NextDoorNetAdmin
NextDoorNetAdmin
  • 42
  • 11 932
Pixie Boot: Loading WinPE via PXE!
I've been using Windows PE for many years now, mostly to do system imaging, rescue, and offline diagnostics. But I've always had to have it available by USB disk, at least to get the machines booted into WinPE. This made it just slightly less convenient to use than PXE booting off the network... but Windows Deployment Services (WDS) is a big, enterprise-level system that was more than I really needed.
But recently, I found actual instructions from Microsoft on how to boot WinPE via PXE! Of course, those instructions don't actually work for UEFI-based machines. (So... basically everything these days.) I eventually cracked the problem, though, so now you all get to benefit from what I've learned!
EXTRA CREDIT:
- The proxyDHCP issue I mention is actually designed to allow a standard DHCP server to run without modification, while separately adding an additional server elsewhere to provide PXE boot services. This lets the two services be administered separately. Of course, I just want to run a single server!
- TFTPD32 (now TFTPD64) has been around for a long time! I started using it back in the late-2000s to help me load firmware into Cisco devices via TFTP, and it still works beautifully today. It's one of those incredibly useful, fully-portable tools that every network administrator should have in their toolkit!
Переглядів: 316

Відео

Window Cleaning (part 5): Putting it all together
Переглядів 150День тому
Time for the big one, folks! This was (by a lot) my longest session of filming to date a full hour and a half! Fortunately, I don't have to make you sit through it all in real time; we skip through most of the really boring parts. ;) Almost everything demonstrated here should be reasonably familiar to you from previous videos, so I don't go into a ton of detail on most points. I do show off som...
Window Cleaning (part 4): Audit Mode Antics
Переглядів 37014 днів тому
Last week, we saw how we could set up these unattend.xml files with Windows System Image Manager... but what does it look like when we actually go use them? This is the last step before we put everything together, I promise! Today, I'm demonstrating what it looks like when Windows Setup gets told to bypass all the user querying stuff, and showing you how Audit Mode will let you customize a Wind...
Window Cleaning (part 3): Secrets of the unattend.xml (Audit mode ahoy!)
Переглядів 19521 день тому
OK, we've removed all the applications we didn't want... we've added settings to stop Microsoft from downloading and auto-installing their "suggested" apps... but what's left? Truthfully, in a home environment, that might be good enough! But in a business environment, now we might want to go the extra mile and do some additional setup to make sure everything is as clean as it can possibly be! W...
Window Cleaning (part 2): Stopping Microsoft from installing apps without permission
Переглядів 577Місяць тому
Imagine working IT in a classified or regulated environment. Everything's locked down by policy, whether for security or to prevent any potential information leakage to competitors. You know exactly what you've put into your standard Windows install, and you've ensured users don't have access to install anything new. So why is Spotify showing up??? By default, Microsoft has decided it's allowed...
Window Cleaning: Creating a clean Windows 11 install (part 1) - AppX Deprovisioning
Переглядів 329Місяць тому
A "clean" installation of Windows used to be pretty easy just erase whatever junked-up install you had, then install a fresh copy straight from Microsoft. Nothing to it. But these days, Microsoft has joined in with the crapware dealers to load your copy of Windows up with an absolute -pile- of software that is both unneeded and undesirable. Fortunately, Microsoft also provides ways to customize...
A Glimpse of a Datacentre
Переглядів 62Місяць тому
Well, no sooner did I make an off-hand comment about "not all admins work in a datacentre" than I had reason to go into a datacentre (colocation facility) myself! So let's take a walk through and see what it's actually like inside one of these facilities! EXTRA CREDIT: - Even for physical access, we need to be using two-factor authentication, or 2FA. It's the same as with pure data security: ea...
The System Administrator Code of Ethics
Переглядів 32Місяць тому
A lot of professional occupations have developed a code of ethics. It's essentially a statement of common values and guidelines meant for members of that occupation to reference in their daily work, as standards that those members aspire to uphold. System admins (and network admins, too!) also have a code of ethics! This particular one is from LOPSA, the League of Professional System Administra...
A Glimpse of the Office
Переглядів 44Місяць тому
Thought I'd do something a little different this week! If you've ever wondered where a network admin works, maybe you've imagined a network operations centre (or NOC) as a Mission Control-style room of flashing monitors and readouts and lots of consoles... or maybe you've thought of datacentres, the big facilities with racks upon racks of servers, and the occasional crash cart hooked up to some...
Am I a programmer?
Переглядів 392 місяці тому
"Are you a computer programmer?" This is a question I get any time I say I work in IT. The answer is... it's complicated? I don't usually think of myself as a programmer, but I do occasionally work with scripting. What's the difference? The lines are a little blurry, so let's talk about programming and scripting! EXTRA CREDIT: - It's important to know exactly which command shell you're working ...
The Web of Trust
Переглядів 1412 місяці тому
Whether we realize it or not, most people on the Internet use a hierarchical trust model every day. There's a selection of root certificates, issued by specific certificate authorities (CAs), and most websites are secured by certificates issued from these authorities. But that's not the only trust model out there! Today, I'm going to talk about the Web of Trust, which is a trust model commonly ...
NDNA: July 2024 Freeform
Переглядів 62 місяці тому
We all come across those kinds of entitled people: the ones who not only refuse to listen to advice, but actively tell you that they don't pay you for your opinion or advice. All they want it for you to "do your job." (As if our job didn't include giving advice!) And it universally sucks. Today's special: the difference in approach between partnering and puppeting, the possible consequences of ...
Crowdstruck: The Dangers of a Monoculture
Переглядів 3652 місяці тому
It's been all over the news: airports, hospitals, mobile payment systems, systems everywhere started bluescreening a few days ago. At fault was a piece of software named Crowdstrike Falcon. There's been quite a lot of talk about what the software was and why it had the effect it did, but I'm going to talk about something related-but-different. Namely, what are the risks we face when we try to h...
A Cast of Traffic
Переглядів 273 місяці тому
There are several ways to categorize traffic on a network, but one which we haven't talked about yet is what "cast" of traffic it is. And there's a few of them! Whether it's your standard unicast traffic, or an all-stations broadcast, knowing how the various casts function will help you plan and diagnose your network. EXTRA CREDIT: - Most IP broadcast traffic is internal to the subnet itself. T...
CIDR house rules: IP network classes
Переглядів 913 місяці тому
IP addresses are often grouped (or summarized) into distinct blocks. These typically have a single administrative authority. But in the past, these were rigidly assigned in different classes. It wasn't flexible, so we moved to something called Classless Inter-Domain Routing, or CIDR. Today, I'm talking about the history of the network classes, including how they are determined, their original c...
More about ZFS - datasets and zvols!
Переглядів 3453 місяці тому
More about ZFS - datasets and zvols!
NDNA: June 2024 Freeform
Переглядів 153 місяці тому
NDNA: June 2024 Freeform
ZFS vs. RAID - vdevs and more!
Переглядів 4384 місяці тому
ZFS vs. RAID - vdevs and more!
802.1q VLAN tagging
Переглядів 814 місяці тому
802.1q VLAN tagging
Which way??? (How routers choose where to send your traffic!)
Переглядів 164 місяці тому
Which way??? (How routers choose where to send your traffic!)
NDNA: May 2024 Freeform
Переглядів 104 місяці тому
NDNA: May 2024 Freeform
Hubs, Bridges, and Switches (oh my!)
Переглядів 284 місяці тому
Hubs, Bridges, and Switches (oh my!)
A Penguin Said That Nobody Drinks Pepsi
Переглядів 525 місяців тому
A Penguin Said That Nobody Drinks Pepsi
ACME (P.S.): SSL Tips and Tools
Переглядів 515 місяців тому
ACME (P.S.): SSL Tips and Tools
NDNA: April 2024 Freeform
Переглядів 295 місяців тому
NDNA: April 2024 Freeform
ACME: Implementation
Переглядів 2115 місяців тому
ACME: Implementation
ACME: Accounts and Validations
Переглядів 996 місяців тому
ACME: Accounts and Validations
ACME: PKI Basics
Переглядів 606 місяців тому
ACME: PKI Basics
NDNA: All-Year Fool
Переглядів 166 місяців тому
NDNA: All-Year Fool
NDNA: March 2024 Freeform
Переглядів 206 місяців тому
NDNA: March 2024 Freeform

КОМЕНТАРІ

  • @zMeul
    @zMeul 11 годин тому

    I use iVentoy because I need more ISOs than Windows installers

  • @TradieTrev
    @TradieTrev 2 дні тому

    This would be handy as if you're deploying like an office or classroom of pcs. I haven't played with PXE booting since windows XP days and remember it being not such a pain to setup when UEFI wasn't a thing. Maybe mention the UEFI in the title so others can find this helpful video, thanks & cheers!

  • @test3tw44
    @test3tw44 6 днів тому

    Wow! It's amazing that the installation can go directly to Audit Mode, what a great toy, I hope to have a good time before the New Year. I hope you'll have a good time before the New Year! I like your smile, although there is no fast forwarding, you can hear the game scene, and your thinking mode, your priorities, and you can learn the reasons for your choices; which is good, because most of the non-native English speakers feel unfamiliar and don't know why and what is going to happen. You can only change the user folder defaults in Audit Mode, because you don't use the system defaults, which cut the system drive and the data drive. Today is a good day, I can eat 50 NTD watermelon and learn interesting methods, thanks for your hard work! ( Translated by DeppL ) 哇!原來安裝可以直接進入 Audit Mode ,真是令人驚奇,真是好玩具,希望過年前能玩的愉快。對了!喜歡你的笑容,雖然沒有快轉,不過可以聽到遊戲場景,以及您的思考模式、側重,可以學習到選擇的原因;這樣很好,因為不是英文母語者,大部份感覺陌生,不知道為什麼,以及會發生什麼。在 Audit Mode 才能更改使用者資料夾預設值,因為不使用系統預設值,切割系統磁碟機和資料磁碟機。今天真是好日子,可以吃到 50元新臺幣的西瓜,也學到有趣的方法,辛苦了,感恩!( DeppL翻譯 )

  • @keylanoslokj1806
    @keylanoslokj1806 10 днів тому

    I bought an HP elitebook laptop in Europe with 11 pro on it. Any advice on how to debloat and despyware it? Thanks in advance

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 10 днів тому

      For any new machine I touch (work or personal), I start by erasing whatever's already on it. If you don't have to worry about multiple users on the machine, or if you don't need to create a master image to be cloned to multiple machines, then you probably don't need to muck around in Audit mode. Definitely prepare your installation media first by deprovisioning junk apps and inserting some registry settings, but then you can take the settings from unattend.xml and merge them into Autounattend.xml. If you do it right, it should automatically wipe the disk, boot through OOBE, and create a new user account for you. You can also use the "OEMkey.ps1" script I provided to reactivate your copy of Windows, using the OEM license already burned into the BIOS.

    • @keylanoslokj1806
      @keylanoslokj1806 10 днів тому

      @@NextDoorNetAdmin so this solution is not advise for a laptop that will have 2-3 users. Thanks for the answer.

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 10 днів тому

      It'll work fine for a laptop with multiple users! If you're doing that, just follow the whole process, Audit mode and all. :) Uncomment the section in deploy1.cmd to allow the OEMkey.ps1 script to run, and you should be good to go.

  • @Florreking
    @Florreking 18 днів тому

    Great series! During audit, I assume changes made in group policy will get saved as well?

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 16 днів тому

      The machine isn't (and shouldn't!) be attached to any domain while it's in audit mode, so group policies won't apply. Once you've created the image and it's booting into OOBE, that's when you join the domain and get group policy applied! On the other hand, if you're talking about Local Group Policy... it's a bit more complicated. First, remember that group policies are just a more user-friendly way of inserting values into the Windows registry. Most user-specific registry entries will be persisted into the default profile if you're using CopyProfile. Most machine-specific registry entries will also be persisted... but some won't. When Sysprep comes through and resets the machine in preparation for capture and cloning, some parts of the registry are cleaned up, and changes may be lost. This is something you may need to test a fair amount. I've spent weeks testing and re-testing things, sometimes. If your desired changes are cleaned up during sysprep, you may be able to re-load and modify the registry hives offline, or you may be able to re-insert the desired values on first boot via a command script... there's always ways to get things done! :)

  • @azmotorhead3614
    @azmotorhead3614 20 днів тому

    Am I safe to assume the unattend.xml and autounattend.xml files get copied into the root directory of the installation media/ISO file used to deploy this custom image? Also, I'm very interested in how you "slipstream" 3rd party programs and/or custom app settings into an installation (I would love to never have to go thru the mind-dumbing process of de-crapifying Edge ever again.) Also also, does the profile settings copy function work on adding domain user profiles to the PC as well? Awesome series of videos!

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 19 днів тому

      1. If Autounattend.xml is present on the root directory of any drive attached when Windows Setup starts, it will be used. So, if you boot off a setup DVD, but Autounattend.xml is present in the root of a connected USB drive, Setup will still use it. 2. When any unattend file is being used (auto or regular), Setup will copy it into the filesystem of the new operating system. (Specifically, C:\Windows\Panther.) This allows Setup to go through multiple reboots to process the different phases of setup, while still using the same unattend file. (edit)2a. If you were to copy an unattend.xml file into C:\Windows\Panther during initial setup, Setup will start using the settings as if it was an "in-progress" unattend file after it reboots. Rufus uses this method to insert any custom settings chosen by the user. 3. When we sysprep the image out of audit mode and into OOBE, we'll pass an argument telling sysprep exactly which unattend file we want it to use. I also prep the filesystem manually, as a belt-and-suspenders approach. 4. All the slipstreaming is done in Audit mode! That's what we're going to see in the next video. :) 5. The default profile copy does work for domain users... with a slight catch. If domain users are using local profiles or a roaming profile which hasn't been instantiated yet, the default profile will be used to provision their new profile. But if domain users are using an existing roaming profile, then their existing roaming profile will be used (as you would expect).

  • @azmotorhead3614
    @azmotorhead3614 22 дні тому

    That actual tutorial starts at 9:58 for those wanting to skip the backstory.

  • @keylanoslokj1806
    @keylanoslokj1806 23 дні тому

    Do you sell those images btw?

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 23 дні тому

      I do not and would not sell these images. I'm happy to share them, but I suspect that selling them would put me immediately at odds with Microsoft. There's a lot of difference, after all, between using Microsoft's available tools to customize their software (and telling other people how to do the same thing themselves), versus reselling their software without authorization.

    • @keylanoslokj1806
      @keylanoslokj1806 23 дні тому

      @@NextDoorNetAdmin do you have a place we can contact you up?

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 23 дні тому

      Not yet. I haven't built out a website or email just yet (though I do have plans for that), so for now the best way to reach me is right here in the comments! That being said, I intend to put much of the details for this online, so other people can access it more freely. I haven't exactly figured out how I want to do that, but in the next couple weeks I should have something for everybody as we wrap up the series. :) I just need to get enough time to sit down and figure it all out!

  • @keylanoslokj1806
    @keylanoslokj1806 23 дні тому

    24:25 what did you mean "it will remove the requirement"?

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 23 дні тому

      The BypassNRO registry key set here removes the requirement to use a Microsoft account in Windows 11. The use of local accounts is re-enabled, and a Microsoft account becomes optional.

  • @keylanoslokj1806
    @keylanoslokj1806 23 дні тому

    If we need all that trouble to have a semi-functional, not completely spyware system, then we should maybe just move to Linux 😂

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 23 дні тому

      That's a different discussion altogether. :) I use Linux, and as I've said in other comments, I personally have chosen to move to Linux instead of using Windows 11 on my personal systems. But that doesn't mean I can tell all of my business clients that I refuse to install Windows any more--that's a complete non-starter. So I still need to know how to do this for work purposes.

    • @keylanoslokj1806
      @keylanoslokj1806 23 дні тому

      @@NextDoorNetAdmin and for businesses that need to use excel amd office etc. hell even i use office

  • @voodoovinny7125
    @voodoovinny7125 24 дні тому

    HW raid, sw raid (by controller or by operating system), btrfs, or zfs all really depends on case use and is not a one for all. We also see it with raid levels too. But there is very little out there of people doing content actually showing you differences to help people understand the differences to make the decision of what is best for them.

    • @az09letters92
      @az09letters92 10 днів тому

      I can't think of any use for hardware RAID anymore. It's expensive, slower and risks data corruption.

  • @pracha95
    @pracha95 24 дні тому

    Too much talking! But good personality.

  • @rv6amark
    @rv6amark 27 днів тому

    Thank you for that wonderful "discussion" of ZSF. I am a new to RAID although I have been around since before MSDOS 1.0 was a thing, but drive arrays are new to me. Best way to keep from aging early is to learn new things...too late! But I still like learning new things.

  • @frankyvee1
    @frankyvee1 27 днів тому

    NTlite is a program that facilitates in doing all this for you in a GUI. But I like tlo know how things work and you explained to me what NTLite is doing in the background. Thank You

  • @brock2k1
    @brock2k1 29 днів тому

    Very well explained, thank you.

  • @keylanoslokj1806
    @keylanoslokj1806 29 днів тому

    Do you believe in the spectre/lite versions? Or too dangerous?

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 29 днів тому

      It concerns me that the website simply redirects me to a UA-cam channel. If I'm going to use something created by somebody else, I want to know EXACTLY what has been done--and ideally, I want to use that process myself to replicate their work, rather than take it on trust. Windows is opaque enough as it is. If I'm going to modify it, I want to be able to start from an official download from Microsoft and then do the modifications myself, so I know exactly what has been done and what (if anything) has been added. That's just my personal preference, though. I'm sure lots of people have had nothing but good experiences with it, but I haven't had experience with it at all, good or bad! Most of my work focuses on cleaning up Windows 10/11 for a business environment, which is a different target. I need stability, support from Microsoft, and the ability to be able to enable telemetry for business purposes if needed; I can't afford to strip everything out like some of those builds do. (I just need to learn to control it.)

    • @keylanoslokj1806
      @keylanoslokj1806 29 днів тому

      @@NextDoorNetAdmin what kind of telemetry is useful for business

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 29 днів тому

      Think of a business application, developed and written in-house rather than purchased. A new update to the application is pushed out, and people start to report that it crashes sometimes. But it doesn't crash all the time, and it doesn't crash on every machine, so troubleshooting it is taking some time... Or, think of pushing out a critical security update. It installs properly on most machines, but it's failing on a few machines here and there. What's different about the machines where it fails? Maybe your business pays for some very expensive applications, and you'd like to know which application(s) you should focus on trying to eliminate--which departments use which applications, and how often? Telemetry is useful for these kinds of problems. If there's a crash, Windows error reporting can log it and send some of the details needed to help fix the issue. If an update fails, diagnostic data can help shed light on what's different about the hardware or software on the problem PCs, so you can adjust the details of which machines are assigned which updates--or which machines you might need to fix in another fashion. Microsoft's telemetry functions are primarily intended to help spot issues like these, particularly as Windows grows more complex. But Microsoft also has settings to allow the business to store the telemetry data for their own in-house reporting needs, in which case Microsoft only collects and forwards the data. You can also turn off Windows error reporting completely without having to remove it--there's a setting for that. (Microsoft used to have a service that allowed businesses to examine and use the telemetry from the Windows PCs in their own fleet, but a lot of the data is now available through the use of Intune or other such agents, some of which still use the built-in data collection functionality in order to provide the needed information.)

  • @keylanoslokj1806
    @keylanoslokj1806 29 днів тому

    Is the Cisco certification for SysAdmins worth it?

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 29 днів тому

      I think it is. At the moment, I consider somebody with a CCNA to be "entry-level". I know Cisco has added additional certifications below CCNA these days... I personally have my CCNP, and I consider myself to be a mid-level networking guy in the grand scheme of things. Might get up to CCIE eventually. :) Cisco certifications spend entirely too much time on the Cisco-specific marketing stuff. Learn it to pass the test, forget it afterwards. The important parts are the general networking principles, yes, but because Cisco is one of the big granddaddies of the Internet, I have found that learning more of the Cisco-specific CLI commands is a massive benefit as well--a lot of other networking gear echoes the Cisco design and command structure!

    • @keylanoslokj1806
      @keylanoslokj1806 29 днів тому

      @@NextDoorNetAdmin i hear ccnp is quite hard

  • @keylanoslokj1806
    @keylanoslokj1806 29 днів тому

    Nice videos sir! Is there a program to clean windows 11 from bloatware?

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 29 днів тому

      There are lots of programs out there. :) For cleaning up an installation file, specifically, there is a program to do this... but it went further than I thought was beneficial, so I went through it all myself to choose what to get rid of and what to keep. It's also worth pointing out that sometimes programs to do this automatically can have negative effects--some previous versions rendered Windows unable to install any security updates, making them quite vulnerable to exploitation. I'm going to show you all one of those tools at the end of this series, but I thought it would be important for people to know how it works and why, so they can make their own decisions about whether they want to go through it manually (like I have).

    • @keylanoslokj1806
      @keylanoslokj1806 29 днів тому

      @@NextDoorNetAdmin i just want a safe and non monitoring version that plays games and works with Office suite

  • @RationalistRebel
    @RationalistRebel Місяць тому

    It's quite irritating when apps don't close file handles when they're supposed to be done with them. It's something that every programing 101 class teaches, yet _so many_ apps still don't do it correctly--even Microsoft's! It's even worse when a Windows service or the user shell clings to an old file handle. Ever tried to unmount a removable drive only to be rejected with an error message...even when _every_ app that ever touched the drive was already closed? Yep, a random service or part of the user shell left a damn file handle on the drive open.

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 29 днів тому

      Indeed! I've had some success using Procexp to find the offending handle and force it closed, but I've found that when it's System holding it open, force-closing the handle leads to system instability. Usually, though, a System file handle is the result of an anti-virus scanner, a file opened remotely via SMB, or something else of that nature. Makes me go on a bit of a hunt!

    • @RationalistRebel
      @RationalistRebel 29 днів тому

      @@NextDoorNetAdmin Yep, I've had Procexp fail a few times too. Sometimes the offending process just re-spawns the handle. On rare cases, it just fails with an error. Rather than trying to force it at that point, most people would give up and just reboot the system to clear the issue. My end run around an inclosable file handle is to simply unplug the drive in sleep mode. When the system wakes up, the offending process just has to deal with the file error...for a file it never should have kept open anyway. Technically, it was done with the file. If the system successfully goes to sleep, any pending file operations and cached versions of the file should have been committed to disk. Of course, I wouldn't do that with a complex file system, such as a database or enterprise-level system. For the average PC, I hadn't had any issues with that trick. If I keep having the same problem with the same app/process, it's still preferable to actually find and correct the issue.

  • @harrymills2770
    @harrymills2770 Місяць тому

    The fact that this video is helpful tells me to never buy another Windows machine.

    • @NextDoorNetAdmin
      @NextDoorNetAdmin Місяць тому

      I decided I would rather switch to Linux than run Windows 11 on my personal systems. But that doesn't stop me from having to deploy Windows 11 for work purposes, so I needed to figure out how to clean this all up anyway. :)

    • @keylanoslokj1806
      @keylanoslokj1806 29 днів тому

      ​@@NextDoorNetAdminthere is no workaround for Office/Excel users and gamers right?

    • @harrymills2770
      @harrymills2770 27 днів тому

      @@NextDoorNetAdmin I don't want to do it, but I'll be running Windoze 10 until May, and then I'll have the summer to figure something else out.

  • @doityourself3293
    @doityourself3293 Місяць тому

    Thank you so much...! Show how to disable cloud also.

    • @NextDoorNetAdmin
      @NextDoorNetAdmin Місяць тому

      We're definitely going to be taking a look at disabling the requirement for a Microsoft account in order to use your computer! There's also going to be some more settings that we can toggle to reduce the amount of "cloud" prompting we have to deal with. Stay tuned!

    • @keylanoslokj1806
      @keylanoslokj1806 29 днів тому

      ​@@NextDoorNetAdmincan we buy a "cleaned" installation file from you sir? Of course i would pay the key + the technical work done

  • @michaelfriesen4911
    @michaelfriesen4911 Місяць тому

    Can you share the sites that list the locations of those pesky registry entries can be identified? Awesome job on these tutorials! 🎉

    • @keylanoslokj1806
      @keylanoslokj1806 29 днів тому

      Wonder if with every new update all this laborious work goes to waste. Microsoft can just reinstall everything and more😢

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 29 днів тому

      This is (mostly) protected from being changed in future updates. Microsoft wouldn't make any friends if classified government networks suddenly had new stuff showing up on their secured PCs, after all! These registry keys exist specifically to disable this behaviour, and for that reason, you can expect them to work through all versions of Windows 11. (And even if Microsoft did add new provisioned applications, it would affect any existing user accounts on the machine. Provisioned apps only install themselves for brand-new users on the machine, so you're fairly safe from that, too!)

  • @mattmaster
    @mattmaster Місяць тому

    What about Unattend.xml installation for clan windows? I was thinking of doing it like that, which way is better?

  • @mattmaster
    @mattmaster Місяць тому

    That's actually really helpful! <3

  • @usernamechangeinprogress
    @usernamechangeinprogress Місяць тому

    Yes ! Realky excited about the next variants love you buddy take care see you next week !

  • @stiabeats
    @stiabeats Місяць тому

    "different version of onenote" hit me hard lol great stuff man

  • @hiddenpcmaster
    @hiddenpcmaster Місяць тому

    Interesting! Can’t wait until the next video. Thanks

  • @inspectorfegit
    @inspectorfegit Місяць тому

    Exactly what i needed, thank you so much

  • @SaulSutherland
    @SaulSutherland Місяць тому

    Cool stuff, thanks for the tour!

  • @javajav3004
    @javajav3004 Місяць тому

    they never get any quieter lmao

  • @guillaumebct2908
    @guillaumebct2908 Місяць тому

    Thanks for the infos and the really clear explanations !

  • @tenzinnamgyel1588
    @tenzinnamgyel1588 Місяць тому

    Very informative

  • @user-vg2lf4tw5s
    @user-vg2lf4tw5s Місяць тому

    Thank you! good for nubs like me.

  • @michaelfriesen4911
    @michaelfriesen4911 2 місяці тому

    Glad they finally gave you an office!

  • @angeldelvax7219
    @angeldelvax7219 2 місяці тому

    I'm only 6 minutes in, and it seems this is about exchange. Do you have any suggestions on how to get a relay set up in windows 10 without exchange? Using hmail as server at the moment. Trying to find information on how to get a proper mail server set up on a linux machine, but all tutorials are strictly for VPS/docker systems.

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 2 місяці тому

      You should find the bits about SPF records are still useful to you, since that applies whether you're running an SMTP server or setting up an SMTP relay. I don't have any information about hmail specifically. But it looks like that's an actual server. I'm not clear on whether you're attempting to send directly from that machine (from the SMTP server), or whether you're setting up a Windows 10 machine to send outbound email via the server (SMTP relay, from sending machine to server to Internet). If you're doing relay, then there's nothing special for Windows 10. Just point it at your SMTP server, and as long as you've configured the server correctly to allow relay from that machine, you should be able to send outbound. :)

    • @angeldelvax7219
      @angeldelvax7219 2 місяці тому

      @@NextDoorNetAdmin hmail is the mailserver I have running on a windows 10 machine. I'd need a relay service to actually enable the server to send mail. Receiving works perfectly. I found that it isn't maintained anymore since 2021, so I'm going to look for a complete solution. Might as well go for a linux server for everything, since I'll need web hosting, file server, chat server etc. anyway. And I have an old HP proliant lying around anyway. Thank you for your quick reply! I'll definitely watch the entire video too. There's no such thing as learning too much after all ;)

  • @PimpinBassie2
    @PimpinBassie2 2 місяці тому

    Heartbleed disproved _many eyeballs make a bug shallow_. I'm happy this outage proved that we still need supe secure mainframes. Also, i wonder if Intel Itanium (EPIC, not EPYC) created the monoculture, because it killed off a lot of non-PC (RISC) architectures.. 🤔

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 2 місяці тому

      I'm not sure I would agree that Heartbleed disproved the aphorism you mention. If anything, I think Heartbleed proved the general point that those who use a product commercially should contribute to its development. Crypto in general is a hard subject to do well, and the OpenSSL devs were chronically short on money and people who were both skilled enough and had sufficient free time to contribute. They didn't have the "many eyes" they needed to make the bugs shallow, nor did they have the resources to hire more. I don't think Itanium created any sort of a monoculture. Other RISC lines (including SPARC, ARM, and the IBM Power series) continued for decades after Itanium's introduction. They may not be especially common (certainly not as common as the x86-64 CISC microarchitecture), but they're still out there, and many are still being actively developed and sold today. Itanium, on the other hand, has itself been discontinued.

  • @vulgar_scabby_beaver
    @vulgar_scabby_beaver 2 місяці тому

    If you have only one backbone you've lost all redundancy. In the good old days when it was the wild west I had a provider no one had heard of, people be bellyaching about outages and downtime but my little insignificant outfit was still chugging along. It was bought out and of course we're all forced to swim in the same pond. It's like driving 10 cars sharing one engine, lose one engine and you've lost 10 cars.

  • @kernelparadigm
    @kernelparadigm 2 місяці тому

    Maybe its a problem (root cause) about alternatives, quality of service and a sprinkle of opensource and open access.

  • @003rlewis
    @003rlewis 2 місяці тому

    You don't want to delete those certificate exports altogether because if you have to restore that VM to a reloaded Host or a new Host environment, you cannot boot the TPM enabled VM without importing those certificates.

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 2 місяці тому

      That's a great tip, thanks! :D

    • @003rlewis
      @003rlewis 2 місяці тому

      @@NextDoorNetAdmin You are very welcome! I appreciate your video, it assisted me today!

  • @nowayandnohowx
    @nowayandnohowx 3 місяці тому

    So, IGMP snooping: leave it enabled or disabled for small business networks and/or home networks?

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 3 місяці тому

      I would leave it enabled. Certainly won't hurt anything! Then if something tries to use multicast and you happen to have a router which supports it, and all the stars align... it should work! If you disable IGMP snooping, that might end up being the piece which breaks it.

  • @michaelfriesen4911
    @michaelfriesen4911 3 місяці тому

    😂

  • @darrinito
    @darrinito 3 місяці тому

    Thank you. IP address space has always confused me.

  • @JavierDiaz-zh2jo
    @JavierDiaz-zh2jo 3 місяці тому

    Hi, Comcast and some other ISPs are blocking port 25, and the SMTP authenticators will be removed from Office 365. Do you know how to get around this port 25 issue?

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 3 місяці тому

      I do! Use a business connection. :) Not to be glib about it, but residential connections often have port 25 blocked in order to combat spam being sent from unaware customers infected with malware. Customers accessing their remote email accounts will usually use a different port--sending directly to port 25 (with or without STARTTLS) is indicative of a server-to-server (relay) connection. Conversely, since a business connection is expected to be running business applications (including email servers), all ports are generally left unblocked. Since you would need a static IP to add into the SPF record to permit the relay, that's also something typically available on a business connection.

    • @JavierDiaz-zh2jo
      @JavierDiaz-zh2jo 3 місяці тому

      @@NextDoorNetAdmin Sorry to say, Comcast in Florida is blocking port 25, even for businesses (which is why I asked). Many companies are dealing with this. To get around it, I set up an SMTP relay server with postfix. It connects to Office 365 using TLS and an account with SMTP authentication enabled.

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 3 місяці тому

      @@JavierDiaz-zh2jo Ouch! That boggles my mind, honestly. Business connections should be unfiltered, in my mind--it's one of the main reasons to even get a business connection in the first place! I'm going to guess that switching ISPs is likewise not a feasible option. If so, then I would honestly next look at ways of proxying the connection. First thing I would try is probably setting up an SSH tunnel to another endpoint where port 25 isn't blocked. If you had a way to SOCKSify the outbound connection, so much the better--you could use dynamic port forwarding instead of local port forwarding. But I'm afraid that I don't have a ready-made solution at hand for that problem... just ideas that would need more work.

    • @TheTF01
      @TheTF01 2 місяці тому

      If there are multiple public ip that need to be added, because of multiple locations, would you just add all of them to the spf record? Also, does that not create some other security concerns public the companies public ip on the spf record?

    • @NextDoorNetAdmin
      @NextDoorNetAdmin 2 місяці тому

      @TheTF01 Every IP address that needs to be allowed to send mail does need to be added... but there's different ways of doing that, depending on the exact circumstances. If they're just single IPs that aren't connected to each other, you can use multiple ip4: entries. If the IPs can be summarized into a CIDR range, you can also enter that. (Example: "ip4:192.168.2.36/30") Does it create a security concern? I don't think it does. For one thing, there's nothing saying that these IP addresses belong to your company. Let's say you have a rule sending all outbound email to a third-party service that adds a signature. (My company does this!) You need to add the third-party service to your SPF record, and they'll typically have documentation telling you what you can put in (it's usually an "include:service.com" entry). But you could just as easily put in the actual IP addresses if you wanted, and it would work the same way. The actual SMTP headers on the email message also include a record of all the machines the email has passed through (using SMTP), including their IP addresses, from start to finish. This not only reveals the sender's IP address (if they used SMTP), but all servers along the mail path. This is standard because it helps to diagnose mail flow issues, as well as allowing things such as SPF to function correctly. And it's been that way since the very beginning of email! As a general security rule, you never want to rely on "security through obscurity"--keeping things safe by keeping them secret. You definitely want to make sure you have a firewall to protect the network, whether you publish the external IPs in an SPF record or not. And if you do have a firewall in place, I think any additional security risk created by an SPF record is minimal, if not negligible.

  • @mattmaster
    @mattmaster 4 місяці тому

    Thanks! :)

  • @nex7053
    @nex7053 4 місяці тому

    I have a problem with this Microsofts solution. If we need SMTP relay for printers it would mean including all public IPs from each office to our SPF record. what that means is that every office will have permission to send whatever they want on behalf our domain. And I know ppl are capable of doing really amazing stuff, like buying some instagram like counter machine, plugging that to network and all I know is that every IDS and FW will turn on red alerts that there is port sweeping by some unknown linux machine happening. Also they have various visitors etc etc.. So for me allowing IP per each office in SPF will not do the trick at all. To me it is reckless and dangerous and also it would basicaly expose public IP of each of our office in one generaly available text record which is HELL NO. And now to my situation with this in mind we need simple SMTP relay - we could use on-prem exchange, but we are getting rid of that as our steps to cloud and also I do not want to deal with zero day every 5 minutes. We could use really handy SMTP server feature available on win server eddition - securing that would be piece of cake as I could even combine that with the setup you provided and have just one out of physical reach IP in SPF. BUT Microsoft decided in their infinite wisdom to deprecate it without direct replacement. So what can we do? Third party? - I would like to avoid third party funky solutions as plague. High volume mailbox? - feature in preview, so it can stretch and change thousands of time. To me what Microsoft is providing with this is good for some startup hipster office, but in corporate it is half baked and potentialy dangerous. Me sad, me angry, me wanna bonk somebody from Microsoft with bonkstick PS: Great video, there is not much about this topic around. Nicely done :)

  • @xCheddarB0b42x
    @xCheddarB0b42x 5 місяців тому

    0. OBS. Capture multiple inputs, such as camera and desktop (picture in picture). 1. Davinci Resolve community edition. Overwhelming at first, but plenty of help is out there. 2. Excalidraw: draw out complex diagrams as you narrate them. 3. Or a second overhead camera: draw it out on paper while you record. Some very large channels use this retro technique. 4. Learn a little bit of editing each video. It won't all be learned overnight. I'm sure you know this from your network learning adventure. 5. "Keep 'em coming! heh heh" (Duke Nukem voice) subbed

  • @javajav3004
    @javajav3004 5 місяців тому

    This is genius

  • @mattmaster
    @mattmaster 5 місяців тому

    Love the content! :)

  • @mattmaster
    @mattmaster 5 місяців тому

    Underrated channel!

  • @javajav3004
    @javajav3004 5 місяців тому

    This channel is gold and your personality makes learning fun. Keep it up!