Monday, September 1, 2025

How to Fix Common Outlook Problems : Start Outlook In Safe Mode, Run The Microsoft Support and Recovery Assistant

No matter how well-written add-ins are (and even Outlook itself), there will always be the occasional Outlook problem that doesn’t seem to go away or may not be related to add-ins at all.  You can read how to fix your Outlook problem on the internet, but sometimes the suggestions don’t work for your specific case.  So, we have produced this list of general things to try to resolve your problem in Outlook. Read on to find out how to fix common Outlook problems below.

Start Outlook In Safe Mode

Did you know that you can start Outlook with no add-ins? It’s called “SafeMode”. You can start Outlook in Safe Mode, which will turn them all off (which is probably best to start with). Follow these instructions: https://support.microsoft.com/en-us/help/4026478/outlook-open-outlook-in-safe-mode. If Outlook behaves in Safe Mode, then you can begin uninstalling add-ins one at a time (temporarily at least).  To uninstall, you should be able to go to Control Panel…Add/Remove Programs, and select Remove (or turn them off temporarily via the registry at HKCU\Software\Microsoft\Office\Outlook\AddIns\{name of add-in}\ – then set LoadBehavior to 0 to turn it off, and 3 to turn it on).  Finally, if you are able to narrow it down to a particular add-in, you might be able to reinstall the offending add-in in a different order (assuming you have more than one add-in you can install – some add-ins are installed by Microsoft when Outlook is installed). We had at least one corporate customer report that changing the order fixed a problem with the right-click menu in our own Outlook Reply to All Monitor add-in.

Run The Microsoft Support and Recovery Assistant

Microsoft has its own tool for automatically scanning and correcting Office when things go awry.  You can read about it and then run the Microsoft Support and Recovery Assistant to see if that helps.  It can automatically diagnose issues, troubleshoot, and fix problems with Outlook.  Note that the above link is for desktop Outlook for Windows.  A more general version that can also fix Office, Microsoft 365, and other Outlook problems can be found here.

Run The Inbox Repair Tool

The Inbox Repair tool (scanpst.exe) works on both the Microsoft Outlook Personal Folders File (.pst) and the Outlook Offline Storage File (.ost) data files.  Scanpst.exe is installed when you install Microsoft Outlook and is located at:  drive:\Program Files\Common Files\System\MSMAPI\LocaleID folder – where LocaleID is the locale identifier (LCID) for the installation of Microsoft Office. The LCID for English – United States is 1033.  Restart Outlook and try to duplicate the problem.   Full instructions on how to repair Outlook data files can be found at https://support.office.com/en-us/article/Repair-Outlook-Data-Files-pst-and-ost-25663bc3-11ec-4412-86c4-60458afc5253.

Repair Office

In Control Panel, go to Programs and Features.  Find Microsoft Office in the list and click Change:

Image of Microsoft Office in Control Panel...Programs and Features...Uninstall a Program

Click “Change” then choose to Repair.

Full instructions at https://sperrysoftware.freshdesk.com/support/solutionsarticles/12000038388-how-to-repair-Microsoft-office.   When complete, restart Outlook and try to duplicate the problem.

Remove Outlook From Your Startup Folder

If you have Outlook in your startup folder, remove the shortcut from the startup folder.  Restart Outlook and try to reproduce the problem.

Stop Performing a Send/Receive When Exiting Outlook

In Outlook, go to File…Options…Advanced.  Click on the Send/Receive button, and highlight “All Accounts”.  Uncheck the box that says “Perform an automatic Send/Receive when exiting:

Image of Option to perform a send/receive

This option could be useful if you constantly have to wait for Outlook to rebuild its data file when you restart.

Restart Outlook and try to duplicate the problem.

Update All Your Add-Ins

If you recently updated or purchased just one Sperry Software add-in, you need to update them all.  You can get the updates at https://www.SperrySoftware.com/Email-Tools/Category/Downloads.  It might help to update all your add-ins, especially if the problem you are experiencing just suddenly started happening on its own (which could be a service pack or Windows update and the add-in vendor may already have a newer version.

Try It On Another Machine

Do you have another machine you can try to duplicate the problem on, preferably with a configuration that is as close as possible to the machine that has the problem?  Identifying patterns helps to diagnose what the problem might be.

Use The Event Viewer

Be sure to check the Application Event Logs in Windows for any clues as well, as that’s where Outlook (and all of Office) writes their notifications, warnings, and errors.  To do that, go to Start and type “eventvwr.exe”.  Wait for it to load; it may take a few seconds.  Then, look in the Windows Logs…Application table, looking in the Source column for events sourced by “Outlook”:

Image of Event Viewer for Outlook

Be sure to look where both Outlook exited and when it was restarted.  Both events might contain useful information.

There’s nothing in particular to warn you about, as there is many informational and diagnostic information there, but reading the entries may lead to a clue about what’s going wrong.  Note that you can sort by clicking on the Source column.

Do a Full Reinstall of Office

Not something you want to take on lightly, but sometimes you have to.  Similar to our earlier suggestion of repairing Office (see #3 Repair Your Microsoft Office above), perform the same steps except choose to Uninstall.  Be aware that you may need your product key if you received one.


"This Content Sponsored by SBO Digital Marketing.

Mobile-Based Part-Time Job Opportunity by SBO!

Earn money online by doing simple content publishing and sharing tasks. Here's how:

  • Job Type: Mobile-based part-time work
  • Work Involves:
    • Content publishing
    • Content sharing on social media
  • Time Required: As little as 1 hour a day
  • Earnings: ₹300 or more daily
  • Requirements:
    • Active Facebook and Instagram account
    • Basic knowledge of using mobile and social media

For more details:

WhatsApp your Name and Qualification to 7338068894

a.Online Part Time Jobs from Home

b.Work from Home Jobs Without Investment

c.Freelance Jobs Online for Students

d.Mobile Based Online Jobs

e.Daily Payment Online Jobs

Keyword & Tag: #OnlinePartTimeJob #WorkFromHome #EarnMoneyOnline #PartTimeJob #jobs #jobalerts #withoutinvestmentjob"

Monday, August 25, 2025

Basic concepts and fundamentals of SELinux : Managing SELinux contexts for files, SELinux commands

Security Enhanced Linux (SELinux) is a security feature developed by the U.S. National Security Agency (NSA) with help from other organizations and the Linux community to provide advanced security controls for Linux systems.

DAC V/s MAC

SELinux uses Mandatory Access Control (MAC). MAC differs from the standard Linux Discretionary Access Control (DAC). DAC includes standard file and directory permissions, access control lists (ACLs), and other user privileges. MAC adds extra protection by controlling what users or processes can access and do with the resources they access. It limits potential damage in the event of a security breach. With MAC, the security controls are precise. For example, if an attacker compromises the HTTP service, he can access only the files the HTTP process can reach, not other processes or files on the system. To enforce this control, MAC creates rules called policies that check the security settings of users and resources whenever access is requested. It stores these settings as labels.

Terminology

SELinux uses complex terminology. The following table outlines the essential terms necessary to understand SELinux concepts and functions.

SubjectA subject is a user or process that accesses an object.
ObjectAn object is a resource that the subject accesses.
AccessAn access is an action the subject performs on an object.
PolicyA policy defines the actions the subject can perform on the object.
ContextA context stores security attributes for subjects and objects.
LabelingLabeling is a process of mapping subjects and objects with their contexts.

Role

A role is an attribute. It defines who (subject) can access what (domains or types). SELinux authorizes users for roles, and roles authorizes domains and types. Each subject has an associated role to ensure that the system and user processes are separated. A subject can transition into a new role to gain access to other domains and types.

Type

A type is a group of objects based on uniformity in their security needs. SELinux groups files and directories with similar security requirements in the same type.Domain

A domain specifies the type of access that a process has. SELinux groups processes with similar security requirements within a specific domain type and runs them in a confined manner within that domain.

Access Vector Cache (AVC)

SELinux uses an Access Vector Cache (AVC) to improve performance. When a subject makes an access request for an object, SELinux checks its policy and, based on it, allows or denies the request. SELinux saves this access decision in AVC. If the same subject makes the same access request, SELinux uses AVC to make its decision. It checks SELinux policy only when the action is not available in AVC.

SELinux Users

SELinux users are predefined user accounts in the SELinux database. SELinux authorizes each SELinux user account for specific tasks. A SELinux user account can perform only the delegated tasks, nothing extra. SELinux users are different from standard Linux users. If implemented, Linux maps standard users to SELinux users. After that, standard users can perform only the actions authorized for the mapped SELinux users. For example, the default file permission allows a user to create new files in their home directory and the root partition. If we map it to a SELinux user account that is authorized to create files only in its home directory, the user cannot create files in the root partition, even if he has permission to do so.

Standard Linux users
  • Each user has a unique identity.
  • We can track and monitor each user account separately.
  • These user accounts have login capability. We use them to access the local system.
  • We create, delete, and manage these accounts as per our requirements.
SELinux users
  • SELinux users are role-based.
  • They are pre-created. We cannot create or delete them.
  • We can not use these accounts directly. These accounts do not have login capability.
  • Unless we map an SELinux user to a standard Linux user, it cannot perform any actions.
  • After mapping, it allows the linked user to perform only the authorized actions.
  • We can map a SELinux user with multiple standard Linux users.

Viewing SELinux users

The seinfo command with the -u option lists all SELinux users.

#seinfo -u

the seinfo command

To view the mapping between Linux and SELinux users, use the following command.

#semange login -l

the semanage command

The seinfo and semanage commands are part of the setools-console package. You must install this package to use these commands.

The setools-console package

SELinux management is complex. The setools-console package simplifies it. It provides commands for all essential SELinux management tasks. However, it is not part of the default SELinux installation. We must install it before we use it. The following command installs it.

#dnf install setools-console

Viewing SELinux contexts

Each SELinux context consists of a subject, an object, a type or domain, and a security level. The -Z option shows SELinux contexts. Use it with the id command to view SELinux contexts for user accounts. For example, the following command shows SELinux contexts for the current user account.

#id -Z

the id command

Use the -Z option with the ls command to view the SELinux contexts of the files and directories.

#ls -Z

the ls command

To view the SELinux contexts of running processes, use it with the ps command.

#ps -eZ

the ps command

Managing SELinux contexts for files

If implemented, SELinux labels all files, processes, and users with contexts. When a user or process accesses a file, it finds the file's type in the allowed file type contexts of the user or process. If the user or process is authorized to access this file type, SELinux lets it access the file. If not, it denies the access request. Since it works over the standard file permissions, no matter what file permissions the user or process has, it cannot access the file. SELinux assigns contexts to a new file from its parent directory.

  • If we copy the file to a new directory, the copied file receives its context from the destination directory.
  • If the destination directory already has a file with the same name and we overwrite it, the new file gets the contexts of the existing file.
  • If we move the file to a new directory, the moved file retains its context.
  • If we archive the file with the tar utility, its context is removed.
  • If we extract an archive, the extracted files get their context from the directory in which they are extracted.
  • The --preserve=context option preserves the context. If we use it with copy operation, the copied file retains its original context. If we use it with the tar command, it keeps the existing context.


"This Content Sponsored by SBO Digital Marketing.

Mobile-Based Part-Time Job Opportunity by SBO!

Earn money online by doing simple content publishing and sharing tasks. Here's how:

  • Job Type: Mobile-based part-time work
  • Work Involves:
    • Content publishing
    • Content sharing on social media
  • Time Required: As little as 1 hour a day
  • Earnings: ₹300 or more daily
  • Requirements:
    • Active Facebook and Instagram account
    • Basic knowledge of using mobile and social media

For more details:

WhatsApp your Name and Qualification to 7338068894

a.Online Part Time Jobs from Home

b.Work from Home Jobs Without Investment

c.Freelance Jobs Online for Students

d.Mobile Based Online Jobs

e.Daily Payment Online Jobs

Keyword & Tag: #OnlinePartTimeJob #WorkFromHome #EarnMoneyOnline #PartTimeJob #jobs #jobalerts #withoutinvestmentjob"


Thursday, August 21, 2025

Basic concepts and fundamentals of ACLs : Routing process, Inbound and Outbound ACLs, ACL correct direction,

This tutorial explains the basic concepts and fundamentals of access control lists. Learn the factors that affect ACL implementation, such as location, direction, order, inbound, and outbound.

An access control list (ACL) is a set of statements. Each statement consists of criteria and actions. Criteria define the conditions for the actions. When the defined conditions are matched, the related actions are executed. Routers use ACLs to filter packets. When a packet enters or exits the router, the router checks the statements of the applied ACL in sequential order to find a match. If the router finds a match, the router executes the corresponding action. If the router does not find a match, the router discards the packet.


An ACL works only if it is applied to the correct interface in the correct direction. In this part, we will discuss the factors that affect ACL implementation.

This tutorial is the second part of the article 'Cisco Access Lists Explained with Examples.'. Other parts of this article are the following.

Location

Access lists are applied to interfaces. For example, if a router has two interfaces, you can apply different access lists to both interfaces. An interface can only use its ACL to filter the traffic that passes through it. It can't use the ACL of the other interface. If you apply an ACL to an interface that does not process targeted traffic, that ACL will not work.

An ACL acts as a sieve. Just as a sieve uses its mesh to filter out liquid or small particles from a mixture, an ACL uses its statements to filter out the desired packets. A sieve can filter the mixture only when you pass the mixture through it. Similarly, an ACL can filter traffic only if traffic is processed through it.

Let's understand this through an example. The following image shows a simple network.

ACL example network

In this network, three segments are connected through the router. Without any ACL, all segments can access each other. Now, the administrator wants to prevent the Staff segment from accessing the Server segment. For this, he created an ACL and applied it to the F0/1 interface. The following image shows this implementation.

Will this ACL work?

No, instead of blocking the Staff segment, this ACL will block the Administrators segment. The F0/1 interface connects the Administrators segment to the Server segment. To access the Server segment, the traffic of the Staff segment neither enters nor exits from the F0/1 interface. Since the traffic of the Staff segment does not interact with the F0/1 interface, the ACL applied to the F0/1 interface does not affect it.

Now you know how the location of the ACL affects the ACL implementation.

Can you guess the correct location for this ACL?

You can apply this ACL to either the F0/0 interface or the F0/2 interface. The following image shows the correct implementation of the ACL.

Correct implementation of the ACL

When implementing an ACL on an interface, make sure that the interface interacts with the targeted traffic. If the targeted traffic does not pass through it, the ACL will not work.

Direction

When a router receives a packet on its interface, it reads the destination address of the packet and forwards the packet from the interface that is connected to the destination address.

We can divide this process into three phases. These phases are entry, process, and exit. In the first phase, the packet enters the router. In the second phase, the router processes the packet. In the third phase, the packet exits the router.

Routing process

We can apply an ACL before the first phase and the third phase. If we apply the ACL before the first phase, the router will process the incoming packets through the ACL. If we apply the ACL before the third phase, the router will process the outgoing packets through the ACL. We can’t apply an ACL before and after the second phase.

Inbound and Outbound ACLs:

If you use an ACL to filter incoming traffic, it is called an inbound ACL. If you use an ACL to filter outgoing traffic, it is called an outbound ACL. An inbound ACL cannot filter the outgoing traffic, whereas an outbound ACL cannot filter the incoming traffic.

Let's take our example back to understand the effect of the direction on the ACL. To prevent the Staff segment from accessing the Server segment, the administrator applied the outbound ACL to the F0/0 interface.

Although the administrator has applied the ACL to the F0/0 interface, the Staff segment can still access the Server.

Can you guess what's wrong with this implementation?

The following image shows the new ACL implementation.

acl wrong direction

The F0/0 interface is the default gateway of the Staff segment. It receives traffic from the Staff segment and forwards it to the Server segment. The F0/0 interface is the entry point of traffic.

The administrator applied the outbound ACL to filter the incoming traffic. The traffic of the Staff segment enters the F0/0 interface. There does not exist F0/0 interface. An outbound ACL can't filter the incoming traffic.

The administrator can fix this problem in two ways. He can apply an inbound ACL to the F0/0 interface, or he can apply an outbound ACL to the F0/2 interface. The following image shows the first solution.

ACL correct direction

Order

Once the access list is implemented, the router processes each packet through the access list. For each packet, the router checks each entry in the access list from top to bottom until a match is found. Once a match is found, the router executes the corresponding action. It does not check the remaining entries for that packet. If an access list has multiple entries for the same packet, the router will only execute the action of the first entry from the top.

If you want to allow only some hosts from a network, you should add the allow statements first in the ACL. If you add an allow statement below the deny statement of the same criteria, the allow statement will never execute.

Let's understand it through our example. The administrator wants to allow only the host 10.0.0.10/8 from the 10.0.0.0/8 network to access the Server segment. For this, he created the following ACL.

Deny all

Allow 10.0.0.10/8

The administrator applied this ACL to the F0/0 interface in the inbound direction. Afterward, all traffic from the Staff section has blocked. Even the host 10.0.0.10/8 has an allowed entry, still the host can't access the Server segment.

Can you guess why this ACL is not working?

The following image shows this ACL implementation.

wrong order

When the packets from the host 10.0.0.10 enter the F0/0 interface, the interface checks the applied ACL. The first statement of the ACL says "deny all incoming traffic". Since this criterion matches all incoming packets, the interface never checks the next statement for any incoming packet. It always executes the action of the first statement. Since the action of the first statement is the 'deny all', all incoming packets are denied.

To fix this issue, the administrator needs to put the allowed statement before the deny statement. The correct ACL is the following.

Alw 10.0.0.10/8

Deny all

The following image shows the implementation of the correct ACL.

Now, when packets from the host 10.0.0.10/8 enter the F0/0 interface, the interface will allow them. But if it receives packets from other hosts, it will discard them. Let's understand why this will happen.

When a packet enters the interface, the interface checks the ACL. The first statement of the ACL is for the host 10.0.0.10/8. The interface will check the source address of the packet. If the source address of the packet is 10.0.0.10/8. The interface will execute the action of the first statement. The action of the first statement is 'allow'. Because of this, the packet will be allowed.

If the source address of the packet is not 10.0.0.10/8, the interface will check the next statement. The next statement is 'deny all'. This will match all incoming packets. The action of the second statement is 'deny all'. Because of this, the packet will be discarded.

Thus, apart from the packets of the host 10.0.0.10/8, all incoming packets will be discarded.


"This Content Sponsored by SBO Digital Marketing.

Mobile-Based Part-Time Job Opportunity by SBO!

Earn money online by doing simple content publishing and sharing tasks. Here's how:

  • Job Type: Mobile-based part-time work
  • Work Involves:
    • Content publishing
    • Content sharing on social media
  • Time Required: As little as 1 hour a day
  • Earnings: ₹300 or more daily
  • Requirements:
    • Active Facebook and Instagram account
    • Basic knowledge of using mobile and social media

For more details:

WhatsApp your Name and Qualification to 7338068894

a.Online Part-Time Jobs from Home

b.Work from Home Jobs Without Investment

c.Freelance Jobs Online for Students

d. Mobile-Based Online Jobs

e.Daily Payment Online Jobs

Keyword & Tag: #OnlinePartTimeJob #WorkFromHome #EarnMoneyOnline #PartTimeJob #jobs #jobalerts #withoutinvestmentjob"


Thursday, August 14, 2025

STP/RSTP Timers Explained : Hello Timer, Max-Age Timer, Forward delay, Differences between STP, RSTP, PVST, RPVST, and MSTP

STP/RSTP uses three timers for its functions. These timers control and define the time STP needs to reach convergence. These timers are Hello, Max age, and Forward delay. The root bridge dictates these timers in BPDUs. The following table lists these timers.

TimerDefault ValueDescription
Hello2 secondsThis is the interval between two consecutive BPDUs.
MaxAge10 times HelloThis is the maximum time a switch waits for a BPDU before changing the STP topology.
Forward delay15 secondsThis is the time the switch keeps ports in learning and listing states.

Let us understand the above timers in detail.

Hello Timer:

Switches use BPDU (Bridge Protocol Data Unit) messages to communicate and share STP (Spanning Tree Protocol) information. A BPDU message contains all the information that STP requires to build and maintain its topology. All STP-running switches broadcast a BPDU at a fixed interval. The Hello-timer defines this interval. The default value of this timer is two seconds. Therefore, all STP-running switches broadcast a BPDU every two seconds.

Max-Age Timer:

As long as a switch receives a BPDU every two seconds from its neighbors, it operates normally. However, if it does not receive a BPDU from the neighbor within MaxAge time, the switch reacts by taking steps to change the STP topology. The default value of this timer is ten times the Hello timer. Since the default value of the hello timer is 2 seconds, the default value of it will be 20 seconds (2 * 10 = 20). So, a switch would wait 20 seconds without hearing a Hello BPDU before reacting.

Forward delay:

Switches use this timer to age out old entries from the CAM table and add new entries. The switch uses CAM table entries to make forwarding decisions. When a network change occurs, CAM table entries become invalid. The switch can not use the existing entries to make forwarding decisions. It must flush the existing entries and learn them again to make forwarding decisions. The switch completes these tasks in the Forward delay time. The default forward delay time is fifteen seconds. STP uses fifteen seconds to flush old entries. It uses the Listening state for this. It takes another fifteen seconds to learn and add new entries to the CAM table. It uses the Learning state for this.

Viewing the STP timer

You can use the show spanning-tree command to view the STP timer values.

show spanning tree command

Similarities between STP, RSTP, PVST, RPVST, and MSTP

The following are the similarities between STP, RSTP, PVST, RPVST, and MSTP. 

  • All create and use a virtual topology to find switching loops in every VLAN.
  • All elect a root bridge and use it as the focal point of the virtual topology.
  • All use the same rules and tiebreakers for the root bridge election.
  • Besides the root bridge, all remaining switches become non-root bridge switches.
  • All select only one root port to reach the root bridge.
  • All use the same rules and tiebreakers to select the root port.
  • All select only one designated port for every local segment or end device.
  • All use the same rules and tiebreakers to select the designated port.
  • After selecting root and designated ports, they block all remaining ports to remove loops.
  • All variations run all ports through a few states. During these states, they learn the network topology, flush CAM table entries, select root and designated ports, and block the ports causing the loops.

Differences between STP, RSTP, PVST, RPVST, and MSTP

The main reason for creating RSTP/RPVST was the convergence. Convergence is the time STP takes to react to a network change. STP/PVST takes a relatively long time for convergence. With default settings, it takes 50 seconds to reach convergence. RSTP/RPVST/MSTP improves it. It reaches convergence within a few seconds (or in slow conditions, in about 10 seconds).

It adds two new port types for rapid convergence. These port types are alternative and backup ports. It uses the alternative port to reach the root bridge if the link connected to the root port fails. It uses the backup port to reach the local segment when the link connected to the designated port fails.

Since it has an alternative or backup port, it does not have to reselect the root or designated ports when a network change occurs. If the root path fails, it enables the alternative port within a few seconds. If the designated path fails, it enables the backup port. It means if the network is running RSTP/RPVST/MSTP, it has to wait a maximum of 10 seconds whenever a change occurs.

STP/PVST does not have a concept of alternative and designated ports. If the root or designated path fails, it reruns the entire process to select the new root or designated ports. Running the entire process again takes 50 seconds. It means if the network is running STP, it has to wait for 50 seconds whenever a change occurs.

RSTP/RPVST/MSTP does not use the learning state. It also renames the blocking state to the discarding state and redefines its use slightly. It combines disabled and blocking states into the discarding state. In the disabled state, the port can work physically, but it can not forward user frames. It simply meant that the interface was administratively disabled.

Conclusion:

There are three STP timers: Hello, Max age, and forward delay. Hello timer defines the interval between BPDUs. The Max age timer defines the switch's wait before rebuilding the STP topology when it does not receive BPDUs from its neighbors. STP uses the forward delay timer to rebuild the CAM table entries. It uses this timer for two states: Listening and Learning. In the Listening state, it ages out old entries. In the Learning state, it adds new entries to make forwarding decisions.

===============================================================


"This Content Sponsored by SBO Digital Marketing.

Mobile-Based Part-Time Job Opportunity by SBO!

Earn money online by doing simple content publishing and sharing tasks. Here's how:

  • Job Type: Mobile-based part-time work
  • Work Involves:
    • Content publishing
    • Content sharing on social media
  • Time Required: As little as 1 hour a day
  • Earnings: ₹300 or more daily
  • Requirements:
    • Active Facebook and Instagram account
    • Basic knowledge of using mobile and social media

For more details:

WhatsApp your Name and Qualification to 8489257126

a.Online Part Time Jobs from Home

b.Work from Home Jobs Without Investment

c.Freelance Jobs Online for Students

d.Mobile Based Online Jobs

e.Daily Payment Online Jobs

Keyword & Tag: #OnlinePartTimeJob #WorkFromHome #EarnMoneyOnline #PartTimeJob #jobs #jobalerts #withoutinvestmentjob"

==========================================================================

Tuesday, August 5, 2025

Installing and Setting Up Microsoft SQL Server Express : Close Windows Services and Task Manager applications before installing

This section provides information for administrators with limited experience with Microsoft SQL Server. The following steps assume you do not have Microsoft SQL Server installed and guide you through downloading and configuring the free Microsoft SQL Server Express edition.

Downloading and Installing Microsoft SQL Server Express and Microsoft SQL Server Management Studio

Before you begin

  • Decide where to install Microsoft SQL Server.
  • Note the connection string as it appears in the installation process. You need it later when installing SOTI Connect.
Important: Close Windows Services and Task Manager applications before installing.

Procedure

  1. Download Microsoft SQL Server 2019 Express to your local machine.
    Note: If you encounter installation issues, update Windows and reboot. Repeat updating and rebooting until there are no more updates to install.
    Note: You may need to restart Microsoft SQL Server multiple times during the installation process for security changes to take effect.
  2. Run the Microsoft SQL Server Express .exe file on your local machine.
  3. Select the Basic installation type to download Microsoft SQL Server Express and all related utilities.

    SQL Server 2019 Express Edition Basic installation selection

  4. Accept the license terms and conditions. Keep the default installation location (on the C: drive), then select Install.Installing Microsoft SQL Server Express
    The installer downloads and installs all the required Microsoft SQL Server Express packages. When everything has been installed successfully, a notification page similar to the following displays:
    SQL Server successful installation notification page
    Note: Take note of the Server value in the Connection String field (red box). You need it when installing SOTI Connect
  5. On the successful installation notification page, select the Install SSMS button (yellow box in the screenshot above) to download and install Microsoft SQL Server Management Studio.
  6. When the Microsoft SQL Server Management Studio installation .exe file finishes downloading, run the .exe file. In the installer window, select where you want to install the Microsoft SQL Server Management Studio. Keep the default installation location on the C: drive.
  7. Select Install.

    SQL Server Management Studio main installation page

    When the installation completes, the Setup Completed screen displays.
  8. Close all applications and restart the server or VM.

Configuring Microsoft SQL Server to Work with SOTI Connect

Procedure

  1. Open the Microsoft SQL Server Management Studio.
  2. Establish a connection to the Microsoft SQL Server instance by entering the Server value in the Connection String you noted in Step 4 of the Downloading and Installing Microsoft SQL Server Express and Microsoft SQL Server Management Studio section.
  3. Select Connect.

    SQL Server Connect to Server dialog box

  4. Microsoft SQL Server connects successfully, and the instance name displays.
    SQL Server instance appearing in Object Explorer list
  5. Right-click the instance name and select Properties.

    SQL instance right-click menu with Properties selection highlighted

  6. In the left panel, select Security.
  7. In the Server Properties panel, select SQL Server and Windows Authentication mode in the Server authentication section. Select OK to save your changes.

    SQL Server properties screen with authentication mode selected

  8. Decide whether you want to use a local SQL account or a Windows account for authentication. The following steps describe configuring a local account.
  9. Expand the Security folder and right-click Logins.
  10. Select New Login.

    SQL Server New Login selected

  11. Enter a Login name, in this example Login name is SQLConnect.
  12. Select SQL Server authentication, and create a password for the login.
    Entering a SQL Server password
  13. In the left panel, select Server Roles, select the sysadmin checkbox, and select OK.

    Sysadmin checkbox selected in the New Login screen

  14. A new local login account is created and displays under the Logins header in the left panel.
    List of new SQL logins
    Important: Use this login for your database when you install SOTI Connect.
  15. Ensure NT AUTHORITY\SYSTEM has the sysadmin role assigned to it. Right-click NT AUTHORITY\SYSTEM and select Properties. Select the sysadmin checkbox under Server Roles.
    Note: Use this login if installing SOTI Connect using Windows Authentication. If the database runs on a remote server, the login is not be NT Authority\System. It is MachineName$ (for example, domainname\computername).
  16. Keep Microsoft SQL Server Management Studio running, then run the Microsoft SQL Server Configuration Manager utility, included as part of Microsoft SQL Server Express.
  17. In the Microsoft SQL Server Configuration Manager utility, expand SQL Server Network Configuration and select Protocols for SQLEXPRESS.
    Note: Select the correct protocol for your SOTI Connect instance if it is different the Protocols for SQLEXPRESS.

    SQL Server protocol screen

  18. Right-click the TCP/IP protocol and enable the TCP/IP protocol.
  19. Right-click the TCP/IP protocol again and then select Properties. The TCP/IP Properties panel displays.
  20. In the TCP/IP Properties panel, select the IP Addresses tab, empty any IP TCP Dynamic Ports fields and set the IPAII TCP Port to 1433.
    Selection screen for TCP/IP protocol
  21. Select Apply, then select OK.
  22. Restart your Microsoft SQL Server instance and Microsoft SQL Server Management Studio to apply your changes.

SQL Server Security Notes

The following information discusses securing access to the database and minimizing permissions.

The installation of SOTI Connect, requires more database privileges than needed for normal working operation. You should reduce the level of access after the installation of Microsoft SQL Server is complete. Use the following table as a reference to the required access levels after the installation is complete.

OperationRequired Database Privileges
Installing or upgradingSysadmin. The SA account is a super admin with permissions for any scenario.
Normal working operationdb_owner.
Service running as local system with DB installed on the same serverLocal System > NT AUTHORITY\System.

The service runs on the computer with this permission.

Note: NT needs Sysadmin during an upgrade.
Service running as local system with the DB installed on a remote serverdb_owner.

UsingMicrosoft SQL Server, add the user or the group containing the user to the db_owner role.

Note: The database does not use the local system or NT AUTHORITY\System, but becomes MachineName$ (for example, domainname\computername).
Service running as a service accountEnsure the user account is also in the DB as an account with the correct permissions.

For example, if the user account samplecompany/ConnectMDM is running the service, ConnectMDM with the domain samplecompany, the account must be given the needed permissions.

If you used the Microsoft SQL Server authentication option (for example, when you created the SQLConnect login in the example above), you should remove the sysadmin role after completing the SOTI Connect installation. You should also confirm that the SQLConnect login has db_owner user mappings for all the SOTI Connect databases.

Note: You must restore the sysadmin role to the SQLConnect user before running the SOTI Connect installer again.

If you used the Windows authentication method to install SOTI Connect, you should remove the sysadmin role from the NT AUTHORITY/SYSTEM login. You should also confirm that this login has db_owner user mappings for all the SOTI Connect databases.

Microsoft SQL Server stores the SOTI Connect databases. Creating, updating, and deleting a database is associated with its owner service. When uninstalling SOTI Connect, you can either retain all the databases or just the 'SOTIConnectDeviceStateHistory' and 'SotiConnectLoggingService' databases.
Important: Due to the possible encryption of some files, you must retain the File Store database to keep access to File Store files after uninstalling SOTI Connect.

You should also remove the sysadmin role from the user who ran the SOTI Connect installer. You must restore the sysadmin role to that user before running the SOTI Connect installer again.


===============================================================


"This Content Sponsored by SBO Digital Marketing.

Mobile-Based Part-Time Job Opportunity by SBO!

Earn money online by doing simple content publishing and sharing tasks. Here's how:

  • Job Type: Mobile-based part-time work
  • Work Involves:
    • Content publishing
    • Content sharing on social media
  • Time Required: As little as 1 hour a day
  • Earnings: ₹300 or more daily
  • Requirements:
    • Active Facebook and Instagram account
    • Basic knowledge of using mobile and social media

For more details:

WhatsApp your Name and Qualification to 7338068894

a.Online Part-Time Jobs from Home

b.Work from Home Jobs Without Investment

c.Freelance Jobs Online for Students

d. Mobile-Based Online Jobs

e.Daily Payment Online Jobs

Keyword & Tag: #OnlinePartTimeJob #WorkFromHome #EarnMoneyOnline #PartTimeJob #jobs #jobalerts #withoutinvestmentjob"



Youtube Channel Image
Nadaipazhagu Tamizhaa Subscribe To watch Videos
Subscribe