How to import our own Root CA certificate in Windows Server 2019

We may have a need to import additional certificate in Windows Server 2019. In this article, we will demonstrate how to import our self-signed Root CA certificate, which can be used later for the different purposes, like outgoing SSTP VPN or the TLS connection.

Let’s begin! Continue reading

Adding new drivers into your offline Windows image

Every Windows installation image is shipped with the selected range of the device drivers. In most cases, those drivers will cover  the main hardware components used on the enterprise market at the time of publication. In case that you have newer hardware (that entered market after your Windows installation is published) or made by smaller manufacturer, you will need to provide related drivers by your own.

For the regular work of any Windows system we should provide all drivers for each piece of hardware inside any machine. Nonetheless, when you want to install the new machine or maybe to run live Windows from the USB drive, the most important drivers are those for the storage controllers and network adapters. Any other driver usually can be added later. Continue reading

Checking free disk space using the power shell

One of the crucial daily tasks for any system administrator is monitoring the disk subsystem on each server. We can perform such task in the different ways – using the local desktop/GUI tools, any remote monitoring tool like MikroTik Dude or even using the different command line tools, like diskpart.

Even better, we can utilise the power shell to find out how much free space we have on any disk, volume or partition in the system. This is convenience way to work with any actual Windows system, especially with the Windows Server Core systems. Continue reading

Testing the ClamAV installation

My previous post covered all necessary steps for successful install of ClamAV as the Windows service. However, we didn’t covered the test procedure. Sure, our services are happily running, yet we don’t know if we can use ClamD to scan suspicious files. Continue reading