Set up L2TP/IPSec PSK on Surface RT

Surface RT stock imageAt this time, Microsoft’s Surface RT has a very limited GUI for editing VPN parameters. For example, there’s no input field for a pre-shared key commonly used with L2TP/IPSec VPN type. Since there’s limited information for setting up more advanced VPN connections on Surface RT, I figured I would post these simple steps.

  1. Use Windows 8 powershell vpn cmdlet: http://technet.microsoft.com/en-us/library/jj613766.aspx
  2. Open up Powershell
  3. Example:Add-VpnConnection –Name “My VPN” –ServerAddress vpn.mydomain.com –TunnelType L2tp –L2tpPsk 5E2BBC9D423B50A2 –RememberCredential 1 –SplitTunneling 1

S Symbol in Your Emails

I recently ran into an issue where the š character appeared in a client’s emails that weren’t there when she sent them. This was apparently caused by Outlook 2011’s autoformatting options that replaced … with a special ellipses character, which wasn’t supported in all mail clients.

Here’s how you can disable that feature and thus avoid unintentional symbols in your emails.

1. Open Outlook and go to Outlook preferences.

Screen Shot 2013-11-06 at 10.41.31 AM

2. Select AutoCorrect under the Personal Settings category.

3. Select AutoFormat tab and uncheck “…” with ellipses.

Screen Shot 2013-11-06 at 10.43.42 AM

Pesky RunDLL Virus Errors at Logon

One of our user’s computers was infected with a virus that, after being removed and cleaned up, left these annoying RunDLL errors for DLL files with randomly generated filenames which occurred every time the user would login:

logon errors

I didn’t get far trying to google some keywords related to the errors. However, some results did point me in the right direction for resolving the issue.

Basically, you want to check every possible repository of startup items or commands. In the registry, most google results told me to check the following locations.

  • HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/Run
  • HKEY_CURRENT_USER/SOFTWARE/Microsoft/Windows/CurrentVersion/Run

However, where these virus-caused items actually ended up being was under a specific user profile in HKEY_USERS:

HKEY_USERS/userprofile/SOFTWARE/Microsoft/Windows/CurrentVersion/Run

I should mention that CCleaner did not list them under the startup category and neither did msconfig, so registry might be the only way to find them that I know of.

Office 365 SMTP Settings

Update, in new office 365 UI:

Server name: smtp.office365.com
Port: 587
Encryption method: TLS

  1. Login in to the Microsoft Online Services Portal.
  2. Click on Outlook.
  3. Click on the question mark icon in the upper right corner of the page.
  4. Click on About.
  5. There will be a section titled External SMTP setting that will contain the server name, encryption type and port. You will be able to use those along with your username and password to send email from devices/programs.

 

Change Office 365 Password Expiration Period

Update: This is now available via the Office 365 administration portal:

Screen Shot 2013-10-11 at 10.03.26 AM

If 90 days seems too short of a period before your Office 365 users’ passwords expire, you can change it via a powershell cmdlet.

Set-MsolPasswordPolicy -ValidityPeriod <days> -NotificationDays <days> -DomainName contoso.com

Validity Period: time before expiration

Notification Days: how many days prior to expiration that the user begins to receive notification pop-up

Make sure you use Powershell to connect to MS online service first: http://onlinehelp.microsoft.com/office365-enterprises/hh124998.aspx