Windows server system service overview and network port requirements

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

As security becomes ever more paramount and network administrators implement extra layers of security, including client PCs running personal firewall products, systems administrators and support staff need to know which ports and protocols Microsoft operating systems and programs require for network connectivity in a segmented network.

Microsoft have addressed this with Microsoft knowledge base article 832017, which details the essential network ports, protocols and services that are used by Microsoft client and server operating systems, server-based programs and their subcomponents in the Microsoft Windows server system.

Windows Update Services name change?

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

Windows Update Services (WUS) is the new name for Software Update Services (SUS). Except it might not be. Last week, Thomas Lee (who is well placed to comment on such things, being both a Microsoft Regional Director and an MVP) quite rightly pointed out that WUS a) sounds bad; and b) is not an accurate description of what the product does.

For more information about SUS/WUS see SUSserver.com and the Windows Update Services Wiki.

Setting the default NumLock state in Windows at logon time

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

My current client has a large number of user accounts with names that are mostly numerical. We discovered that, no matter what the BIOS settings were, NumLock is off by default in the Log On to Windows dialog; however, it is possible to change this as described in Microsoft knowledge base article 154529.

Restoring data in Outlook Express

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

I don’t use Outlook Express personally, but I recently rebuilt my father-in-law’s PC and imported his settings from the old disk. I didn’t have a clue where Outlook Express stored its data, but came across an article on the iOpus website about backing up Outlook Express. The old system was non-functional, so I didn’t follow the whole article, but it gave me the information I needed to find all the .DBX files with the mail data and the .WAB address book file.

Best practices for maintaining your computer at work

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

A couple of years back, I worked as a Project Manager in the IT department for a major fashion design, marketing and retail company. My main project provided a standard desktop operating environment, along with replacement mail and directory services, across Europe, vastly improving the overall reliability of the IT platform and the resultant user experience.

Being a retailer, our IT infrastructure budget was not huge, and it seemed that I was forever explaining why we “locked down” the desktop, and why we could not support users’ own devices on our network, be they notebooks, PDAs, or mobile phones (synchronising with our PCs). We had corporate standards, and they were set for good reasons (mainly supportability and reliability). It really didn’t help when senior executives started to buy Blackberry devices and expected them to work with our e-mail servers (and when the IT Director’s view was one of “just make it work”… but without an associated budget). Another bugbear was educating users not to open suspicious e-mails and attachments. On top of that, our users were spread across Europe, and there were cultural and legal differences which affected the way in which users considered “ownership” of their PCs and associated data (whether work PCs should be available for personal use, etc.).

Now Microsoft has published a document which would have been a really useful summary for my users (8 ways to help maintain your computer and devices at work). It may be a bit “high level”, but it is written for end users and it raises some valid points.

Actually, I think that the whole Microsoft At Work section of the Microsoft website is worth a look, with articles including:

I recommend that anyone who uses a computer at home or work, or who is responsible for supporting users in their daily IT activities should take a look.

Microsoft error code lookup tool

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

Today’s Windows IT Pro magazine network Windows Tips and Tricks Update, highlights Microsoft’s Error Code Lookup tool. The tool can be used to determine error values from decimal and hexadecimal error codes presented by Windows operating systems, looking up one or more values at a time and showing informational data associated with the value where it is available.

(Note that although the Web page is called “Exchange Server Error Code Look-up” the tool actually handles Windows operating system error codes).

Microsoft launches Partner Pack for Windows

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

Microsoft has released another add-on pack for Windows, but this time most of the software is supplied by partners. The Partner Pack for Windows is aimed at consumers and includes:

  • Games (Super Slyder and Serpentine).
  • Homestead Photosite (web photo publishing application).
  • Microsoft Time Zone (displays the time in multiple zones around the world).
  • Computer Associates eTrust (antivirus software).
  • Google Deskbar (desktop search tool).
  • Desktop Media Gallery (templates and images).
  • Onfolio Express (research tool which runs within Internet Explorer).
  • Post-it Software Notes (software version of a post-it note).
  • PayPal Payment Wizard (add PayPal payment buttons to e-mail).
  • Microsoft USB Flash Drive Manager (backup and restore files to/from USB flash drives).

Some of this may be useful, some not, but it’s interesting to see Microsoft shipping Google Deskbar at the same time as developing their own desktop search capabilities.

Avoiding using hard-coded pathnames in scripts

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

Another gem gained from my anonymous colleague is the use of the %0 environment variable (which returns the current command name in the same way as %1, %2, etc. return any arguments passed to the command) to avoid using hard coded paths in scripts. For example, %0\..\ refers to the directory in which the file is located, and can be used where a pathname is required, but the drive letter may vary, e.g. %0\..\scripts\ (where the scripts folder could be on any available drive, but always the same drive as the calling command).

Scripting the deletion of registry keys and values

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

One of my colleagues (who wishes to remain anonymous) gave me a great tip this morning – how to delete registry keys and values using a .REG file.

To delete a value, set its contents to – in the .REG file, e.g.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MyKey]
"MyValue"=-

Or to delete a key, add a – sign after the leading [ in the .REG file, e.g. [-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MyKey]

Apparently this works on all version of Windows from Windows 2000 onwards, although I’ve only tried it with Windows XP Professional.

Handy script for determining when a user last logged on

This content is 20 years old. I don't routinely update old blog posts as they are only intended to represent a view at a particular point in time. Please be warned that the information here may be out of date.

I recently came across a handy script which examines a Windows NT/2000/XP/2003 computer or an Active Directory domain controller to read out the last log on time for each user. By piping the output to a text file, it could be useful for sorting and identifying redundant user accounts.