Welcome to the Jocha blog!
Lately we’ve been getting a lot of inquiries regarding Azure Backup. One customer tried to set up the Microsoft Azure Recovery Services (MARS) agent, they experienced a problem where the backup job fails immediately…
My customer has bought a Hewlett-Packard server with a Windows Server 2012 ROK (Reseller Option Kit) license.
However this customer had some issues with the installation of the license on the Hyper-V guest server. Since the Windows server does not recognize the ‘hardware’ as a Proliant server, licensing will not succeed.
However there is a simple solution…
I received an inquiry from one of my mid-size (100-200 users) customers today. They’ve been planning on implementing a new online service which requires the latest Java version.
The clients have a large quantity of outdated versions of Java, which needed to be uninstalled before we deployed the newest version.
They are currently running Windows 7 and Windows 8, so somewhat modern operative systems.
We’ve all been there, wireless passwords tend get lost.
There are several tools to retrieve the missing information, but I strongly believe that the less stuff you download from the web, the safer you are. So why not use the built in functions instead?
A customer of mine recently started deploying Windows 8 in their environment. MDT was set up and the deployment was working fine, but after deployment the Windows 8 machines wouldn’t connect to the WSUS server.
When trying to connect to the WSUS-server through the Control Panel I got an error message.
There are numerous of ways to measure update compliance in an enterprise. Some prefer to just compare the compliance of a Software Update Group against a collection. The issue I’ve found with this is that when you release updates the compliance falls down to 0%…
This article focuses on the scenario where the laptop/desktop has been lost or stolen, and how to make sure that the local data/credentials are secured/encrypted.
I created a powershell-script which will reset the password of all users in a specific Organizational Unit.
I prefer to set unique high-end passwords for all users. If you prefer a more ‘user friendly’ approach simply…
A downside with the ADMX files is that when you update them, and the new files replace settings and values you end up with orphaned settings in your GPOs. In our example we had two orphaned registry values from a previous OneDrive ADMX.
We’ve been upgrading a customers environment… for one of their workstation configurations they didn’t want the computers to lock on idle, which is enforced by default.
Back in 2012 I wrote an article about dynamically setting a computer name during a Task Sequence. Here is my updated and improved script. I’m currently setting up a deployment solution running SCCM with MDT 2013…
There are a few different approaches when it comes to cleaning up the Windows 10 deployment. I prefer to uninstall the built-in applications which my enterprise and customers have no need for.
Jocha previously released a very popular mail report-script for Windows Backup. A downside with the new Azure backup-agent is that it did not offer mail reports… until today!