Articles In Infrastructure

By Ken Phelan, Posted in Infrastructure

Lately, we’ve seen a lot of activity at Gotham clients regarding increasing the functionality their SSL VPN. Gotham has installed a lot of this technology and I was thinking about the early days of SSL VPN. When SSL VPNs first came out, Gotham was one of the first movers in evangelizing what we thought was a great way to simplify access for individual users. During the education process we would eventually find ourselves in the office of whoever was running the traditional IPSEC VPN that was currently in... read more.

  • October 17, 2012

By Entrcb, Posted in Infrastructure

I recently had the opportunity to deploy Provisioning Services 6.1 to upgrade an existing client from 5.6. As there was no possibility of downtime, we decided to go with a parallel update; taking a copy of the existing vDisk and reverse-imaging it as per the Citrix documentation, and then installing the Target Device software and using XenConvert to create a new vDisk. Everything went perfectly until it actually came time to boot the target device from the vDisk. The dreaded BSOD! The 7B BSOD; which mean... read more.

  • October 04, 2012

By Ed Bratter, Posted in Infrastructure

Many Exchange 2010 administrators are familiar with working with database availability groups (DAG) and the multiple copies of mailbox stores they provide. One area of confusion around DAGs, however, is properly configuring DAG networks. This article reviews how to configure a multi-site DAG that consists of multiple networks. The example I will be using consists of Exchange Servers hosted in two physical locations. Each server has three network cards and resides on three different VLANs. For simplicity,... read more.

  • September 26, 2012

By Joe Jessen, Posted in Infrastructure

Announced yesterday, Microsoft's Surface tablet is positioned to compete directly against Apple’s iPad in both the consumer and corporate environment. Leveraging the new Metro UI, Microsoft’s new tablet provides a familiar usability to existing mobile device users and adds one piece that Apple has not been able provide: seamless integration with corporate device management infrastructure. Mobile device management (MDM) solutions control and deploy applications and apply security policies similar to those... read more.

  • June 19, 2012

By Ed Bratter, Posted in Infrastructure

If you are using the Active Directory Migration Tool (ADMT) to migrate the SID History of objects between forests, you may receive the following error if you have not configured everything according to the ADMT documentation: Could not verify auditing and TcpipClientSupport on Domains. Will not be able to migrate the SIDs. Access is denied. Microsoft has published a KB article to remedy the issue: ADMT: "Could Not Verify Auditing and TcpipClientSupport on Domains" Error Message When You Try to Migrate... read more.

  • June 05, 2012

By Ed Bratter, Posted in Infrastructure

For those of you preparing to do an inter-org Exchange migration between Exchange 2010 organizations, the MRSProxy service is a required component that facilitates cross-forest mailbox moves. (Note this process is only relevant when one forest is running Exchange 2010 and the other forest has at least a single Exchange 2010 CAS Server). This service is installed by default, but is disabled. As such, it must be enabled when doing this type of migration. Microsoft published a definitive KB article on how t... read more.

  • June 04, 2012

By Gotham, Posted in Infrastructure

IaaS is a provisioning model that allows organizations to outsource some of the physical components of a computing environment, such as servers and storage. In this model, an organization does not own the physical components, but still maintains control of the software and data that reside in the environment. ... read more.

  • April 23, 2012

By Gotham, Posted in Infrastructure

IaaS is a provisioning model that allows organizations to outsource some of the physical components of a computing environment, such as servers and storage. In this model, an organization does not own the physical components, but still maintains control of the software and data that reside in the environment. ... read more.

  • April 23, 2012