Merhabalar;

Exchange Server ortamlarında sıkça gelen isteklerden biri de mail’lere imza eklenmesidir.

Imza ekleme işlemini gerçekleştirmek için;

1)Exchange 2010 Management Console’u açalım.

2)Organization Configuration-Hub Transport-Transport Rules kısmına gelelim ve

New Transport Rule komutunu vererek kullanıcılarımız için imza kuralını oluşturmaya başlayalım.

3)Kuralımıza bir isim verelim.

4)From users and that are inside or outside the organization’ı seçelim ve Inside organization diyelim.

5)Actions ekranında “append disclaimer text and failback to action if unable to apply” seçeneğini seçelim ve alt kısımdan

Disclaimer Text‘e basarak kuralımızı yazalım.

Ben imza’da kullanıcının active directory’deki özelliklerinden Firstname,Lastname,Department,Telephone,Company

Street,City,State,Zip Code bilgilerinin getirilmesini istedim.

Aşağıdaki kodu kopyala yapıştır yapalım.

html
body
table border=”0″ width=”100%”
tr
td width=”85″
img border=”1″ src=”http://10.0.0.1/resim.jpg”
/td td valign=”top” font face=”Garamond”
b %%Firstname%% %%Lastname%% /b /font br
font size=”2″ face=”Calibri” %%department%% br
Telephone: %%Phone%% br
%%Company%% br
%%Street%% br
%%City%%, %%State%% %%ZipCode%%
/font /td
/tr
/table
/body
/html

%%Firstname%% %%Lastname%%
%%department%%
Telephone: %%Phone%%
%%Company%%
%%Street%%
%%City%%, %%State%% %%ZipCode%%


6) Exceptions kısmını next ile geçelim.

7)New butonuna basarak kuralımızı oluşturalım.Atılan deneme mail’indeki ekran görüntüsü aşağıdaki gibi olacaktır.

Exporting and Importing DHCP Scopes


This article explains the steps taken to export DHCP scopes from one server and import them to another or from old to new server. I have tried and tested them for DHCP on Windows Server 2003.

Run the following from command prompt using administrator login. You can try running this from any domain computer.

C:\> netsh dhcp server \dhcpservername1 export C:\DHCPServerScope1 all

This exports the DHCP scope from this server to a file called “DHCPServerScope1″ under C drive.

If the above method does not work due to invalid path error, which is possible; then you can export the scopes by logging into the DHCP server. You can then export and save the scopes to the local or shared folder. After this, to import the scopes, you can log into the other DHCP server and again using “netsh.exe” utility import the configurations of the scopes to the other DHCP server (Recommended)

To export scopes following syntax can be used:

netsh dhcp server export

Example:

C:\>netsh dhcp server export c:\scopes\DHCPServerScope1 10.0.0.1

To import scopes following syntax can be used:

netsh dhcp server import all

Example:

C:\>netsh dhcp server import c:\scopes\DHCPServerScope1 all

How to Add “Scan with Windows Defender” to the Context Menu in Windows 8


scan-with-windows-defender-from-context-menu

Windows Defender replaces Microsoft Security Essentials in Windows 8, but it does not include the ability to quickly right-click folders and scan them. However, you can add this option yourself with a quick registry hack.

This trick adds a “Scan with Windows Defender” option to the context menu that appears when you right-click a folder. It works similarly to the “Scan with Microsoft Security Essentials” option on previous versions of Windows.

Unfortunately, there is no command that launches Windows Defender in graphical mode and initiates a scan, so we will have to launch Windows Defender in a Command Prompt window.
Option 1: Download and Run a .reg File

You can add this option to your registry by downloading and running the file below. This will do everything for you – just download the .zip file, open it, and double-click the AddWindowsDefenderToContextMenu.reg file it contains.

Download WindowsDefenderContextMenu.zip

If you want to remove this option later, run the included RemoveWindowsDefenderFromContextMenu.reg file.

If you would rather add this context menu option manually, follow the instructions below.
Option 2: Add the Context Menu Entry Manually

Press the Windows key to access the Start screen, type regedit at the Start screen, and press Enter to launch the Registry Editor.

Navigate to the following key:

HKEY_CLASSES_ROOT\Folder\shell

Right-click the shell key in the left pane, point to New, and create a new Key. Name it WindowsDefender.

With the WindowsDefender key selected in the left pane, right-click in the right pane and create a new String value. Name it Icon, then double-click it and enter the following value:

%ProgramFiles%\\Windows Defender\\EppManifest.dll

Right-click in the right pane again and create another new String value. Name it MUIVerb, then double-click it and enter the following value:

Scan with Windows Defender

Right-click the WindowsDefender key in the left pane, point to new, and create a new key. Name it Command.

Double-click the (Default) value in the right pane with the Command key selected and give it the following value:

“C:\Program Files\Windows Defender\MpCmdRun.exe” -scan -scantype 3 -SignatureUpdate -file %1

When you use the option, you will see the scan happen in a Command Prompt window. You will only be alerted if a problem is found. If the scan is very quick, you will see a Command Prompt window appear and disappear quickly. If a problem is found, the window will alert you instead of closing

Adding Other Entries to Your Context Menu

You can use similar tricks to add any application to your Windows context menu.

If you want to scan individual folders from the graphical user interface, use the Custom option in Windows Defender to scan any file or folder.

CODE – Windows event viewer CUSTOM XML FILTER


If you want to run an advanced filter in Windows Event Viewer you will need to know a little bit of XPath 1.0, If you have used SQL 2005/2008 and XML fields, this should be as easy as 123. If not, here is some examples I have put together.

In this example I am currently filtering the Security Tab, Date Range of December 1 2009 to December 18 2008, I have the TargetUserSid and Workstation Name

     *[System[
         (Level=4 or Level=0 or Level=5) 
            and (EventID=4624) 
            and TimeCreated[@SystemTime>='2009-12-01T15:34.000Z' and @SystemTime@lt;='2009-12-18T15:34:34.999Z']
            ]
        ]
       and
        *[EventData[Data[@Name='TargetUserSid']
                and(Data='S-1-5-21-1261577687-3656830202-1507140918-1131')
         ]
        and
        *[EventData[Data[@Name='WorkstationName']
               and(Data='computerName.domain.local')
        ]





     *[System[
         (Level=4 or Level=0 or Level=5) 
            and (EventID=4624) 
            and TimeCreated[@SystemTime>='2009-12-01T15:34.000Z' and @SystemTime@lt;='2009-12-18T15:34:34.999Z']
            ]
        ]
       and
        *[EventData[Data[@Name='TargetUserSid']
                and(Data='S-1-5-21-1261577687-3656830202-1507140918-1131')
         ]
        and
        *[EventData[Data[@Name='WorkstationName']
               and(Data='computerName.domain.local')
        ]





     *[System[
         (Level=4 or Level=0 or Level=5) 
            and (EventID=4624) 
            and TimeCreated[@SystemTime>='2009-12-01T15:34.000Z' and @SystemTime@lt;='2009-12-18T15:34:34.999Z']
            ]
        ]
       and
        *[EventData[Data[@Name='TargetUserSid']
                and(Data='S-1-5-21-1261577687-3656830202-1507140918-1131')
         ]
        and
        *[EventData[Data[@Name='WorkstationName']
               and(Data='computerName.domain.local')
        ]

nder Security > EventData you can filter these options.

SubjectUserSid
SubjectUserName
SubjectDomainName
SubjectLogonId
TargetUserSid
TargetUserName
TargetDomainName
TargetLogonId
LogonType
LogonProcessName
AuthenticationPackageName
WorkstationName
LogonGuid
TransmittedServices
LmPackageName
KeyLength
ProcessId
ProcessName
IpAddress
IpPort
As simple as

?
1
and *[EventData[Data[@Name=’YOUROPTION’]and(Data=’YOURVALUE’)]]

As simple as

?
1
and *[EventData[Data[@Name=’YOUROPTION’]and(Data=’YOURVALUE’)]]

Here are examples of simple custom filters in Windows Event Log:

Select all events in the Security Event Log where the account name involved (TargetUserName) is “JUser”

?
1
*[EventData[Data[@Name=”TargetUserName”] and (Data=”JUser”)]]

Select all events in the Security Event Log where the string “JUser” is present as data anywhere in the EventData section

?
1
*[EventData[Data and (Data=”JUser”)]]

Select all events in the Security Event Log where the strings “JUser” or “JDoe” are present as data anywhere in the EventData section

?
1
*[EventData[Data and (Data=”JUser” or Data=”JDoe”)]]

Select all events in the Security Event Log where the string “JUser” is present as data anywhere in the EventData section and the Event ID is “4471”

?
1
*[System[(EventID=”4771″)]] and *[EventData[Data and (Data=”JUser”)]]