Free Script: Find Orphaned Hyper-V VM Files

by Eric Siron

If you’ve had very much virtual machine churn in your environment, it’s almost inevitable that you’ve wound up with a few disconnected virtual machine files here and there. This free script will help you to locate orphaned Hyper-V VM files. For fellow infrastructure scripters, there is a special bonus script included as well.

The worst thing about my testing environment is that I often wind up with files that look legitimate, but are no longer part of any virtual machine. Even in live environments, some virtual machine moves and operations leave a trail of unwanted files. Errors and failures can produce more.

Original post link: Free Script: Find Orphaned Hyper-V VM Files

MailStore – Top Marks in Customer Satisfaction Survey

MailStore Achieves Top Marks in Customer Satisfaction Survey

An international survey conducted among MailStore Server customers in the United States of America, Canada, Australia, New Zealand, Great Britain, the Netherlands, Belgium, Germany, Austria, and Switzerland and further countries confirms the high level of satisfaction with the quality of our products and services. Over 480 companies responded to our appeal and rated MailStore Server in terms of documentation, support, product features from the administrator’s and user’s point of view, and the price/performance ratio.

Top Marks for MailStore Server and The Service

The results show that MailStore Server meets the expectations of the companies surveyed. A total of 97.7 percent of those surveyed would recommend the email archiving solution to others.

96.1 percent of participants rated stability as ‘Very good’ or ‘Good,’ while 93.2 percent judged performance of the software solution as ‘Very good’ or ‘Good.’ The services provided by the technical support team were also examined. 92.8 percent of those who took part in the survey rated the quality of support as ‘Very good’ or ‘Good’ and 92.2 percent judged response times to be ‘Very good’ or ‘Good.’

We are delighted with this fantastic feedback and would like to thank all of those who took part in the survey. Your evaluations and suggestions motivate us to continue to do our best to ensure that our email archiving solutions and our services exceed your expectations in the future.

You can find more information about the results in our current press release and in our new white paper Customer Satisfaction Survey 2014

 

12 Common Hyper-V Deployment Mistakes

by Eric Siron

I’ve seen a lot of questions from those who have recently deployed Hyper-V for the first time.

Some just need a few pointers to iron some minor glitches, but some are in really bad shape.

Here are some of the common deployment mistakes and their solutions.

Read more :  12 Common Hyper-V Deployment Mistakes

 

How to Reset A Forgotten Hyper-V Admin Password

by Luke Orellana

As an IT Professional, you might find yourself blessed with the unfortunate scenario of working on a Hyper-V server that is not able to authenticate to the domain and the cached domain credentials are no longer working. In addition to this predicament, you learn that there is no documentation for the local administrator password. Either the client who you’re working for doesn’t know the local administrator password or the previous engineer who built the server is no longer working for your company and the standard passwords aren’t working.

A 3rd party password cracker application will allow you to reset the local administrator password. The drawback is you have to pay for it and in my experience they don’t always work.

Follow the steps below and use the Ease of Access Exploit to change the local administrator password.

Read the full blog post here.

New MailStore Server 9

New: MailStore Server 9

Integrated Task Scheduler

MailStore Server 9 has an integrated task scheduler that greatly simplifies the creation and execution of archiving tasks. All tasks for archiving email servers were previously created in the Windows Task Scheduler of the system on which the client was running by the MailStore Client software. MailStore Server now controls these types of archiving tasks, completely independently and centrally. In addition, the administrator no longer needs to set execution intervals; MailStore Server automatically defines the optimal scheduling for all available tasks.

Improved Email Preview with HTML View

MailStore Web Access and the Outlook add-in now also offer an HTML preview and can display archived emails in a fashion similar to what you’re used to seeing in Microsoft Outlook. A whitelist-based HTML sanitizer, specifically developed for MailStore, provides the necessary security. Moreover, the display of recipients and file attachments has been significantly improved; this includes MailStore Client, too.

Auto Update of the MailStore Client

As of Version 9, the MailStore Client software no longer needs to be manually updated when you update the server (from Version 9.0 to 9.1). MailStore Client and the Outlook add-in are automatically updated using the auto update feature. A manual or group policy controlled update of the client components is only necessary again in certain situations when upgrading the main version (for example, from 9.x to 10).

Maximum Transparency: Auditing 2.0

MailStore Server 9 can write event types defined by the administrator not only in the Windows event log but also in the form of text files in a directory in the file system. MailStore Server 9 also has a special viewer with many sorting and filtering features, allowing the files to be easily accessed and quickly analyzed.

Greatly Increased Archiving Performance

MailStore Server analyses every email that has been received during archiving and checks whether it has already been archived in order to prevent duplicates in the archive. The time required for this process varies and depends on the number of mailboxes to be archived, the volume of received email, and the size of the existing archive.

performance measurement

The diagram shows the measurement results when archiving 148 IMAP mailboxes with 25 simultaneous threads and a total of 902,716 emails to be checked. MailStore Server 8 required 25:39 minutes. MailStore Server 9 required 8:12 minutes.

The intelligent caching system and a new store hinting algorithm implemented in MailStore Server 9 allow mailboxes for Exchange EWS and IMAP to be archived at a much faster rate. At the same time, the new archiving methods allow the CPU resources of modern systems to be used more efficiently and significantly reduce network traffic and the workload of the email server.

Powerful Message List

The MailStore Client’s message list, which lists search results or displays the content of a folder in the archive, was completely revised. It can now effortlessly display hundreds of thousands of elements. The message lists of MailStore Web Access and the add-in for Outlook have also been optimized so that the results continue to load automatically when scrolling.

New Lock Manager

A newly developed lock manager in MailStore Server 9 ensures that the internal standby modes are reduced to a minimum. This allows a fluid interaction with the system, even in high load situations, and results in an improved user experience.

Optimized Backup and Restore

MailStore Server 9’s integrated backup feature now also writes a *.csv file in which the original storage location is retained. The backup can be restored to the productive environment with minimal effort via a batch file, which is also automatically generated. The MailStore Server service now also supports the commands ‘PAUSE’ and ‘CONTINUE’ to simplify the creation of snapshots as an alternative to using VSS snapshots.

Further Information


Get Started Today!

Free trial version

The 30-day trial version of MailStore Server 9 can be installed in just a few minutes on any Windows PC (or virtual environment) and tested immediately. No changes will be made to your email server or emails at any time during archiving.

Setup files for existing customers

Are you already a customer with active update and support service? If so, MailStore Server 9 is ready for you to download now, free of charge. Please be sure to read the release notes.

Contact Datastor for more information

 

Automatic Archive in Archiware P5

Automatic Archive in Archiware P5

Let’s say you work in the media and entertainment industry, perhaps in Post production, and maybe, just maybe, you shoot a lot of digital film (R3D, Arri RAW, XDCAM, etc), and just maybe you have a SAN. And maybe you’re lucky and you set up a nice backup system using Archiware P5, for example. What about archive? What about finished projects, what do you do about that? Even more importantly, what do you do about the camera archives? That’s the digital film footage that comes in and gets copied to the SAN before creative work begins… it seems like important stuff. Very important to backup, and even better, to archive! How can we set up an automatic archive in Archiware P5?

DEFINITION: What is the difference between backup and archive? In the media and entertainment industry I would define backup as a continuous data protection of live data on a production volume, while archive is a copy of a finished project or original media that will be removed from the production volume and must kept safe for future retrieval. Backups will roll over (a new full backup every week, or month) and if that is all we had, then footage or projects that are done and gone off the SAN would be then lost. Archive separates out the finished projects or source material as needing an independent safekeeping. P5 Archive also has the option of creating a mini-MAM type database of proxy files that can be easily viewed in a web browser for quick identification of files to be restored.

So, how do we set up an automatic archive in Archiware P5? We want it to be automatic so we don’t have to think about it, since manually archiving like backups can be forgotten. If we set up a watch folder on the SAN then we just have to instruct everyone to drop their camera masters and other source files into the folder when they copy to the SAN and P5 will automatically archive them to an incremental tape archive. Wow. That’s awesome.

Tips and Tricks: If you edit with Final Cut Pro X then I recommend using it to make Camera Archives (a verified copy of the footage from the original card or drive) then placing this in the watch folder. If you’re using Adobe’s Premiere workflow, then Prelude can make a verified copy as well, but not in the same way exactly. This will be the subject of another post. Stay tuned.

Read more

Using Gmail Drafts to… Command and Control your Computer?

Using Gmail Drafts to… Command and Control your Computer?

– See more at: http://blog.emsisoft.com/2014/10/29/using-gmail-drafts-to-command-and-control-your-computer/#sthash.dZS6fBdx.dpuf

For those who (over) think before they email, the Drafts folder can be both blessing and a curse. Anyone who has ever accidentally sent an unfinished draft to a coworker, new contact, or friend will probably even go one further: unfinished drafts that reveal what you’re thinking before the thought is polished and ready to be sent can be embarrassing and unprofessional. Thanks to the unending nefariousness of malware writers, the email drafts folder can now also be considered dangerous.

Researchers have uncovered a variant of the Icoscript RAT that uses Gmail draft folders to issue commands to and collect data from infected computers. Many types of malware do this latter part – that is, connect to a “command and control” server,  to provide updates and steal information – but the use of draft emails to make this happen adds a new layer of stealth to the process.

According to reports, attackers are able to pull this off because they can use the remote access trojan to open an invisible instance of Internet Explorer on the infected computer. Windows is built to allow programs to do this, to perform behind the scenes information gathering. With Icoscript, attackers are leveraging this capability to log into an anonymous Gmail account and issue C&C commands through an unsent draft. Conversely, the malware is also designed to place stolen data in drafts for cybercriminals to collect. In effect, attackers have created a malware communication channel, with a trusted program, where nothing is ever actually sent. This makes the malware much harder to detect than programs that perform C&C communication through other protocols, on many of which strange activity will be detected by anti-malware.

Those who have discovered this clever little draft trick – that’s also sometimes used by people who have affairs to exchange messages on a shared email –  stress that “there’s no easy way to detect its surreptitious data theft without blocking Gmail altogether.” For end users, this means that protection hinges on prevention. Icoscript may be good at hiding itself, but it still has to work its way onto your machine. If you’re using an anti-malware that processes roughly 225,000 new malware samples every single day, and you’re well-versed in all the ways cybercriminals use to trick people into installing their creations, it is very unlikely that this will occur.

You will still need to be careful about spilling your heart out in an email draft, though 😉

Have a nice (malware-free) day!

– See more at: http://blog.emsisoft.com/2014/10/29/using-gmail-drafts-to-command-and-control-your-computer/#sthash.0H7g6xqY.dpuf

Live Backup Changes in Hyper-V Server 2012 R2

Live Backup Changes in Hyper-V Server 2012 R2

by Eric Siron

Quite some time ago, we wrote a post about taking live backups in Hyper-V. Hyper-V Server 2012 R2 really changed the mechanics of backup. This post examines how those changes have affected live, or hot, backups. Until 2012 R2, backup was strictly based on VSS (Volume Shadow Copy Service) operations. Backup applications trigger VSS in…

Original post link: Live Backup Changes in Hyper-V Server 2012 R2

Widespread Windows Zero Day affecting Microsoft Office Files

In Alerts & Outbreaks by steve on October 22, 2014 | English

– See more at: http://blog.emsisoft.com/2014/10/22/widespread-windows-zero-day-affecting-microsoft-office-files/#sthash.g5VZQ18G.dpuf

Last week, Emsisoft published details on The Sandworm Team, and how this group of hackers has been using vulnerability CVE-2014-4114 to remotely execute malicious code through shared Microsoft Office files. Microsoft has since issued a patch for this vulnerability; however, it has been discovered that there is still a way to exploit Microsoft Office files to serve malware. This new zero day vulnerability has been designated CVE-2014-6352, and it allows attackers to remotely execute malicious code on all supported versions of Windows, excluding Windows Server 2003. This unpatched zero day has been used by The Sandworm Team, and it is currently also being used by cybercriminals across the Internet. Observed attacks have involved targeted emails containing malicious Powerpoint attachments. In theory, this vulnerability could also be leveraged in any scenario where Microsoft Office documents are shared.

How can I stay protected?

The most concerning aspect of CVE-2014-6352 is that it affects the most recently patched versions of Windows. Microsoft is currently investigating the issue, but it could be nearly 3 weeks before the vulnerability is formally patched. In the meantime, cybercriminals will be sure to exploit the vulnerability to serve malware to as many users as they can.

To stay protected, Emsisoft recommends:

  • Avoiding unsolicited Microsoft Office documents whenever possible
  • Implementing Microsoft’s Suggested Actions
  • Using a proactive antimalware that can automatically prevent infection from unregistered threats

Due to the facts that 1) sharing Microsoft Office files is for many people an everyday task and 2) that Microsoft’s Suggested Actions are somewhat technical, it is likely that CVE-2014-6352 will allow cybercriminals to infect a lot of users with malware. Furthermore, because a vulnerability is essentially a doorway into your PC, the malware served in such attacks will widely vary.

User running Emsisoft should know that, as was the case with CVE-2014-4114  and The Sandworm Team, your security solution does offer automatic protection from this latest zero day. If you are running one of our products, no further action is required: simply allow your computer to update whenever Microsoft issues a formal patch.

For those not using protection, we recommend giving Emsisoft Anti-Malware a try. You can actually test it for 30 days, at no cost – meaning that even if you hate it (which we’re pretty sure you won’t 🙂 it will guarantee protection from this latest zero day until Microsoft fixes the problem. After the vulnerability is patched, you can then simply uninstall your trial – or you can keep it, to ensure that you’re protected the next time an application vulnerability (inevitably) pops up.

– See more at: http://blog.emsisoft.com/2014/10/22/widespread-windows-zero-day-affecting-microsoft-office-files/#sthash.g5VZQ18G.dpuf

Paragon Software Group releases Protect & Restore 3.5

Paragon Software Group releases Protect & Restore 3.5 for business organizations of all sizes to meet data protection and restore objectives in virtual and physical environments

October 2014

Unified, scalable protection solution for heterogeneous IT infrastructures now with enhanced performance, a new powerful deduplication mechanism, the most efficient Exchange database backup and recovery, protection of virtual machines hosted by Microsoft Hyper-V, Paragon’s proprietary patent-pending data processing techniques and more!

 

 FREIBURG, Germany , October 15, 2014 —  Paragon Software Group, a leader in data protection and backup and disaster recovery since 1994, announces the release of  Paragon Protect & Restore 3.5 – an advanced backup and disaster recovery solution with centralized IT management for organizations employing diverse platforms and technologies in physical and virtual environments. The new PPR 3.5 delivers rock-solid security in heterogeneous IT environments consisting of domain and non-domain machines.

PPR 3.5 comes with significantly increased backup and recovery performance by at least 50%. In addition, the new PPR 3.5 is now able to work with complex infrastructures utilizing up to 20,000 objects per OU (Organizational Unit).

The new release brings the most efficient utilization of backup storage and network traffic, delivering a very powerful deduplication mechanism, specially developed for today’s diverse corporate IT environments challenged with managing heterogeneous systems. PPR 3.5 delivers enhanced Exchange database backup and recovery, protection of virtual machines hosted by Microsoft Hyper-V, and other advancements.

In case of a disaster, PPR enables IT administrators to instantly restore any physical or virtual machine, minimizing the downtime and the entire recovery process to seconds. PPR employs the VMware replication mechanism, strengthened and broadened by Paragon Software’s own proprietary patent-pending data processing techniques that enable it to benefit from very fast recovery timings of VM replication during the restore of physical machines, making it a unique feature on the market.

“Data is the most important asset of any organization. In case of a disaster, IT administrators should be able to get systems back online within the minimal downtime. PPR tackles data loss threats posed to companies by providing advanced, easy-to-use protection, incorporating the latest imaging, replication and restore technologies,” commented Konstantin Komarov, CEO of Paragon Software Group.

IT administrators can benefit from PPR’s ease of use via a centralized management console, very low impact on the performance of systems during backup, and distributed architecture providing real flexibility. Attractive licensing models, based on the number of systems and variety of platforms to be protected, are especially optimized to meet up to date IT-compliance and financial controlling guidelines. Paragon offers a competitive (up to 50%) discount to companies replacing multiple data protection solutions for various platforms and environments with PPR, designed to work seamlessly with all.

New features and benefits:

  • Backup Data Deduplication
  • Enhanced Exchange Database Backup and Recovery
  • Enhanced Virtual Machine Backup and Replication
  • Highest Performance and Exceptional Robustness
  • Native PPR Security
  • Rotating Media Support

 

Availability and Licensing:

With PPR 3.5, Paragon introduces a new and more flexible licensing model, with options to suit various scenarios.  To find out more about Paragon’s cost-efficient starter packages for small and medium-sized companies, volume and non-profit discounts, please send inquiries to sales@paragon-software.com.

All product editions include the management console, the deduplication server, adaptive restore (restore to dissimilar hardware) and a 1-year maintenance, including extended support and upgrade assurance at no extra cost. For more information on licensing, please visit:http://www.paragon-software.com/medium-large-business/protect-restore/license.html

To download a free evaluation copy, please visit http://www.paragon-software.com/medium-large-business/protect-restore/ To schedule afree webinar, please visit: http://www.paragon-software.com/medium-large-business/protect-restore/webinar.html

 

PPR 3.5 is also available through Paragon’s partner program.

You can find the full article here

Read more