Essentials server impacted by DST

Essentials is impacted by the DST and is complaining about sending out the email after the daylight savings change.

Storage server Essentials is also impacted.
http://www.mcbsys.com/blog/2014/11/cant-email-essentials-health-report-since-daylight-savings-time/

Manually restart the service seems to work.

SBS 2008 and the RWW issue

Install the cumulative update KB3197954 released on 10/27/2016 (in addition to the flash update that also came out out of band)

If you are STILL having issues connecting via RWW AFTER this update PLEASE let me know.
Addressed connectivity issue from a 32-bit application to a Remote Desktop Gateway that doesn’t have HTTP tunneling enabled.

Show all
October 27, 2016—KB3197954 (OS Build 14393.351)

Did you see the new SMB Jump start series?

Hello Microsoft Cloud Partners,

Our new SMB JumpStart: Enterprise Mobility + Security (EMS) program kicks off on November 8 and you won’t want to miss this great opportunity designed to help your team comprehend, adopt, and deploy EMS based solutions to expand your business opportunities.

Register now

This five-week program is comprised of weekly webinars focused on a new aspect of the chosen technology, as well as hands-on independent learning assignments and 1: Many coaching sessions to help ensure your comprehension and ability to adopt. The program will include a private Yammer group where participants can access resources, ask questions and join the conversation with others in the program.

Benefits to you:

In this 5-week program, you’ll receive step-by-step guidance and resources on the following topics:

  • Communicating the EMS customer value proposition, choosing an internal champion, and activating your Internal Use Rights
  • Using Azure Active Directory to configure single-sign on, multi-factor authentication, and self-service access to third-party SaaS applications
  • Leveraging Azure Information Protection for sharing, tracking, and revoking protected documents, even outside of your organization
  • Utilizing Intune for mobile application management without requiring device enrollment
  • Using Intune to provide MDM (mobile device management) and overview of additional capabilities of EMS including Advanced Threat Analytics

Who should participate? This program is best-suited companies who are ready to commit to starting a EMS or Azure practice today. We recommend your company’s Office 365 and/or Azure technical lead attend the sessions.

Ready to get started? The program kicks off on Tuesday, November 8. Register for the program and you will receive access to the webinars, private Yammer group, and resources webpage. Spaces are limited – don’t miss out.

Register today!  

If you have any further questions on the SMB JumpStart: Enterprise Mobility + Security program, please send an email to smbin@microsoft.com

View article…

Missed any of the SMB jump start sessions?

https://www.yammer.com/msuspartner/#/groups/9205100/files  The files are uploaded to the MS us partner yammer group.

I’d highly recommend downloading and watching as while your clients may not be THERE yet as some point in time they will be.

I’m trying to lobby to get AzureADconnect officially supported on Essentials 2012 r2 and 2016.  This is a “it works” but they think we’re going to try to run both the Office 365 wizard included in Essentials as well as Azure AD connect.  This is a pick one or the other, you can’t do both.  But given that Microsoft is leaning very strongly to where Azure AD connect is where they want us to go, it makes no sense that it’s not supported on Essentials which is (supposedly) their entry product into cloud services.

WSUS and the auto approve problem

If you automatically approve security updates in WSUS you will find that both the security and security/nonsecurity bundles will be deemed applicable and will want to install.  To decline one or the other do the following:

Download from here and in the example below, Daniel is declining the security monthly bundle
https://www.powershellgallery.com/packages/PoshWSUS/2.3.1.2

Connect-PoshWSUSServer -WsusServer YourServer -port 8530
Get-PoshWSUSUpdate -Update “Security Monthly Quality Rollup” | Deny-PoshWSUSUpdate

Hat tip and major thank you and kudos to Daniel on the Patchmanagement.org list serve:

http://marc.info/?l=patchmanagement&m=147628480311685&w=2

At ITDev Connections

And tomorrow will be the big change in Microsoft updating.

In the meantime I’m making sure I’m all set for my Session on Windows 10 updating as well as patching the Internet of things.

If you are here in Vegas, stop by and say Hi!

Yo, Quickbooks, SBS 2011 *is* Server 2008 R2

https://community.intuit.com/questions/1433882?_ans=1&_pos=2&_src=sapi&_tot=12279&from=sapi&tags=

So have you spotted this yet?  Quickbooks 2017 throws off an error obviously pulling bad OS string data from something.  Let see if we can get some attention to this and get this fixed.

As … you know Intuit?  SBS 2011 is based on Server 2008 r2.  There is no such thing as Server 2011.

Updated:  Manually install  .net 4.6.2  .  Now install the QB running as compat wizard.  Pick XP sp2 (don’t ask just try it).  Got a report that this worked.

RWW and SBS 2008

I got it working as a workaround by replacing the mstscax.dll (Version 10.0.14393.0) in %windir%\SysWOW64\ with the “backup file” in “Windows.old\WINDOWS\SysWOW64” version (10.0.10586.494)

I had to take ownership of the file and give Administrators Full control access to be able to replace the file.

Hope this helps someone out.
https://social.technet.microsoft.com/Forums/en-US/1932302f-b31c-4c8b-8dec-d0554852800b/windows-10-version-1607-build-1439310-rww-error-50331656?forum=smallbusinessserver&prof=required

Be aware this is an extremely temporary fix.  The next feature release will replace that dll for sure.  If there is a security update to RDP, this will also replace the dll.  So be prepared for it to not stick.

I’m still trying to work with the Essentials team to get this understood to see what our long term options are.

How fast does ransomware run?

https://blog.barkly.com/how-fast-does-ransomware-encrypt-files

Spotted this online….

Starting at execution, here are the times it took for the following ransomware samples to encrypt the files and notify me with a ransom screen:

 

  • Chimera: 18 seconds
  • Petya: 27 seconds
  • TeslaCrypt 4.0: 28 seconds
  • CTB-Locker: 45 seconds
  • TeslaCrypt 3.0: 45 seconds
  • Virlock: 3 minutes 21 seconds
  • CryptoWall: 16 minutes

Want to see ransomware in action?

This is an analysis of an email that I got….

Check it out here: https://www.reverse.it/sample/0adc7a9b3173d6db061d1c354864cecd9e43bd2b8cc25f977783921448349e95?environmentId=100#

Or a shorter link to it is here:

http://tinyurl.com/igniteransomware