The Burton Tech Journal

Tag: Microsoft

Microsoft Software Discounts for Students

by on Dec.07, 2009, under Microsoft Office, Microsoft Operating Systems

Anyone that has an active email address ending in .EDU can purchase Microsoft Office 2007 Ultimate Edition and Windows 7 at dramatically discounted rates (click the link to order):

Microsoft is planning to expire this program soon so I would take advantage of the offer as soon as possible!

Leave a Comment :, , , , , , more...

Event ID 1030 and 1058 when querying Group Policy Objects

by on Nov.26, 2008, under Window Small Business Server 2003, Windows Server 2003

After a Windows 2003 Small Business Server failed to shutdown using APC’s PowerChute UPS software, it was having trouble querying and applying the group policy settings.


Event 1058

Event Type: Error
Event Source: Userenv
Event Category: None
Event ID: 1058

Windows cannot access the file gpt.ini for GPO CN={31B2F340-016D-11D2-945F-00C04FB984F9},CN=Policies,CN=System,DC=domain,DC=local. The file must be present at the location <\\Random_Domain_Name.local\sysvol\domain.local\Policies\{31B2F340-016D-11D2-945F-00C04FB984F9}\gpt.i ni>

— And —

Event 1030

Event Type: Error
Event Source: Userenv
Event Category: None
Event ID: 1030

Windows cannot query for the list of Group Policy objects. Check the event log for possible messages previously logged by the policy engine that describes the reason for this.

Successful repair steps taken:

  1. Download and install the Windows Server 2003 Service Pack 1 Support Tools.
  2. Once installed, open the command prompt and run: dfsutil /PurgeMupCache
  3. Then run: gpupdate /force
  4. Examine the Application Event log for Event ID 1704

If this does not correct your issue, the following Microsoft Knowledge Base articles might help:

  1. KB888943 – Event 1030 and event 1058 may be logged, and you may not be able to start the Group Policy snap-in on your Windows Small Business Server 2003 computer.
  2. KB842804 – A Windows Server 2003-based computer may stop responding when it is resumed from standby and events 1030 and 1058 are logged in the application log of a domain controller.
Leave a Comment :, , , , , , , , , , , , , more...

View Mail Headers in Outlook 2007

by on Nov.25, 2008, under Email, Microsoft Office, Microsoft Outlook 2007, Spam

Extracting an email header can be useful in tracking email issues, locating spammers, and reporting spam.

To view your header, do the following:

  1. Locate the message in your inbox and right-click on it.
  2. Select Message Options from the menu
  3. Copy the text in the Internet Headers window.  This will not include the email message, just the header.
  4. Paste the information into an email or document for analysis.  If you wish to paste the information into an email, you will need to close the options dialogue first.
Leave a Comment :, , , , , , , , more...

View Mail Headers in Outlook 97, Outlook 98, Outlook 2000, Outlook 2003

by on Nov.23, 2008, under Email, Microsoft Office, Microsoft Outlook 2003, Spam

Extracting an email header can be useful in tracking email issues, locating spammers, and reporting spam.  To find your email header, in Outlook versions 97 to 2003, you can use the following steps.  Please note, Microsoft Outlook 97 may require the Internet Mail Enhancement Patch to view any mail headers.

To view your header, do the following:

  1. Start Outlook
  2. Open the email message in a separate window by double clicking on the email in your Inbox
  3. In the new email window, click on the View menu and select Options
  4. Copy the text in the Internet Headers window.  This will not include the email message, just the header.
  5. Paste the information into an email or document for analysis.  If you wish to paste the information into an email, you may need to close the options dialogue first.
Leave a Comment :, , , , , , , , , , , more...

Migrate to Windows Small Business Server 2008 from Windows Small Business Server 2003

by on Nov.12, 2008, under Window Small Business Server 2003, Windows Small Business Server 2008

The following TechNet article – “Migrate to Windows Small Business Server 2008 from Windows Small Business Server 2003” – covers the process of installing Windows Small Business Server 2008 and migrating your existing Windows Small Business Server 2003 based domain:

Although the process is fairly straight forward and simple, we have found it useful to simulate the process using a virtualized environment created from the SBS 2003 machine using Acronis True Image Virtual Edition and VMWare.

Leave a Comment :, , , , , , , , , , , , , , , , , , more...

Check Windows Installer (MSI) Logs

by on Sep.21, 2008, under Microsoft Windows XP, Windows Application Deployment, Windows Vista

Windows typically uses the following directory to store MSI logs with the filenames “Msi*.log”:


By examining the MSI logs most recently modified, you can often see installation issues, such as permission errors, registry problems, and dependancy errors:

dir /O-D /TW %SYSTEMROOT%\Temp\Msi*.log

If MSI logging is not enabled, you can enable it by editing the registry or via GPO.  See KB223300 for details on how to enable logging.

Leave a Comment :, , , , , , , more...

Simulate a Windows Application Deployment Lifecycle

by on Sep.21, 2008, under Microsoft Windows XP, Windows Application Deployment, Windows Vista

If a domain test bed is not avaiable, either real or virtualized, it is best to use a single workstation to test an unproven MSI based package. Frequently the deployment process is hung up when the MSI performs a custom action that requires some form of user interaction. It is important to not only look for this behavior in new installations, but also MSI’s used to upgrade long functioning deployed applications, before introducing either to your GPO.

This is the recommended test procedure:

A) Perform an installation and look for dialogues that require user intervention:

  1. MSIEXEC /i “\\path_to_msi” /qb
  2. The /i switch tells MSIEXEC to install or configure a product
  3. The /qb switch tells MSIEXEC to use a basic UI

B) If the application does not install correctly, check the MSI log file for errors. Otherwise confirm the application is functioning correctly.

C) It is critical to test what happens during uninstallation of the application too. Any user interaction requirements could cause a failure when upgrading or removing your application later. Run the following command to observe the uninstall process:

  1. MSIEXEC /x “\\path_to_msi” /qb
  2. The /x switch tells MSIEXEC to uninstall the product

D) If the application installs and uninstalls without requiring user interaction, it will probably work fine deployed. To finalize a simulation, the application should be silently installed remotely using PSEXEC and the following commands:

  1. PSEXEC -u context\username -p password \\target_machine MSIEXEC.EXE /i “\\path_to_msi” /qn

E) Confirm the application functions correctly with an unprivileged user account. Check the MSI log on the target machine for errors if necessary.

F) Once again, test the uninstall process:

  1. PSEXEC -u context\username -p password \\target_machine MSIEXEC.EXE /x “\\path_to_msi” /qn

G) If the application appears to be working, you can proceed with assigning it to your GPO.

H) If application does not deploy, try the following:

  1. Examine the MSI logs on the client computer and make any adjustments necessary.
  2. Confirm Vista’s UAC is not blocking installation.
  3. Check for valuable tips and tricks, particularly if you are deploying a popular commerical package. The site has some great resources on how to customize packages so they will install correctly.
Leave a Comment :, , , , , , , , , , , , , , , , more...

Cannot Disconnect or Re-Map a Network Drive

by on Sep.17, 2008, under Microsoft Windows Networking, Microsoft Windows XP, Windows Vista

Occassionally a workstation will show a mapped network drive as “Disconnected” in Windows Explorer.  Double-clicking on the drive does not resume the connection and attempting to unmap the drive will give an error that “The network connection does not exist”.

Additionally you may see your login scripts not mapping other drives.

To correct the problem, download the User Profile Hive Cleanup Service from the Microsoft Downloads site and read the installation/usage instructions:

Leave a Comment :, , , , , , , more...

Duplicate Items in Exchange with at least one Entourage Client

by on Sep.15, 2008, under Microsoft Entourage 2008, Microsoft Exchange, Microsoft Office

A client of mine recently contacted me with a number of Exchange related problems.  Various company Executives were seeing duplicate and vanishing appointments in their Entourage Calendar.  Most of the company Execs were on Macs using Entourage 2008, while their assistants were using Outlook 2003/2007 on Windows based PC’s will full delegation rights.

After examining the Exchange entries, it appears the duplicates were being created solely by the Entourage clients.  Further examination of the Mac clients revealed that they also had the Sync Services Enabled for Entourage.

Entourage Preferences - Sync Services

By disabling the Sync Services for Entourage, it eliminated duplications from the corrupted truth database.  Unfortunately, some of the Execs wanted Entourage data to continue to sync with their .Mac accounts, despite the same information being available from any web browser via OWA.   This required fixing the somewhat buggy Sync Service.

The Sync Service works as an intermediate between your various applications/devices and the data they contain.  When an application like Entourage syncs with the Sync Service, the data is copied from Entourage to the truth database.  At that point, other applications like iCal further synchronize the data with the truth database.

iCal <–> Truth DB <–> Entourage <–> Exchange

For an excellent article on sync’ing, check out the Entourage Help Blog and “Why does syncing play Gossip with my contacts?“.

To fix the issues my clients were experiencing, I had to purge the corrupt truth database and re-sync using Entourage as the master database.  If you want to do something similar, follow these steps:

  1. Back up all iCal, Address Book, and Entourage Data.  If you fail to do this and make a mistake, you will lose data.
  2. Turn OFF the Sync Services for Entourage in the Entourage Preferences on ALL clients that connect to the Exchange server.
  3. Remove the duplicate items in Entourage using these tools.
  4. Delete duplicate iCal appointments using John Maisey’s iCal Dupe Deleter.
  5. WARNING: The remaining steps will delete data – Make sure you have a valid BACK UP before proceeding.
  6. Quit all Microsoft Office applications except Entourage
  7. In the Entourage menu select “Turn Off Office Reminders”
  8. Quit Entourage
  9. Start the “Activity Monitor”, select “database daemon”, and choose “Quit Process” from the Processes Menu (perform a Normal Quit, not a Force Quit)
  10. Quit iCal, Address Book, Safari, and any other applications that sync with a .Mac account
  11. Use Activity Monitor to quit the Sync Services
  12. Delete the contents of ~/Library/Application Support/SyncServices/
  13. Since Entourage is going to be the primary source of data, delete the iCal and Address Book data files:
    • Delete  ~/Application Support/iCal/*~/Application Support/AddressBook/*
    • Delete  ~/Library/Caches/*
    • Delete  ~/Library/Caches/*
  14. Open the .Mac applet via the System Preferences and Verify .Mac syncing is enabled
  15. Restart all applications that sync with .Mac (ie, iCal, Address Book, Safari, etc)
  16. Turn on the Sync Services in the Entourage Preferences
  17. When prompted with the “Replace, Replace, Merge” dialogue, since we select Entourage to be the primary source of data, make sure to choose “Replace Sync Services items with Entourage items”.

From what I have experienced, synchronizing an Exchange linked Entourage client with a .Mac is frequently problematic and I do not recommend it at the time this article was written.  If you must use this functionality, make sure to always make additions/changes/deletions from one machine and with a single application.  You should then give some time for synchronization to occur before using another machine/app.  As you can imagine, this can be an issue for users with delegates constantly changing Exchange data from another machine!

Leave a Comment :, , , , , , , , more...

Use CheckSUR to repair Windows Vista update issues

by on Sep.14, 2008, under Vista Windows Update, Windows Vista

The Windows Vista Check for System Update Readiness (CheckSUR) tool will try to fix certain Windows Update installation failures.

System resources, such as file data, registry data, and even in-memory data, can develop inconsistencies during the lifetime of the operating system. These inconsistencies may be caused by various hardware failures or by software issues. In some cases, these inconsistencies can affect the Windows Servicing Store, and they can cause a Windows Vista update to fail. When the update fails, it blocks the user from installing updates and service packs. CheckSUR addresses this issue.

When Windows Update detects inconsistencies that are related to system servicing in system files or in the registry, Windows Update offers CheckSUR as an available update package.

Note This Windows Update or Automatic Update package will only be offered if such inconsistencies have been detected on the system. CheckSUR should run automatically after it has been installed from Windows Update.

To manually install and run CheckSUR, follow these steps:

  1. Click Start , click All Programs, click Accessories, right-click Command Prompt, and then click Run as administrator.
  2. In the User Account Control dialog box, click Continue.
  3. Type reg add HKLM\COMPONENTS /v StoreCorruptTimeStamp /t REG_SZ /d “0” /f, and then press ENTER.
  4. Type reg delete
    , and then press ENTER.
  5. Download and then install CheckSUR from the Microsoft Download Center.
  6. As soon as the file has been successfully downloaded, double-click the file to install and run CheckSUR.

We recommend that you restart your computer after you run CheckSUR to make sure that any changes take effect. Additionally, you must try to reinstall any software updates that previously could not be installed. If CheckSUR detected and fixed the cause of the failures, these updates will now install successfully.

CheckSUR creates a log file that captures the issues, if any exist, that were found or fixed. The log file will be located at %WINDIR%\Logs\CBS\CheckSUR.log

CheckSUR is run by Windows Update after you install KB947821. Windows Update can take as long as 10 to 15 minutes to complete this scan. The time may be significantly longer on some computers. However, the Windows Update progress bar is not updated while this process is running, and it will not move. This means that the Windows Update progress bar may indicate that it is 0 percent complete, or 20 percent complete, and so on, for some time. This behavior is expected, and you should not cancel the update. If you cancel the update, some problems may not be identified, and this package may have to run again.

Leave a Comment :, , , , , , more...

Looking for something?

Use the form below to search the site:

Still not finding what you're looking for? Drop a comment on a post or contact us so we can take care of it!


A few highly recommended websites...