Author: Mike

Access Denied when trying to view Event Logs

Tweet Recently came across an issue where an “Access Denied” message would be given when trying to view the System or Application logs. The problem stemmed from a developer adding “Everyone” into the “Guests” group on the server.  Since Windows 2000, Guests are not allowed to view these logs. The fix was simple- remove “Everyone” from the “Guests” group. This is a good example why Developers shouldn’t have Admin...

Read More

VMware end of Availability

Tweet Some older versions will not be available for download soon: Virtual Infrastructure products being removed by May 2010: ESX 3.5 versions 3.5 GA, Update 1, Update 2, Update 3 and Update 4 ESX 3.0 versions 3.0 GA, 3.0.1, 3.0.2 and 3.0.3 ESX 2.x versions 2.5.0 GA, 2.5.1, 2.5.2, 2.1.3, 2.5.3, 2.0.2, 2.1.2 and 2.5.4 Virtual Center 2.5 GA, 2.5 Update 1, 2.5 Update 2, 2.5 Update 3, 2.5 Update 4 and 2.5 Update 5 Virtual Center 2.0 Virtual Infrastructure products remaining for Extended Support: These versions will be the baseline for ongoing support during the Extended Support phase. All subsequent patches issued will be based solely upon the releases below. ESX 3.5 Update 5 will remain throughout the duration of Extended Support ESX 3.0.3 Update 1 will remain throughout the duration of Extended Support Virtual Center 2.5 Update 6 expected in early 2010 Lifecycle...

Read More

Cleaning up after a P2V

Tweet After converting a physical to a virtual, there is some clean-up that should be done. Non-existing hardware devices should be removed. Software which controlled the legacy hardware should be uninstalled. Here’s how to uninstall the old hardware: 1) Open a command-prompt and type: “set devmgr_show_nonpresent_devices=1” (without quotes), hit Enter now type: “start devmgmt.msc” Leave the command window open! 2) Click on “View –> Show hidden devices” 3) Expand all the device trees and right-click/uninstall the ghosted devices All done!  Nice and clean.  Don’t forget to un-install any old software packages such as vendor hardware management and RAID controller software that might not be...

Read More