Tuesday, November 24, 2020

Exchange TLS Issues

 Test TLS on Exchange-

 - Download SMTP Console from Socket Labs.
https://www.socketlabs.com/smtp-server-connection-diagnostics-tool/

 - Connect to exchange, do "EHLO domain.com", then click startls from the menu.

Monday, August 24, 2020

Cisco Anyconnect keeps disconnecting and reconnecting to ASA.

 Cisco Anyconnect keeps disconnecting and reconnecting to ASA.


Cisco defaults to DTLS which uses UDP port 443.  If it fails, it connects over TLS over TCP 443.  To resolve this, make sure UDP port 443 is open outbound to the firewall.

Thursday, June 18, 2020

Office Registry Fixes for Various O365 Issues

Outlook ignores autodiscover because your domain is part of an O365 instance, even though you use on-prem exchange-

Open RegEdit
Navigate to HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\AutoDiscover
New DWORD entry, ExcludeExplicitO365Endpoint -  value of 1.
------------------------------------------------------
You are using SAML and you get a white or invisible ghost window instead of a login screen-

[HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity]
"DisableADALatopWAMOverride"=dword:00000001

If the above key change alone does not work, edit this additional Registry key:
[HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity]
"DisableAADWAM"=dword:00000001

---------------------------------------------------------------
Prevent Outlook from ignoring autodiscover and connectiving to office 365
[HKEY_CURRENT_USER\Software\Microsoft\Office\x.0\Outlook\AutoDiscover]
"ExcludeExplicitO365Endpoint"=dword:00000001

---------------------------------------------------------------
You get a white window or one that disappears quickly-
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity]
"DisableADALatopWAMOverride"=dword:00000001

[HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity] 
"DisableAADWAM"=dword:00000001

 
REMOVE EnableADAL under-
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity .

ADD-
HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity]
"DisableADALatopWAMOverride"=dword:00000001

[HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity] 
"DisableAADWAM"=dword:00000001
---------------------------------------------------------------
 

Monday, April 6, 2020

Monday, February 3, 2020

Domain Controller (DC) booting into safe mode/DSRM after backup with Veeam

bcdedit /v

To disable directory services restore mode, type the following in a command prompt:

bcdedit /deletevalue safeboot

Tuesday, January 28, 2020

Bond two NICs on RHEL (LACP, 802.3ad)

/etc/sysconfig/network-scripts

nmcli con
nmcli con add type bond ifname bond1
nmcli con mod id bond-bond1 ifname bond1 mode 802.3ad ip4 172.23.71.19/29
nmcli con mod id bond-bond1 bond.options mode=802.3ad,miimon=100,lacp_rate=fast,xmit_hash_policy=layer2+3
nmcli con mod id bond-bond1 802-3-ethernet.mtu 1500
nmcli con del fdf7fbfc-c533-42e5-8e2b-f2e123dab80e
nmcli con del f08f3cfc-3830-4bd0-9735-b9507e2d1af1
nmcli con add type bond-slave ifname p1p1 con-name p1p1 master bond1
nmcli con add type bond-slave ifname p6p2 con-name p6p2 master bond1

nmtui

Saturday, January 11, 2020

Outlook 2019 won't autodiscover and keeps prompting for password with on-prem Exchange.


If you have your domain associated with an Office 365 account, Outlook will completely ignore autodiscover and try to authenticate to Office 365.

Open RegEdit
Navigate to HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\AutoDiscover 
New DWORD entry, ExcludeExplicitO365Endpoint -  value of 1.
------------------------------------------------------------
You are using a SAML provider and get a white blank screen or a ghost login screen-

[HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity]
"DisableADALatopWAMOverride"=dword:00000001

If the above key change alone does not work, edit this additional Registry key:
[HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\Identity] 
"DisableAADWAM"=dword:00000001
------------------------------------------------------------

Thursday, January 2, 2020

Unlock VMware ESXi root account

Procedure to unlock the ESXi host account at the console

  1. Login to the DCUI (to enable the ESXi Shell if not already done)
  2. Login with root and the correct password
  3. Go to Troubleshooting Options
  4. Select Enable ESXi Shell
  5. Press CTRL+ALT+F1
  6. At the ESXi shell login with root and the password
  7. Run the following commands to show number of failed attempts:
    pam_tally2 --user root
  8. Run the following command to unlock the root account:
    pam_tally2 --user root --reset