At this time, Microsoft’s Surface RT has a very limited GUI for editing VPN parameters. For example, there’s no input field for a pre-shared key commonly used with L2TP/IPSec VPN type. Since there’s limited information for setting up more advanced VPN connections on Surface RT, I figured I would post these simple steps.
- Use Windows 8 powershell vpn cmdlet: http://technet.microsoft.com/en-us/library/jj613766.aspx
- Open up Powershell
- Example:Add-VpnConnection –Name “My VPN” –ServerAddress vpn.mydomain.com –TunnelType L2tp –L2tpPsk 5E2BBC9D423B50A2 –RememberCredential 1 –SplitTunneling 1
I recently ran into an issue where the š character appeared in a client’s emails that weren’t there when she sent them. This was apparently caused by Outlook 2011’s autoformatting options that replaced … with a special ellipses character, which wasn’t supported in all mail clients.
Here’s how you can disable that feature and thus avoid unintentional symbols in your emails.
1. Open Outlook and go to Outlook preferences.
2. Select AutoCorrect under the Personal Settings category.
3. Select AutoFormat tab and uncheck “…” with ellipses.
One of our user’s computers was infected with a virus that, after being removed and cleaned up, left these annoying RunDLL errors for DLL files with randomly generated filenames which occurred every time the user would login:
I didn’t get far trying to google some keywords related to the errors. However, some results did point me in the right direction for resolving the issue.
Basically, you want to check every possible repository of startup items or commands. In the registry, most google results told me to check the following locations.
However, where these virus-caused items actually ended up being was under a specific user profile in HKEY_USERS:
I should mention that CCleaner did not list them under the startup category and neither did msconfig, so registry might be the only way to find them that I know of.
Update, in new office 365 UI:
Server name: smtp.office365.com
Encryption method: TLS
- Login in to the Microsoft Online Services Portal.
- Click on Outlook.
- Click on the question mark icon in the upper right corner of the page.
- Click on About.
- There will be a section titled External SMTP setting that will contain the server name, encryption type and port. You will be able to use those along with your username and password to send email from devices/programs.
Update: This is now available via the Office 365 administration portal:
If 90 days seems too short of a period before your Office 365 users’ passwords expire, you can change it via a powershell cmdlet.
Set-MsolPasswordPolicy -ValidityPeriod <days> -NotificationDays <days> -DomainName contoso.com
Validity Period: time before expiration
Notification Days: how many days prior to expiration that the user begins to receive notification pop-up
Make sure you use Powershell to connect to MS online service first: http://onlinehelp.microsoft.com/office365-enterprises/hh124998.aspx