Categories
Enterprise Tech Featured

Best Practices to Move your Applications to Cloud

In this previous article, we had a quick overview on the different cloud service models and how it eases your challenges w.r.t administration. Now, let me ask you a simple question, can every software or workloads be moved to Cloud? The answer will definitely be a NO.

“No single delivery model meets all needs, but the combination of public, private, and hybrid clouds offer a range of options suitable for many business requirements”

Every application is different; and having a better understanding on what workload can be moved to a Cloud platform is a key to have the right cloud enterprise architecture. These below scenarios will give you an idea on what is a general market trend and patterns which are optimal for Cloud platforms adoption; and when should you move your applications to Cloud.

On/Off Work Pattern: In this scenario, the application only runs at certain times. Jobs which are batch processed fall under this pattern. Over Provisioned capacity is always wasted and the time to market can be cumbersome. For eg: The pdf printer job used by the HR team during the monthly payslip sheet generation is not a usual task but a batch process, e-book publication software which converts books to .PUB formats when a new book is ready for market.

Cloud: on off patterns

Growing Pattern: In this scenario, we can see how some business tend to grow too fast to be able to use regular hosting approach. As the business growth rate is high, one cannot procure and provision hardware fast enough. The successful services needs to grow or scale; keeping up with the growth is a big IT challenge. Example: A simple web application, which has seen great adoption and is being used by everyone in the community. You cannot have a downtime for this application and then scale it up; but need to manage it while the application is live. This is one best scenario when a cloud platform can be adopted.

Cloud Growing Patterns

Predictable Increase: In this scenario, the peak demands periods of a requirement are well known. Peaks due to the periodic increased demands. For eg: A product testing phase, when the utilization can go multiple and be predicted. Or even a Simple Quarterly results announcement website, where the page visits are high at specific periods. For eg: University Websites when results are announced every semester; News portal showcasing the quarterly results etc.

Cloud Predictable Bursting Patterns

Un-Predictable Increase: Scenarios where the bursting cannot be predicted or “situations driving business” fit in this category. Unexpected/unplanned peak in demand; sudden spike impacts performance. For eg: During Disaster Recovery, the number of utilizations of the machines and computer to run the backup job might spike high. Another general example could be, a sudden demand of product and vendors placing orders on the request portal. A Video posted on your website which goes Viral on Social Media etc.

Cloud Unpredictable Bursting Patterns

Summing up, you can look at using cloud Services in these following cases (not just limited to these listed below) –

  • Whenever you have an application with variable load which also has a need to scale massive with high reliability. One best example could online shopping portals during festival seasons or Thanks Giving day.
  • Web-apps with a short lifetime can also be a good candidate for cloud; take an example of a social media campaign your company is planning to do.  It could also be a Contest which you do for Christmas.
  • Sometimes large applications which does not fit well in your own data center, becomes a good option for cloud.
  • If you are planning to run many similar jobs at one single time, running the same on two or more different cloud instances will give you a same result at a much faster pace. Of-course, you also have an option to replicate the same machine configurations across any number of computers (VMs) you want.
  • If your application is going to leverage a variety of data available on the Internet (like Pictures, Tweets etc) then having a public data store option becomes more efficient. In such a scenario, running your software(as a service) from the Cloud makes it even more flexible.
Categories
Enterprise Tech General Microsoft

Windows Azure gets renamed to Microsoft Azure. Will this change their Fortunes?

Microsoft re-brands Windows Azure name and plans to start calling it “Microsoft Azure”, beginning April 3, 2014. This change reflects Microsoft’s strategy and focus on Azure as the public cloud platform for customers as well as for our own services Office 365, Dynamics CRM, Bing, OneDrive, Skype, and Xbox Live.

So Everything under the Public Cloud is going to be called – Microsoft Azure.

According to Microsoft ” Our commitment to deliver an enterprise-grade cloud platform for the world’s applications is greater than ever. Today we support one of  the broadest set of operating systems, languages, and services of any public cloud—from Windows, SQL and .NET to Python, Ruby, Node.js, Java, Hadoop, Linux, and Oracle. In today’s mobile-first, cloud-first, data-powered world, customers want a public cloud platform that supports their needs—whatever they may be—and that public cloud is Microsoft Azure.”

Looks like with recent Azure Events, Microsoft is driving their forces to take the lead in talking to users, communities and companies. Not sure, if they will ever get to a well connected and integrated platform like Google, where there is a great sync between IaaS and PaaS offerings; and when they get there, I wonder, where Google would’ve reached to. It’s going to be an interesting game to watch. Amazon, you better catch up too..!

To get a Free Trail of the Windows Azure, Oops, Microsoft Azure – Click here

What’s your take on this? Does this name change really help them?

Categories
Enterprise Tech Microsoft Windows Installer, Application Compatibility and Deployments

How to Install SSL Certificates on Microsoft Servers – Free eBook

Windows administrators are continually tasked with securing servers and applications, including installing SSL certificates for authentication and encryption. This raises a number of questions for system administrators: which kind of SSL certificate should be used? How are SSL certificates installed? What is the Certificate Store? How does SSL work in Internet Information Server (IIS), Exchange Server, SQL Server and SharePoint?

How to Install SSL Certificates on Microsoft Servers  How to Install SSL Certificates on Microsoft Servers by security expert Dan Sullivan provides detailed step by step instructions on how to select, install and maintain SSL certificates in Microsoft environments. Whether you are just starting out and need to know how to acquire a certificate, or you are looking for tips on troubleshooting and maintaining existing certificate configurations, this guide has pragmatic and detailed information to help you.

This complete book includes the following chapters:

  • Chapter 1: Getting Started with SSL Certificates in Windows Server
  • Chapter 2: Understanding the Microsoft Certificate Store
  • Chapter 3: Using SSL Certificates in Microsoft Internet Information Server (IIS)
  • Chapter 4: Installing SSL Certificates in Microsoft Exchange Server, Microsoft SharePoint, and Microsoft SQL Server

Download the complete 71-page book today!

Note: You will need to create a profile in Realtime Nexus (The Digital Library for IT Pros) when you click the above link.

Courtesy: Realtime Nexus

You would also be interested in downloading these e-books:

Categories
Best Practices Enterprise Tech Microsoft Windows Installer, Application Compatibility and Deployments

Download Best Practices Analyzers – Exchange & Unified Communications

Best Practice Analyzers are free tools available for most Microsoft Enterprise products and they are used to determine the overall health of your platform. The tools perform read only scans against your environment’s servers and identify items that do not conform to Microsoft best practices. They should be run on a regular basis as part of your standard operations maintenance plan. Here are some tools for the Exchange, Unified Communications, Sharepoint, Project Server and Office System.

Microsoft Exchange Best Practices Analyzer v2.8The Microsoft Exchange Best Practices Analyzer is designed for administrators who want to determine the overall health of their Exchange servers and topology. The tool scans Exchange servers and identifies items that do not conform to Microsoft best practices. The Exchange Best Practices Analyzer programmatic-ally collects settings and values from data repositories such as Active Directory, registry, metabase and performance monitor. Once collected, a set of comprehensive ‘best practice’ rules are applied to the topology. Administrators running this tool will get a detailed report listing the recommendations that can be made to the environment to achieve greater performance, scalability and uptime.

Office Communications Server 2007 Best Practices Analyzer – The Microsoft Office Communications Server 2007 Best Practices Analyzer Tool is a diagnostic tool that gathers configuration information from a Microsoft Office Communications Server 2007 and 2007 R2 environments and determines whether the configuration is set according to Microsoft best practices. You can install the tool on a client computer that runs Microsoft .NET Framework 2.0, or on a server that runs Office Communications Server.

The tool uses a set of configuration files to gather information from the Office Communications Server 2007 or 2007 R2 environment. It compares this data against a set of pre-defined rules for Office Communications Server, and reports potential issues. For every issue reported, the tool provides the current configuration in the Office Communications Server environment, and the recommended configuration. With the proper network access, the tool can examine your Active Directory and Office Communications Server 2007 or 2007 R2 servers to do the following:

  • Proactively perform health checks, verifying that the configuration is set according to recommended best practices
  • Generate a list of issues, such as suboptimal configuration settings or unsupported or not recommended options
  • Judge the general health of a system
  • Help troubleshoot specific problems
  • Prompt you to download updates if they are available
  • Provide online and local documentation about reported issues, including troubleshooting tips
  • Generate configuration information that can be captured for later review

Microsoft Best Practices Analyzer for Windows SharePoint Services 3.0 and the 2007 Microsoft Office System – The Microsoft Best Practices Analyzer for Windows SharePoint Services 3.0 and the 2007 Microsoft Office System Best Practices Analyzer programmatically collects settings and values from data repositories such as MS SQL, registry, metabase and performance monitor. Once collected, a set of comprehensive ‘best practice’ rules are applied to the topology.

Administrators running this tool will get a detailed report listing the recommendations that can be made to the environment to achieve greater performance, scalability and uptime.

Also read –

Categories
Best Practices Enterprise Tech Microsoft

Download Best Practices Analyzers – Forefront, ISA and Security

Best Practice Analyzers are free tools available for most Microsoft Enterprise products and they are used to determine the overall health of your platform. The tools perform read only scans against your environment’s servers and identify items that do not conform to Microsoft best practices. They should be run on a regular basis as part of your standard operations maintenance plan. Here are some tools for Internet Security and Acceleration Server, Forefront Unified Access Gateway, Threat Management, Baseline security and Security update Inventory tool.

Microsoft Internet Security and Acceleration (ISA) Server Best Practices Analyzer Tool

The ISA Server Best Practices Analyzer (BPA) is a diagnostic tool that automatically performs specific tests on configuration data collected on the local ISA Server computer from the ISA Server hierarchy of administration COM objects, Windows Management Instrumentation (WMI) classes, the system registry, files on disk, and the Domain Name System (DNS) settings.  The resulting report details critical configuration issues, potential problems, and information about the local computer. By following the recommendations of the tool, administrators can achieve greater performance, scalability, reliability, and uptime.

The ISA Server Best Practices Analyzer is supplied with two supplemental tools.

  • The ISA Data Packager enables you to create a single .cab file containing ISA Server diagnostic information that can be easily sent to Microsoft Product Support Services for analysis.
  • BPA2Visio generates a Microsoft Office Visio® 2003 or Visio 2007 diagram of your network topology as seen from an ISA Server computer or any Windows computer based on output from the ISA Server Best Practices Analyzer Tool.

Microsoft Forefront Unified Access Gateway (UAG) 2010 Best Practices Analyzer Tool

The Forefront UAG BPA is a diagnostic tool that automatically performs specific tests on configuration data collected on the local Forefront UAG computer from a hierarchy of administration COM objects, Windows Management Instrumentation (WMI) classes, the system registry, files on disk, and the Domain Name System (DNS) settings. The resulting report details critical configuration issues, potential problems, and information about the local computer. By following the recommendations of the tool, administrators can achieve greater performance, scalability, reliability, and uptime.

Microsoft Forefront Threat Management Gateway Best Practices Analyzer Tool

The Forefront TMG BPA is a diagnostic tool that automatically performs specific tests on configuration data collected on the local Forefront TMG computer from the Forefront TMG hierarchy of administration COM objects, Windows Management Instrumentation (WMI) classes, the system registry, files on disk, and the Domain Name System (DNS) settings. The resulting report details critical configuration issues, potential problems, and information about the local computer. By following the recommendations of the tool, administrators can achieve greater performance, scalability, reliability, and uptime.


The Forefront TMG BPA is supplied with two supplemental tools:

  • The TMG Data Packager enables you to create a single .cab file containing Forefront TMG diagnostic information that can be easily sent to Microsoft Product Support Services for analysis.
  • BPA2Visio generates a Microsoft Office Visio® diagram of your network topology as seen from a Forefront TMG computer or any Windows computer based on output from Forefront TMG BPA. Note that Microsoft Office Visio 2003, 2007, or 2010 must be installed in order to run BPA2Visio.

Important!: This BPA Tool is designed to support Forefront TMG only. To download the BPA Tool for Internet Security and Acceleration (ISA) Server, see ISA BPA Tool

Microsoft Forefront Client Security BPA

The FCS Best Practices Analyzer Tool is designed for administrators who want to determine the overall health of their Forefront computers and to diagnose current problems. The tool scans the configuration settings of the computer and reports issues that do not conform to the recommended best practices.

Microsoft Baseline Security Analyzer

Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool that helps small- and medium-sized businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. Improve your security management process by using MBSA to detect common security misconfigurations and missing security updates on your computer systems.

Extended Security Update Inventory Tool

The SMS Extended Security Update Inventory tool is a scan tool built for the sole purpose of helping customers determine SMS client computers that may need security updates that are not detectable using the existing SMS Security Update Inventory Tool built on MBSA. Like the SMS Software Update Inventory tool, this tool also has the instructions for locating each applicable update, downloading it from Microsoft, and deploying it using SMS . The SMS Extended Security Update Inventory Tool is built on Enterprise Scan Tool (EST) detection technology.

Also read –

Categories
Best Practices Enterprise Tech Microsoft

Download Guides – SBS, Mobile Device Manager, Commerce Server, Biztalk

Best Practice Analyzers are free tools available for most Microsoft Enterprise products and they are used to determine the overall health of your platform. The tools perform read only scans against your environment’s servers and identify items that do not conform to Microsoft best practices. They should be run on a regular basis as part of your standard operations maintenance plan. Here are some tools for Windows Small Business Server, Mobile Device Manager, Commerce Server and Biztalk.

Windows Small Business Server 2003 Best Practices Analyzer

The Microsoft Windows Small Business Server 2003 Best Practices Analyzer examines a server that is running Windows Small Business Server 2003 (Windows SBS) and presents a list of information and errors that administrators should review. The Windows SBS Best Practices Analyzer examines the server and collects configuration information from many sources including:

  • Active Directory Windows Management Instrumentation (WMI)
  • Registry and Metabase.

After collecting information about server configuration, the Windows SBS Best Practices Analyzer verifies that the information is correct and then presents administrators with a list of issues sorted by severity. The list describes each issue and provides a recommendation or possible solution.

Microsoft Windows Small Business Server 2011 Best Practices Analyzer

Microsoft Windows Small Business Server 2011 BPA (Windows SBS 2011 BPA) is a diagnostic tool that is built on the Microsoft Baseline Configuration Analyzer (MBCA) technology. Windows SBS 2011 BPA scans a computer that is running the Windows SBS 2011 server software, and compares the existing server settings to a predefined set of recommended best practices. Windows SBS 2011 BPA performs the following tasks:

  • Gathers information about a computer that is running the Windows Small Business Server 2011 server software
  • Determines if the server settings comply with a set of best practices that are recommended by Microsoft
  • Provides a report of the scan results, which identifies variances from the recommended best practices
  • Identifies conditions that may lead to problems with the server
  • Recommends solutions to potential problems

Microsoft System Center Mobile Device Manager 2008 Resource Kit – Best Practices Analyzer

MDM Best Practices Analyzer (BPA) Tool helps you to analyze the prerequisites for MDM setup and deployment. Because each MDM server component has different prerequisites, the tool helps you to plan and build a successful deployment environment by assessing each server’s readiness for MDM before you run MDM Setup.

Microsoft Commerce Server 2007 Best Practices Analyzer

The Microsoft Commerce Server Best Practices Analyzer examines a Commerce Server 2007 deployment and generates a list of best practices issues it discovers. The Best Practices Analyzer is intended for use in Commerce Server 2007 production and staging environments.

BizTalk Server Best Practices Analyzer

The BizTalk Server Best Practices Analyzer examines a BizTalk Server deployment and generates a list of best practices issues it discovers. The BizTalk Server Best Practices Analyzer performs configuration level verification, by reading and reporting only, and uses the gathered data to determine whether best practices are being followed.

Also read –

Categories
Best Practices Enterprise Tech Microsoft

Download Best Practices Analyzers – Windows Server Enterprise Platform

Best Practice Analyzers are free tools available for most Microsoft Enterprise products and they are used to determine the overall health of your platform. The tools perform read only scans against your environment’s servers and identify items that do not conform to Microsoft best practices. They should be run on a regular basis as part of your standard operations maintenance plan. Here are some tools for the Windows Server platform which includes PAL, DHCP, Hyper-V, WSUS, Active Directory, Remote Desktop, File Services, and DNS.

  • Performance Analysis of Logs (PAL) Tool – Ever have a performance problem, but don’t know what performance counters to collect or how to analyze them? The PAL (Performance Analysis of Logs) tool is a powerful tool that reads in a performance monitor counter log and analyzes it using known thresholds.

Also read –

Categories
Best Practices Enterprise Tech Featured Microsoft Tools

Top Ten Tips and Troubleshooting with Process Explorer Tool

Process Explorer tool from SysInternals, will give you a complete overview on what processes are currently running in your PC along with the details on who invoked it and how much system resources it is consuming. This tool will be very essential, if you want to identify which file or directory has a particular program opened. In this article, you will learn 10 best practices and tips which will help to use this tool better.

A process is a container for a set of resources, including one or more threads. A process never consumes a CPU. Its the thread inside the process which consumes the system resources like CPU, Memory etc. Each process at-least has one Thread.  Using this tool, you can also determine which thread of a process is consuming CPU.

Some of the benefits, this Tool gives you are..

  • Displays the Parent/Child Relationships of the Processes
  • Highlighting of different process based on their source and states.
  • Customize Columns to suit specific needs to analyze CPU performance, Threads, etc
  • Tons of Options to play around with..!

Tip 1:Process Explorer Parameters – Create a Startup Shortcut / Desktop Shortcut to this executable (procexp.exe) and add a parameter /t /e to it.

Process Explorer - Parameters

/t makes this executable run minimized and /e will make it run elevated. As most of the times, you want the system processes also.. it makes sense to run the tool elevated.

Process Explorer - System TrayWhen you invoke this shortcut, the Process Explorer will run in the System Tray as shown below. You can just double click to invoke them.

Tip 2: Configuring the Options – Goto Options Menu Item and Select Hide When Minimized and Allow only one instance. This will help you to just minimize the program, even when you click on the X close button. Sometimes, you tend to invoke the shortcut more than once, thinking that the Process Explorer is not running, selecting the Allow only one instance will help you not have multiple entries of Procexp inside the process explorer window.

Process Explorer - Hide When MinimizedTip 3: Configure Symbols – When you invoke any process and go-to the Threads Tab, you will observe a hexadecimal weird address in the Start Address Tab. These will not be helpful for you while troubleshooting. You will need to convert it to a meaninful message and thats where configuring the symbols will be useful.

Process Explorer - Hexa Thread DefinitionsGoto Options Tab, and click on Configure Symbols item.

Process Explorer - Configure Symbols

You will need to install the Windows Debugging Toolkit, so that you can configure the path of the dbghelp.dll file. Also, configure the Symbols path as both local and internet. For more information read here – http://www.microsoft.com/whdc/devtools/debugging/debugstart.mspx

Process Explorer - Configure Symbol PathsOnce you do this, the hexa-decimal code will be converted to more meaningful message for effective understanding and troubleshooting. You can see in the Start Address column now.

Process Explorer - Meaningful Thread Definitions

Tip 4: Highlighting Colors – Goto Options Menu Item and Select, Configure highlighting. Using this option, you can customize the colors which you would like to assign for certain roles of processes. By default Pink color is associated for processes with one or more – win32 services, Yellow color for processes which uses .NET Framework, Light blue color for processes which are running with the same user account as the process explorer.

Configure Highlighting of ProcessesTip 5: Configure Difference highlighting Duration: Set the Duration to 5 or more seconds. This is an important tip, which will help you distinguish in the difference of the events. The color associations and the process will exist and run for 5 seconds. For example, every process which starts new is associated a green color and every process that stops gets a red. the processes will exist in the Process Explorer for at-least 5 seconds with the same color code, so that you can see them and diagnose the same.

Configuring highlighting DurationTip 6: Verifying Processes – When you double-click on any process it opens the properties dialog; this will give you the complete information of that particular process. Its Parent process, Who invoked it, At what time, What OS version is it (32/64 bit) etc. Just observe that, this executable is not verified no matter it comes from Microsoft Corporation. Verifying the processes will help you to determine whether this process is signed to run on this particular edition of the OS. For example, if your machine performance is sluggish, you might run the verify process and see if any of the executables like antivirus are not suited for your PC.

Analyzing a Process Image

Goto Options Tab and select on Verify Image Signatures. This will start the verification process. Now you click on any column and add a new column for Verified Signer. You will start seeing all the process along with the verified status.

Verified Processes

Tip 7: Process Identification – Sometimes, there could be many processes running on your PC (for example, many instances of a same application), In this case it would be difficult to identify the associated process entry in Process Explorer. Thats where exactly, this magnifier comes to your help. Hold the magnifier button, and that will show you all the other windows executing on your PC. Just drop the magnifier on a window which you wanted to identify and that appropriate process would get high-lighted in the Process Explorer.

Magnifier Process Identifier

Tip 8: DLL/Header View – Selecting a Process, and pressing Cntl+D will show the DLL view in the hidden tab. Cntl + H will show the headers which are currently accessed by the process. This will be helpful to understand the components used by a process. You can also choose to search a dll or a Header using the Search option. For eg: If you ever encountered a failed delete action by your process, searching for ‘delete’ will give you more information on what gets called and which file did your process try to delete. You can hover over any process in Process explorer, this will get you all the win32 services running in it.

Cntl+D for DLL View –

Process Explorer - DLL View

Cntl+H for Header View –

Process Explorer - Headers View

Tip 9: Performance Graphs – Double-clicking the graph in the icon bar, will open the performance graph. The red color showcases the kernel mode and the green signifies the transition of Kernel and User mode. If you are running a multi-core PC, choose to ‘show One Graph per CPU’. This will help you manage tasks and also enables you to take a decision to set affinity for a process to a single CPU. (You can right click on a process, Set Affinity to just any of the CPU)

Set Processor Affinity

System Information - Performance Graph

Tip 10: Configure Columns – In the explorer window, Right click on a column header and add new columns. To identify an executable or a process performance, you need to add Threads, CPU Usage, Context Switch Delta and CPU Cycles Delta. This will help you identify which process has more threads and is consuming high CPU usage. Based upon your analysis, you can choose to terminate it for system performance.

Process Performance

Are you aware of any other worthwhile tip on this tool? If yes, drop in as a comment here and I shall feature it in this article appropriately!

Also read about the other SysInternals Tools here  –

Categories
Enterprise Tech How-to Microsoft Tools

How To Enable System Boot Time Logging using Process Monitor Tool

How many times have you faced issues with slow or longer boot time in your PC? Does it happen only on your computer? There could be many reasons for this. It could be too many Startup process, Run Keys, and sometimes even malware executables as well.

It would make your troubleshooting job easy, if you get to know what really happens when your PC boots. Process Monitor tool from SysInternals will exactly help you in doing the same. This tool can also be used for other process snapshot and access informations. however, in this post we will look at its Boot Logging capabilities.

First download the executable from SysInternals Site, If you face issues with Security Warning message, check this tip to fix it.

Step 1: Execute the procmon.exe; Goto Options menu, and Click Enable Boot Logging.

Enable Boot Logging

Step 2: This will further give you this below Boot logging options. You can choose to Enable the Profiling Events, if you need.

Boot Logging Options

Step 3: You can now reboot your PC. When the machine restarts, the process monitor will start monitoring all the processes and applications which gets invoked during the system boot and generates a dump file.

Step 4: Execute procmon.exe again. You will see this below dialog which tells you that, a log of the boot-time activity was created by the previous instance of process monitor. To save the collected Data, press the Yes Button.

Boot Time Activity Logs

Step 5: The file will initially be saved as a dump file in C:\Windows, you will need to convert it to Process Monitor Log (pml) log files. Save the Log file using this below dialog. This will start converting the dump file to pml file.

Saving Procmon Log - Dump to Log File

Converting Boot-time Event Data

Once the Log is converted, it will open in the Process Monitor tool.


Here you can get an idea on all the applications and processes which was executed during the system boot. This report will help you identify, which process was invoked by whom and how much time did it take to for its complete execution. You can also identify if any malwares are running in your PC, which is affecting your system boot.

Logs for System Boot

Step 6: You can choose to filter these reports; when you click on any entry you will get the below dialog which will give you a complete snapshot on the process attributes, Who invoked it, its architecture, the Parent Process Id, along with information on when did the process transition from User mode to a Kernel mode through the Stack.

Event Properties

Also read about the other SysInternals Tools here  –

Categories
Enterprise Tech How-to Microsoft Tools

How to Remove Security Warning Message – Files Downloaded from Internet

How many times, have you seen this dialog when you execute a file which was downloaded from Internet?  For example, this Process Explorer message box below. This would come-up, every-time you run this executable. Also, when you open any of the help file from the downloaded suite you see this ‘Navigation Cancelled’ dialog.

Issues because of the Security Zone Information

The problem is that, when you download any of the files from the internet, using internet explorer, it gets tagged with metadata in alternate data stream, and says what IE Security zone did it came from. and even though, when you are running it from the local file system, windows remembers that it came from the internet.

Methods to resolve this –

1. Easiest way is to remove the zone information using the file Properties. Before you extract the zip file, Right-click on the file, select Properties tab. Click on the un-block button to remove the alternate data stream – Security zone information.

Unblock - File Properties

2. The other option, is to use a Sysinternals tool called Streams. Streams will examine the files and directories you specify and inform you of the name and sizes of any named streams it encounters within those files. Streams makes use of an undocumented native function for retrieving file stream information.

Using this parameter, streams -d will remove the Zone identifier information from a file and you will not see the security warning message/dialog.

streams - Sysinternals Tool

Also read about the other SysInternals Tools here  –