<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>KB on Mexicali IT</title><link>https://mxlit.com/categories/kb/</link><description>Recent content in KB on Mexicali IT</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 16:20:00 -0700</lastBuildDate><atom:link href="https://mxlit.com/categories/kb/index.xml" rel="self" type="application/rss+xml"/><item><title>Zero-Trust Endpoint Isolation: Containment via Offline SIDs</title><link>https://mxlit.com/kb-00088/</link><pubDate>Mon, 30 Mar 2026 16:20:00 -0700</pubDate><guid>https://mxlit.com/kb-00088/</guid><description>&lt;p&gt;When a user is terminated in &lt;strong&gt;Active Directory&lt;/strong&gt;, the first line of defense is instantly engaged: denial of corporate access, which disconnects their VPN sessions and blocks interactive logins through the Domain Controller (DC).&lt;/p&gt;
&lt;p&gt;However, there is a critical risk vector. If the employee (or a malicious attacker) has their corporate laptop, the local Windows &lt;code&gt;Cached Credentials&lt;/code&gt; will continue to operate. This allows them to log into the machine &amp;ldquo;offline&amp;rdquo; (from the domain) and &lt;strong&gt;extract sensitive files locally onto a USB drive&lt;/strong&gt; without needing to be connected to the corporate VPN or internal network.&lt;/p&gt;</description></item><item><title>Isilon OneFS: Immutable Data Protection against Ransomware with SmartLock (WORM)</title><link>https://mxlit.com/kb-00087/</link><pubDate>Sun, 22 Mar 2026 11:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00087/</guid><description>&lt;p&gt;In today’s cybersecurity landscape, traditional storage defenses are no longer sufficient to contain advanced attacks. When a threat actor compromises administrator credentials, standard backups and storage &lt;em&gt;snapshots&lt;/em&gt; can be easily deleted or aggressively encrypted. This is where &lt;strong&gt;SmartLock&lt;/strong&gt; for Dell Isilon (PowerScale) comes into play.&lt;/p&gt;
&lt;p&gt;SmartLock provides true file-system-level immutability using &lt;strong&gt;WORM (Write-Once, Read-Many)&lt;/strong&gt; technology. Once a file is deliberately locked (committed) inside a SmartLock domain, it cannot be modified, overwritten, or deleted by &lt;em&gt;anyone&lt;/em&gt; (not even by a sophisticated ransomware attack deploying &lt;em&gt;root&lt;/em&gt; privileges) until its retention period securely expires.&lt;/p&gt;</description></item><item><title>Isilon OneFS: Transparent Cloud Tiering &amp; Cost Optimization with CloudPools (AWS S3)</title><link>https://mxlit.com/kb-00086/</link><pubDate>Sun, 22 Mar 2026 03:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00086/</guid><description>&lt;p&gt;As data volumes continue to grow explosively, a significant percentage inevitably becomes &amp;ldquo;cold data&amp;rdquo;—historical files that are rarely accessed. Keeping this inactive data sitting on high-performance primary storage is extremely cost-inefficient.&lt;/p&gt;
&lt;p&gt;To solve this, OneFS integrates &lt;strong&gt;CloudPools&lt;/strong&gt;, a powerful tiering feature that allows you to seamlessly move inactive data blocks to an external object storage platform like Amazon S3, Azure Blob, or a local ECS. When data is tiered, OneFS leaves behind a reference file (a SmartLink, or &lt;em&gt;stub&lt;/em&gt;) on the local file system. To end-users connected via SMB or NFS, the file still appears in its original location as normal; however, when they try to open it, the cluster retrieves the payload from the cloud transparently.&lt;/p&gt;</description></item><item><title>Isilon OneFS: Storage Efficiency - Implementing SmartDedupe</title><link>https://mxlit.com/kb-00085/</link><pubDate>Sat, 21 Mar 2026 10:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00085/</guid><description>&lt;p&gt;As users consume storage, it is common to find redundant data (documents copied multiple times, identical ISOs, or duplicated backups). To mitigate this waste of capacity, Isilon offers &lt;strong&gt;SmartDedupe&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Unlike other storage systems that perform inline deduplication, Isilon utilizes &lt;strong&gt;post-process deduplication&lt;/strong&gt;. This means data is written to disk immediately with maximum performance, and subsequently, a background job (&lt;em&gt;Job Engine&lt;/em&gt;) scans the file system for identical 8KB blocks to consolidate them and free up space.&lt;/p&gt;</description></item><item><title>Isilon OneFS: Local Protection - Retention Strategies with SnapshotIQ</title><link>https://mxlit.com/kb-00084/</link><pubDate>Sat, 21 Mar 2026 00:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00084/</guid><description>&lt;p&gt;With our authentication, access zones, and capacity limits in place, our Isilon cluster is functionally ready for production. However, a production environment is only as good as its recovery strategy. In the world of Scale-Out NAS, the first line of defense against accidental file deletion or corruption is &lt;strong&gt;SnapshotIQ&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;SnapshotIQ allows for virtually unlimited snapshots (up to 1,024 per directory) with negligible performance impact. In this article, we will configure an automated retention strategy and explore how users can recover their own files without IT intervention.&lt;/p&gt;</description></item><item><title>Isilon OneFS: Capacity Management - Implementing SmartQuotas</title><link>https://mxlit.com/kb-00083/</link><pubDate>Fri, 20 Mar 2026 22:13:00 -0700</pubDate><guid>https://mxlit.com/kb-00083/</guid><description>&lt;p&gt;We have successfully joined our cluster to Active Directory and established a robust NTFS permission architecture. Now, we must ensure our storage environment remains stable and is not saturated through uncontrolled usage. In Isilon, this is managed through the &lt;strong&gt;SmartQuotas&lt;/strong&gt; license.&lt;/p&gt;
&lt;p&gt;SmartQuotas allows us to limit space at three distinct levels (Directory, User, or Group) and offers several types of limits:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Advisory (Informational)&lt;/strong&gt;: Only generates alerts; does not block usage. Ideal for transparent monitoring.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Soft Limit&lt;/strong&gt;: Allows users to temporarily exceed the threshold (useful for heavy rendering or month-end processes) but generates critical notifications and, after a grace period, becomes a block.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hard Limit&lt;/strong&gt;: Upon reaching the threshold, the file system returns a &amp;ldquo;Disk Full&amp;rdquo; error to the user. Not a single additional kilobyte is allowed.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In this guide, we will implement a &lt;strong&gt;Directory-level Hard Limit&lt;/strong&gt; for our departmental production folder.&lt;/p&gt;</description></item><item><title>Isilon OneFS: Data Presentation - SMB Share Configuration and Permission Management</title><link>https://mxlit.com/kb-00082/</link><pubDate>Fri, 20 Mar 2026 19:34:00 -0700</pubDate><guid>https://mxlit.com/kb-00082/</guid><description>&lt;p&gt;Our Isilon cluster is now a trusted member of Active Directory, and users are encapsulated within their own dedicated &lt;em&gt;Access Zone&lt;/em&gt;. However, up to this point, the storage remains an opaque block. It is time to open the doors and present that storage to the network.&lt;/p&gt;
&lt;p&gt;In this article, we will create our first network-accessible resource (SMB Share) and address one of the greatest debates in storage administration: the correct management of permissions.&lt;/p&gt;</description></item><item><title>Isilon OneFS: Identity Integration - Access Zones and Active Directory Joining</title><link>https://mxlit.com/kb-00081/</link><pubDate>Fri, 20 Mar 2026 19:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00081/</guid><description>&lt;p&gt;We have reached one of the most critical architectural milestones of the entire deployment. So far, our cluster is live on the network, utilizing dynamic routing with SmartConnect and secured via SSL management. However, an enterprise NAS serves little purpose if users must memorize new credentials or if management traffic is mingled with high-performance production data.&lt;/p&gt;
&lt;p&gt;In this article, we will join our Dell EMC Isilon cluster to our Active Directory domain (&lt;code&gt;mxlit.com&lt;/code&gt;) and configure true &lt;strong&gt;multi-tenancy&lt;/strong&gt; by creating our first dedicated &lt;strong&gt;Access Zone&lt;/strong&gt;.&lt;/p&gt;</description></item><item><title>Isilon OneFS: Securing the WebUI with SmartConnect and SSL Certificates</title><link>https://mxlit.com/kb-00080/</link><pubDate>Fri, 20 Mar 2026 01:03:00 -0700</pubDate><guid>https://mxlit.com/kb-00080/</guid><description>&lt;p&gt;Managing an enterprise-grade storage cluster through a static IP address while dealing with the annoying &amp;ldquo;Site not secure&amp;rdquo; browser warning is not an acceptable practice in a production environment. Beyond the visual nuisance, it bypasses critical identity verification and can lead to man-in-the-middle vulnerabilities during administrative sessions.&lt;/p&gt;
&lt;p&gt;In this guide, we will elevate your Dell EMC Isilon cluster&amp;rsquo;s management security. We will configure a load-balanced FQDN for our management network using SmartConnect and subsequently issue and install a valid SSL certificate using an internal Windows Server Certificate Authority (CA).&lt;/p&gt;</description></item><item><title>Isilon OneFS: The Magic of SmartConnect and DNS Delegation</title><link>https://mxlit.com/kb-00079/</link><pubDate>Thu, 19 Mar 2026 00:47:15 -0700</pubDate><guid>https://mxlit.com/kb-00079/</guid><description>&lt;p&gt;If you have followed our previous guides, you now have a 3-node virtual Isilon cluster running with Enterprise licenses activated. However, at this point, it is still just a group of servers. To transform Isilon into a true &lt;em&gt;Scale-Out&lt;/em&gt; NAS—where all nodes work as a single brain—we need to configure its &amp;ldquo;secret sauce&amp;rdquo;: &lt;strong&gt;SmartConnect&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;In this article, we will break down the architecture behind SmartConnect, why it is so powerful, and how to configure it step-by-step using Windows Server DNS, the industry standard.&lt;/p&gt;</description></item><item><title>Isilon OneFS: Unlocking Enterprise features (Licensing)</title><link>https://mxlit.com/kb-00078/</link><pubDate>Wed, 18 Mar 2026 23:28:12 -0700</pubDate><guid>https://mxlit.com/kb-00078/</guid><description>&lt;p&gt;When building a Dell EMC Isilon (OneFS) laboratory on Proxmox or VMware, you may notice that by default, many advanced features in the web interface—such as replication, deduplication, or quotas—appear locked or inactive.&lt;/p&gt;
&lt;p&gt;To truly simulate a production environment, you need access to the full suite of enterprise tools. In this guide, we will look at how to activate these features directly from the command line for your homelab, bypassing the need for corporate license files.&lt;/p&gt;</description></item><item><title>Isilon OneFS: Joining nodes to the cluster</title><link>https://mxlit.com/kb-00077/</link><pubDate>Wed, 18 Mar 2026 22:52:16 -0700</pubDate><guid>https://mxlit.com/kb-00077/</guid><description>&lt;p&gt;Integrating additional nodes into an Isilon cluster is one of the most rewarding processes in the OneFS architecture. Once the first node is operational, expanding capacity and performance is nearly automatic.&lt;/p&gt;
&lt;p&gt;In this guide, we detail the steps to join Node 2 (and subsequent nodes) to our lab cluster in Proxmox.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="prerequisites-quick-checklist"&gt;Prerequisites (Quick Checklist)&lt;/h2&gt;
&lt;p&gt;Before pressing the start button, ensure that the virtual machine (e.g., VM 202) strictly complies with the defined architecture:&lt;/p&gt;</description></item><item><title>Isilon OneFS: Protecting the Simulator on Hypervisors (NVRAM and Cache)</title><link>https://mxlit.com/kb-00076/</link><pubDate>Wed, 18 Mar 2026 20:05:41 -0700</pubDate><guid>https://mxlit.com/kb-00076/</guid><description>&lt;p&gt;Deploying a virtual Dell EMC Isilon (OneFS) cluster in your lab environment with Proxmox is an excellent way to test enterprise features like SyncIQ, SmartPools, or SmartConnect. However, this simulator has a critical &amp;ldquo;Achilles&amp;rsquo; heel&amp;rdquo; when running on general-purpose hypervisors: susceptibility to file system corruption during sudden power outages.&lt;/p&gt;
&lt;p&gt;Here I explain exactly why this happens and how to fix it by adjusting storage policies in Proxmox.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="the-problem-absence-of-physical-nvram"&gt;The Problem: Absence of Physical NVRAM&lt;/h2&gt;
&lt;p&gt;In a production environment, physical Isilon nodes rely heavily on a battery-backed NVRAM (Non-Volatile RAM) card. This memory acts as an ultra-fast and secure &lt;strong&gt;journal&lt;/strong&gt;. Every write transaction enters the NVRAM first; if there is a power outage, the battery ensures the data is written to disk once power returns.&lt;/p&gt;</description></item><item><title>Umami: Solving Geolocation (City and Region) with Cloudflare Tunnels</title><link>https://mxlit.com/kb-00075/</link><pubDate>Tue, 17 Mar 2026 19:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00075/</guid><description>&lt;p&gt;Umami is one of the best privacy-focused, self-hosted alternatives for web analytics. However, an extremely common issue when deploying it behind &lt;strong&gt;Cloudflare Tunnels&lt;/strong&gt; is that the dashboard identifies the visitor&amp;rsquo;s country, but the &lt;strong&gt;City&lt;/strong&gt; and &lt;strong&gt;Region&lt;/strong&gt; fields appear empty (&lt;code&gt;—&lt;/code&gt;).&lt;/p&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00075/index-1.png" alt=""&gt;&lt;/p&gt;
&lt;p&gt;In this guide, we will look at how to fix this telemetry &amp;ldquo;short circuit&amp;rdquo; by correctly configuring HTTP headers so that Cloudflare provides Umami with all the geographic information it needs.&lt;/p&gt;</description></item><item><title>Isilon OneFS: Virtual Cluster Deployment - Part 1: Installation &amp; Initial Configuration</title><link>https://mxlit.com/kb-00074/</link><pubDate>Tue, 17 Mar 2026 01:45:00 -0700</pubDate><guid>https://mxlit.com/kb-00074/</guid><description>&lt;p&gt;Welcome to the first installment of the &lt;strong&gt;Isilon / PowerScale&lt;/strong&gt; series. In this documentation, we will explore the depths of Dell EMC&amp;rsquo;s scale-out NAS platform, starting from the ground up. Whether you are building a lab for testing or preparing for an enterprise deployment, this guide will provide the technical foundations needed to stand up a virtual Isilon cluster on Proxmox.&lt;/p&gt;
&lt;hr&gt;
&lt;h2 id="phase-1-mac-vlan-and-vm-configuration-in-proxmox"&gt;Phase 1: MAC, VLAN, and VM Configuration in Proxmox&lt;/h2&gt;
&lt;p&gt;Create a VM without disks, with 3 Network Interface Cards (NICs), a minimum of 6GB of RAM, and 4 vCPUs. Edit the hardware for each cloned node to match your network design exactly.&lt;/p&gt;</description></item><item><title>GitHub: Hybrid Cloud CI/CD - Building a Zero-Downtime Pipeline with Self-Hosted Runners</title><link>https://mxlit.com/kb-00073/</link><pubDate>Mon, 16 Mar 2026 00:00:01 -0700</pubDate><guid>https://mxlit.com/kb-00073/</guid><description>&lt;h3 id="introduction-the-evolution-of-a-pipeline"&gt;Introduction: The Evolution of a Pipeline&lt;/h3&gt;
&lt;p&gt;In the previous posts of this series, I detailed my journey from a broken, 25-minute SFTP deployment bottleneck to a hyper-optimized &lt;strong&gt;Rsync&lt;/strong&gt; pipeline that completes in mere seconds. But optimization is only half the battle in Enterprise Architecture. The other half is &lt;strong&gt;Resiliency&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Currently, my pipeline relies entirely on Microsoft&amp;rsquo;s GitHub Cloud infrastructure. While GitHub Actions provides 2,000 free CI/CD minutes per month, relying 100% on external compute resources violates a core principle of self-hosting: &lt;em&gt;Control&lt;/em&gt;. What happens if I burn through my free tier limits during intense development weeks? What if GitHub&amp;rsquo;s shared runner queues are experiencing an outage?&lt;/p&gt;</description></item><item><title>Cloudflare: Cryptographic Security for Your Domain with DNSSEC</title><link>https://mxlit.com/kb-00072/</link><pubDate>Sun, 15 Mar 2026 14:30:00 -0700</pubDate><guid>https://mxlit.com/kb-00072/</guid><description>&lt;p&gt;The Domain Name System (DNS) is the Internet&amp;rsquo;s address book, but by original design, it is not secure. When a user types a domain into their browser, the query travels in plain text and blindly trusts the response it receives. This is where &lt;strong&gt;DNSSEC (Domain Name System Security Extensions)&lt;/strong&gt; comes in.&lt;/p&gt;
&lt;p&gt;DNSSEC does not encrypt DNS queries, but rather &lt;strong&gt;digitally signs them&lt;/strong&gt;. It works through a public-key cryptography system that guarantees DNS resolvers (such as those from Google, Cloudflare, or your ISP) that the IP address they are being directed to is legitimate and has not been altered along the way.&lt;/p&gt;</description></item><item><title>Umami: Deploying Umami Analytics with Docker</title><link>https://mxlit.com/kb-00071/</link><pubDate>Sun, 15 Mar 2026 01:35:00 -0700</pubDate><guid>https://mxlit.com/kb-00071/</guid><description>&lt;p&gt;Maintaining absolute control over your visitors&amp;rsquo; demographic and behavioral data is essential in the world of Enterprise technology. Umami Analytics has become the leading alternative for those seeking a lightweight, privacy-friendly, and, above all, easy-to-deploy solution through Docker.&lt;/p&gt;
&lt;h3 id="why-self-hosted-over-the-cloud-version"&gt;Why Self-Hosted over the Cloud version?&lt;/h3&gt;
&lt;p&gt;While Umami offers a cloud version, self-hosting provides undeniable advantages for technical or corporate profiles:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;No retention limits:&lt;/strong&gt; The cloud&amp;rsquo;s free version often has limits on how many events you can process or how long they are stored. On your own server, the only limit is your storage.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Sovereignty:&lt;/strong&gt; Data never leaves your infrastructure. This is vital for privacy compliance or simply for total control.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Privacy by Design:&lt;/strong&gt; By not relying on third-party servers, you eliminate an external tracking point.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero Operational Cost:&lt;/strong&gt; If you already have a server with Docker, adding an Umami container doesn&amp;rsquo;t increase your monthly costs.&lt;/li&gt;
&lt;/ol&gt;
&lt;hr&gt;
&lt;h3 id="1-environment-preparation"&gt;1. Environment Preparation&lt;/h3&gt;
&lt;p&gt;Umami requires a database to store metrics. The cleanest and most self-contained way to deploy it is by using Docker Compose to spin up both the Umami application and a PostgreSQL database in the same stack.&lt;/p&gt;</description></item><item><title>GitHub Actions: Optimizing CI/CD Deployments (From SFTP to Rsync)</title><link>https://mxlit.com/kb-00070/</link><pubDate>Thu, 12 Mar 2026 16:41:54 -0700</pubDate><guid>https://mxlit.com/kb-00070/</guid><description>&lt;h3 id="introduction-the-hidden-cost-of-it-just-works"&gt;Introduction: The Hidden Cost of &amp;ldquo;It Just Works&amp;rdquo;&lt;/h3&gt;
&lt;p&gt;When I first migrated this Knowledge Base to Hugo and set up a CI/CD pipeline using GitHub Actions, my primary goal was simplicity. I needed a way to push my Markdown files to GitHub and have a runner automatically compile the static HTML and send it to my Nginx container hosted on a remote VPS.&lt;/p&gt;
&lt;p&gt;To achieve this, I used a popular, off-the-shelf SFTP Deployment Action. For the first few days, it was magical. I would commit a new post, and within &lt;strong&gt;2 minutes&lt;/strong&gt;, the site was live.&lt;/p&gt;</description></item><item><title>TrueNAS: Enable Computer Management &amp; OpenFiles Access (Access Denied Fix)</title><link>https://mxlit.com/kb-00069/</link><pubDate>Tue, 10 Mar 2026 22:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00069/</guid><description>&lt;p&gt;\nimage: &amp;ldquo;truenas_thumbnail.jpg&amp;rdquo;&lt;/p&gt;
&lt;p&gt;When managing a TrueNAS or FreeNAS file server integrated with Microsoft Active Directory, you may encounter a &lt;code&gt;You do not have permissions to see the list of files opened by Windows clients.&lt;/code&gt; or &lt;code&gt;NT_STATUS_ACCESS_DENIED&lt;/code&gt; error when attempting to connect using native Windows RPC administrative tools.&lt;/p&gt;
&lt;p&gt;This behavior is most prominent when:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Trying to open the &lt;code&gt;fsmgmt.msc&lt;/code&gt; (Computer Management -&amp;gt; Shared Folders) MMC snap-in pointing to your NAS.
&lt;img src="https://mxlit.com/kb-00069/image-5.png" alt="alt text"&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00069/image-6.png" alt="alt text"&gt;&lt;/p&gt;</description></item><item><title>Proxmox: How to Resolve "Bulk Start Waiting for Quorum"</title><link>https://mxlit.com/kb-00068/</link><pubDate>Tue, 10 Mar 2026 21:30:00 -0700</pubDate><guid>https://mxlit.com/kb-00068/</guid><description>&lt;p&gt;When running a Proxmox VE cluster, a sudden power outage or network partition can bring down multiple nodes simultaneously. When a single node powers back on, it will typically refuse to start its Virtual Machines, freezing at a &lt;strong&gt;&amp;ldquo;bulk start waiting for quorum&amp;rdquo;&lt;/strong&gt; message.&lt;/p&gt;
&lt;p&gt;Proxmox does this intentionally: to prevent &amp;ldquo;split-brain&amp;rdquo; scenarios where two isolated nodes try to run the same VMs at the same time and corrupt storage, the cluster enforces &lt;em&gt;Quorum&lt;/em&gt; (a strict majority of active nodes). If a node cannot see the majority of the cluster, it locks down.&lt;/p&gt;</description></item><item><title>Proxmox: How to Import Hyper-V VMs (.VHDX) to Proxmox</title><link>https://mxlit.com/kb-00067/</link><pubDate>Tue, 10 Mar 2026 21:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00067/</guid><description>&lt;p&gt;Migrating your infrastructure from Microsoft Hyper-V to Proxmox VE is a common step for organizations seeking a powerful, open-source virtualization platform. While Proxmox does not natively run &lt;code&gt;.vhdx&lt;/code&gt; files, its underlying QEMU hypervisor architecture allows you to easily import and seamlessly convert Hyper-V disks into Proxmox-native formats (RAW or QCOW2) directly from the command line.&lt;/p&gt;
&lt;p&gt;This guide will walk you through the process of exporting a Virtual Machine from Hyper-V, transferring the virtual disk, converting it into a Proxmox VM, and configuring the necessary VirtIO drivers to ensure Windows boots successfully.&lt;/p&gt;</description></item><item><title>Proxmox: How to Expand Local Storage (Remove Local-LVM)</title><link>https://mxlit.com/kb-00066/</link><pubDate>Tue, 10 Mar 2026 20:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00066/</guid><description>&lt;p&gt;When you install Proxmox VE on a single driveâ€”for instance, a 1TB SSDâ€”the installer automatically partitions the space into &lt;code&gt;local&lt;/code&gt; (root file system, typically for ISOs and backups) and &lt;code&gt;local-lvm&lt;/code&gt; (block storage for VM disks). However, for many Homelab enthusiasts and small-scale deployments, this division is often unnecessary and can lead to wasted space on one partition while the other is full.&lt;/p&gt;
&lt;p&gt;This guide explains how to safely remove the &lt;code&gt;local-lvm&lt;/code&gt; partition and expand your primary &lt;code&gt;local&lt;/code&gt; (root) filesystem to claim 100% of your disk&amp;rsquo;s usable space.&lt;/p&gt;</description></item><item><title>Proxmox: How to Add Nodes (Hosts) to a Cluster</title><link>https://mxlit.com/kb-00065/</link><pubDate>Tue, 10 Mar 2026 19:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00065/</guid><description>&lt;p&gt;Scaling your virtualization environment by creating a Proxmox VE Cluster allows you to centrally manage multiple physical nodes from a single web interface. Clustering enables advanced enterprise features such as High Availability (HA), live migration, and shared storage management. This guide will show you how to securely join a new, standalone Proxmox host into an existing cluster.&lt;/p&gt;
&lt;h2 id="1-retrieve-cluster-join-information"&gt;1. Retrieve Cluster Join Information&lt;/h2&gt;
&lt;p&gt;First, log into the web interface of an existing node that is &lt;strong&gt;already part of the cluster&lt;/strong&gt; you wish to join.&lt;/p&gt;</description></item><item><title>Proxmox: How to Add Active Directory Authentication (LDAP)</title><link>https://mxlit.com/kb-00064/</link><pubDate>Tue, 10 Mar 2026 18:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00064/</guid><description>&lt;p&gt;Integrating Proxmox Virtual Environment (VE) with Microsoft Active Directory allows you to centralize user management and apply your organization&amp;rsquo;s existing security policies to your virtualization clusters. By connecting Proxmox to AD via LDAP, administrators and operators can log in using their standard domain credentials, eliminating the need to manage separate local accounts on each Proxmox node.&lt;/p&gt;
&lt;h2 id="1-add-the-active-directory-realm"&gt;1. Add the Active Directory Realm&lt;/h2&gt;
&lt;p&gt;Navigate to your Proxmox VE web interface. At the top of the left-hand cluster menu, click on &lt;strong&gt;Datacenter&lt;/strong&gt;, then select &lt;strong&gt;Realms&lt;/strong&gt;.&lt;/p&gt;</description></item><item><title>Proxmox VE: How to Apply a Valid Let's Encrypt SSL Certificate via ACME DNS</title><link>https://mxlit.com/kb-00063/</link><pubDate>Tue, 10 Mar 2026 17:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00063/</guid><description>&lt;p&gt;By default, Proxmox VE generates a self-signed SSL certificate during installation. While this encrypts the traffic between your browser and the server, it causes modern browsers to throw aggressive &amp;ldquo;Your connection is not private&amp;rdquo; warnings.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Why should we apply a valid SSL Certificate?&lt;/strong&gt;
In an enterprise or advanced homelab environment, ignoring certificate warnings is a dangerous habit. It trains administrators to click &amp;ldquo;Proceed Anyway&amp;rdquo;, which leaves them vulnerable to genuine Man-in-the-Middle (MitM) attacks. Furthermore, integrating Proxmox with external APIs, backup servers, or automation tools (like Terraform) often fails outright if the endpoint does not possess a mathematically verifiable, globally trusted SSL certificate.&lt;/p&gt;</description></item><item><title>Proxmox VE: Post-Install Configuration using Helper Scripts</title><link>https://mxlit.com/kb-00062/</link><pubDate>Tue, 10 Mar 2026 16:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00062/</guid><description>&lt;p&gt;After completing the bare-metal installation of Proxmox VE, you will quickly notice a few initial hurdles: the persistent &amp;ldquo;No Valid Subscription&amp;rdquo; validation nag, the inability to download updates because the &amp;ldquo;Enterprise&amp;rdquo; repository is enabled by default, and a few unoptimized cluster settings.&lt;/p&gt;
&lt;p&gt;To fix all of this simultaneously, we will use a legendary community tool that has saved thousands of hours for homelabbers and system administrators alike: &lt;strong&gt;Proxmox VE Helper-Scripts&lt;/strong&gt;.&lt;/p&gt;</description></item><item><title>Proxmox VE: Bare-Metal Installation &amp; Boot Partitioning Guide</title><link>https://mxlit.com/kb-00061/</link><pubDate>Tue, 10 Mar 2026 15:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00061/</guid><description>&lt;p&gt;When it comes to building an enterprise-grade homelab or deploying production hypervisors on a budget, &lt;strong&gt;Proxmox Virtual Environment (VE)&lt;/strong&gt; is the undisputed king. Built on Debian GNU/Linux, it provides native integration with KVM (Kernel-based Virtual Machine) for virtual machines and LXC for lightweight containers, completely free of licensing traps.&lt;/p&gt;
&lt;p&gt;In this guide, we will walk through the bare-metal installation of Proxmox VE, paying special attention to the often-overlooked storage partitioning step to ensure you aren&amp;rsquo;t leaving performance on the table.&lt;/p&gt;</description></item><item><title>TrueNAS: How to Apply System Updates</title><link>https://mxlit.com/kb-00060/</link><pubDate>Mon, 09 Mar 2026 15:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00060/</guid><description>&lt;p&gt;Keeping your TrueNAS installation up-to-date is crucial for maintaining system stability, improving ZFS performance, and patching critical security vulnerabilities. Fortunately, TrueNAS features a highly robust, built-in updater that handles downloading patches, applying them to a new boot environment, and safely rebooting the system without putting your data at risk.&lt;/p&gt;
&lt;p&gt;This short guide demonstrates how to check for and apply system updates to your TrueNAS server.&lt;/p&gt;
&lt;h2 id="step-by-step-guide"&gt;Step-by-Step Guide&lt;/h2&gt;
&lt;h3 id="1-check-for-updates"&gt;1. Check for Updates&lt;/h3&gt;
&lt;p&gt;Log into your TrueNAS web interface as an administrator. Navigate to &lt;strong&gt;System&lt;/strong&gt; &amp;gt; &lt;strong&gt;Update&lt;/strong&gt; in the left-hand menu.
&lt;img src="https://mxlit.com/kb-00060/20250110004429.png" alt="Navigate to System Update"&gt;&lt;/p&gt;</description></item><item><title>TrueNAS: How to Create an SMB Share Drive</title><link>https://mxlit.com/kb-00059/</link><pubDate>Mon, 09 Mar 2026 14:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00059/</guid><description>&lt;p&gt;The primary purpose of deploying TrueNAS is often to act as a highly resilient network file server. Server Message Block (SMB), also known as CIFS, is the standard file-sharing protocol natively used by Windows, but it is also widely supported by macOS and Linux systems. To share data across your network, you must first create an isolated filesystem container (a ZFS Dataset) and then expose that dataset via the SMB service.&lt;/p&gt;</description></item><item><title>TrueNAS: How to Join an Active Directory Domain</title><link>https://mxlit.com/kb-00058/</link><pubDate>Mon, 09 Mar 2026 13:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00058/</guid><description>&lt;p&gt;When deploying TrueNAS in an enterprise environment, integrating it with a central Windows Server Active Directory (AD) domain is essential. Joining the domain allows TrueNAS to directly query your domain controllers for users and groups, eliminating the need to recreate local accounts. You can then assign NTFS-style permissions (ACLs) to your SMB shares seamlessly.&lt;/p&gt;
&lt;p&gt;This guide details the procedure for joining your TrueNAS storage server into an Active Directory domain.&lt;/p&gt;</description></item><item><title>TrueNAS: How to Import and Apply SSL Certificates</title><link>https://mxlit.com/kb-00057/</link><pubDate>Mon, 09 Mar 2026 12:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00057/</guid><description>&lt;p&gt;Securing your TrueNAS web interface with a valid SSL/TLS certificate is a critical step in deploying a production-ready storage server, especially when integrating it with enterprise Active Directory environments or managing it over a network. By default, TrueNAS generates a self-signed certificate, which modern browsers flag as insecure.&lt;/p&gt;
&lt;p&gt;This guide details the process of importing an existing SSL certificate (and its private key)â€”often issued by an internal Windows Certificate Authority or a provider like Let&amp;rsquo;s Encryptâ€”and applying it to the TrueNAS graphical interface.&lt;/p&gt;</description></item><item><title>TrueNAS: How to Create a New ZFS Storage Pool</title><link>https://mxlit.com/kb-00056/</link><pubDate>Mon, 09 Mar 2026 11:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00056/</guid><description>&lt;p&gt;The core of any TrueNAS deployment is its storage configuration. At the heart of this system is the ZFS file system, which organizes physical disks into logical groupings called &lt;em&gt;vdevs&lt;/em&gt; (Virtual Devices) and aggregates them into a &lt;em&gt;Pool&lt;/em&gt;. Creating a robust storage pool is your first step toward configuring data shares, taking snapshots, and securing your enterprise or homelab data.&lt;/p&gt;
&lt;p&gt;This guide will walk you through the process of creating a new ZFS Storage Pool in TrueNAS.&lt;/p&gt;</description></item><item><title>TrueNAS: How to Install and Configure the Ultimate ZFS Storage OS</title><link>https://mxlit.com/kb-00055/</link><pubDate>Mon, 09 Mar 2026 10:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00055/</guid><description>&lt;h2 id="introduction-what-is-truenas"&gt;Introduction: What is TrueNAS?&lt;/h2&gt;
&lt;p&gt;TrueNAS is universally recognized as the world&amp;rsquo;s most robust Open Storage operating system, directly heavily relying on the legendary ZFS (Zettabyte File System) architecture. It delivers absolute enterprise-grade features straight out of the box: proactive data self-healing, intelligent RAM tier caching (ARC), and unlimited instantaneous snapshots.&lt;/p&gt;
&lt;p&gt;Whether deploying the FreeBSD-based &lt;strong&gt;CORE&lt;/strong&gt; or the modern Debian Linux-based &lt;strong&gt;SCALE&lt;/strong&gt;, TrueNAS effectively transforms commodity servers into high-performance, resilient storage arrays meticulously built to serve virtualization clusters, heavy backup targets, and enterprise media streams.&lt;/p&gt;</description></item><item><title>Windows Server: How to Fix Software Protection Activation Errors</title><link>https://mxlit.com/kb-00054/</link><pubDate>Sun, 08 Mar 2026 18:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00054/</guid><description>&lt;p&gt;When deploying new Windows Servers from templates, cloning VMs, or performing major system upgrades, you might run into a frustrating issue where Windows refuses to activate against your KMS host or accept a retail key. Often, the system throws obscure licensing errors or the &amp;ldquo;Software Protection&amp;rdquo; (&lt;code&gt;sppsvc&lt;/code&gt;) service repeatedly fails to start.&lt;/p&gt;
&lt;p&gt;This failure usually stems from deep-rooted permission corruption within the Windows system folders. During cloning or upgrading, the built-in &lt;code&gt;NETWORK SERVICE&lt;/code&gt; or &lt;code&gt;sppsvc&lt;/code&gt; accounts lose their crucial read/write access to the local licensing store folders, making it physically impossible for the OS to retrieve or write its own activation state.&lt;/p&gt;</description></item><item><title>Windows Server: How to Configure Automatic Logon</title><link>https://mxlit.com/kb-00053/</link><pubDate>Sun, 08 Mar 2026 17:40:00 -0700</pubDate><guid>https://mxlit.com/kb-00053/</guid><description>&lt;p&gt;In a production environment, Windows Servers are typically designed to remain on the lock screen until an administrator actively authenticates. However, certain legacy applications or specific GUI-based tools explicitly require an &lt;em&gt;active user session&lt;/em&gt; to run in the background. If the server reboots and sits at the &lt;code&gt;Ctrl+Alt+Delete&lt;/code&gt; screen, these applications will simply fail to start, causing painful outages.&lt;/p&gt;
&lt;p&gt;This scenario is extremely common when dealing with specialized Virtual Machines (VMs) in a homelab or enterprise cluster where you need an application to fire up automatically unattended.&lt;/p&gt;</description></item><item><title>Windows Server: In-Place Upgrade Guide and Compatibility Paths</title><link>https://mxlit.com/kb-00052/</link><pubDate>Sun, 08 Mar 2026 17:20:00 -0700</pubDate><guid>https://mxlit.com/kb-00052/</guid><description>&lt;p&gt;Upgrading a Windows Server traditionally involved standing up a brand-new virtual machine and meticulously migrating roles, data, and applications (a &amp;ldquo;clean install&amp;rdquo; migration). However, Microsoft&amp;rsquo;s &lt;strong&gt;In-Place Upgrade&lt;/strong&gt; process has become phenomenally reliable, allowing you to upgrade the operating system of an existing server while keeping your files, settings, and complex applications completely intact.&lt;/p&gt;
&lt;p&gt;This guide outlines exactly how to perform an in-place upgrade, the supported upgrade paths you must follow, and crucial compatibility warnings.&lt;/p&gt;</description></item><item><title>Active Directory: How to Check Active Directory Health and Force Replication</title><link>https://mxlit.com/kb-00051/</link><pubDate>Sun, 08 Mar 2026 17:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00051/</guid><description>&lt;p&gt;A healthy Active Directory (AD) environment is the backbone of any Windows-based enterprise network. When Domain Controllers (DCs) stop communicating or fail to replicate changes properly, you will experience bizarre authentication issues, missing user accounts, and erratic GPO behaviors.&lt;/p&gt;
&lt;p&gt;As a system administrator, knowing how to quickly diagnose AD health and manually force replication is a critical skill. This guide outlines the most essential CMD and PowerShell commands used to verify Active Directory status, assess replication health, and manually trigger synchronization between servers.&lt;/p&gt;</description></item><item><title>VMware: How to Fix "Two Filesystems With the Same UUID Have Been Detected"</title><link>https://mxlit.com/kb-00050/</link><pubDate>Sun, 08 Mar 2026 13:30:00 -0700</pubDate><guid>https://mxlit.com/kb-00050/</guid><description>&lt;p&gt;Encountering the &amp;ldquo;Two filesystems with the same UUID have been detected&amp;rdquo; error during an ESXi host boot can immediately halt your hypervisor&amp;rsquo;s startup sequence. This issue typically occurs when the host detects multiple storage devices or boot partitions that share the exact same Universally Unique Identifier (UUID). This is a common side-effect of cloning a boot USB drive, SD card, or dealing with duplicate LUN snapshots without resigning the VMFS volumes. Resolving this boot halt is critical to bringing your ESXi host back online.&lt;/p&gt;</description></item><item><title>VMware: How to Install a New Certificate with an Internal CA</title><link>https://mxlit.com/kb-00049/</link><pubDate>Sun, 08 Mar 2026 12:35:00 -0700</pubDate><guid>https://mxlit.com/kb-00049/</guid><description>&lt;p&gt;Securing your vCenter Server (VCSA) with an authentic SSL certificate is a crucial step towards maintaining a robust virtualization environment. By default, vCenter uses self-signed certificates, which prompt annoying and potentially dangerous browser security warnings. Replacing these with a certificate signed by your own Internal Certificate Authority (CA) not only eliminates these warnings but also ensures that all communication within your management plane is encrypted and trusted natively by your domain devices.&lt;/p&gt;</description></item><item><title>VMware: How to Apply Patches to vCenter Server</title><link>https://mxlit.com/kb-00048/</link><pubDate>Sat, 07 Mar 2026 11:15:00 -0700</pubDate><guid>https://mxlit.com/kb-00048/</guid><description>&lt;p&gt;Keeping your vCenter Server updated is not just a best practice; it&amp;rsquo;s a critical operational necessity. Regular patching resolves severe security vulnerabilities, delivers essential bug fixes, and ensures compatibility with modern hardware and newer ESXi hosts. Since vCenter acts as the central command hub for your entire virtual infrastructure, an unpatched server can become a major security liability and compromise the stability of all managed workloads.&lt;/p&gt;
&lt;h2 id="1-login-into-vami"&gt;1. Login into VAMI&lt;/h2&gt;
&lt;p&gt;Navigate to your vCenter Server Management Interface (VAMI) using port 5480:&lt;/p&gt;</description></item><item><title>Leaving SaaS: Creating Your Own Telemetry Microservice with FastAPI and Docker</title><link>https://mxlit.com/kb-00047/</link><pubDate>Thu, 05 Mar 2026 16:30:00 -0800</pubDate><guid>https://mxlit.com/kb-00047/</guid><description>&lt;p&gt;Static site generators (SSGs) like Hugo are unbeatable in speed and security. By compiling everything into pure HTML files, we eliminate attack vectors and database dependencies. However, a classic problem arises: How do we add basic interactivity, such as a &amp;ldquo;Likes&amp;rdquo; counter, without ruining the static nature of the site?&lt;/p&gt;
&lt;p&gt;Initially, the easy answer is to integrate a third-party service (SaaS). It&amp;rsquo;s fast and it works. But as infrastructure engineers, relying on an external API presents us with two fundamental problems: the loss of sovereignty over our data and the inevitable paywalls that arise when traffic increases. The ultimate solution isn&amp;rsquo;t to look for a heavyweight open-source clone, but to build our own minimalist microservice.&lt;/p&gt;</description></item><item><title>HUGO: Implementing Serverless Telemetry in Hugo with Lyket (Applause Button)</title><link>https://mxlit.com/kb-00046/</link><pubDate>Thu, 05 Mar 2026 13:00:00 -0800</pubDate><guid>https://mxlit.com/kb-00046/</guid><description>&lt;p&gt;Implementing Serverless Telemetry in Hugo with Lyket&lt;/p&gt;
&lt;p&gt;Migrating to a static site generator (SSG) like Hugo offers massive advantages in security and speed by not relying on databases to serve content. However, this presents a challenge when we want to integrate basic interactivity, such as a &amp;ldquo;Like&amp;rdquo; or &amp;ldquo;Applause&amp;rdquo; counter in our Knowledge Base.&lt;/p&gt;
&lt;p&gt;Instead of setting up additional containers or databases just to record clicks, the most elegant solution is to use a decoupled serverless approach. This is where &lt;strong&gt;Lyket&lt;/strong&gt; comes in, an external API that handles transactional telemetry while our frontend remains 100% static.&lt;/p&gt;</description></item><item><title>VMware: Installing VMware vCenter Server (VCSA)</title><link>https://mxlit.com/kb-00045/</link><pubDate>Thu, 05 Mar 2026 10:00:00 -0800</pubDate><guid>https://mxlit.com/kb-00045/</guid><description>&lt;p&gt;The Heart of Your Infrastructure: Why You Need vCenter&lt;/p&gt;
&lt;p&gt;Managing ESXi servers individually through their web interface is fine for a very small environment, but when you&amp;rsquo;re looking to scale, automate, and ensure availability, &lt;strong&gt;vCenter Server&lt;/strong&gt; is the critical component. It acts as the centralized control panel for your entire vSphere infrastructure.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Key Advantages of Deploying vCenter:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Centralized Management:&lt;/strong&gt; Control multiple ESXi hosts, virtual machines, and networks from a single console.&lt;/p&gt;</description></item><item><title>Docker: Automatic Image and Log Cleanup</title><link>https://mxlit.com/kb-00043/</link><pubDate>Wed, 04 Mar 2026 21:15:00 -0800</pubDate><guid>https://mxlit.com/kb-00043/</guid><description>&lt;p&gt;Why doesn&amp;rsquo;t Docker automatically clean up junk files?&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;ve had a Docker server for more than a month, you&amp;rsquo;ve probably noticed that disk space mysteriously disappears. Docker is designed on the principles of immutability and security. It doesn&amp;rsquo;t delete anything by default because it can&amp;rsquo;t guess whether that &amp;ldquo;orphaned&amp;rdquo; image from three months ago is a critical version you plan to roll back to, or if that build cache is something you need for a quick deployment tomorrow.&lt;/p&gt;</description></item><item><title>GitHub: Guide to Deploying Hugo CI-CD to a Server with GitHub Actions Monorepo</title><link>https://mxlit.com/kb-00044/</link><pubDate>Wed, 04 Mar 2026 21:15:00 -0800</pubDate><guid>https://mxlit.com/kb-00044/</guid><description>&lt;p&gt;&lt;strong&gt;Objective:&lt;/strong&gt; Eliminate the manual process of compiling and copying the &lt;code&gt;public/&lt;/code&gt; folder to the server. We will implement a pipeline that, upon detecting a &lt;code&gt;git push&lt;/code&gt; on the main branch, compiles the site and transfers it securely via SFTP using SSH keys.&lt;/p&gt;
&lt;h2 id="security-least-privilege-implementation"&gt;&lt;em&gt;Security: Least Privilege Implementation&lt;/em&gt;&lt;/h2&gt;
&lt;p&gt;In real production environments, we do not use root. Deployment is performed with a restricted user who only has access to their own home directory. This adds a vital layer of security: if the CI/CD process is compromised, the attacker is trapped in a &amp;ldquo;cage&amp;rdquo; within the user&amp;rsquo;s $HOME directory.&lt;/p&gt;</description></item><item><title>DNS: How to Enable DNS Debug Logging on Windows Server (and Why Be Careful)</title><link>https://mxlit.com/kb-00041/</link><pubDate>Wed, 04 Mar 2026 15:00:00 -0800</pubDate><guid>https://mxlit.com/kb-00041/</guid><description>&lt;p&gt;When we deploy security solutions like Cortex XSIAM or centralize logs with Elasticsearch using Filebeat, one of the most common requirements is to ingest the name resolution activity of our Domain Controllers (DCs).&lt;/p&gt;
&lt;p&gt;To achieve this, the first fundamental step is to &lt;strong&gt;enable DNS Debug Logging in the Windows DNS server configuration&lt;/strong&gt;. However, this is not simply a matter of checking a box; There are critical technical and infrastructure considerations you should be aware of before implementing it in production.&lt;/p&gt;</description></item><item><title>VMware: Unable to migrate VM (Migrate button grayed out) - Resolved via MOB</title><link>https://mxlit.com/kb-00042/</link><pubDate>Wed, 04 Mar 2026 13:58:17 -0800</pubDate><guid>https://mxlit.com/kb-00042/</guid><description>&lt;p&gt;Have you ever tried to migrate a Virtual Machine in vCenter and found that the &lt;strong&gt;Migrate&amp;hellip;&lt;/strong&gt; option is completely disabled (grayed out)?&lt;/p&gt;
&lt;p&gt;Often, when trying to power it on or move it, vCenter displays a message indicating that the VM is pinned to a host (&amp;ldquo;The virtual machine is pinned to a host&amp;rdquo;). This usually happens when backup software (like Veeam) leaves a task hanging, or when a previous operation fails, leaving the VM in a locked or logically &amp;ldquo;locked&amp;rdquo; state.&lt;/p&gt;</description></item><item><title>Active Directory: Adding Windows Core as a Domain Controller.</title><link>https://mxlit.com/kb-00040/</link><pubDate>Wed, 04 Mar 2026 12:00:00 -0800</pubDate><guid>https://mxlit.com/kb-00040/</guid><description>&lt;h2 id="domain-controller-in-windows-core"&gt;Domain Controller in Windows Core&lt;/h2&gt;
&lt;p&gt;If you&amp;rsquo;ve followed this series, you already know how to set up a primary and a secondary Domain Controller using the graphical interface (Desktop Experience). But, if we really want to take our infrastructure to the next level and minimize risks,&lt;/p&gt;
&lt;p&gt;In this third and final installment, we&amp;rsquo;re going to deploy a Domain Controller using Windows Server Core and purely the command line (PowerShell).&lt;/p&gt;
&lt;h3 id="why-choose-server-core-for-your-active-directory"&gt;&lt;strong&gt;Why Choose Server Core for Your Active Directory?&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;If you&amp;rsquo;re wondering why you should forgo the visual convenience of a graphical interface for such a critical role, the answer boils down to three fundamental pillars for any business environment:&lt;/p&gt;</description></item><item><title>Isilon OneFS: How a BBU Failure Brings Down Your Cluster (and the Risk of Forcing Recovery)</title><link>https://mxlit.com/kb-00039/</link><pubDate>Tue, 03 Mar 2026 00:00:00 +0000</pubDate><guid>https://mxlit.com/kb-00039/</guid><description>&lt;p&gt;Working with enterprise storage infrastructure like Dell PowerScale (Isilon) usually provides peace of mind due to its high availability. However, when OneFS&amp;rsquo;s self-protection mechanism kicks in, it can trigger a domino effect that completely halts production.&lt;/p&gt;
&lt;p&gt;We recently faced a critical incident in OneFS 9.7.1.3 where a battery failure (BBU) escalated to the total loss of access to shared disks (SMB/NFS) and the crash of the WebUI.&lt;/p&gt;
&lt;p&gt;In this post, I will document the symptoms, the root cause, the workaround, and, most importantly, &lt;strong&gt;why forcing the system out of Read-Only mode carries a massive risk of data loss if not properly calculated&lt;/strong&gt;.&lt;/p&gt;</description></item><item><title>Moving FSMO Roles</title><link>https://mxlit.com/kb-00038/</link><pubDate>Fri, 20 Feb 2026 21:14:14 -0800</pubDate><guid>https://mxlit.com/kb-00038/</guid><description>&lt;h2 id="why-is-it-necessary-to-move-fsmo-roles"&gt;&lt;strong&gt;Why is it necessary to move FSMO roles?&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;In an Active Directory environment, not all Domain Controllers (DCs) are the same. Although most tasks are replicated multidirectionally, there are five critical roles called FSMO (Flexible Single Master Operation) that can only be run by one server at a time to prevent write conflicts and corruption in the ntds.dit database.&lt;/p&gt;
&lt;p&gt;Moving these roles is not just an administrative whim; It is an operational necessity in the following scenarios:&lt;/p&gt;</description></item><item><title>FSMO Role Function</title><link>https://mxlit.com/kb-00037/</link><pubDate>Fri, 20 Feb 2026 15:14:14 -0800</pubDate><guid>https://mxlit.com/kb-00037/</guid><description>&lt;p&gt;FSMO (Flexible Single Master Operations) roles are critical roles in an Active Directory environment that are assigned to one or more domain controllers to ensure that certain administrative and replication tasks are handled centrally. There are five FSMO roles, each with a specific function in the operation of Active Directory. Below, I detail the purpose of each:&lt;/p&gt;
&lt;h3 id="1-pdc-emulator"&gt;1. &lt;strong&gt;PDC Emulator&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Main Function&lt;/strong&gt;: This role is responsible for emulating the behavior of a Windows NT Domain Controller (PDC) and is primarily used in mixed environments with earlier versions of Windows Server (such as Windows NT 4.0).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Specific Functions&lt;/strong&gt;:
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Password Authentication&lt;/strong&gt;: When a user changes their password, the PDC Emulator is responsible for updating the password database.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Time Synchronization&lt;/strong&gt;: The PDC Emulator is the primary server for time synchronization in the domain, as it is assumed to be the time source for the entire domain.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Group Policies&lt;/strong&gt;: It is responsible for managing certain types of group policies and password administration.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Master Password Change Copy&lt;/strong&gt;: This is the only server authorized to receive password changes across the entire domain. This means that if other domain controllers experience replication issues, passwords will not be synchronized correctly.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="2-rid-master"&gt;2. &lt;strong&gt;RID Master&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Main Function&lt;/strong&gt;: The RID Master is responsible for assigning &lt;strong&gt;ranges of unique identifiers (RIDs)&lt;/strong&gt; to domain controllers within the domain. RIDs are part of the unique identifier of an object in Active Directory (such as a user or group).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Specific Functions&lt;/strong&gt;:
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;RID Assignment&lt;/strong&gt;: Every object in Active Directory has a unique RID that is assigned when the object is created. The RID Master is the only one that can assign blocks of RIDs to other domain controllers.&lt;/li&gt;
&lt;li&gt;If the RID Master is offline for a period of time, other domain controllers will not be able to create new objects in the directory because they will not be able to obtain new RIDs.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="3-infrastructure-master"&gt;3. &lt;strong&gt;Infrastructure Master&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Main Function&lt;/strong&gt;: The Infrastructure Master is responsible for maintaining references to objects in other domains within Active Directory. This role is essential for trust relationships between domains.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Specific Functions&lt;/strong&gt;:
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cross-domain references&lt;/strong&gt;: If an object in one domain has a reference to an object in another domain (for example, if a user is in a group in another domain), the Infrastructure Master ensures that these references are up to date.&lt;/li&gt;
&lt;li&gt;If the Infrastructure Master is in a domain that is also a &lt;strong&gt;Global Catalog Server&lt;/strong&gt;, it will not be able to perform its job correctly, as the Global Catalog already manages object information for the entire forest.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="4-schema-master"&gt;4. &lt;strong&gt;Schema Master&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Main Function&lt;/strong&gt;: The Schema Master is responsible for managing changes to the Active Directory schema. The schema is the definition of all object types and attributes that can be stored in Active Directory.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Specific Functions&lt;/strong&gt;:
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Schema Modifications&lt;/strong&gt;: If you want to add a new type of object or attribute to Active Directory (for example, a new account type or a new property for users), that change must be made through the Schema Master.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Schema Modifications&lt;/strong&gt;: Only a domain controller with the Schema Master role can apply changes to the schema. Other domain controllers cannot.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="5-domain-naming-master"&gt;5. &lt;strong&gt;Domain Naming Master&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Main Function&lt;/strong&gt;: The Domain Naming Master is responsible for managing domain name changes within the Active Directory forest.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Specific Functions&lt;/strong&gt;:
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Creating and Deleting Domains&lt;/strong&gt;: If you need to add a new domain or delete one in the Active Directory forest, the Domain Naming Master is the role responsible for this process.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Domain Name Changes&lt;/strong&gt;: Any attempt to change a domain name or domain structure within a forest is performed through the Domain Naming Master.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="summary-of-fsmo-role-functions"&gt;Summary of FSMO Role Functions&lt;/h3&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;&lt;strong&gt;Role&lt;/strong&gt;&lt;/th&gt;
 &lt;th&gt;&lt;strong&gt;Main Function&lt;/strong&gt;&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;PDC Emulator&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;Time synchronization, password management, group policies, and PDC emulation in mixed environments.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;RID Master&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;Assigns blocks of RIDs to domain controllers to create objects.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;Infrastructure Master&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;Maintains object references across domains.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;Schema Master&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;Makes modifications to the Active Directory schema (adding new attributes or object classes).&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;Domain Naming Master&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;Manages the creation and deletion of domains in a forest.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 id="how-many-domain-controllers-should-have-these-roles"&gt;How Many Domain Controllers Should Have These Roles?&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Ideally, there should only be one domain controller with each of these roles within a domain or forest&lt;/strong&gt; to avoid conflicts and ensure that operations are performed centrally.&lt;/li&gt;
&lt;li&gt;However, in large or complex environments, &lt;strong&gt;FSMO roles can be moved&lt;/strong&gt; to other domain controllers if necessary for availability or performance reasons. This is usually done using tools such as &lt;strong&gt;&lt;code&gt;ntdsutil&lt;/code&gt;&lt;/strong&gt; or &lt;strong&gt;PowerShell&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="fsmo-role-verification"&gt;FSMO Role Verification&lt;/h3&gt;
&lt;p&gt;To verify which server is managing each FSMO role, you can use the following PowerShell command:&lt;/p&gt;</description></item><item><title>How to extend the disk when there is another partition in between</title><link>https://mxlit.com/kb-00036/</link><pubDate>Wed, 21 Jan 2026 10:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00036/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;You&amp;rsquo;ve probably experienced this: you expand a virtual disk in Proxmox or VMware, go to Windows Disk Management intending to extend your main partition, and find that the &amp;ldquo;Extend Volume&amp;rdquo; option is grayed out (disabled).&lt;/p&gt;
&lt;p&gt;Why does this happen?
The reason is purely geometric. For Windows to extend a partition, the unallocated space must be contiguous and located immediately to the right of the volume you want to expand.&lt;/p&gt;</description></item><item><title>Exchange: How to Install Exchange Server</title><link>https://mxlit.com/kb-00035/</link><pubDate>Sat, 05 Aug 2023 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00035/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;At this point, we should have completed the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;input checked="" disabled="" type="checkbox"&gt; Extended the Active Directory schema&lt;/li&gt;
&lt;li&gt;&lt;input checked="" disabled="" type="checkbox"&gt; Prepared the domain for Exchange&lt;/li&gt;
&lt;li&gt;&lt;input checked="" disabled="" type="checkbox"&gt; Installed the Exchange Server prerequisites&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If we have done everything as described in the previous posts, we will proceed with the Exchange installation.&lt;/p&gt;
&lt;p&gt;To do this, remount the ISO and run the Setup.exe file.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00035/image.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;It will ask if you want to connect to the Internet to check for updates; select that option and click Next.&lt;/p&gt;</description></item><item><title>Exchange: How to Install Exchange Server Prerequisites</title><link>https://mxlit.com/kb-00034/</link><pubDate>Fri, 04 Aug 2023 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00034/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;








&lt;blockquote class="blockquote-regular"&gt;
 &lt;p&gt;For security and performance reasons, it is recommended to install Exchange only on member servers and not on Active Directory servers.&lt;/p&gt;

&lt;/blockquote&gt;
&lt;p&gt;In this post, we will see a series of prerequisites that are necessary for installing Exchange.&lt;/p&gt;
&lt;p&gt;To do this, we will begin by running the following command in PowerShell as an administrator.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-powershell" data-lang="powershell"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Install-WindowsFeature NET-Framework-&lt;span style="color:#ae81ff"&gt;45&lt;/span&gt;-Features, RPC-over-HTTP-proxy, RSAT-Clustering, RSAT-Clustering-CmdInterface, RSAT-Clustering-Mgmt, RSAT-Clustering-PowerShell, Web-Mgmt-Console, WAS-Process-Model, Web-Asp-Net45, Web-Basic-Auth, Web-Client-Auth, Web-Digest-Auth, Web-Dir-Browsing, Web-Dyn-Compression, Web-Http-Errors, Web-Http-Logging, Web-Http-Redirect, Web-Http-Tracing, Web-ISAPI-Ext, Web-ISAPI-Filter, Web-Lgcy-Mgmt-Console, Web-Metabase, Web-Mgmt-Console, Web-Mgmt-Service, Web-Net-Ext45, Web-Request-Monitor, Web-Server, Web-Stat-Compression, Web-Static-Content, Web-Windows-Auth, Web-WMI, Windows-Identity-Foundation, RSAT-ADDS
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;img src="https://mxlit.com/kb-00034/image-1.png" alt="alt text"&gt;&lt;/p&gt;</description></item><item><title>Exchange: How to Prepare Your Domain for Exchange</title><link>https://mxlit.com/kb-00033/</link><pubDate>Thu, 03 Aug 2023 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00033/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;








&lt;blockquote class="blockquote-regular"&gt;
 &lt;p&gt;Exchange uses Active Directory to store information about mailboxes and Exchange server configurations in your organization. Before installing Exchange Server, you must prepare your Active Directory forest and domains for the new version of Exchange&lt;/p&gt;

&lt;/blockquote&gt;
&lt;p&gt;This step is similar to what we did in the previous post; the requirements are the same.&lt;/p&gt;
&lt;p&gt;Open Command Prompt as administrator.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00033/image.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00033/image-1.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;Run the following command:&lt;/p&gt;
&lt;p&gt;setup.exe /PrepareAD /OrganizationNam:&amp;quot;&lt;Organization Name&gt;&amp;quot; /IAcceptExchangeServerLicenseTerms_DiagnosticDataOn&lt;/p&gt;</description></item><item><title>Exchange: How to Extend the Active Directory Schema</title><link>https://mxlit.com/kb-00032/</link><pubDate>Sun, 30 Jul 2023 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00032/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, we&amp;rsquo;ll see how to extend the Active Directory schema and prepare it for an Exchange installation.&lt;/p&gt;
&lt;p&gt;The Active Directory schema is a fundamental component of the network management technology developed by Microsoft, known as Active Directory. Simply put, we could think of the schema as the &amp;ldquo;DNA&amp;rdquo; of Active Directory, as it defines and organizes the structure and attributes of the objects that can be stored in the directory.&lt;/p&gt;</description></item><item><title>Exchange: Verify AD Requirements for Exchange Server</title><link>https://mxlit.com/kb-00031/</link><pubDate>Sun, 30 Jul 2023 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00031/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Before starting any configuration, we must verify the Active Directory requirements to begin installing Exchange in our environment.&lt;/p&gt;
&lt;p&gt;The minimum requirements for our domain controller must be Windows Server 2008 R2 Datacenter RTM or later.&lt;/p&gt;
&lt;p&gt;The minimum for the Active Directory forest is also Windows Server 2008 R2 or later.&lt;/p&gt;
&lt;p&gt;You can find all these requirements in detail at the following link.&lt;/p&gt;
&lt;p&gt;Another requirement is having .NET Framework 4.8 installed. It&amp;rsquo;s also recommended that each Active Directory site where you plan to install Exchange Server 2016 should have at least one domain controller with the global catalog.&lt;/p&gt;</description></item><item><title>How to Upgrade from Ubuntu 20.04 LTS to Ubuntu 22.04 LTS</title><link>https://mxlit.com/kb-00030/</link><pubDate>Sun, 30 Jul 2023 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00030/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;








&lt;blockquote class="blockquote-regular"&gt;
 &lt;p&gt;Ubuntu is one of the most popular and reliable Linux operating systems on the market, and one of its most widely used versions is Ubuntu 20.04 LTS (Long Term Support). However, the arrival of Ubuntu 22.04 LTS brings with it numerous improvements and advantages that make an upgrade worth considering. In this article, we will explore the reasons to upgrade from Ubuntu 20.04 LTS to Ubuntu 22.04 LTS, the advantages of using LTS versions, and detail the key improvements offered by the new version.&lt;/p&gt;</description></item><item><title>How to Get Free SSL Certificates from Let's Encrypt with Certify The Web</title><link>https://mxlit.com/kb-00029/</link><pubDate>Thu, 20 Jul 2023 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00029/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;First, let&amp;rsquo;s briefly explain why SSL certificates should be used and what Let&amp;rsquo;s Encrypt is.&lt;/p&gt;
&lt;p&gt;In today&amp;rsquo;s digital world, online security is a primary concern for all businesses and websites. Cyberattacks and the theft of sensitive information are on the rise, and users have become more aware of the importance of browsing the web securely. One of the most effective ways to protect the privacy and integrity of your visitors&amp;rsquo; data is by using SSL (Secure Socket Layer) certificates. In this article, we&amp;rsquo;ll explore the importance of SSL and how companies like Let&amp;rsquo;s Encrypt are offering free SSL certificates to help secure the web.&lt;/p&gt;</description></item><item><title>Active Directory: SYSVOL Folder not replicating</title><link>https://mxlit.com/kb-00028/</link><pubDate>Mon, 13 Feb 2023 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00028/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The SYSVOL directory is a folder on Windows domain controllers that contains information and data necessary for the logon system and other Active Directory functions to work correctly. SYSVOL is essential for domain controller replication and the consistency of Active Directory data across the domain.&lt;/p&gt;
&lt;p&gt;When SYSVOL replication fails between domain controllers, it can cause serious problems with Active Directory functionality, such as the failure to create Group Policy Objects (GPOs). If these GPOs are not reflected across the different domain controllers, it can become a major issue.&lt;/p&gt;</description></item><item><title>Active Directory: Password Settings Objects (PSOs)</title><link>https://mxlit.com/kb-00027/</link><pubDate>Fri, 13 Jan 2023 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00027/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Active Directory (AD) is a Microsoft directory service that allows system administrators to centralize the management of users, groups, and resources on a network.&lt;/p&gt;
&lt;p&gt;One of AD&amp;rsquo;s features is the ability to configure Password Settings Objects (PSOs) to establish security policies for user passwords.&lt;/p&gt;








&lt;blockquote class="blockquote-regular"&gt;
 &lt;p&gt;Password Security Objects (PSOs) are different from password policies that can be added via Group Policy Objects (GPOs). PSOs can be used for specific purposes, such as setting a password shorter than the one specified by your domain&amp;rsquo;s password policy. This can be helpful if you have a system that doesn&amp;rsquo;t support the currently configured password policy. PSOs can also be used to strengthen passwords for a particular group, such as by increasing the password length or locking users after a single failed login attempt. The options are numerous and should be tailored to your specific needs.&lt;/p&gt;</description></item><item><title>VMware: How to Upgrade an ESXi Server</title><link>https://mxlit.com/kb-00026/</link><pubDate>Wed, 08 Jun 2022 14:00:00 -0800</pubDate><guid>https://mxlit.com/kb-00026/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, we&amp;rsquo;ll see step-by-step how to upgrade a standalone ESXi server, using both online and offline methods.&lt;/p&gt;
&lt;p&gt;The process requires the server to be in maintenance mode and will need a restart upon completion. Therefore, I recommend moving all VMs to another host if they are in a cluster.&lt;/p&gt;
&lt;p&gt;For this procedure, I will use the server previously created in the post &lt;a href="https://mxlit.com/kb-00024"&gt;How to Install an ESXi Server&lt;/a&gt;. As we can see, the server version is 6.7.0 Update 3 (Build 14320388).&lt;/p&gt;</description></item><item><title>VMware: How to Install vRealize Operations Manager</title><link>https://mxlit.com/kb-00025/</link><pubDate>Tue, 07 Jun 2022 14:00:00 -0800</pubDate><guid>https://mxlit.com/kb-00025/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, we&amp;rsquo;ll see step-by-step how to install VMware vRealize Operations Manager.&lt;/p&gt;
&lt;p&gt;But what is VMware vRealize Operations Manager?
vRealize Operations Manager is a VMware tool that helps IT administrators monitor, troubleshoot, and manage the health and capacity of the entire virtual infrastructure in VMware.&lt;/p&gt;
&lt;p&gt;VMware vRealize Operations Manager collects performance data from each object within our environment, stores and analyzes the information, and provides it in real time for better decision-making.&lt;/p&gt;</description></item><item><title>VMware: How to Install an ESXi Server</title><link>https://mxlit.com/kb-00024/</link><pubDate>Sun, 05 Jun 2022 14:00:00 -0800</pubDate><guid>https://mxlit.com/kb-00024/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, we&amp;rsquo;ll see step-by-step how to install the VMware ESXi Hypervisor… but what is a hypervisor?&lt;/p&gt;
&lt;p&gt;A hypervisor is software that allows a server to allocate resources to different virtual machines hosted on it by using shared resources, such as memory and processing power.&lt;/p&gt;
&lt;p&gt;Generally, we can find two types of hypervisors.&lt;/p&gt;
&lt;p&gt;Type 1 hypervisors are those that are installed directly on the computer, while Type 2 hypervisors are those that are hosted within another operating system, such as Microsoft Hyper-V, VirtualBox, VMware Workstation, and others.&lt;/p&gt;</description></item><item><title>Windows Server: How to extend the trial period</title><link>https://mxlit.com/kb-00023/</link><pubDate>Mon, 28 Mar 2022 14:00:00 -0800</pubDate><guid>https://mxlit.com/kb-00023/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, I will explain how to extend the trial license offered by Microsoft for Windows Server and why it is important to keep Windows Server activated.&lt;/p&gt;
&lt;p&gt;As you may know, Microsoft offers Windows Server for free for a 180-day trial period. After this time, we &amp;ldquo;must&amp;rdquo; enter a valid license; otherwise, the system will be deactivated. This can cause a series of inconveniences, such as the deactivation of certain custom options, and the server will also shut down automatically after a period of time.&lt;/p&gt;</description></item><item><title>Exchange: Configuring the Page File</title><link>https://mxlit.com/kb-00022/</link><pubDate>Thu, 06 Jan 2022 14:00:00 -0800</pubDate><guid>https://mxlit.com/kb-00022/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, I will show you how to configure the page file for Exchange Server 2013/2016 using best practices. The process is slightly different for Exchange Server 2019, but I will explain the differences in paging.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Recommended RAM and Page File Size for 2013/2016 Versions&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Before continuing, please note the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;For the Mailbox role, the minimum recommended RAM is 8GB.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;For the Edge Transport role, the minimum recommended RAM is 4GB.&lt;/p&gt;</description></item><item><title>Exchange: Exchange Server Versions</title><link>https://mxlit.com/kb-00021/</link><pubDate>Thu, 06 Jan 2022 14:00:00 -0800</pubDate><guid>https://mxlit.com/kb-00021/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The first thing to consider before implementing Exchange Server is understanding the different versions available. Currently, there are two versions: Standard and Enterprise. Here you will see the differences between them to determine which one best suits your needs.&lt;/p&gt;








&lt;blockquote class="blockquote-regular"&gt;
 &lt;p&gt;&lt;strong&gt;Enterprise Edition&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;It has a maximum of 100 databases per server.&lt;/li&gt;
&lt;li&gt;The maximum size is 16TB.&lt;/li&gt;
&lt;/ul&gt;

&lt;/blockquote&gt;








&lt;blockquote class="blockquote-regular"&gt;
 &lt;p&gt;&lt;strong&gt;Standard Edition&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;It is limited to 5 databases per server.&lt;/li&gt;
&lt;li&gt;The maximum size is 1TB.&lt;/li&gt;
&lt;/ul&gt;

&lt;/blockquote&gt;
&lt;p&gt;A mounted database refers to the database that is active for use. This could be a database containing the mailboxes that clients use or a database mounted in passive mode. You can create more databases than the limit described above, but you can only mount the number specified for each version. (The recovery database does not count toward the limit.)&lt;/p&gt;</description></item><item><title>ADDS: Configure and Promote a Second Domain Controller</title><link>https://mxlit.com/kb-00019/</link><pubDate>Fri, 31 Dec 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00019/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, we&amp;rsquo;ll see how to configure and promote a second domain controller.&lt;/p&gt;
&lt;p&gt;Having a second domain controller is crucial, as it serves as a backup in case the primary controller fails. Redundancy is always beneficial; without an extra domain controller, if the primary controller fails, all users could lose access to the various systems.&lt;/p&gt;
&lt;p&gt;To avoid this, we&amp;rsquo;ll walk you through this task step by step. While this isn&amp;rsquo;t limited to just a second controller, you can also follow the same steps to add additional controllers.&lt;/p&gt;</description></item><item><title>DHCP: How to Configure a DHCP Server from Scratch</title><link>https://mxlit.com/kb-00020/</link><pubDate>Fri, 31 Dec 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00020/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, we&amp;rsquo;ll see how to configure a DHCP server, add the necessary role, and configure the scopes.&lt;/p&gt;
&lt;p&gt;Having a DHCP server within your organization is essential, and here we&amp;rsquo;ll see the configuration step by step.&lt;/p&gt;
&lt;p&gt;For this post, I&amp;rsquo;ll use the primary Domain Controller to add the DHCP role. While this is common practice in many environments, you should consider the number of clients that will be connected to avoid impacting server performance.&lt;/p&gt;</description></item><item><title>PFSense: Adding an Additional LAN</title><link>https://mxlit.com/kb-00018/</link><pubDate>Sat, 13 Nov 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00018/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, we&amp;rsquo;ll see how to add an additional LAN to pfSense.&lt;/p&gt;
&lt;p&gt;PFSense is an open-source firewall/router based on FreeBSD. It can be installed physically or virtually. PfSense has undoubtedly established itself as a great alternative for firewall use because it is highly configurable with its extensive package list, allowing for expanded functionality.&lt;/p&gt;
&lt;p&gt;The Community version can be downloaded from this link.&lt;/p&gt;
&lt;p&gt;Now that we&amp;rsquo;ve briefly explained what pfSense is and what it&amp;rsquo;s used for, let&amp;rsquo;s see how to create another LAN and why.&lt;/p&gt;</description></item><item><title>VMware: Updating Windows Templates in VMware with PowerCLI</title><link>https://mxlit.com/kb-00017/</link><pubDate>Sun, 07 Nov 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00017/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;As we&amp;rsquo;ve seen in previous posts, the typical way to create new virtual machines is through templates. As administrators, we need to keep these templates updated. Having one or two templates isn&amp;rsquo;t a challenge or very time-consuming, but if you have several templates in different locations, such as: 3 templates in Mexicali, 3 in Tijuana, 3 in Ensenada, and another 3 somewhere else (just to name a few), this task can be a bit time-consuming since the procedure involves several steps.&lt;/p&gt;</description></item><item><title>VMware: How to Create a Virtual Machine from a Template – GUI/PowerCLI</title><link>https://mxlit.com/kb-00016/</link><pubDate>Sat, 06 Nov 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00016/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, we&amp;rsquo;ll see how to create a new VM from a template. In previous posts, we saw how to create a VM from scratch; however, the ideal way is to create VMs from a template. Here, we&amp;rsquo;ll see how to perform this task using vCenter (graphical method) and PowerShell.&lt;/p&gt;
&lt;p&gt;Right-click where you want to create the VM (in this case, I&amp;rsquo;ll use the resource pool I created earlier), then select New Virtual Machine….&lt;/p&gt;</description></item><item><title>VMware: How to Convert a Virtual Machine into a Template, from GUI/PowerCLI</title><link>https://mxlit.com/kb-00015/</link><pubDate>Tue, 02 Nov 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00015/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, we&amp;rsquo;ll see how to create a virtual machine template that we can use to create other virtual machines.&lt;/p&gt;
&lt;p&gt;I recommend updating Windows completely before creating the template. Once that&amp;rsquo;s done, we can proceed.&lt;/p&gt;
&lt;p&gt;Select the virtual machine you want to convert into a template, click on Actions, select Template, and then Convert to Template.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00015/image.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;Accept the warning.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00015/image-1.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;As you can see in the image, the template has disappeared from the resource pool.&lt;/p&gt;</description></item><item><title>VMware: How to create a new virtual machine from scratch.</title><link>https://mxlit.com/kb-00014/</link><pubDate>Sun, 31 Oct 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00014/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, we&amp;rsquo;ll see how to create a new virtual machine from scratch. While the ideal approach is to create virtual machines from a template, here we&amp;rsquo;ll see how to do it if you don&amp;rsquo;t have one. In future posts, I&amp;rsquo;ll explain how to create a template from an existing virtual machine and then create virtual machines from that template.&lt;/p&gt;
&lt;p&gt;Right-click on the cluster or resource pool where you want the new virtual machine to be located, and select &amp;ldquo;New Virtual Machine…&amp;rdquo;&lt;/p&gt;</description></item><item><title>Exchange: How to Add Another Email Domain</title><link>https://mxlit.com/kb-00013/</link><pubDate>Wed, 27 Oct 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00013/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, we&amp;rsquo;ll see how to add another domain to an Exchange server.&lt;/p&gt;
&lt;p&gt;First, we need to obtain a domain. This can be one you&amp;rsquo;ve purchased or any free domain. Then, we need to edit the MX records of the new domain so they point to our Exchange server.&lt;/p&gt;
&lt;p&gt;To obtain a free domain, I&amp;rsquo;ve included the link &lt;a href="https://mxlit.com/kb-00005"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;For this example, I&amp;rsquo;ll use the domain mxlitpro.tk, which was created previously.&lt;/p&gt;</description></item><item><title>PowerShell: How to Transfer Security Groups from One User to Another</title><link>https://mxlit.com/kb-00012/</link><pubDate>Thu, 14 Oct 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00012/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;A couple of days ago, I was asked for help copying security groups from one user to a new user. While it&amp;rsquo;s true that we can perform this task manually, sometimes a simple line of code can save us this work. This is helpful when the new user belongs to the same department as the user whose groups we want to copy.&lt;/p&gt;
&lt;p&gt;There&amp;rsquo;s something to keep in mind before doing this: you should be aware that the user with the groups belonging to the department may have additional, previously authorized access. For example, they might have access to shared files because they&amp;rsquo;re part of a project, etc. This is why you should be careful when copying the groups in their entirety. If this isn&amp;rsquo;t the case, then the following script can be very helpful.&lt;/p&gt;</description></item><item><title>PowerShell: Send email to users when password will soon expire.</title><link>https://mxlit.com/kb-00011/</link><pubDate>Fri, 08 Oct 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00011/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;








&lt;blockquote class="blockquote-regular"&gt;
 &lt;p&gt;In this post, we&amp;rsquo;ll see how to alert users when their domain password will soon expire. To do this, we&amp;rsquo;ll create a PowerShell script.&lt;/p&gt;
&lt;br&gt;
&lt;p&gt;This script is divided into three functions, which I will explain.&lt;/p&gt;

&lt;/blockquote&gt;
&lt;h2 id="send-email"&gt;Send-Email&lt;/h2&gt;
&lt;p&gt;Send-Email This function basically receives three parameters: Username, user email address, and the number of days remaining until the password expires.&lt;/p&gt;
&lt;p&gt;In this case, I&amp;rsquo;m using unauthenticated email. Please note that using unauthenticated email (no SSL and no password, using port 25) means you can only send internal emails. If you want to send emails outside your organization, you must use port 587, enable SSL, and enter a username and password. This will depend on your specific requirements.&lt;/p&gt;</description></item><item><title>PowerShell: Create security groups for each server, remove local administrators and add them to the new group.</title><link>https://mxlit.com/kb-00010/</link><pubDate>Mon, 13 Sep 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00010/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;








&lt;blockquote class="blockquote-regular"&gt;
 &lt;p&gt;Security Procedure: Local Administrator Control&lt;/p&gt;
&lt;p&gt;Some time ago, I was asked to find a method to implement certain security and control measures for users who are local administrators on each server. These measures required the following:&lt;/p&gt;
&lt;br&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Creation of Groups in AD:&lt;/strong&gt; Create a security group in Active Directory for each server.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Assignment of Permissions:&lt;/strong&gt; Add the created group to the corresponding server with the local administrator role.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;User Migration:&lt;/strong&gt; Find all current local administrators on the server and add them to the new AD group.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Account Removal:&lt;/strong&gt; Once the users are added to the AD group, remove them from the server&amp;rsquo;s local administrators group.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Audit Log:&lt;/strong&gt; Save a log of the users who are administrators on each server.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Notification:&lt;/strong&gt; Send an email with a report of the changes made.&lt;/li&gt;
&lt;/ol&gt;

&lt;/blockquote&gt;
&lt;p&gt;The idea behind all of this is to have control and know which users are local administrators on the servers. We&amp;rsquo;re talking about more than 500 servers, and managing them one by one would be quite complicated.&lt;/p&gt;</description></item><item><title>GPO: How to Configure Password Policies</title><link>https://mxlit.com/kb-00009/</link><pubDate>Thu, 02 Sep 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00009/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, I will show you how to create a GPO to meet the minimum requirements for password policies.&lt;/p&gt;
&lt;p&gt;The first step is to access Group Policy Management.&lt;/p&gt;
&lt;h2 id="group-policy-management"&gt;Group Policy Management&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00009/image.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;Right-click on Group Policy Objects and select New.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00009/image-1.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;Give it a name related to what you want to do.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00009/image-2.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;Select the created GPO, right-click, and select Edit.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00009/image-3.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;Within the computer settings, expand the following options: Policies, Windows Settings, Security Settings, Account Policies, and select Password Policy.&lt;/p&gt;</description></item><item><title>PowerShell: How to Create New Users in AD</title><link>https://mxlit.com/kb-00008/</link><pubDate>Tue, 31 Aug 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00008/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The easiest way to create users in AD is undoubtedly using Active Directory Users and Computers, provided you only want to create one or two users. But what if you want to create multiple users? In that case, I don&amp;rsquo;t think this method is the most suitable. For this, we will use PowerShell with the New-ADUser cmdlet.&lt;/p&gt;
&lt;p&gt;There are multiple parameters we can use with the New-ADUser cmdlet. If we check the syntax, we get the following:&lt;/p&gt;</description></item><item><title>ADDS: Install, Configure, and Promote a Domain Controller</title><link>https://mxlit.com/kb-00006/</link><pubDate>Sat, 28 Aug 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00006/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, we&amp;rsquo;ll see how to install the ADDS (Active Directory Domain Services) role and how to promote our new domain controller.&lt;/p&gt;
&lt;p&gt;A domain controller will help us manage user authentication, apply policies, assign roles, and create administrative groups within our company.&lt;/p&gt;
&lt;p&gt;To do this, it&amp;rsquo;s recommended to follow some prerequisites before continuing with the role installation.&lt;/p&gt;
&lt;p&gt;We&amp;rsquo;ll need to assign a descriptive name to our domain controller.&lt;/p&gt;</description></item><item><title>GPO: Enable script execution.</title><link>https://mxlit.com/kb-00007/</link><pubDate>Sat, 28 Aug 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00007/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;PowerShell script execution is disabled by default on domain-joined computers. If you attempt to run a script, you will receive a message stating that the policy is restricted.&lt;/p&gt;
&lt;h2 id="disallowed-scripts"&gt;Disallowed Scripts&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00007/image.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00007/image-1.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;As administrators, we may want to implement scheduled tasks to perform certain automations, so it is necessary to be able to run scripts without restrictions.&lt;/p&gt;
&lt;p&gt;While it&amp;rsquo;s true that we can manually modify these values â€‹â€‹within the computer or bypass the script as shown in the image.&lt;/p&gt;</description></item><item><title>How to get a free domain with Freenom</title><link>https://mxlit.com/kb-00005/</link><pubDate>Fri, 27 Aug 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00005/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;h2 id="lets-talk-about-freenom"&gt;Let&amp;rsquo;s talk about Freenom.&lt;/h2&gt;
&lt;p&gt;Freenom is a domain provider where you can get free domains for a year. These domains work just like any other domain and are perfect for testing and development environments. Perhaps the only limitation is that you can only get domains that end in .tk, .ml, .ga, .cf, or .gq.&lt;/p&gt;
&lt;p&gt;Note: I don&amp;rsquo;t recommend using a free domain for production.&lt;/p&gt;
&lt;h2 id="step-by-step-guide"&gt;Step-by-Step Guide&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Go to &lt;a href="https://www.freenom.com"&gt;https://www.freenom.com&lt;/a&gt; and create an account.&lt;/p&gt;</description></item><item><title>Active Directory: Delegation of Control.</title><link>https://mxlit.com/kb-00004/</link><pubDate>Thu, 19 Aug 2021 14:00:00 -0800</pubDate><guid>https://mxlit.com/kb-00004/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;h2 id="scenario"&gt;Scenario&lt;/h2&gt;
&lt;p&gt;Delegation of control in Active Directory can be very helpful when managing a large number of users from different locations. System administrators can delegate permissions to IT staff in different branches so they can manage users in their city. This is especially useful when permissions are delegated and your company doesn&amp;rsquo;t need everything centralized.&lt;/p&gt;
&lt;p&gt;For this example, let&amp;rsquo;s consider the following: My organization is divided into three cities: Ensenada, Tijuana, and Mexicali, with the latter being the main headquarters. Each city has IT staff, and we, as IT administrators, want to delegate user responsibility to the IT staff in Tijuana and Ensenada. To do this, I&amp;rsquo;ve created a security group for each city: IT-Tijuana and IT-Ensenada. Within these groups, I&amp;rsquo;ve added the corresponding staff for each city. These groups will serve as the basis for delegating control to the desired OUs (Organizational Units).&lt;/p&gt;</description></item><item><title>GPO: Maintain the Domain Admins group or other groups as local administrators within computers.</title><link>https://mxlit.com/kb-00003/</link><pubDate>Thu, 19 Aug 2021 14:00:00 -0800</pubDate><guid>https://mxlit.com/kb-00003/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;h2 id="situation"&gt;Situation&lt;/h2&gt;
&lt;p&gt;This is something I&amp;rsquo;ve seen in different places: sometimes, certain users with administrator privileges on a domain-joined computer delete the Domain Admins group or other groups required by the organization, whether for checking the computer&amp;rsquo;s status or for deploying software like SCCM.&lt;/p&gt;
&lt;p&gt;One of the basic rules is: Never make users local administrators. However, if it&amp;rsquo;s necessary and you want to ensure that the desired group always has local administrator privileges on your computer, the solution is to apply a Group Policy Object (GPO) to handle this automatically. It doesn&amp;rsquo;t matter if the user deletes the local administrator group(s) from their computer; when a GPO is applied, it will automatically add the required groups back to the computer&amp;rsquo;s administrators group.&lt;/p&gt;</description></item><item><title>PowerShell: How to add all users from an OU to a security group</title><link>https://mxlit.com/kb-00001/</link><pubDate>Sat, 14 Aug 2021 14:00:00 -0800</pubDate><guid>https://mxlit.com/kb-00001/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Sometimes it&amp;rsquo;s necessary to add all members of an Organizational Unit (OU) to a security group in Active Directory, but how can we do this using PowerShell?&lt;/p&gt;
&lt;h2 id="solution"&gt;Solution&lt;/h2&gt;
&lt;p&gt;Run the following command:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-powershell" data-lang="powershell"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Get-ADUser -SearchBase &lt;span style="color:#e6db74"&gt;&amp;#34;OU=IT,OU=Networkingzone_Users,DC=NETWORKINGZONE,DC=NET&amp;#34;&lt;/span&gt; -Filter * |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;ForEach-Object {Add-ADGroupMember -Identity &lt;span style="color:#e6db74"&gt;&amp;#39;Security-Test-Group&amp;#39;&lt;/span&gt; -Members $_}
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;img src="https://mxlit.com/kb-00001/001.png" alt="Descripción del Paso 1"&gt;&lt;/p&gt;
&lt;p&gt;As you can see in the image, I only have 7 users within the IT OU and in this example all users from that OU will be added to the “Security-Test-Group”.&lt;/p&gt;</description></item></channel></rss>