Windows Server

Disabling SMB1.0/CIFS File Sharing Support

There is a lot of buzz these days about new ransomware hijacking systems worldwide. The malware, dubbed NotPetya because it masquerades as the Petya ransomware. One of the many ways to help the spread of malware is to patch your computer, effectively stopping the SMB exploits by disabling SMBv1.

Here are steps which can be used to disable (remove) SMBv1 support.

For client operating systems:

  1. Open Control Panel, click Programs, and then click Turn Windows features on or off.
  2. In the Windows Features window, clear the SMB1.0/CIFS File Sharing Support checkbox, and then click OK to close the window.
  3. Restart

For server operating systems:

  1. Open Server Manager and then click the Manage menu and select Remove Roles and Features.
  2. In the Features window, clear the SMB1.0/CIFS File Sharing Support check box, and then click OK to close the window.
  3. Restart

Ref: https://support.microsoft.com/en-us/help/2696547/how-to-enable-and-disable-smbv1-smbv2-and-smbv3-in-windows-and-windows

In Place Upgrade Of Windows Server 2008 R2 Standard

If you have a need to upgrade a server running Windows Server 2008 R2 Standard to either the Enterprise, or Datacenter edition, it’s possible to do so online, without re-installing Windows. This not only a simple process, it saves you time.

Open an elevated command prompt and type DISM /Online /Get-CurrentEdition. This returns the current Windows version.

Type DISM /Online /Get-TargetEditions to list the Windows editions to which this server can be upgraded to.

Type DISM /Online /Set-Edition:ServerDataCenter /ProductKey:xxxxxx will upgrade the operating system. All that’s required to complete the upgrade is a reboot.

Done!

Ref Info:

DISM Windows Edition-Servicing Command-Line Options – https://technet.microsoft.com/en-us/library/hh825157.aspx

KMS Client Setup Keys – Link

Disable Windows Firewall Server Core

Server Core now installed and what is the first command I choose to run in PowerShell

Its a command to disable all firewall profiles:

 

Hyper-V: Compact Hyper-V Virtual Hard Disk

I am attempting to do some quick cleanup on a Hyper-V host used for testing.

To do this I compacted the Hyper-V Virtual Disks.

  1. Open the Hyper-V Management console
  2. Right click on VM Guest
  3. Select Settings
  4. Select the Hard Drive for the VM Guest
  5. Click the Edit button
  6. Select Compact
  7. Click Finish

*note* you want to do this on dynamically expanding disk types

Server 2012 R2 Data Deduplication on Windows 8.1

Talking a late walk around features of Windows Server 2012 R2. One of the features that interested me was the deduplicaiton feature. Naturally I want to run this on my Windows desktop. So my journey began.

Warning these steps and method are no way supported by Microsoft; use at your own risk.

To pull this off you need to acquire files from a Windows Server 2012 R2 installation.

Here is a list of the cab files:

Microsoft-Windows-Dedup-Package~31bf3856ad364e35~amd64~en-US~6.3.9600.16384.cab
Microsoft-Windows-Dedup-Package~31bf3856ad364e35~amd64~~6.3.9600.16384.cab
Microsoft-Windows-FileServer-Package~31bf3856ad364e35~amd64~en-US~6.3.9600.16384.cab
Microsoft-Windows-FileServer-Package~31bf3856ad364e35~amd64~~6.3.9600.16384.cab
Microsoft-Windows-VdsInterop-Package~31bf3856ad364e35~amd64~en-US~6.3.9600.16384.cab
Microsoft-Windows-VdsInterop-Package~31bf3856ad364e35~amd64~~6.3.9600.16384.cab

Here is a link I am sharing out from MEGA that has them all archived.

Microsoft-Windows-Dedup-Package.zip (4.2 MB)

Steps to follow:

Place all files into a folder

Next open a command prompt running as administrator

Execute the following dism command:

You can also run them one at time

Once all have completed successfully you need to issue the following command to enable the feature

This can also be done via the “Turn Windows features on or off” under Program and Features

At this point the feature is installed and enable and you only need to specify what volumes you would like to deduplicate.

 

Supporting Sources and Thanks: Wei King , Bernard Khoo