How to fix the AllItems.aspx getting overwritten

What if a user accidentally overwrites the AllItems.aspx page for a document library? Well it gave me a slight heart attack when this happened recently. But I was able to find a fix pretty quickly. Here’s what I did:


Open the site in SharePoint Designer 2010. When in your troubled site where the document library lives go to Site Actions > Edit in SharePoint Designer.

Once in SPD in the left nav go to Lists and Libraries

Then under the Document Libraries section choose your document library


Your library will open in a tab where you can see all info and settings for this library. What we are concerned with is under the Views section:


The AllItems.aspx is the All Documents view that you see listed here. So what you do now is click on New on the upper right corner of the View section.


Name it something like All_Items, then check the box to make this your default view. Click Ok.


Now you will be able to open your document library again! You can now remove the old corrupt All Documents view, and rename your new All_Items to All Documents and you are back in business!

SharePoint 2010 Alternate Access Mappings for SSL sites using BigIP F5 Load Balancer

This process took quite some time to figure out what would work with the AAM, and the F5. The first step is going to Central Admin and then Application Management and Configure alternate access mappings.

  1. Ensure you are in the proper web app collection for the AAM you want to change.
  2. You should see a internal URL with in zone Default and Public URL
  3. Edit this zone to be a short name of https://yoursite
  4. Then you will add a internal URL with in the Internet zone.
  5. Then go to your Central Admin Server and open command prompt and run: stsadm -o addalternatedomain -url -incomingurl -urlzone internet
  6. After you run this go back to Central Admin and delete the https to https internet url
  7. Then change the short name url to the long name

This is what you should see in the AAM settings for your web app:

Internal URL                                           Zone                                        Public URL                             Default                                                        Internet                       

Install and configure Foxit PDF iFilter on SharePoint 2010

Foxit PDF iFilter works great with SharePoint 2010 search. Here is the download link:


1. Download and install the x64 version Foxit PDF IFilter from the link above on App/Index Server

2. Download the small 17×17 Adobe PDF icon image from the Adobe website and save it as “pdficon.gif” (or whatever name you like)

3. Copy the downloaded icon to “Drive:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\14\Template\Images”

4. Edit the DOCICON.XML file located in “Drive:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\14\Template\XML\”

5. Under the section, add the line for PDF extension. Remember to use the same filename “icpdf.gif”

6. Central Admin > Application Management > Manage service applications > Search Service Application > File Types > Click New File Type

7. Type pdf and click ok

8. Restart the search service:

a. net stop osearch14

b. net start osearch14

9. Perform a full crawl of your content sources

Exchange 2010 RBAC Model

This will be nice to have in our environment. Seems a little daunting at first glance, but I think the work to get all the admins set up with the proper access will far outweigh the initial time investment.

Amplify’d from

Here comes Exchange 2010. New in Exchange is management of delegation and permissions through the so called Role Based Access Control model, shortened to RBAC. RBAC is partially configurable through the RBAC User Editor (Exchange Management Console > Toolbox) or fully using cmdlets. The RBAC model is based on three pillars, Who, What and Where.

The Exchange 2010 and RBAC model create new opportunities for customers. Large companies, who probably already have complex delegation models in-place, will like the more fine grained controls to support business requirements. Their challenge lies in converting their existing model to the new designed RBAC model. For smaller customers the default set of roles, groups, scopes and assignments might appear overwhelming at first, but eventually be found an asset as it supports least privilege security model and get rid of the (Exchange) Adminsistrators surplus.


What is UCS Cisco’s Unified Computing System?

I will be using the acronym UCS a lot as we are implementing it at my work and thought I would share what it is…

Amplify’d from

Data Center Server Platform—Cisco Unified Computing System

Cisco Unified Computing System Overview

Today, IT organizations assemble their data center environments from individual components. Their administrators spend significant amounts of time manually accomplishing basic integration tasks rather than focusing on more strategic, proactive initiatives. The industry is in a transition away from the rigid, inflexible platforms that result and moving toward more flexible, integrated, and virtualized environments.

The Cisco Unified Computing System™ is a next-generation data center platform that unites compute, network, storage access, and virtualization into a cohesive system designed to reduce total cost of ownership (TCO) and increase business agility. The system integrates a low-latency, lossless 10 Gigabit Ethernet unified network fabric with enterprise-class, x86-architecture servers. The system is an integrated, scalable, multichassis platform in which all resources participate in a unified management domain.

Managed as a single system whether it has one server or 320 servers with thousands of virtual machines, the Cisco Unified Computing System decouples scale from complexity. The Cisco Unified Computing System accelerates the delivery of new services simply, reliably, and securely through end-to-end provisioning and migration support for both virtualized and nonvirtualized systems. It provides the following benefits:

Embedded system management—Management is uniquely integrated into all the components of the system, enabling the entire solution to be managed as a single entity through Cisco UCS Manager. Cisco UCS Manager provides an intuitive GUI, a command-line interface (CLI), and a robust API to manage all system configuration and operations. Cisco UCS Manager enables IT managers of storage, networking, and servers to collaborate easily on defining service profiles for applications.

Just-in-time provisioning with service profiles—Cisco UCS Manager implements role- and policy-based management using service profiles and templates. Infrastructure policies—such as power and cooling, security, identity, hardware health, and Ethernet and storage networking—needed to deploy applications are encapsulated in the service profile. This construct improves IT productivity and business agility. Now infrastructure can be provisioned in minutes instead of days, shifting IT’s focus from maintenance to strategic initiatives.

Unified fabric—Cisco’s unified fabric technology reduces cost by eliminating the need for multiple sets of adapters, cables, and switches for LANs, SANs, and high-performance computing networks. The system’s fabric extenders pass all network traffic to parent fabric interconnects, where it can be processed and managed centrally, improving performance and reducing points of management. The unified fabric is a low-latency lossless 10-Gbps Ethernet foundation that enables a “wireonce” deployment model in which changing I/O configurations no longer means installing adapters and recabling racks and switches.

State-of-the-art performance—Intel® Xeon® 5500 series processors automatically and intelligently adjust server performance according to application needs, increasing performance when needed and achieving substantial energy savings when not.

Performance and power settings can also be manually configured.

Energy efficiency—The system is designed for energy efficiency. Power supplies are 92 percent efficient and the Intel Xeon 5500 series processors use automated low-power states to better match power consumption with workloads. The simplified design of the Cisco UCS B-Series Blade Servers improves airflow efficiency and can reduce the number of components that need to be powered and cooled by more than 50 percent compared to traditional blade server environments; similar component reduction can be achieved with the Cisco UCS C-Series Rack-Mount Servers.


What’s New in Exchange 2010

Oh how excited I am to take on this project. Working with our new Cisco UCS system which will host our new VMWare Environment and host our new Exchange 2010 implementation. I am in the early stages of gathering information for my project plan and thought this little blurp off of the Cisco site provided a great summary of a few of the components that make up the Exchange services. I really like how you can set policy from the Hub server to analyze the outgoing messages and if you are for example a health org that needs to abide by HIPPA rules for patient info the Hub will be able to determine based on policy to hold your message or let it through or encrypt it if necessary.

Amplify’d from

Hub Transport Server Role

For those familiar with earlier versions of Exchange Server 2007, the Hub Transport server role replaces what was formerly known as the bridgehead server in Exchange Server 2003. The function of the Hub Transport server is to intelligently route messages within an Exchange Server 2010 environment. By default, SMTP transport is very inefficient at routing messages to multiple recipients because it takes a message and sends multiple copies throughout an organization. As an example, if a message with a 5 MB attachment is sent to 10 recipients in an SMTP network, typically at the sendmail routing server, the 10 recipients are identified from the directory and 10 individual 5 MB messages are transmitted from the sendmail server to the mail recipients, even if all of the recipients’ mailboxes reside on a single server.

The Hub Transport server takes a message destined to multiple recipients, identifies the most efficient route to send the message, and keeps the message intact for multiple recipients to the most appropriate endpoint. Hence, if all of the recipients are on a single server in a remote location, only one copy of the 5 MB message is transmitted to the remote server. At that server, the message is then broken apart with a copy of the message dropped into each of the recipient’s mailboxes at the endpoint.

The Hub Transport server in Exchange Server 2010 does more than just intelligent bridgehead routing; it also acts as the policy compliance management server. Policies can be configured in Exchange Server 2010 so that after a message is filtered for spam and viruses, the message goes to the policy server to be assessed whether the message meets or fits into any regulated message policy and appropriate actions are taken. The same is true for outbound messages; the messages go to the policy server, the content of the message is analyzed, and if the message is determined to meet specific message policy criteria, the message can be routed unchanged or the message can be held or modified based on the policy. As an example, an organization might want any communications referencing a specific product code name or a message that has content that looks like private health information, such as Social Security number, date of birth, or health records of an individual, to be held or encryption to be enforced on the message before it continues its route.

Client Access Server Role

The Client Access Server role in Exchange Server 2010 (as was also the case in Exchange Server 2007) performs many of the tasks that were formerly performed by the Exchange Server 2003 front-end server, such as providing a connecting point for client systems. A client system can be an Office Outlook client, a Windows Mobile handheld device, a connecting point for OWA, or a remote laptop user using Outlook Anywhere to perform an encrypted synchronization of their mailbox content.

Unlike a front-end server in Exchange Server 2003 that effectively just passed user communications on to the back-end Mailbox server, the CAS does intelligent assessment of where a user’s mailbox resides and then provides the appropriate access and connectivity. This is because Exchange Server 2010 now has replicated mailbox technology where a user’s mailbox can be active on a different server in the event of a primary mailbox server failure. By allowing the CAS server to redirect the user to the appropriate destination, there is more flexibility in providing redundancy and recoverability of mailbox access in the event of a system failure.

Mailbox Server Role

The Mailbox server role is merely a server that holds users’ mailbox information. It is the server that has the Exchange Server EDB databases. However, rather than just being a database server, the Exchange Server 2010 Mailbox server role can be configured to perform several functions that keep the mailbox data online and replicated. For organizations that want to create high availability for Exchange Server data, the Mailbox server role systems would likely be clustered, and not just a local cluster with a shared drive (and, thus, a single point of failure on the data), but rather one that uses the new Exchange Server 2010 Database Availability Groups. The Database Availability Group allows the Exchange Server to replicate data transactions between Mailbox servers within a single-site data center or across several data centers are multiple sites. In the event of a primary Mailbox server failure, the secondary data source can be activated on a redundant server with a second copy of the data intact. Downtime and loss of data can be drastically minimized, if not completely eliminated, with the ability to replicate mailbox data on a real-time basis.

Microsoft eliminated single copy clusters, Local Continuous Replication, Clustered Continuous Replication, and Standby Continuous Replication in Exchange 2010 and substituted in their place Database Availability Group (DAG) replication technology. The DAG is effectively CCR, but instead of a single active and single passive copy of the database, DAG provides up to 16 copies of the database and provides a staging failover of data from primary to replica copies of the mail. DAGs still use log shipping as the method of replication of information between servers. Log shipping means that the 1 MB log files that note the information written to an Exchange server are transferred to other servers and the logs are replayed on that server to build up the content of the replica system from data known to be accurate. If during a replication cycle a log file does not completely transfer to the remote system, individual log transactions are backed out of the replicated system and the information is re-sent.

Unlike bit-level transfers of data between source and destination used in Storage Area Networks (SANs) or most other Exchange Server database replication solutions, if a system fails, bits do not transfer and Exchange Server has no idea what the bits were, what to request for a resend of data, or how to notify an administrator what file or content the bits referenced. Microsoft’s implementation of log shipping provides organizations with a clean method of knowing what was replicated and what was not. In addition, log shipping is done with small 1 MB log files to reduce bandwidth consumption of Exchange Server 2010 replication traffic. Other uses of the DAG include staging the replication of data so that a third or fourth copy of the replica resides “offline” in a remote data center; instead of having the data center actively be a failover destination, the remote location can be used to simply be the point where data is backed up to tape or a location where data can be recovered if a catastrophic enterprise environment failure occurs.

A major architecture change with Exchange Server 2010 is how Outlook clients connect to Exchange Server. In previous versions of Exchange Server, even Exchange Server 2007, RPC/HTTP and RPC/HTTPS clients would initially connect to the Exchange Server front end or Client Access Server to reach the Mailbox servers while internal MAPI clients would connect directly to their Mailbox Server. With Exchange Server 2010, all communications (initial connection and ongoing MAPI communications) go s through the Client Access Server, regardless of whether the user was internal or external. Therefore, architecturally, the Client Access Server in Exchange Server 2010 needs to be close to the Mailbox server and a high-speed connection should exist between the servers for optimum performance.


How to Configure Outlook 2010 with Gmail

Enable IMAP in Gmail

First log into your Gmail account and open the Settings panel. Click on the Forwarding and POP/IMAP tab and verify IMAP is enabled and save changes.


Next open Outlook 2010, click on the File tab to access the Backstage view. Click on Account Settings and Add and remove accounts or change existing connection settings.


In the Account Settings window click on the New button.


Enter in your name, email address, and password twice then click Next.


Outlook will configure the email server settings, the amount of time it takes will vary.


Provided everything goes correctly, the configuration will be successful and you can begin using your account.



Manually Configure IMAP Settings

If the above instructions don’t work, then we’ll need to manually configure the settings. Again, go into Auto Account Setup and select Manually configure server settings or additional server types and click Next.


Select Internet E-mail – Connect to POP or IMAP server to send and receive e-mail messages.


Now we need to manually enter in our settings similar to the following. Under the Server Information section verify the following.

  • Account Type: IMAP
  • Incoming mail server:
  • Outgoing mail server (SMTP):


Note: If you have a Google Apps account make sure to put the full email address ( in the Your Name and User Name fields.

Note: If you live outside of the US you might need to use and

Next, we need to click on the More Settings button…


In the Internet E-mail Settings screen that pops up, click on the Outgoing Server tab, and check the box next to My outgoing server (SMTP) requires authentication. Also select the radio button next to Use same settings as my incoming mail server.


In the same window click on the Advanced tab and verify the following.

  • Incoming server: 993
  • Incoming server encrypted connection: SSL
  • Outgoing server encrypted connection TLS
  • Outgoing server: 587

Note: You will need to change the Outgoing server encrypted connection first, otherwise it will default back to port 25. Also, if TLS doesn’t work, we were able to successfully use Auto. Click OK when finished.


Now we want to test the settings, before continuing on…it’s just easier that way incase something was entered incorrectly. To make sure the settings are tested, check the box Test Account Settings by clicking the Next button.


If you’ve entered everything in correctly, both tasks will be completed successfully and you can close out of the window. and begin using your account via Outlook 2010.


You’ll get a final congratulations message you can close out of…


And begin using your account via Outlook 2010.



Using IMAP allows you to synchronize email across multiple machines and devices. The IMAP feature in Gmail is free to use, and this should get you started using it with Outlook 2010.

Facebook Tip #1 – Linking other social sites into Facebook

I have had people ask how I am able to get my Flickr or my website blog to show in my Facebook updates…well this is how:

1st go to your Facebook profile page and under the section where you type your status you will see a Options link. Click on it.

2nd you click on the settings link.

Then it opens up a section as seen below. You can pick from the available sites to bring those into your facebook updates. For example if I add photos to my Flickr as public photos they will show in my facebook status. Same goes for my blog or RSS updates. You can unfortunately only have one Blog site to update. These are just other great ways to link all of your social networking together.

Easy Steps to Create Your Own Website

I have helped both of my sisters now create their own websites and shopping carts and thought I should share the easy steps here for all to use.
First step, and sometimes the hardest is to think of your domain name. This is the URL that you will type in a web browser to get to your web page. I use to purchase, and check the domain name to make sure that its not already taken as a .com or .net, .com are more popular, but if your domain is a common name chances are someone else has already taken it. So, be creative in choosing your domain. Another thing to remember is this domain name can be used for your email too.

Second step now that you have your own domain name is to decide what you want to do with your new presence on the world wide web! For my sites and my sisters sites I went with Bluehost for my hosting provider. I have to say they are the best! I have been with a few different web host and Bluehost support by far out ranks all the others. CLICK HERE TO SIGNUP FOR BLUEHOST.COM Once you order your hosting package with Bluehost you have endless options on how to create your site. You can have a shopping cart site that lists multiple products for sale, or you can host a WordPress site and pretty much configure it to do just about anything for your web presence.

Leave comments on any questions you might have in regards to the process and I will address them for you the best I can.

Cool Website

Cool Website Alert!!

My sister Tracy told me about this website called

This site is really cool! They have all hand made items. That is a criteria for posting or selling on the etsy site is that it has to be hand made. They have tons of categories from paintings and photography to clothing and purses! This is a site you should definitely check out!