Month: July 2016
Schedule a Hyper-V Checkpoint
How to Schedule a Hyper-V Checkpoint. Before I show you how to use SnapShot Master to create and schedule a Hyper-V checkpoint I will briefly describe what a checkpoint is. What is a Hyper-V Checkpoint? ...
DetailsHow to upgrade to SCCM 1606
SCCM 1606 Update So what was the most exciting thing released this month? Well if you said Pokemon GO, you are on the wrong blog. It was in fact the release of a well received ...
DetailsHow to Create a Hyper-V Template for Deployment
How to Create a Hyper-V Template for Deployment If you ever need to deploy Virtual Machines often a great time saving way is to create a VM Template for quick and easy deployment. The main reason ...
DetailsMICROSOFT’S July 2016 PATCH RELEASES
The following eleven Patch Tuesday updates / patches have been released by Microsoft for the July 2016 Update deployment. Are you ready to start deploying and remove the patching risk using SnaPatch Patch Management Software? MS16-084 – ...
DetailsVMWare PowerCLI Installation Failed
VMWare PowerCLI Installation Failed If you are installing VMWare’s PowerCLI for remote administration of your VMWare farm, or for SnaPatch or Snapshot Master you may at times receive the following error, “Setup has detected that the ...
DetailsHow to Create a VMWare Template for Deployment
How to Create a VMWare Template for Deployment So you are deploying Servers regularly and ask becoming sick of completing this the manual way. Well to create a template for quick deployment is relatively easy, just ...
DetailsHow to Deploy a VM and Join a Domain Automatically
Virtual machines have become an essential part of modern IT infrastructure, as they allow administrators to create and manage multiple computing environments on a single physical machine. This can be incredibly useful for tasks such ...
DetailsDeploying a Zero Day Exploit Update Fix with Microsoft SCCM 2012
Deploying a Zero Day Exploit Fix with Microsoft SCCM 2012 Zero Day exploits are vulnerabilities that are found and can be used by hackers to exploit and use for malicious or personal intent. These exploits ...
Details