Janik von Rotz

Setup SSH on Windows 10

I have started a new job and as usual had to set up a new computer. Using Windows in a Unix environment seems like a bad choice at first. However, Microsoft has changed strategy and embraced the Unix world with projects such as Windows Subsystem for Linux (WSL) or Windows SQL Server support for Linux. In result you can install bash with WSL and use the native ssh client. But there is also another way. If you install Git for Windows a ssh binary is shipped as well. This binary and other tools such as ssh-keygen are not available from the command line by default. I want show you how to fix this, setup a keypair and start using ssh in a Windows environment.

Read More...



Create a soft wallet and transfer your Ether coins from an exchange

Intrigued by the title you might ask your self: What is the reason to store ether in a software wallet? Well, If you have cryptocoins on an exchange platform there is always the risk of the account getting hacked or the platform goes offline (see MtGox). Exchange platforms for cryptocoins are not as regulated and institutionalized as banks and trading centers are. The risk is in favor of the provider. To assert full control of your coins aka your money it is recommended to store them in a wallet.

Read More...



A Glimpse of China

I visited China from the beginning of last december until christmas. My backpack was filled with prejudice and the expectation of having a hard time travelling there. The reality looked quite different. China was a blast! Vibrant, lively, fascinating, contradictory and quite the opposite from the european life style. Swallowed in Beijing and spit out in Hong Kong I enjoyed China all over. Definitely not the last I have been there. Again my favorite pictures:

Read More...



Impressions of the Turnerabend 2017

My local sports club STV Kerns organized and performed a cinema themed gymnastic show Turnerabend. Together with other sports clubs we’ve put together a program and presented during two evenings and one after noon. During the event I was in charge of technical aspects and making photos of the show. Here are some of my favorites.

Read More...



Forward Windows event log entries to syslog server

Syslog is the defacto standard for sending log messages in an IP network. Instead of pulling log messages from a remote computer as you would do it in a windows environment, the log files are sent by remote computers to a central log repository. This way of managing log files has become the standard for Linux / Unix environments. As our IT systems tends to become hybrids, the questions arises how it possible to send syslog messages from a windows computer. In this post I will present you a simple approach.

Read More...



PowerShell - Logging in CMTrace format

CMTrace is probably the first choice for a log viewer in a Microsoft environment. When working with System Center Configuration Manager there aren’t any alternatives available. In a recent scenario I had to write log files in the CMtrace format. There are already many cmdlets available to do so, however, most of them did not work well or were overengineered. There I’ve taken a look at the CMTrace format specs and wrote a PowerShell function to create compatible log files.

Read More...



Configuration Manager - Configure requirement rules for deployment types with PowerShell

Configuration Manager applications can be equipped with powerful requirement rules. For example an application must be installed only if there is enough disk space on the target device or only if the device is the users primary device. The second example is an important requirement rule when working with user device affinity. Configuring this kind of rule is done in a few seconds using the management console. However, scripting the rule with PowerShell is much more difficult. As of today the cmdlets provided by Microsoft for automating Configuration Manager assets do not support building requirement rules for deployment types. But as always there is a workaround. In my case I’ve decided to create an application template containing all requirement rules and copy specific rules from there to other applications.

Read More...



SCCM 1702 increase client log size and retention

With additional steps in an image deployment task sequence the log files will grow quite big. By default the Configuration Manager client keeps a log history of 0 and a size limit of 2 MB for each log file. In result you’ll find yourself missing important details when trying to debug a failed operating system deployment. At some point the log files will be cut off. In order to increase the log size and retention, parameters must be configured in two places.

Read More...



Monitor and audit Active Directory user and group management

Traceability is key when collaborating in the Active Directory (AD). Multiple admins changing and updating permissions and policies makes it difficult being compliant with the company’s policies. It is important to monitor mutations in the directory. By default audit policies are disabled for Domain Controllers (DC) and must be enabled explicitly. Enabling auditing for the DCs is quite easy, querying the logs for a specific event is a bit more difficult.

In this guide you’ll learn how to enable auditing for a specific case and how to query the audit logs for a specific event.

Read More...



Get unlinked GPOs with PowerShell

In terms of IT compliance having valid GPOs is essential. They must be update to date and the GPO directory should be free of any unlinked GPOs. Retrieving a list of unlinked GPOs in the management console is impossible. With PowerShell it is quite easy.

Read More...



19