How to fix error 80240016 while Upgrading to Windows 10

While upgrading to Windows 10, if you ever got the famous 80240016 Windows update error message saying that “Windows 10 couldn’t be installed” (as the screnshot below shows), don’t worry at all as it needs a small fix:1

All you need to do is to open Windows Defender by searching for it in Control Panel (on Windows 7) or in the start screen (on Windows 8/8.1) -> open the Settings tab -> uncheck “Turn on real-time protection (recommended)”


The rest is a piece of cake then. Just re-try the upgrade process and you will see it will never fail on you again:


If you still had issues upgrading to Windows 10, please let me know in the comments section and I will try my best to help you.

Step-by-Step Guide to Backup/Restore BitLocker recovery information to/from Active Directory

In this scenario you will back up the BitLocker recovery information on Example-Server01 in Active Directory and also later retrieve the recovery key from Active Directory on another server and use it to access Example-Server01 again.

Task 1: Create a BitLocker recovery certificate template and issue a new recovery certificate

  1. Log on to Example-DC01 (Domain Controller).
  2. Open the Start screen and type Certification Authority and press Enter.
  3. In the left pane, expand Example-Example-DC01-CA and right click Certificate Templates and click Manage.
  4. On the Certificate Templates Console, right click Key Recovery Agent and click Duplicate Template.
  5. On the Properties of New Template window, select the Extensions tab, click Edit and on the Edit Application Policies Extension dialog box then click Add.
  6. Select BitLocker Drive Encryption and BitLocker Data Recovery Agent and then click OK twice.
  7. Click the General tab and type BitLocker Key Recovery as the Template display name, select Publish certificate in Active Directory and then click OK.
  8. Close both the Certificate Templates Console and Certification Authority windows.
  9. Open the Start screen and type cmd.exe and press Enter.
  10. Type the following commands and press Enter after each line to create a recovery certificate on the desktop:
    • cd desktop
    • cipher.exe /r:Recovery-Cert
  11. Open the Start screen and type Group Policy Management and press Enter.
  12. Expand the following nodes Forest: > Domains > > Group Policy Objects and right click Default Domain Policy and click Edit.
  13. On the Group Policy Management Editor window, expand the following nodes Computer Configuration > Policies > Windows Settings > Security Settings > Public Key Policies and right click BitLocker Drive Encryption and click Add Data Recovery Agent.
  14. On the Welcome to the Add Recovery Agent Wizard page, click Next.
  15. On the Select Recovery Agents wizard page, click Browse Folders and click Next.
  16. Select Recovery-Cert.cer from the desktop and click Open and in the confirmation dialog box click Yes and then click Next.
  17. On the Completing the Add Recovery Agent Wizard page, click Finish.
  18. Open the Start screen and type certmgr.msc and press Enter.
  19. In the left pane expand Certificates – Current User > Trusted Root Certification Authorities and right click Certificates and click All Tasks > Import.
  20. On the Welcome to the Certificate Import Wizard page, click Next.
  21. On the File to Import page, click Browse, select Recovery-Cert.cer from the desktop and click Open and then click Next twice and then Finish.

Continue reading

Best Practices on Combining NTFS and Share Permissions

The best way to go about combining NTFS and Share permissions is to first understand how the two types of permissions affect one another. In fact when NTFS and Share permissions are combined, the most restrictive permission will take effect.

For instance, if the user John has “Allow-Full Control” NTFS permission on a folder and he also has “Allow-Read” Share permission on the same folder. As a result of combining the two, John will receive “Allow-Read” permission on the folder.

The best approach to minimize the confusion and difficulty of combining NTFS and share permissions, is to always assign the user entity of “Everyone” “Allow-Full Control” share permission and then assign more detailed permissions using NTFS permissions. This way we have avoided the difficulty of combining permissions effectively and have also managed to provide more detailed permissions to users and groups.

Continue reading

Complete Guide to Microsoft Enhanced Mitigation Experience Toolkit (EMET)

Microsoft Enhanced Mitigation Experience Toolkit (EMET) is a piece of software installed on the operating system and it makes it very difficult to exploit a vulnerability on a system or software. It provides the capability of preventing different exploitation techniques on the operating system or software level when security patch for the faulty software is not released. The benefits of using EMET are as follows:

  • It is very easy to use and does not include any complicated processes.
  • In order to prevent an operating system or software from exploitation, there is no need for the source code of the software and all it takes is to install and configure EMET before or after the faulty software is installed.
  • EMET can be configured for all the operating system components, processes and drivers and also individual applications and softwares installed on the operating system.
  • It can also work with legacy software and applications that exist in an organization’s infrastructure and cannot be easily phased out.

Protection Levels

There are two types of settings on EMET which can be configured to provide mitigation:

  • System Settings: These settings will apply to the whole operating system and its components and drivers.
  • Application Settings: These settings will apply to specific applications installed on the operating system.

Continue reading

Step-By-Step Guide to Implement and Configure BitLocker Drive Encryption on Windows Server 2012 R2

In the first part of this guide you will learn how to install the BitLocker Drive Encryption feature on a Windows Server 2012 R2.

  1. Log on to Example-Server01.
  2. On the Start screen click Server Manager.
  3. On the Server Manager window, click Manage on the top right and from the menu select Add Roles and Features.
  4. On the Before you begin page, click Next.
  5. On the Select installation type page, select Role-based or feature-based installation and click Next.
  6. On the Select destination server page, select Select a server from the server pool and then select from the Server pool in the middle table and click Next.
  7. On the Select server roles page, click Next.
  8. On the Select features page, select BitLocker Drive Encryption from the list and in the new dialog box select Include management tools (if applicable) and click Add Features.
  9. On the WDS page, click Next.
  10. On the Select role services page, click Deployment Server and Transport Server and click Next.
  11. On the Confirm installation selections, Click Install.
  12. Once the installation finished successfully, click Close.

Continue reading

Step-by-Step Guide to EFS Recovery

In this scenario John Smith is an employee who uses his domain credentials to have direct access to Example-Server01 which many employees use to store their confidential customer’s data. John uses the folder C:\Example_Customer1 to store his exclusive customer’s data and he uses EFS to encrypt the content of this folder.

After a few months John has been asked to leave the company with immediate effect due to integrity issues and therefore the IT security administrator needs to recover the files he stored in C:\Example_Customer1.

Continue reading

Configuring EFS using Cipher.exe

In this exercise you will learn how to encrypt and decrypt files and folders using cipher.exe command-line utility on a Windows Server 2012 R2:

  1. Log on to Example-Server01 and create a new folder named Confidential_Docs in partition C.
  2. Double click and open Confidential_Docs and create a text document in it and name it Daily_Doc.txt.
  3. Double click Daily_Doc.txt and type something in it. Click File and then Save and then close the Notepad text editor.
  4. Open the Start screen and type cmd.exe and press Enter to open Windows command line.
  5. Type the following command and press Enter to encrypt the Confidential_Docs folder and all the content inside:
  6. Cipher.exe /E /S:C:\Confidential_Docs
  7. To decrypt the same folder, you will need to use the following command:
  8. Cipher.exe /D /S:C:\Confidential_Docs

Continue reading

Step-by-Step Guide to Disable Encrypting File System (EFS)

You can disable EFS for a folder, a computer or even the entire domain. In order to disable EFS for a folder create a file called Desktop.ini that contains:



All you need to do is to save this file in the folder in which you want EFS to be disabled. When the user wants to encrypt the folder or the files in the folder, this will show him/her a message that “An error occurred applying attributes to the file: filename. The directory has been disabled for encryption.”

Please note that only the current folder with all the files in it are affected by the Desktop.ini file. If you create a subfolder, both the subfolder and any files in it can be encrypted. Also, encrypted files can be copied or moved, without losing their encryption, into the directory that contains the Desktop.ini file.

Disabling EFS for a Stand-Alone Computer

If you want to disable EFS for the entire computer, you need to add an entry to the computer Registry:

  1. In the Run dialog box, type regedit.exe.
  2. Navigate to the subkey HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft \Windows NT\CurrentVersion\EFS.
  3. On the Edit menu, point to New, and then click DWORD Value.
  4. Enter EfsConfiguration for the value name and 1 for the value data to disable EFS. (A value of 0 enables EFS.)
  5. Restart the computer.
  6. If EFS is disabled and a user tries to encrypt a file or folder, a message tells the user that “An error occurred applying attributes to the file: filename. The directory has been disabled for encryption.”

Continue reading

Step-by-Step Guide to Configure Group Managed Service Accounts

Important Points about Group Managed Service Accounts

Group Managed Service accounts are perfect identity solutions for services running on multiple hosts and using group them password management requires no administration overhead as password management is handled automatically using Windows Server 2012/2012 R2 across multiple hosts. It also supports offline hosts which are not connected to network for a period of time, and when they go back online, the password is synchronized on the service running on them and the service can start successfully. It is also important to take note that failover clusters currently do not support gMSAs but the services running on top of clusters can support them if they are a Windows service, an App pool, a scheduled task or they natively support gMSA.

Please also take note that you can only configure and administer group managed service accounts on Windows Server 2012/2012 R2 but you can still have other domain controllers running earlier versions of Windows Server operating system. There are very important points to take into consideration when configuring managed service accounts:

  • Managed service accounts can work across domain boundaries as long as the required domain trusts exist.
  • A managed service account can be placed in a security group.
  • Managed service accounts can be stored anywhere in Active Directory, nevertheless there is also a specific container for them.
  • Passwords are automatically created for managed service accounts and are refreshed every 30 days. You can change a password manually.

Continue reading

Ultimate Guide to Security on Windows Server 2012 R2


I am so proud and excited to announce that I am finally finished with my first book and it is released to public. This book is on the topic of security on Windows Server 2012 R2 and after a year of working on it, I finally decided to not release it through Microsoft global marketplace (which is only private to training centers worldwide) and instead self publish it and make it available to everyone globally.

Learn how to secure the new Microsoft Windows Server 2012 R2 through this completely practical book which includes many step-by-step guides, exercises, and lab scenarios. This book will:

  • Provide beginner to advanced level content on the topic of security
  • Include many step-by-step hands-on labs and exercises
  • Include guides on how to configure commonly-used security services such as Network Access Protection, Network Policy Services, Dynamic Access Control, and many more.
  • Include also contents on how to configure security for Hyper-V
  • Fit also the need of those managing Windows Server 2008 (R2) environments

This book is a must-read for those who are tired of searching for good contents and would like to read something which is so right to the point. You can have more information about this book from and even have a glance inside the book contents.

Looking forward to your feedback about the book.