Skip navigation

Windows Tips & Tricks UPDATE--April 11, 2005

Windows Tips &amp Tricks UPDATE, April 11, 2005, —brought to you by the Windows IT Pro Network and the Windows 2000 FAQ site

Make sure your copy of Windows Tips & Tricks UPDATE isn't mistakenly blocked by antispam software! Be sure to add [email protected] to your list of allowed senders and contacts.

This email newsletter comes to you free and is supported by the following advertisers, which offer products and services in which you might be interested. Please take a moment to visit these advertisers' Web sites and show your support for Windows Tips & Tricks UPDATE.

Diskeeper - The Number One Automatic Defragmenter

EMC Dantz

Sponsor: Diskeeper - The Number One Automatic Defragmenter

Keeping your systems up and running and available to the users is vital! Slow, crash-prone systems have a devastating effect on your organization's productivity. Disk fragmentation is a major cause of crashes, slowdowns and freeze-ups, and it must be kept in check. Fortunately, there is a solution: Diskeeper, the Number One Automatic Defragmenter. Automatic defragmentation boosts performance and reliability, reducing help desk traffic by heading off problems before they become emergencies. See for yourself—download a FREE 30-day fully-functional evaluation version of Diskeeper. Install it then just "Set It and Forget It", and watch as the problems caused by fragmentation simply disappear! See why over 16 million Diskeeper licenses have been sold--get your free evaluation version of Diskeeper 9 now!


  • Q. Which Microsoft services and products support clustering?
  • Q. Do I need to take any special steps when restoring a backup of my Relative Identifier (RID) master?
  • Q. How can I trigger an action to be performed when certain Windows events occur
  • Q. How can I block users from accessing the Microsoft Web application service that determines unknown file extensions?
  • Q. Which disk counters are enabled by default in Windows Server 2003 and Windows XP?

by John Savill, FAQ Editor, [email protected]

In this issue, I tell you which Microsoft services and products support clustering and which disk counters are enabled by default in Windows Server 2003 and Windows XP? I also explain the process of restoring a backup of the Relative Identifier (RID) master, how to trigger an action to be performed when certain Windows events occur, and how to block users from accessing the Microsoft Web application service that determines unknown file extensions.

Sponsor: EMC Dantz

Learn how small and midsize businesses (SMBs) and distributed enterprises can optimize disk-based backup! Storage industry experts have identified backup and recovery as a major area of concern for SMBs and distributed enterprises. EMC Dantz, the maker of award-winning Retrospect backup and recovery software, is offering a free white paper describing how combining disk-based backups with automated backup technology can deliver easy-to-manage backups, fast restores, and simplified creation and tracking of tape for offsite media rotation. Download the white paper today!


Q Which Microsoft services and products support clustering?

A. The table at lists a number of widely used Microsoft applications and services and describes the type of clustering support they provide.

Q. Do I need to take any special steps when restoring a backup of my Relative Identifier (RID) master?

A. Remember that the RID master is responsible for allocating RIDs (in batches of 500) to all domain controllers (DCs) in a domain. If the RID master is incorrectly restored (e.g., from an old backup), it might assign RID pools that it has already issued, resulting in duplicate SIDs being created in the domain. Therefore, I recommend that you give the RID master Flexible Single-Master Operation (FSMO) role to a different DC instead of restoring the RID master. If you do restore the RID master, be aware that if you have more than one DC in the domain, the RID master must be able to contact one of them before its RID role will be started. In a disaster recovery situation, this requirement might be a problem because no other DCs would be available. Microsoft documents the steps to work around this problem at .

Q. How can I trigger an action to be performed when certain Windows events occur?

A. Solutions such as Microsoft Operations Manager (MOM) have highly configurable options for performing actions that depend on Windows events. However, Windows XP and later provide a tool, eventtriggers.exe, which lets you schedule an action to be performed when certain events occur. The basic command syntax for creating a trigger is

  eventtriggers /create /tr "<friendly name for trigger >"  /eid <event ID to trigger on>  /l <log to monitor, or omit to track all logs>  /t <type of event to monitor for, e.g., ERROR>  /tk <task to perform when event is found>  /ru <username to run the action under; by default, the local system is used>  /rp <password of specified user account>  
To display a detailed list of the triggers you've created, run the command
  eventtriggers /query /v  
You can configure the query to create the output in a specific format. For example, to create a comma-separated value (CSV) format, add the argument
  /fo csv  
to the end of the previous command (/fo means format). Other format options include table and list. If you need to troubleshoot a trigger action, you can view the log file at \%systemroot%\system32\wbem\logs\cmdtriggerconsumer.log.

However, the log doesn't give much information. Typically, the best way to debug a trigger action is to try to run the trigger action manually. Remember that specifying credentials (i.e., the /ru and /rp arguments) to use might fix the problem because by default the action will run under the local system context. To remove all the triggers on your system, use this command:

  eventtriggers /delete /tid *

Q. How can I block users from accessing the Microsoft Web application service that determines unknown file extensions?

A. By default, if you try to open a file that has an unknown file extension, you'll be given the option of selecting a program with which to open the file or using the Microsoft Web service to help ascertain the required application to open the file type, as the figure at shows. To block the Web lookup of extensions, perform these steps:

  1. Start the registry editor (regedit.exe).
  2. Go to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system registry subkey.
  3. From the Edit menu, select New, DWORD Value.
  4. Enter a value name of NoInternetOpenWith and press Enter.
  5. Double-click the new value and set it to 1. Click OK.
  6. Close the registry editor.

The change takes effect immediately, and the user now sees only the dialog box for choosing the application to use; the option to connect to the Web service is gone.

Q. Which disk counters are enabled by default in Windows Server 2003 and Windows XP?

A. In earlier versions of Windows, you had to manually enable certain physical and logical disk counters before their values could be monitored via tools such as performance monitor. In Windows 2003 and XP, both sets of counters are automatically enabled, and no manual configuration is required. Microsoft notes that for legacy applications that use the IOCTL_DISK_PERFORMANCE control code to retrieve raw counters, you can specify -Y or -N on the Diskperf command to forcibly respectively enable or disable the counters, as you could with previous versions of Windows.

Events and Resources
(A complete Web and live events directory brought to you by Windows IT Pro: )

  • Ensure SQL Server High Availability

  • In this free Web seminar, discover how to maintain business continuity of your IT systems during routine maintenance and unplanned disasters. Learn critical factors for establishing a secure and highly available environment for SQL Server including overcoming the technology barriers that affect SQL Server high availability. Find out about Microsoft's out-of-the-box high-availability technologies, including clustering, log shipping, and replication. Register Now!

  • Get Ready for SQL Server 2005 Roadshow in a City Near You

  • Get the facts about migrating to SQL Server 2005. SQL Server experts will present real-world information about administration, development, and business intelligence to help you implement a best-practices migration to SQL Server 2005 and improve your database computing environment. Attend and receive a 1-year membership to PASS and 1-year subscription to SQL Server Magazine. Register now!

  • Protect the Rest of Your Exchange Infrastructure

  • There is more to data protection for Exchange than protecting mail and mail servers. In this free Web seminar, you’ll learn some methods for anticipating, avoiding, and overcoming technical problems that can affect your Exchange environment including, corruption or errors in Active Directory, DNS problems, configuration errors, service pack installation problems, and more. Register now!

  • Detect Attempted Intrusions into Your Windows System

  • In Chapter 5 of this free eBook, you’ll learn basic intrusion detection, Windows auditing, audit policy, auditing categories, event-log management, and audit policy best practices. Discover how to appropriately configure event auditing and capture critical information about most unauthorized events. Download your copy now!

    (from Windows IT Pro and its partners)

  • Attend This Free Web Seminar for a Chance to Win a $1000 American Express Gift Check!

  • Achieve High Availability and Disaster Recovery for Microsoft Servers. In this Web seminar, discover what it takes to minimize the likelihood of downtime through reliability and resilience in your Microsoft server environment including Exchange Server, SQL Server, File Server, IIS, and SharePoint. Sign up today!

  • Check Out the New Windows IT Security Newsletter!

  • Security Administrator is now Windows IT Security. We've expanded our content to include even more fundamentals on building and maintaining a secure enterprise. Each issue also features product coverage of the best security tools available and expert advice on the best way to implement various security components. Plus, paid subscribers get online access to our entire security article database! Click here to try a sample issue today:

  • Nominate Yourself or a Friend for the MCP Hall of Fame

  • Are you a top-notch MCP who deserves to be a part of the first-ever MCP Hall of Fame? Get the fame you deserve by nominating yourself or a peer to become a part of this influential community of certified professionals. You could win a VIP trip to Microsoft and other valuable prizes. Enter now--it’s easy:

    Sponsored Link

  • Quest Software

  • Heading to Exchange from Notes or GroupWise? Get Expert Help!;14771969;8214395;x?

    Contact Us
    Here's how to reach us with your comments and questions:

    This email newsletter is brought to you by Windows IT Pro, the leading publication for IT professionals deploying Windows and related technologies. Subscribe today.

    Hide comments


    • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

    Plain text

    • No HTML tags allowed.
    • Web page addresses and e-mail addresses turn into links automatically.
    • Lines and paragraphs break automatically.