Tweaking the Windows File System
article #847, updated 3 days ago

The command is FSUTIL.

https://technet.microsoft.com/en-us/library/cc753059.aspx

The following usages enhance speed. There are caveats for each.

  • Don’t do this if you use compression :-)
    FSUTIL behavior set disablecompression 1
  • Don’t do this if you use Microsoft built-in encryption!
    FSUTIL behavior set disableencryption 1
  • This one interferes with some backup and file-sync systems.
    FSUTIL behavior set disablelastaccess 1
  • This will interfere with very old software, or software whose updates do not comply with Microsoft’s recommended practices, especially involving DOS-style short filenames.
    FSUTIL behavior set disable8dot3 1
  • Designates more RAM for disk cache. Only use if you have ample RAM. Default is zero, 1 is an option.
    FSUTIL behavior set memoryusage 2
  • Can be 1, 2, 3, or 4; these are multiples of 200M of disk space reserved for file tables, it makes handling of large quantities of files more efficient, but only does anything for partitions created after this setting is made.
    FSUTIL behavior set mftzone 4

This one may decrease speed a tad, but should increase reliability. Does not work with system drives, it is unclear as to why.
FSUTIL resource setconsistent E:\

This one resets NTFS transaction logs at reboot, this can eliminate many issues of filesystem slowdown over time which have to do with a kind of corruption which CHKDSK does not catch.
fsutil resource setautoreset true c:\

Categories:      

==============

New malware remover
article #849, updated 4 days ago

Here’s a new one, being recommended by shouldiremoveit.com, appears to work well:

https://www.reasoncoresecurity.com/product.aspx

Categories:      

==============

Full wipe and recreate of the NTFS transaction record for a system drive
article #848, updated 8 days ago

Here is a procedure which reportedly does a full wipe and recreate of the NTFS transaction record for a system drive. The commands below need to be run in an administrative CMD, then the machine rebooted. ‘setautoreset’ tells the system to do a smaller-scale reset at every boot, it is not known whether there is any reason to set it back to ‘false’ after the reboot is complete. The procedure appears to be able to eliminate some extremely stubborn Windows Update errors, as well as alleviating some situations where NTFS volumes become very slow in accessability. Setting setautoreset to true, all by itself with a reboot, has been seen to help quite a lot too.

fsutil resource setautoreset true %SystemDrive%\

attrib -r -s -h %SystemRoot%\System32\Config\TxR\*
del %SystemRoot%\System32\Config\TxR\*

attrib -r -s -h %SystemRoot%\System32\SMI\Store\Machine\*
del %SystemRoot%\System32\SMI\Store\Machine\*.tm*
del %SystemRoot%\System32\SMI\Store\Machine\*.blf
del %SystemRoot%\System32\SMI\Store\Machine\*.regtrans-ms

Categories:      

==============

Windows Firewall for Quickbooks
article #844, updated 11 days ago

Create the following as a batch file and run it, client and server, 64- or 32-bit:

@echo off
IF "%~1"=="" (
	echo QBapps 
	echo Required parameter: QuickBooks software version number, e.g., 2014
	echo Example:  QBapps 2014
	exit /B
)
IF EXIST "%ProgramFiles(x86)%" (SET PGMFILES="%ProgramFiles(x86)") ELSE (SET PGMFILES="ProgramFiles")
netsh advfirewall firewall add rule name="QBCFMonitorService" dir=in action=allow program="%PGMFILES%\Common Files\Intuit\QuickBooks\QBCFMonitorService.exe"
netsh advfirewall firewall add rule name="QBupdate" dir=in action=allow program="%PGMFILES%\Common Files\Intuit\QuickBooks\QBupdate\QBupdate.exe"
netsh advfirewall firewall add rule name="QBDBMgrN" dir=in action=allow program="%PGMFILES%\Intuit\QuickBooks %1\QBDBMgrN.exe"
netsh advfirewall firewall add rule name="QBDBMgr" dir=in action=allow program="%PGMFILES%\Intuit\QuickBooks %1\QBDBMgr.exe"
netsh advfirewall firewall add rule name="QBW32" dir=in action=allow program="%PGMFILES%\Intuit\QuickBooks %1\QBW32.exe"
netsh advfirewall firewall add rule name="QBCFMonitorService" dir=out action=allow program="%PGMFILES%\Common Files\Intuit\QuickBooks\QBCFMonitorService.exe"
netsh advfirewall firewall add rule name="QBupdate" dir=out action=allow program="%PGMFILES%\Common Files\Intuit\QuickBooks\QBupdate\QBupdate.exe"
netsh advfirewall firewall add rule name="QBDBMgrN" dir=out action=allow program="%PGMFILES%\Intuit\QuickBooks %1\QBDBMgrN.exe"
netsh advfirewall firewall add rule name="QBDBMgr" dir=out action=allow program="%PGMFILES%\Intuit\QuickBooks %1\QBDBMgr.exe"
netsh advfirewall firewall add rule name="QBW32" dir=out action=allow program="%PGMFILES%\Intuit\QuickBooks %1\QBW32.exe"

Previous recommendations are below.

http://payroll.intuit.com/support/kb/1000504.html

http://support.quickbooks.intuit.com/support/Articles/SLN41458

Combing the above, I found the following list of ports.

  • QuickBooks 2015: 8019, 56725, 55363-55367
  • QuickBooks 2014: 8019, 56724, 55358-55362
  • QuickBooks 2013: 8019, 56723, 55353-55357
  • QuickBooks 2012: 8019, 56722, 55348-55352
  • QuickBooks 2011: 8019, 56721, 55343-55347
  • QuickBooks 2010: 8019, 56720, 55338-55342
  • QuickBooks 2009: 8019, 56719, 55333-55337
  • QuickBooks 2008 and 2007: 10172
  • QuickBooks 2006: 10160

Here are a list of commands, suitable for an administrative command prompt, to be run on server and workstation to generate the port exceptions above.

netsh advfirewall firewall add rule name="Quickbooks General" dir=in action=allow protocol=TCP localport=8019
netsh advfirewall firewall add rule name="Quickbooks 2015 1" dir=in action=allow protocol=TCP localport=56725
netsh advfirewall firewall add rule name="Quickbooks 2015 2" dir=in action=allow protocol=TCP localport=55363-55367
netsh advfirewall firewall add rule name="Quickbooks 2014 1" dir=in action=allow protocol=TCP localport=56724
netsh advfirewall firewall add rule name="Quickbooks 2014 2" dir=in action=allow protocol=TCP localport=55358-55362
netsh advfirewall firewall add rule name="Quickbooks 2013 1" dir=in action=allow protocol=TCP localport=56723
netsh advfirewall firewall add rule name="Quickbooks 2013 2" dir=in action=allow protocol=TCP localport=55353-55357
netsh advfirewall firewall add rule name="Quickbooks 2012 1" dir=in action=allow protocol=TCP localport=56722
netsh advfirewall firewall add rule name="Quickbooks 2012 2" dir=in action=allow protocol=TCP localport=55348-55352
netsh advfirewall firewall add rule name="Quickbooks 2011 1" dir=in action=allow protocol=TCP localport=56721
netsh advfirewall firewall add rule name="Quickbooks 2011 2" dir=in action=allow protocol=TCP localport=55343-55347
netsh advfirewall firewall add rule name="Quickbooks 2010 1" dir=in action=allow protocol=TCP localport=56720
netsh advfirewall firewall add rule name="Quickbooks 2010 2" dir=in action=allow protocol=TCP localport=55338-55342
netsh advfirewall firewall add rule name="Quickbooks 2009 1" dir=in action=allow protocol=TCP localport=56719
netsh advfirewall firewall add rule name="Quickbooks 2009 2" dir=in action=allow protocol=TCP localport=55333-55337
netsh advfirewall firewall add rule name="Quickbooks 2007-8 1" dir=in action=allow protocol=TCP localport=10172
netsh advfirewall firewall add rule name="Quickbooks 2006 1" dir=in action=allow protocol=TCP localport=10160
netsh advfirewall firewall add rule name="Quickbooks General" dir=out action=allow protocol=TCP localport=8019
netsh advfirewall firewall add rule name="Quickbooks 2015 1" dir=out action=allow protocol=TCP localport=56725
netsh advfirewall firewall add rule name="Quickbooks 2015 2" dir=out action=allow protocol=TCP localport=55363-55367
netsh advfirewall firewall add rule name="Quickbooks 2014 1" dir=out action=allow protocol=TCP localport=56724
netsh advfirewall firewall add rule name="Quickbooks 2014 2" dir=out action=allow protocol=TCP localport=55358-55362
netsh advfirewall firewall add rule name="Quickbooks 2013 1" dir=out action=allow protocol=TCP localport=56723
netsh advfirewall firewall add rule name="Quickbooks 2013 2" dir=out action=allow protocol=TCP localport=55353-55357
netsh advfirewall firewall add rule name="Quickbooks 2012 1" dir=out action=allow protocol=TCP localport=56722
netsh advfirewall firewall add rule name="Quickbooks 2012 2" dir=out action=allow protocol=TCP localport=55348-55352
netsh advfirewall firewall add rule name="Quickbooks 2011 1" dir=out action=allow protocol=TCP localport=56721
netsh advfirewall firewall add rule name="Quickbooks 2011 2" dir=out action=allow protocol=TCP localport=55343-55347
netsh advfirewall firewall add rule name="Quickbooks 2010 1" dir=out action=allow protocol=TCP localport=56720
netsh advfirewall firewall add rule name="Quickbooks 2010 2" dir=out action=allow protocol=TCP localport=55338-55342
netsh advfirewall firewall add rule name="Quickbooks 2009 1" dir=out action=allow protocol=TCP localport=56719
netsh advfirewall firewall add rule name="Quickbooks 2009 2" dir=out action=allow protocol=TCP localport=55333-55337
netsh advfirewall firewall add rule name="Quickbooks 2007-8 1" dir=out action=allow protocol=TCP localport=10172
netsh advfirewall firewall add rule name="Quickbooks 2006 1" dir=out action=allow protocol=TCP localport=10160

Categories:      

==============

Reset Windows filesystem transaction support
article #846, updated 11 days ago

Apparently, corruption in Windows filesystem transaction support will cause many different kinds of errors, ranging from IIS not starting to scheduled task creation failing to Windows updates failing. To fix this, one can do the following in an administrative command prompt:

fsutil resource setautoreset true c:\

In some circumstances it is reportedly helpful to repeat the above for E:\ and any other NTFS drive in production.

Categories:      

==============

Windows Networking for Quickbooks
article #609, updated 18 days ago

This article has been rewritten here:

http://notes.ponderworthy.com/windows-firewall-for-quickbooks

Categories:      

==============

Sending mass email marketing via SMTP
article #843, updated 19 days ago

A few methods:

https://sendgrid.com/

https://mandrill.com/

http://smtp.com

The first two have free-of-charge tiers.

Categories:      

==============

Export Exchange public folders to PST
article #841, updated 21 days ago

Here:

“https://technet.microsoft.com/en-us/library/Dn874017(v=EXCHG.150).aspx#PSTMigrate”

appears to be a method.

Categories:      

==============

Find HP Drivers by Device Serial Number
article #832, updated 21 days ago

Here are great places to find drivers and info for HP devices by serial number.

First, workstations and printers:

http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/psi/swdSelector/?spf_p.tpst=psiProductSelector&spf_p.prp_psiProductSelector=wsrp-navigationalState%3D_op%253Dserial&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken

Second, Enterprise, for servers, storage, and networking:

http://h20566.www2.hpe.com/portal/site/hpsc/template.PAGE/public/psi/swdSelector/?cc=us&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken&javax.portlet.prp_867000c4cf25636cc859bfdeb053ce01=wsrp-navigationalState%3D_op%253Dserial&javax.portlet.tpst=867000c4cf25636cc859bfdeb053ce01&lang=en-us&ac.admitted=1438961375712.125225703.1938120508

Categories:      

==============

Time synchronization (NTP, SNTP) setup
article #37, updated 22 days ago

In Windows Server 2012 R1/2, 2008 R1/2, 7, Vista, and 2003 SP2 and later, it’s good to run the following two commands in an administrative command prompt (an ordinary command prompt for 2003):

w32tm /config /manualpeerlist:pool.ntp.org,0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org /syncfromflags:MANUAL /reliable:YES /update
w32tm /resync

In Server 2003 SP1 and before, and XP, we use this, because /reliable doesn’t exist:

w32tm /config /manualpeerlist:pool.ntp.org,0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org /syncfromflags:MANUAL /update
w32tm /resync

Sometimes w32tm doesn’t exist as a service, and has to be registered:

w32tm /register

Under Windows 2000, we need to go a bit more archaic:

net time /setsntp:pool.ntp.org
net time /querysntp

If you are using Windows DHCP services, the above is best for the server, but for all of the workstations you can set up time servers as a DHCP option.  For this, the following list works well.  Put them in one at a time into the DHCP options, and then click Resolve for an IP.

pool.ntp.org
0.pool.ntp.org
1.pool.ntp.org
2.pool.ntp.org

Or you can simply put in your server’s local IP. This is probably best for a domain.

Categories: