Building a bootable USB for HP's Service Pack for Proliant ISO is accomplished by using HP's USB Key Utility version 2.0 or beyond.
To download the Service Pack for Proliant, use this link for the 2015.06.0 edition or use search. Currently There's an "Obtain Software" link which requires a valid support login. Directions for building a bootable usb over 4 GB using HP's USB Key Utility for Windows are including in the HP Service Pack for Proliant Quick Start Guide, which oddly isn't listed on the download page and had to search for it separately.
The HP USB Key Utility is available for download, may need to search and then check Revision History to locate version 2.0 or beyond. From what I understand earlier versions do not support x64 bit and/or 4 GB+.
I am currently a DBA working on MS SQL Servers. I have also been a BI and SharePoint Admin and I have managed VMware, Nimble Storage, and Veeam. This blog shares quirky things which should be simple, but are not.
Showing posts with label Server Admin. Show all posts
Showing posts with label Server Admin. Show all posts
September 29, 2015
January 25, 2013
TPM and BitLocker passwords in Active Directory
The process of configuring and save Windows 7 (and 8?) TPM and BitLocker passwords to Active Directory (2008 R2) is multi-stepped. First Active Directory and Group Policy need to be configured, then the clients needs to be setup, and you need to know how recover the passwords from Active Directory. Generally I use this TechNet article as a guide with a few important notes added here.
Active Directory & Group Policy Setup
I used the "Sample test scenario with Windows 7" from the same TechNet article as a reference instead of a step-by-step guide. It is handy for verifying permissions are configured correctly, but I had trouble with some of the scripts so it was messy. Plus, it's not a day-by-day guide for setting up several computers.
TPM
See: this article on suspending BitLocker protection before applying certain kinds of updates. The process involves suspending protection and then resuming protection once updates are complete.
Recovery
TPM (reference: technet blog)
<ownerAuth>.....</ownerAuth>
BitLocker
Active Directory & Group Policy Setup
- The Add-TPMSelfWriteACE.vbs script needs to be modified to reflect the correct GUIDs listed in the "TPM and FVE scheme object GUID's" mid-way through the script. You can locate the GUIDs by using ADSIEdit and change the Action --> Settings --> Select a well known Naming Context: Schema. From here you can look at the properties for the particular items to find the objectGUID.
- After executing the Add-TPMSelfWriteACE.vbs the permission for the computers to write to the Active Directory attribute needs to be completed. This needs to be done before enabling TPM on any client or the passwords won't save. Follow the information on this TechNet blog. Failure to do this will result in an "Access is Denied. Error 0x80070005" when initializing TPM.
- Follow the original TechNet article for setting Group Policy.
I used the "Sample test scenario with Windows 7" from the same TechNet article as a reference instead of a step-by-step guide. It is handy for verifying permissions are configured correctly, but I had trouble with some of the scripts so it was messy. Plus, it's not a day-by-day guide for setting up several computers.
TPM
- Add the Computer to AD and make sure Group Policy is applied (gpupdate.exe & gpresult.exe /SCOPE Computer /R). Current user needs admin rights for the entire process.
- tpm.msc (or Control Panel > BitLocker Drive Encryption > TPM Administration)
- Click either 'Initialize TPM' or 'Change Owner Password. Note: To change the password, you need the old one.
- If 'Initialize', shutdown when prompted, then upon booting acknowledge/allow the BIOS notice regarding TPM. If 'Change', provide the current password file (if in AD, see Recovery below).
- Log in with the same account to continue the TPM process. You can verify the TPM Owner Password is saved to AD by using the Recovery section below.
- This command will being the process for the C drive, repeat for others. Run using an Elevated Prompt (run as Administrator): manage-bde -on C: -RecoveryPassword
- Reboot, then run the following to see the encryption process status: manage-bde -status
- Control Panel > System and Security > BitLocker Drive Encyrption
- Click 'Turn on BitLocker' for the desired drives and follow any prompts.
See: this article on suspending BitLocker protection before applying certain kinds of updates. The process involves suspending protection and then resuming protection once updates are complete.
Recovery
TPM (reference: technet blog)
- Active Directory Users and Computers > enable 'Advnaced Features' in View.
- Open Properties on the desired computer, then the 'Attribute Editor' tab.
- Locate the attribute 'msTPM-OwnerInformation' and note the value.
- Enter the following into a text editor (such as notepad), but replace the "....." with the value found in AD. Save the file with a .tpm extension at a location accessible by the computer.
<ownerAuth>.....</ownerAuth>
BitLocker
- Open Active Directory Users and Computers
- Open Properties on the desired computer, then the BitLocker tab.
- The BitLocker Recovery Password is in the details section.
April 09, 2012
Looback errors on SharePoint server
While testing a migration from one SharePoint server to another I was noticing several various errors that may all be attributed to the same problem. The underlying configuration is the default zone URL is a dns alias. Errors:
- Nintex Workflow returns "Error returned from server: The remote server returned an error: (401) Unauthorized." The workflow is starting another workflow which saves attachments on a list item to a document library.
- In the IIS log there are several 401 errors at the time of the workflow but no username.
- The SharePoint Server Search has error ID 14 in the event log which is the SharePoint URL cannot be crawled. The same errors can be found in the Crawl History for the Search Service Application (Central Admin --> Application Management --> Manage Service Applications).
- Search no longer errors trying to access the local SharePoint sites (there are errors trying to access specific files).
- Workflow does not error when trying to call the second workflow.
Subscribe to:
Posts (Atom)