How-To

15 posts

OS Guide: Slipstream Updates Using DISM and OSCDImg Updated

We’ve updated our slipstream guide. A link to the OSCDImg download via the ADK is now included along with some additional instructions. Crayon has been loaded and tweaked to work with our WordPress so the script is so much easier to read. 🙂 OS Guide: Slipstream Updates Using DISM and […]

System Builder Tips: Intel R2208WFTZSR Maintenance Free Backup Unit Integration and New RMM iKVM

We completed a custom server build yesterday. Intel R2208WFTZSR 2U dual Intel Xeon Processor Server System Dual Intel Xeon Processor 6240Y 192GB ECC RAM (12x 16GB) Intel RAID Controller and Intel RAID Maintenance Free Backup Unit (2) 240GB Intel SSD M.2 RAID 1 (2) 3.8TB Intel SSD D3-S4510 SATA RAID […]

Azure Web App: Site Experiencing Difficulties HTTP Errors – Fix

We started getting alerts from JetPack that our WordPress site, https://blog.mpecsinc.com, was offline. Sure enough, browsing to the site lead to a “This site is experiencing technical difficulties.” white page. Since our WordPress site is hosted in Azure, we logged on to the portal and clicked into the AppService blade […]

Business Tip: Office Lens Those Receipts

Throughout the day we can process quite a few credit card and debit transactions. Getting those receipts into our bookkeeping system can be a challenge. Enter Microsoft’s Office Lens app. Office Lens on iPhone – Co-op Albany Fuel Receipt Start the app and point it at the receipt in question. […]

Veeam: Manage the SQL Instance Memory Limit

One of our standalone Hyper-V hosts was experiencing performance issues with the Remote Desktop Session Host that provides the company’s primary user environment. The main application running on the session host can be a bit finicky so we ran the gamut troubleshooting within the guest OS. The performance drags were […]

Security: Client E-mail Warning for Current Malware Campaigns

The first place in any “security strategy” should be to train the human. Most malware infections today are caused by a user clicking through when they should not have. The posters below give a very clear set of workflows for an infection. Excellent posters via MALWARE-TRAFFIC-ANALYSIS.NET Note the STEP IN […]