Convert VMware .vmdk to Hyper-V .vhdx with Powershell

Download Microsoft Virtual Machine Converter 3.1 over here.

  1. Install mvmc_setup.msi
  2. Run your Powershel 3.0+ as an administrator.

Import-Module “C:\Program Files\Microsoft Virtual Machine Converter\MvmcCmdlet.psd1”

Convert to VHD:
ConvertTo-MvmcVirtualHardDisk -SourceLiteralPath “E:\Virtuele Machines\DC01\DC01.vmdk” -DestinationLiteralPath “G:\Hyper-V” -VhdType FixedHardDisk -VhdFormat Vhd

Convert VHD to VHDX:
Convert-VHD -Path ‘G:\Hyper-V\dc01.vhd’ -DestinationPath “G:\Hyper-V\dc01.vhdx” -VHDType Fixed -Passthru

Windows 10 ADK update build 10586

The latest Windows 10 ADK update, build 10586, was silently released a few days ago (Thanks deploymentresearch for the download link). In this post you learn about what’s changed.

Download link: http://download.microsoft.com/download/3/8/B/38BBCA6A-ADC9-4245-BCD8-DAA136F63C8B/adk/adksetup.exe

Warning: Do NOT upgrade your ConfigMgr 2012 R2 SP1 or MDT 2013 Update 1 environments to this build yet. For ConfigMgr, even though it seems to fix the x64 UEFI / PXE and Powershell/.NET issue, which is great, the new ADK does break Computer Refresh scenarios (Bare metal works). The error code is 0x80220014. Research and discussions with the product teams in progress… MDT 2013 Update 1 yet to be validated, but error comments on twitter does not give me a warm and fuzzy feeling.

4fbe7042-d2fd-416e-a7b3-d3458a49aeec

Windows Update KB3097877 crashes Outlook

A recent update for Windows may cause Outlook to crash.

The update that causes this is KB3097877 and it appears to be limited to only some Windows 7 installations when downloading online images for a HTML message. The version of Outlook that you are using doesn’t seem to matter and other applications may also be affected.

Thanks to Howto-Outlook

MS15-122 Security Update for Kerberos to Address Security Feature Bypass (Bitlocker)

This security update resolves a security feature bypass in Microsoft Windows. An attacker could bypass Kerberos authentication on a target machine and decrypt drives protected by BitLocker. The bypass can be exploited only if the target system has BitLocker enabled without a PIN or USB key, the computer is domain-joined, and the attacker has physical access to the computer.

This security update is rated Important for all supported editions of Windows. For more information, see the Affected Software section.

The update addresses the bypass by adding an additional authentication check that will run prior to a password change. For more information about the vulnerability, see theVulnerability Information section.

For more information about this update, see Microsoft Knowledge Base Article 3105256.

Translate »