Friday, December 1, 2017

[Solved] Cannot manage active directory certificate services … error

If you get an error message when you try to start the Active directory certificate service,


Cannot manage active directory certificate services. The system cannot find the file specified: 0x800700002 (WIN32: 2 ERROR_FILE_NOT_FOUND).

image

You can follow the below steps to overcome  this issue,

Basically what you need to do is to run the Post Deployment Configuration again and complete the installation of the Certification authority.

clip_image002

I have copy paste  the steps to do that and hope My help will not need to configure this as it was already there in the configuration file.

clip_image004

clip_image006

clip_image008

clip_image010

clip_image012

clip_image014

clip_image016


clip_image018

clip_image020

Once this is successful, you can restart the PC and next time you will be able to open your Certification Authority.

clip_image022

Friday, November 24, 2017

Enable Log Analytics in Azure

As I mentioned in my previous post. to use the OMS Log analytics feature, you can enable the Azure log analytics to collect the data from the Azure hosted instances.

To enable this, you can go in to the More Service in Azure Portal and search for Log Analytics.

clip_image001

Then select  create new and give a OMS workspace name.

You can create a new resource group or can select the existing resource group with the servers that you ant to monitor there.

Then select the location where you want to deploy this service.

Initially you can go with the free pricing tier which enables 500MB daily limit.

clip_image002

Then you can select the Virtual machine and in the next select the correct the virtual machines that you want to log the events.

clip_image003

Go into the selected VM and click connect. Once that is done, you will see the status as This Workspace.

clip_image004

Once you go into the Log Analytics Usage blade, you will be able to see the data consumption. Means you can plan, whether you can go with the free pricing tier or need to purchase some other tier.

image

Thursday, November 23, 2017

Azure Log Analytics


Azure Log  analytics are used in the Operation Management suit to collect the availability and the performance of the cloud  and the on-premise environments.

As you can see in the below diagram, you should be able to monitor and get the log information from the Azure hosted VMs, SCOM managed Servers and VM with the OMS agents.

image

At the center of Log Analytics is the OMS repository which is hosted in the Azure cloud.

Data is connected into the data source and then you have a chance of selecting the mothered that you want to filter them. As you can see in the below diagram, Log search can be done through the OMS itself and then you can select the option whether you want to send the alert to a specific Ticketing tool or a recipient, Download the data which can be used in the Power BI to do the reporting, or exporting as a CSV file.

image

This is a sample image of Azure Activity Log in the OMS. I will post the step by step guide about the OMS configuration .

image

SNAGHTML44bb8917

To start this you can use the OMS free data plan package which comes with an 500 MB daily upload limit.

If you have an azure subscription already then, go into OMS portal.

Thursday, November 16, 2017

Troubleshoot the Azure site to Site VPN issues.


I  have experienced that most of the time the Azure site to site configuration, making issues in the initial setup because of not following the correct steps.

For an example Some Firewall / Routers support only the “ RouteBased configuration” and not the  “PolicyBased configuration ”. Then you need to select the correct configuration method initially.

Even the IKE version needs to be 2 not 1. I saw sometimes those small mistakes kills your whole day.

Before starting the configuration you can refer the below mentioned Microsoft documentation,

https://docs.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-about-vpn-devices

Here you will be able to find the deployment guide for most of the known Firewall and Routes with the “ RouteBased configuration” and the “PolicyBased configuration ” methods.

You can download the step by step guide for the firewall configuration and for Azure VPN setup details are also in the document.

Friday, November 3, 2017

Azure Site-To-Site VPN configuration


Steps to create a S2S VPN is mentioned below.

If you have not set up the virtual network gateway then you can follow my previous post about  Azure Point to site Configuration.

There you can find the details about the Virtual Network Gateway setup.


Next, you can open the Virtual Network Gateway and click on connect. I have already set up one connection and you can click on the add button to start with a new VPN setup.

image


Then you can give a name for the VPN and select the collection type. Here I have selected VNet-to-VNet as I was planning to configure S2S VPN.

First give a name for the configuration then select the VPN as the type to create the VPN gateway.

Then you need to select correct Virtual network which you need to establish the connection and the IP address for the destination.

image


For the Network Gateway again you can give a name IP address and the address space.

clip_image003

You can give the same Preshared key which you have entered in the destination gateway.

image

Or else later you can change that by goin into the Settings > Preshared Keyimage


Once you Save that VPN status is Connecting.

clip_image005


You can get the Connected status if you have done the both the side configuration properly    Smile

Wednesday, November 1, 2017

Azure Point to Site VPN Configuration

Steps to configure P2S VPN is mentioned below and you can follow the steps to configure your site to point VPN.


There are mainly four categories of VPN provided by the Azure for the time. Those are.

  1. Point-to-Site (VPN over IKEv2 or SSTP)

  2. Site-to-Site and Multi-Site (IPsec/IKE VPN tunnel)

                               –> Site to Site and Multi Site VPN service

  3. VNet-to-VNet connections (IPsec/IKE VPN tunnel)

  4. Site-to-Site and ExpressRoute coexisting connections


If  you want more information or the connectivity information, you can click on the links and find them.

If you want more information about the Azure VPN pricing, then click on this Link


To start the S2S configuration, you need to go into

Virtual network gateways > Select the Gateway that you have created earlier 

Then select Point-To-Site Configuration and click configure now.

If you have not created your Virtual Network Gateway, you can follow my blog post which is describe about that.


image

Then give an address pool which you want to use and select the tunnel types below.


Select SSTP protocol.

SSTP(Secure Socket Tunneling Protocol) is a new form of VPN tunnel with features that allow traffic to pass through firewalls that block PPTP and L2TP/IPsec traffic. SSTP provides a mechanism to encapsulate PPP traffic over the SSL channel of the HTTPS protocol. The use of PPP allows support for strong authentication methods such as EAP-TLS. The use of HTTPS means traffic will flow through TCP port 443, a port commonly used for Web access. Secure Sockets Layer (SSL) provides transport-level security with enhanced key negotiation, encryption, and integrity checking.

image

I have selected the Azure Certificate as the authentication type. And to use the certificate you need to Generate a Root and a Client certificate.

Steps to create the certificate can be found here.

Once you copy and paste the Certificate you will be able to save the new configuration.

Next the Download VPN client tab will be active and you will able to download the VPN client from that.

image

You can generate the client Certificate by using the below command,

makecert.exe -n "CN=AzureClientVPNCert" -pe -sky exchange -m 96 -ss My -in "AzureClientVPNCert" -is my -a sha1

image

Then import the certificate into the Personal Certificate folder and install the VPN client on the PC which you want to use this VPN.

image

If you have imported the Client Certificate correctly, then you will be able to connect your client VPN without any issues.


image

You can download the generated Certificate from https://gallery.technet.microsoft.com/Azure-Point-to-VPN-3613dbeb location.

This will help you to do the initial testing.

Tuesday, October 31, 2017

Azure Virtual Network Gateway

Creating a Virtual Network gateway in an Azure environment is not a rocket science. But there a few things that you need to clearly defined and if you missed them, then, will kill your day to find solutions for those errors.


To configure the Virtual network gateway select the “Virtual Network Gateway” by going into the ore services as shown below.


image


image

If you see your Virtual network in inactive that means you have to create the Gateway subnet for this network.To do that you can go into Vnet >  Subnet then you can go into “Gateway Subnet”

image

But If you have deployed by using the default configuration then you will not be able to

add the CIDR (Classless Inter-Domain Routing). That is because you cant use a overlapping IP range.


image

To overcome this you can change the “Address Space”. Here I have change to *.*.*.*/16 Which will be easy for me to manage my demo environment. but when you are doing this, you should plan this properly to reduce the unwanted broadcasts.

image

Once that is done, You can assign a name for the Gateway and a Static IP for the Gateway.

image


Hope this helps you to configure your Virtual Gateway in your Azure environment.

Friday, October 27, 2017

How to create Windows Root Certificate By using PowerShell


This will be required for the few occasions like when you want to create an Azure site to site VPN and when creating an ADFS.

First, you need to download the Window SDK and install on the server. You can find the download URL below.

Windows 10 SDK 


Once that's done, you can go into the location where this “makecert.exe” located in.

As you can see below now the location was changed and you can find that


C:\Program Files (x86)\Windows Kits\10\bin\10.0.16299.0\x86>

I have highlighted the new folder location in yellow color.

Now you can run “Dir” a check whether the ““makecert.exe” file is available there.

image

To create the Root Certificate you can run,

makecert -sky exchange -r -n "CN=AzRootVPNCert" -pe -a sha1 -len 2048 -ss My "AzRootVPNCert.cer"

image

Once that is succeed, you should be able to find the created certificate under the personal certificate.


image

Next  will find the way that we can create the client certificate.

Monday, October 16, 2017

How to change the default RDP port in Azure VM

Changing an RDP default port in a Server is not a rocket science. But to do that in a VM which is hosted in the Azure environment will make more troubles if you failed to follow the correct steps.

The first thing that I recommend is to keep another server in the same resource group and the same subnet.

Then, even if you make a mistake, then you have a way of accessing your registry by using your secondary VM.

Once you ready to change the  RDP port, logged into your VM through the RDP and open the Registry Editor.

Then go into below location,

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp\PortNumber

image

Default port will be 3389 and as you can see above change that to the port that you want.

Before doing any changes make sure that you have allowed the firewall for this port or to do the testing disable the Windows firewall

Click Ok and restart the VM.

Now go into the Azure portal and the Networking pane under settings. There you can find the default RDP endpoint which was created earlier.

Edit that and change the RDP inbound port as you configured in your VM. Same port needs to be in the both the configuration files.

image

Now  open the RDP connection and give the VM IP and the port as mentioned in the below print screen.

image

This will help you to minimize the brute force attacks to your Azure VM.

No subscriptions found in Azure portal


This is a common error which we can see when we setup a new azure account. Sometime this is not an error and this error is coming because of a mistake that we are doing.

If you experience this issue you an start with the below steps to troubleshoot this.

First, you need to check whether you have logged into the correct account. Because mainly there two categories, and if you are in the wrong account, then you will not be able to see your subscription.

This option will prompt once you type your user name and if you have personal and work accounts created for the same email address.

image


If this is not the case, then you can check the User permission under the Microsoft Azure Access control (IAM).

Check the Role that is assigned for the email address that you are using and you have to have minimum owner permission to access your subscription.

If that is not set. Give the owner's permission.

image

Then login into your Azure portal by using that email account. Now you should be able to see the subscriptions.

Thursday, October 12, 2017

Configure Alerts and Events for Azure Backup


To do this first you need to enable the Windows backup. To do that first search for

Recovery Services vaults > Backup Alerts >

image

Then select the configure notifications an enable Email Notifications and give the recipient email address of the Ticketing system or he alert dashboard.


image

You can set the method of notification and severity. Based on your selections you will be able to receive the alerts.

This is a small configuration that you need to do. But that will stop a future disaster.