Field Notes: The case of buried Active Directory Account Management Security Audit Policy events

Security auditing is one of the most powerful tools that you can use to maintain the integrity of your system.  As part of your overall security strategy, you should determine the level of auditing that is appropriate for your environment.  Auditing should identify attacks (successful or not) that pose a threat to your network, and…

0

Field Notes: The case of the failed SQL Server Failover Cluster Instance – Binaries Disks Added to Cluster

I paid a customer a visit a while ago and was requested to assist with a SQL Server Failover Cluster issue they were experiencing.  They had internally transferred the case from the SQL team to folks who look after the Windows Server platform as they could not pick up anything relating to SQL during initial…

0

Understanding Volume Activation Services – Part 1 (KMS and MAK)

Windows Activation and KMS have been around for many years – and still – a lot of people don’t understand the basics of Windows activation, what are the differences between KMS and MAK, and how to choose the best Volume Activation method that meets the organization’s needs. In this blog post, we’ll shed some light on these…


Field Notes: The case of accidentally misconfigured Failover Cluster CSV cache

Introduction In this post, I take you through a process of troubleshooting high pool usage using free tools available in the Windows Sysinternals suite and the Windows Performance Toolkit (WPT).  I also show you how to resolve the issue by properly configuring the Cluster Shared Volume (CSV) cache using PowerShell command-lets available in the Failover…

0