microsoft

How to Log Windows Firewall Activity

Firewall Logging is Useful to verify if newly added firewall rules are working or not, to identify malicious activity,  and to determine if the firewall is dropping packet which causes application  failures.

By default, the Firewall log is disabled.

more …

Advertisements

How to Exceed the 4 vCPU limit for VM’s on Hyper-V

  

Many times I was asked for the way to exceed the limitation of 4 virtual processors assigned to a virtual machine for Windows Server 2008 R2.

I guess there is still many Windows Server 2008 hyper-visor running on a physical server which has much more cores, Although It is very limiting, but I will not recommend you to modify productions VM’s setting to exceed the limit.

more …

Forefront TMG flood attack mitigation

forefront_tmg

Forefront TMG – flood attack

Forefront TMG protect your system from flood attack, flood attack are attempts by malicious users to attack a network, by http denial of service attack, SYN attack, worm propagation.

The default TMG configuration setting for flood mitigation set to ensure that Forefront TMG can continue to function under a flood attack; there are some actions you can take during an attack that can further mitigate its effect.

more ..

SQL Server backup

SQL Server backup Using Management Studio and Transact-SQL

SQL2008

How to create a full database backup in SQL Server 2008 R2 by using SQL Server Management Studio and Transact-SQL,  As a database increases in size full database backups take more time to finish and require more storage space. Therefore, for a large database, you might want to supplement a full database backup with a series of differential database backups.

more …