Trending Topics

VMware on AWS - How to restore NSX DFW firewall rules to previous state

Image
Customers who uses NSX day-in, day-out would like to have a point-in time restore functionality of DFW firewall rules. Many customer have a large footprints in VMC and make changes to DFW quite often. This feature was missing for long time and we could see its included in recent versions . Let's see how DFW configuration roll back works  NSX DFW configuration has versioning, and it is stored in the NSX Manager.  Every time when someone update DFW configuration, NSX creates one more version but keep storing the previous ones. You can rollback for previous config but reapplying it once again.  You can find the options under Networking & Security tab , > Security > Distributed Firewall . In the right side we see an Actions drop down. Choose View to get to the below screen.  Let’s go through the use case:  1. Original state- default config with no custom rules:  a. There are no saved configurations during last 30 days: In my existing test setup, with the current setting

Windows: Get a List of All Running Processes from the Command Line


If you need to get a quick list of running processes on your computer or another computer on your network, you can use the Windows Instrumentation command-line interface (WMIC) to quickly generate this. You can even generate a text file so you can print the list if need be. This Tech-Recipe applies to Windows XP Professional, Windows Vista, Windows Server 2003 and Windows Server 2008.


1. Open a command prompt.

2. Execute the following command:
wmic process get description,executablepath

To list the processes on another computer, execute the following command:
wmic /node: process get description,executablepath

Where computer name is the name of the desired computer.

to generate a textfile, execute the following (make sure to change the output path to your liking):

Your computer:
wmic /output:d:\process.txt process get description,executablepath

Another computer:
wmic /node: /output:d:\process.txt process get description,executablepath

Your results will look something like this:

Popular posts from this blog

HOW TO EDIT THE BCD REGISTRY FILE

DNS Scavenging.

AD LDS – Syncronizing AD LDS with Active Directory