RWW and SBS 2008

On September 29, 2016, in news, by susan

I got it working as a workaround by replacing the mstscax.dll (Version 10.0.14393.0) in %windir%\SysWOW64\ with the “backup file” in “Windows.old\WINDOWS\SysWOW64” version (10.0.10586.494)

I had to take ownership of the file and give Administrators Full control access to be able to replace the file.

Hope this helps someone out.

Be aware this is an extremely temporary fix.  The next feature release will replace that dll for sure.  If there is a security update to RDP, this will also replace the dll.  So be prepared for it to not stick.

I’m still trying to work with the Essentials team to get this understood to see what our long term options are.


How fast does ransomware run?

On September 26, 2016, in news, by susan

Spotted this online….

Starting at execution, here are the times it took for the following ransomware samples to encrypt the files and notify me with a ransom screen:


  • Chimera: 18 seconds
  • Petya: 27 seconds
  • TeslaCrypt 4.0: 28 seconds
  • CTB-Locker: 45 seconds
  • TeslaCrypt 3.0: 45 seconds
  • Virlock: 3 minutes 21 seconds
  • CryptoWall: 16 minutes

Packing the geek stuff

On September 24, 2016, in news, by susan

Getting ready to get on a plane tomorrow for Atlanta.  Philip Elder is heading there as well and I’m looking forward to getting his SMB and cluster views first hand.

By the way have you seen the upcoming SMB virtual sessions with the new technology heading our way?

SMB Tech Jumpstart: Hybrid Identity:

Date: Oct 03, 2016  |  Time: 10:00 AM – 11:00 AM  |  Location: Skype Meeting

SMB Tech Jumpstart: Hybrid Identity

Are you interested in EMS and Azure, but you aren’t sure where to start? Do you feel like you don’t quite know the technologies you’re selling? Maybe you just don’t know where to begin to understand all of the Microsoft tools?


Our new SMB JumpStart: Hybrid Identity program kicks off on October 3rd, and you won’t want to miss this great opportunity designed to help your team comprehend, adopt, and deploy Microsoft Technologies to expand your business opportunities.

This four-week program includes weekly webinars focused on a new aspect of the chosen technology, as well as hands-on independent learning assignments and Office Hours sessions, to help insure engagement and individual comprehension. If you have additional questions, there will be a members-only Yammer group where you can consult technical experts. At the end of the series, you will be your company’s Identity technical champion, ready to identify, pitch, and implement new customer services.

Benefits to you:

In this 4-week program on Hybrid Identity, you’ll receive step-by-step guidance and resources each week on the following topics:

  • Choosing a Champion and Activating Your Internal Use Rights
  • Connecting your On Premises Active Directory with Office 365 and Azure
  • Using Multi-Factor Authentication and Single Sign-on for other Software as a Service solutions
  • Custom Portal Branding, Password Writeback, and other enhanced Azure Active Directory Premium benefits

Who should participate: This program is best-suited for companies who are ready to commit to starting a EMS or Azure practice today. We recommend your company’s Office 365 technical lead attend the sessions.


Ready to get started?

The program kicks off on Monday, October 3rd.

Register for the program and you will receive access to the webinars, private Yammer group, and resources webpage.


Webinar (10-11am PST) Office Hours (10-11am PST)
October 3 October 7
October 10 October 14
October 17 October 21
October 24 October 28

Come and talk with me about Ransomware

On September 19, 2016, in news, by susan

I’ll be in two locations in September and October talking about Ransomware

The first is at Microsoft’s Ignite –

The second is a birds of a feather session on Ransomware at ITDEV connections in Las Vegas.

Ignite is sold out and ITDEV is almost sold out… so hurry fast


A new updating model

On August 15, 2016, in news, by susan

Further simplifying servicing models for Windows 7 and Windows 8.1

Get ready for a big change to how we install updates for Windows 7 and 8.1.  If you receive updates via windows update, your 7 and 8.1 updates are going to a cumulative 10 model.

If you are managing updates with WSUS and/or SCCM you’ll see one security update bundle and one non security update bundle each month.


Windows 10 anniversary update and Essentials R2

On August 11, 2016, in news, by susan

Steps to take (assuming you haven’t upgraded to Anniversary edition yet)

Step one on your Essentials R2 machine:  Ensure installed.  It’s the July non security update rollup.

On your clients, uninstall the OLD connector (it will be listed as a windows update) and then go to http://servername/connect and manually reinstall/reconnect your workstations to the server.  This will install the NEW connector as a program not as an update.

Install the anniversary update.  You may (you will) find that the newly revised connector appears to be gone.  It really isn’t it’s just an issue with the notification area cache.  Thanks to Mike (The Office Maven) we have a fix:

EssentialsTrayApp.exe doesn’t work after KB3172614:

Hi All,

Apparently the “Notification Area Icons” cache becomes (somewhat???) corrupted when installing the Windows 10 Anniversary Update (1607), and this in turn is causing EssentialsTrayApp.exe to error out when it attempts to reset the Essentials notification area icon (as is indicated by the errors that are shown in the EssentialsTrayApp.<SID>.log file).

In order to correct the issue, you simply need to reset the Notification Area Icons cache for each user who is missing the Essentials notification area icon on their Windows 10 client computer. I have tested this on three separate Windows 10 client computers (Pro and Home), and it has corrected the problem on all of them.

To reset the Notification Area Icon cache, simply download the “Reset_Notification_Area_Icons_Cache.bat” file from the following web page (props go out to Shawn Brink and the Windows Ten Fourms for their excellent tutorial!):

How to Reset Notification Area Icons in Windows 10

After the client computer has restarted, you will find the Essentials notification area icon has returned to the notification area of your Windows 10 client computer.

I hope this helps everyone out that is currently experiencing the problem on their Windows 10 client computers.

— MIKE (The Office Maven)

Now here’s step two:


Hi All,

While you’re at it you might also want to fix the “Alert Evaluations” task in the Task Scheduler as it is also messed up by the new client connector that gets installed by KB3172614.

To do so, open the Task Scheduler (on the client computer), and go to:

Task Scheduler Library -> Microsoft -> Windows -> Windows Server Essentials

Double-click on the “Alert Evaluations” task and click on the “Actions” tab in the Properties window that appears.

Double-click on the “Start a program” action and change the “Program/script” value to:

C:\Program Files\Windows Server\Bin\RunTask.exe

And change the “Add arguments (optional)” value to:

/asm:”C:\Program Files\Windows Server\Bin\AlertFramework.dll” /class:Microsoft.WindowsServerSolutions.NetworkHealth.AlertFramework.HealthScheduledTask /method:EvaluateAlertsByTriggerTaskAction /task:”Alert Evaluations”

NOTE: Adjujst the location of your client computer’s “C:\Program Files” folder as required (for locals other than English, etc.).

Click OK, answer Yes to the confirmation message that appears, and then click OK again to close the Properties window.

After that, you can manually run the task to make sure that it now works properly (note that you may need to hit Refresh in order to see the updated run result).

— MIKE (The Office Maven)

Susan note:  I realize that all of this is extremely confusing and requires way too many manual steps.  I too wish that Microsoft could release an update that didn’t require a manual uninstall and reinstall.  I find this discouraging (to say the least).


The R2 problem is being investigated at this time – will keep you posted

Issues seen with:

Essentials R2:

I think the old connector isn’t being uninstalled and we’re getting two connectors installed.  I think.  Under investigation.

Bottom line the symptom if it was installed before, you went through the AU release, the connector is lost.  You go to reinstall the connector and it won’t find the server.

See the resolution here:

Windows 10 anniversary update and Essentials R2

SBS 2008:

RWW doesn’t work.  The error points to a mismatch in RDP protocol.  In the past the only way I’ve seen to fix that is to roll back a RDP update which obviously we can’t do in Windows 10.

Bypassing RWW with Rdgateway works.  Given that SBS 2008 is no longer under a support window….

Bottom line use the bypass until we can figure out a workaround.


SBS 2011 Standard

RWA still works


SBS 2011 Essentials:

No reports yet


Tilting at windmills again

On August 3, 2016, in news, by susan

If you look at that list it pretty much makes it that group policy doesn’t allow you to block consumerish apps or to customize the start menu.

And be aware that if you go in the group policy some of these aren’t documented inside the group policy editor or listed as needing a certain version in the spreadsheet.

Yes, this is tilting at windmills, but one should at least try.