once you have the ISO, we’re going to need to mount it in on the server, which fortunately is super easy in Server 2012. Just double click the ISO and Windows will automatically mount the ISO as a drive letter. Once you have the ISO mounted, go ahead and open the drive and run setup.exe
The installer will ask if you want to check for updates, press yes and move forward. Generally speaking you’re going to want to go with all of the default options in the installer. Other then when you’re asked about which roles you’d like to install. If this is going to be single server installation with no separate edge server. You’re going to want to select both the Mailbox Role and the Client Access role. You can always install a separate edge server later if you need one.
At the end of this process you’ll get to the check prerequisites step.
If everything is done right it should run and spit out something that looks like this. If you have any outstanding issues here, you’ll need to resolve them before moving to the next step.
After you’ve resolved your prereqs go ahead and install Exchange 2013, after it’s finished you’ll get this message and you’ll need to reboot.
Once the server reboots we’ll need to login to the local Exchange Control Panel (ECP). The Exchange Console has been replaced in 2013 with the ECP and is no longer available. Open a browser (preferably IE) and go to
If you have Exchange 2007/2010 on the network you’ll need to use this URL to force the Exchange 2013 console.
If everything worked right, you should see this:
Head over to /etc/mongod.conf
and comment out bind_ip
and restart mongod!
service mongod restart
The install took incredibly long, and afterwards seemed to hang on Finalizing your settings. I gave up after a while and downloaded a fresh RTM ISO of Windows 2012 and installed that. Although I ‘feel’ like it installed a bit faster, it still definitely hung on the Finalizing your settings step longer than usual. I can only theorise why however, perhaps some sort of interaction with proprietary hardware with virtualisation capability?
Regardless, the answer is just wait a long time. Once it installs the VM seem to operate responsively and quickly, just appears to be an installation quirk.]]>
Firstly, you need to open the Windows Firewall with Advanced Security Snapin. If you don’t know where that is, chances are you shouldn’t be working on SQL Server. It’s under Administrative Tools.
Next, we’re going to want to create a new rule Inbound Rule. Go to Inbound Rules and press New Rule on the top right.
Select Program from the List, and press next.
Next up, enter the following path into your “this program path” section.
%ProgramFiles%\Microsoft SQL Server\MSSQL11.SQLEXPRESS\MSSQL\Binn\sqlservr.exe
This may be slightly different depending on your SQLExpress version or Instance name, just check the Microsoft SQL Server directory for your instance name.
Finally press allow connection, and on the next window apply the profiles you want to have access to the SQL server. If you don’t know the answer, just apply it to all profiles. Finally, name it something memorable, like ‘MSSQL Server”.
This will allow users access to any port that sqlservr.exe wants access too. However, it may not necessarily allow SQL Browser to function. If you would also like SQL Browser to be exposed to the internet, you can either allow just that port, or you can find it at this path:
C:\Program Files (x86)\Microsoft SQL Server\90\Shared\sqlbrowser.exe
The short answer to this question is, leave Godaddy (link to official forums, over a year old). I’m not saying this out of spite or any distaste for Godaddy, but it is an ongoing issue that has only affected them. Furthermore, they are the only ones that can resolve it.
To explain what’s going on here, first we need to explain how mail providers combat spam. Typical spam filters use a point system to determine how reputable an email is. These points affect whether or not a mail is viewed as reputable enough to be delivered or not. Mail that meets this threshold for trust is typically delivered, and mail that does not is typically either marked as spam or treated with additional scrutiny.
Examples of Things that Build Trust
Examples of suspicious traits
Now, typically the goal of e-mail administrators is to build as much trust as possible in the eyes of the receiving mail server. Typically e-mail admins will go to great lengths to maintain deliverability.
This all started a few years ago, when Godaddy actively decided that they could not fully control the amount of fraudulent spam e-mail coming from their servers. As a result, Godaddy was blacklisted as a mail provider on the major mail blacklists. Although they are no longer being fully blacklisted, all mail from Godaddy is immediately treated with suspicion. That means that unless your mail is otherwise perfectly trustworthy, just being from Godaddy is enough to have your mail marked as spam.
This doesn’t necessarily mean that you’re e-mail will be marked as spam every time, but it does mean that a certain number of messages will depending on how the receiving providers spam filter is configured.
Leave Godaddy for mail. Godaddy is definitely not bad for a lot of services. We use them for SSL Certificates, Domain Registration and DNS. That said, we actively move as many clients away from Godaddy email hosting as quickly as possible. These issues can strike at any time, and can cripple a business.
My recommendation is definitely either Google Apps or Hosted Exchange. We’re a Fort Myers IT Consulting Company certified to provide both of these services if you need a consultant.]]>
We’ve been observing this problem at one of our Fort Myer’s Business IT clients. They have a multitenant office complex that has a shared internet connection. We started receiving calls from tenants stating that their internet connections were running unusually slow. After a short period we identified that the problem was unique to E1200 Series Routers. After playing around in the connection settings for a while, we managed to identify that the E1200s have a form of QoS that is severely limiting download speeds. This is apparently designed to help prioritise Skype and other media traffic over bulk downloads.
T0 repair this problem you need to:
Login to the router at 192.168.1.1
Go to Applications and Gaming
Go to QoS
After some research it does appear to be innocuous . Although I imagine that certain automated scripts might also login via XMPP as part of their testing of passwords, it appears as it is not unusual for a previously configured chat application to trigger this type of message.
This article from Facebook.com, explains it better: https://www.facebook.com/help/community/question/?id=10151104320371724]]>
Does your Fort Myers Business need to comply with PCI-DSS (Payment Card Industry Data Security Standard)? Online Scanning Tools, do not provide any real protection from data fraud risks. When working to maintaining PCI-DSS compliance, the only true way to safeguard your customers is with a properly trained and certified Information Security Consultant.
Performing an annual risk assessment is a requirement if you wish to continue processing credit card transactions. Although some companies will encourage you to guess through these audits, there is substantial risk and liability if you do not properly perform them. Don’t take a very expensive chance, hire the professionals.
Greenwire Technology Solutions is Fort Myers only fully trained and certified IT Risk Assessor. Take your clients’ privacy seriously, and hire the Privacy Professionals at Greenwire.