Chat with us, powered by LiveChat

Microsoft Word 2013 – Insufficient Memory or Disk Space

Thursday, 30 June 2016

Microsoft Word 2013 – Insufficient Memory or Disk Space

Recently a client called up saying that they are getting the following error message every time they open up Word:

This error is only appearing on one particular user’s computer (not the entire office) and also when they open Word in Safe Mode, it’s non-existent, which is a good sign.  When the client is getting this error message, when they try to close down Word, they also receive the following message:

The strange thing is that this error message only appears when the user gets the “Insufficient memory or disk space” error as well.
After looking into the computer, the first thing I did was to delete the normal.dotm file.  This alone didn’t make any difference and the error messages were still coming up.  After this, I checked the Add-Ins and disabled all of the add-ins which were originally enabled.  With all the add-ins disabled, Word was working perfectly.  This obviously now points to an issue with Add-Ins.  I ensured that there were no GPOs which were affecting Office (there was but I un-linked them and confirmed the issue was still happening).
Repair of Office didn’t resolve the issue, nor did an uninstall of Office.  Sometimes when uninstalling Office, it doesn’t actually remove all files, folders and registry entries which are associated with the application.  This could be why the uninstall and reinstall didn’t work.  To get around this, you need to run the Microsoft FixIt to obliterate all traces of Office.  This can be found here.
After nuking Office, rebooting and then reinstalling, Word was now behaving itself and the add-ins are now working.
Thursday, 30 June 2016

Inflate VMDK file – VMWare

Recently I had a request come through from a client to change a Virtual Machine’s disk from Thin to Thick provisioned.

To achieve this is relatively easy and can be done by following these steps:

1. Log into vSphere and get the location of where the Virtual Machine disk is located

2. Power off the Virtual Machine
3. Browse the Datastore and find the .vmdk file

4. Right-click on the .vmdk file and click Inflate

5. This will then inflate the drive up to the provisioned size you had originally selected when you created the drive.
6. Power on Virtual Machine
There shouldn’t be a need to do anything further once the Virtual Machine has been powered on.  It will boot up the same as it did before, but the difference is that the .vmdk file is now Thick Provisioned.
Note that you cannot have any Snapshots associated with this virtual machine before going through this process.
Tuesday, 28 June 2016

Configure SSL for Apache Tomcat

Recently a client of mine required SSL to be enabled for Apache Tomcat.  A 3rd party had installed their software and setup Tomcat, but required it to be configured for SSL  This was a rather large pain to get going, but now that it’s working, I feel it would be rather helpful having the full instructions on what to do to get it all up and running.

Basically how it works is that you have to create a KeyStore that will reside on the server that’s running Tomcat.  This KeyStore will contain certificates for the server and will be referenced by a server.xml file which controls Tomcat.

Generate the CSR
1. Create a new folder in C: called “Tomcat SSL”.  This will house all the certificates and KeyStores associated with this task.

2. From a Command Prompt, navigate to the Java folder and find keytool.exe
Usually located here: C:\Program Files (x86)\Java\jre1.8.0_91\bin

3. Create the new KeyStore by typing in the following command:
keytool.exe -genkey -alias [fqdn of website] -keyalg RSA -keystore “C:\Tomcat SSL\Keystore.jks”

This will then ask you to type in a password.  It doesn’t have to be too complex, but make sure it’s something you can remember.

CMD will then prompt you for the following information:

  • First and Last name
  • Name of organisation unit
  • Name of organisation
  • City of Locality
  • State or Province
  • two-letter country code for this unit
Once you’ve done that, confirm that you have all the details correct by typing in yes and then hitting enter.
 
4. Generate a CSR to create the certificate from.  To do this, type the following command:
keytool.exe -certreq -keyalg RSA -Alias [fqdn of website] -KeyStore [Location of Keystore.jks file] -File “C:\Tomcat SSL\tomcatssl.csr”
This will then ask you to type in the password that you had set in the last section to confirm that you have permissions to do this.  Once you have done this, you will need to go to a CA and generate a new key.  I personally use DigiCert to get this done.  When you create the certificate, it will ask you what platform you want to generate it for.  Choose tomcat.
Once DigiCert have generated the certificate and you go to download it, it will ask you how you wish to download this.  Select that you want to have all the individual .crt files within a .zip file.
This will include the certificate that you have just generated, as well as the root certificate and also an intermediary certificate.  You can work out which certificate is which by viewing the certificate, then clicking on Certification Path
 
The order will usually be the following
  1. TrustedRoot.crt – Root
  2. DigiCertCA.crt – Intermediary
  3. [fqdn of website].crt
Knowing which cert is which will come in hand in the next step.
Import the Certificates
5. Import the RootCA certificate with the following command:
keytool.exe -import -alias root -keystore “C:\Tomcat SSL\keystore.jks” -trustcacerts -file “C:\Tomcat SSL\TrustedRoot.crt”

 

6. Enter the KeyStore password to allow this certificate to be imported.
7. Import the Intermediary certificate with the following command:
keytool.exe -import -alias intermed -keystore “C:\Tomcat SSL\keystore.jks” -File “C:\Tomcat SSL\DigiCertCA.crt”
8. Enter the KeyStore password to allow this certificate to be imported
9. Import the final certificate with the following command:
keytool.exe -import -alias [fqdn of website] -keystore “C:\Tomcat SSL\keystore.jks” -File “C:\Tomcat SSL\[fqdn of website].crt”
10. Enter the KeyStore password to allow this certificate to be imported.
This now finishes the requirements to get the certificates installed and ready to go on the Tomcat server.  Now we have to tell Tomcat to use SSL and to use the specific KeyStore to obtain the certificates etc.
Configure Tomcat’s SSL Connectors
1. Go to the following location
C:\Program Files (x86)\Apache Software Foundation\Tomcat 8.0\conf
2. Find server.xml and open this up in Notepad
3. Scroll down the document until you can find the following section:

 

<!– Define a SSL/TLS HTTP/1.1 Connector on port 8443
         This connector uses the NIO implementation that requires the JSSE
         style configuration. When using the APR/native implementation, the
         OpenSSL style configuration is required as described in the APR/native
         documentation –>
4. Right under this section, you will see the Connector Port showing as 8443 and then what protocol it is
5. Remove what has been written there and type in the following:
<Connector port=”443″ protocol=”HTTP/1.1″
               maxThreads=”150″ SSLEnabled=”true” scheme=”https” secure=”true”
               clientAuth=”false” SSLProtocol=”TLS”
keystoreFile=”C:\Tomcat SSL\keystore.jks”
keystorePass=”[password of keystore]”  />
6. Changing the port from 8443 to 443 will mean that you don’t have to go to https://localhost:8443, but you can just go to https://localhost.
7. That whole section should look like the following:
    <!– Define a SSL/TLS HTTP/1.1 Connector on port 8443
         This connector uses the NIO implementation that requires the JSSE
         style configuration. When using the APR/native implementation, the
         OpenSSL style configuration is required as described in the APR/native
         documentation –>
    <Connector port=”443″ protocol=”HTTP/1.1″
               maxThreads=”150″ SSLEnabled=”true” scheme=”https” secure=”true”
               clientAuth=”false” SSLProtocol=”TLS”
keystoreFile=”conf/keystore.jks”
keystorePass=”[password of keystore]”  />
8. Find the Apache Tomcat service and restart it
9. Once you have restarted the serivce, you should be able to go to https://localhost and it will load the tomcat webpage using TCP443.
10. Remember that because you’re accessing it internally and testing using localhost, it’s going to give you a certificate error.  This will not happen if you’re accessing it using the FQDN of the website
Monday, 27 June 2016

Microsoft Exchange could not discover any route to connector CN=Windows SBS Company Web Connector [SERVERNAME]

Recently when I was troubleshooting some Exchange issues on a client’s server, I noticed the following Event log and thought I would troubleshoot it further:

What’s happening is that a ‘Foreign Connector’ is still present in the Active Directory and Exchange configuration for an old SBS environment (SBS was recently decommissioned).  This is for SharePoint email to web feature, which was never used and it’s not needed.

To get rid of this, it’s safe to just delete the connector.  To find the connector, type the following:

Get-ForeignConnector | fl

To delete the connector, type the following:

Remote-ForeignConnector “Windows SBS Company Web Connector SERVERNAME”

This will remove the orphaned connector, clean up the errors and stop them from occurring.

Monday, 27 June 2016

SMTP rejected a (P1) mail from ‘HealthMailboxXXXX.

Recently a client of mine noticed that their Exchange server (Exchange 2013) was getting an event log every five minutes saying the following:

There was no interruption to mail flow, but we wanted to look into it and find out why it was happening.  I had a look into this event and it looks like there was an issue with this Health Mailbox.  Having a look into what the best cause of action is, it was understood that these can be deleted from AD without any issues.

I logged into the DC and deleted the specific user account in question:

After deleting this user account (and I had made sure the Active Directory Recycle Bin was enabled), I restarted the Microsoft Exchange Health Manager service.  If needed, this will re-create the HealthMailbox.  After monitoring for about half an hour, I was happy that the event was no longer showing up within Event Viewer.
Sunday, 19 June 2016

Windows 7 install ‘hanging’ within Hyper-V

Recently I was required to create a Windows 7 VM within a Hyper-V environment (Server 2012 R2).  When creating the new Virtual Machine and installing Windows, I noticed that it would hang on ‘Starting Windows’:

There was nothing that could be done which would allow this VM to progress further than ‘Starting Windows’.  Upon looking into the setup of the VM, I noticed it had been created as a ‘Generation 2’ machine.  Gen 2 Hyper-V machines are only support for Server 2012 or Windows 8 and above.  Because this was a Windows 7 VM, it wasn’t supporting and not working.

To resolve this, you need to delete the VM, then go back into the Hyper-V Manager and make sure you select Gen 1 as your preferred VM Generation.

Sunday, 19 June 2016

DHCP Server showing ‘169’ address

Recently I was on a Domain Controller and accessing the DHCP Server console, and I noticed that the server address was showing a 169 address instead of the server name.  DHCP was working fine and there was no issue with the way that it was all working, but it was rather odd that it was showing this address, so I decided to look into it further.

It turns out that the DHCP console was getting it’s IP address from a NIC that wasn’t in use, hence the 169 address.  A quick fix here was to disable the NIC itself.  After closing and re-opening (refresh would also suffice), DHCP showed the FQDN of the server, and it was back to normal.

Friday, 17 June 2016

GPOs no longer being applied

Recently a client of mine advised they had a few issues with their GPOs suddenly not applying.  After looking through what the issue could be, we added Authenticated Users to the permissions list and gave them ‘read’ permissions.  This suddenly resolved the issue.

Authenticated Users didn’t have permission before, as it was locked down by Security Group.  I hadn’t made any changes to the GPO and neither had the IT team onsite.  This prompted me to look into this further.

Upon investigation, I found that this was caused by a Windows Update (https://support.microsoft.com/en-us/kb/3163622).  The update details are the following:

Known issues

MS16-072 changes the security context with which user group policies are retrieved. This by-design behavior change protects customers’ computers from a security vulnerability. Before MS16-072 is installed, user group policies were retrieved by using the user’s security context. After MS16-072 is installed, user group policies are retrieved by using the computer’s security context. This issue is applicable for the following KB articles:

  • 3159398 MS16-072: Description of the security update for Group Policy: June 14, 2016
  • 3163017 Cumulative update for Windows 10: June 14, 2016
  • 3163018 Cumulative update for Windows 10 Version 1511 and Windows Server 2016 Technical Preview 4: June 14, 2016
  • 3163016 Cumulative Update for Windows Server 2016 Technical Preview 5: June 14 2016

Symptoms

All user Group Policy, including those that have been security filtered on user accounts or security groups, or both, may fail to apply on domain joined computers.

Cause

This issue may occur if the Group Policy Object is missing the Read permissions for the Authenticated Users group or if you are using security filtering and are missing Read permissions for the domain computers group.

Resolution

To resolve this issue, use the Group Policy Management Console (GPMC.MSC) and follow one of the following steps:

  • Add the Authenticated Users group with Read Permissions on the Group Policy Object (GPO).
  • If you are using security filtering, add the Domain Computers group with read permission.
Tuesday, 14 June 2016

How to configure Transaction Log Shipping for SQL Server

SQL Log Shipping is a simple solution that operates and provides disaster recovery protection at the database level for SQL instances.  The general gist is that the database data/logs are replicated/backed up to a secondary server which is also running SQL and allows the database to failover and start running on the secondary site if there is a problem with the primary site.  It’s nice and simple to get going, so if you have multiple sites and can spare the SQL licenses, it’s definitely recommended.

Before starting this setup, you will need to ensure that you have a network location that you can backup your current SQL database to.  This can be on the same server that your primary instance, but needs to be shared out and obviously accessible.  In terms of a file structure, it would be a good idea to have Instance > Database names.  That way it is easy to manage and you know which database goes where.

It is also assumed that you have created a share on the secondary SQL server, where the logs will be shipped to.  This will be where your fail over data goes to.  The file structure should be the same as the primary server and also shared out.

1. Make sure that your database is in ‘full’ or ‘bulk-logged’ recovery mode.

2. Click on Transaction Log Shipping, then tick Enable this as a primary database in a log shipping configuration

3. Select Backup Settings, and then select the network path location.  This will be where you’re database will be backed up to and should be on the same server as your primary server.

4. Click Add under ‘Secondary Databases’ then connect to the second SQL database.
5. Select the first option under Initialise Secondary Database
 
6. Click Copy Files and then select the location that you want to ship the logs over to (secondary server)
7. Click Restore Transaction Log, then select Standby Mode and tick Disconnect users in the database when restoring backups.
8. Select Settings under ‘Monitor server instance’, and select the secondary server.  This will monitor the logs and ensure everything is going well.
9. Log into SQL Management Studio and check the databases to ensure that the database is replicating
Tuesday, 14 June 2016

Exchange 2007 Uninstall hangs on Remove Exchange Files

Today I was decommissioning an Exchange 2007 server for a customer.  The uninstall process got down to “Remove Exchange Files” where it just hanged and did not proceed.  The environment was running Exchange 2007 SP2 on Windows Server 2008 Standard SP2.

After a quick search I found that I ran into a known uninstall issue. The hanging in removing the Exchange files is caused by a final Powershell script that won’t run so instead of ending in failure it just hangs and gives the appearance that it is still processing the removal.

All you need to do is open task manager and kill powershell.exe.  Doing this will automatically spawn a new Powershell and allow the removal to complete.  In my situation, the removal completed within 10 seconds of the new Powershell launching.