So you can’t get Quickbooks to work in Multi-user mode on Windows 2012 R2

Usually I write more about technology from a business owner’s perspective. But today, after spending about hours and hours with tech support from both Quickbooks and Microsoft, I’m writing about a technical issue. I just upgraded a client’s network to a Windows 2012 R2 Essential server. Like most small businesses, they use Quickbooks extensively to run their business. They had been running Quickbooks 2011 and needed to upgrade to Quickbooks 2014 to support their payroll functionally. For those that are legal eagles, I should note that Quickbooks™ is a registered trademark of Intuit, Inc. and Windows™ is registered trademark of Microsoft, Inc.

Like most IT professionals, the plan was to do one upgrade at a time to try and keep the number of things that changed to a minimum. The installation of the new server and all the new workstations worked like a charm. We then tried testing Quickbooks. In this case, 5 users access Quickbooks as a major function of their job. Each of the users could access and work with the Quickbooks 2011 database, but only in single user mode; we could not change to multi-user mode.

So, it was off to Quickbooks support. Since we had to change to Quickbooks 2014 for payroll support, the recommendation from tech support was to upgrade to Quickbooks 2014 to see if that fixed the problem. After several hours of conversion attempts and diagnostics, our Quickbooks tech declared that there was something wrong with the Quickbooks database and it needed to be sent into their database group for repair. This repair was to take 3 to 5 days. Since it was the Wednesday before a holiday weekend, we were hoping we would get notified that the file was available on Friday, but more realistically, we figured we would hear on Tuesday.

Not having heard from Quickbooks by mid-day Tuesday, the client called Quickbooks and discovered that the database group had received the file, but had no idea what they were supposed to do with it. Instructions were given and the file was made available late Thursday.

We installed the file and started testing. We still could not get multi-user access to the new Quickbooks 2014 version of the database. Quickbooks support got called in again. After spending another half day with Quickbooks support, they declared that there was something blocking the ports they needed open on the server. When asked if there was any additional help we could get from them, like Tier 2 support, we were informed that there was no additional support that is available to clients and we were on our own to figure out what the problem was with the ports. They only thing they would point to is an article in their knowledge base that walk you through the same steps we had taken. There were also the following lines at the bottom of the article:

Once you have followed all the steps in the article above and still experience the H202 error (your file is hosted on a Windows Server 2012 server), sign up to be notified below.

We are working to resolve this issue. We will notify you as soon as we have a solution or update to this topic.

Knowing that Quickbooks support wasn’t going to be any more help, I did some additional testing. Taking another server in my lab, I installed Windows 2008 R2 and added in Quickbooks 2014. That configuration allowed me to open the client’s file in multi-user mode. To take it a step further, I wiped the test machine and installed Windows 2012 R2 Essential, just like the client server, added Quickbooks 2014 and it worked! This meant the problem was isolated to the specific server at the client. I also determined that the problematic port was port 8019.

Since the problem was now isolated to being the client server environment, I went back to the client site and installed the Quickbooks database on a Windows 7 machine and the client’s staff was able to access the database in multi-user mode. While they were catching up on the work that had piled up, it was now time to contact Microsoft support to find an answer.

It was a long day with Namrata Manchanda of Microsoft PSS. Quickbooks tech support tested the ports by attempting to telnet to each of the ports required by their application. If a connection could not be opened, they concluded that the port was closed. My testing had shown that if I tried the same telnet test on the server using the loopback address (127.0.0.1) the connection worked. If I used the internal LAN address, the connection failed. Namrata found the same results. She checked the firewall rules, deleted them, re-added them with the same results. She compared SysInternal Process Explorer logs between the working workstation “server” and the real server. She still found nothing to point to the cause of the problem. We then removed Quickbooks from the server and she created a temporary website that would respond to port we were working on. After confirming the website worked via a browser, she tried the telnet tests. They responded exactly the same, loopback worked, LAN address didn’t. She then changed the port on the website to 8020 to test on a non-modified firewall port. Again the results were the same!

This testing now showed that the problem was indeed the firewall. Since restarting the firewall service several times did not fix the problem, Namrata tried restarting the Base Filtering Engine service. Now both tests worked! We reinstalled the Quickbooks database engine and we were able to open the file in multi-user mode.

The final result was that for some reason the Base Filtering Engine was not acknowledging the changes to the firewall rules and had cached the old rules. This is why when checking the rules, it appeared that the rules were correct, but in actuality, they were not applied. So if you have a Windows Firewall issue that will not resolve properly even if the rules are correct, try restating the Base Filter Engine service as well as the Windows Firewall service.

Does Anti-Malware really work?

I’ve been off taking care of business, but an article crossed my desk that I could not help sharing. The Wall Street Journal reported

“Software designed to block malicious actors from infiltrating networks is no longer viable and enterprises need to transition to new cybersecurity strategies focused on identifying threats and mitigating damages, according to the company that put antivirus software on the map. Brian Dye, senior vice president for information security at Symantec, says even the best antivirus software can now only intercept less than half of all malware, which is prompting the company to shift its focus on new products that help companies detect and respond to breaches.
The Wall Street Journal (tiered subscription model)

Many of my colleagues, me included, have thought that Symantec AntiVirus had been living off its reputation and no longer really worked in the SMB marketplace. From our perspective, the code had gotten too bloated and had too large of an impact on the performance of user workstations. Additionally, the just did not seem to find the malware that other options found. Now they are basically admitting that they have not done a great job and have given up.

This may be in reaction to the Target and other similar break-ins that have happened over the last few months. And it may be a reaction to the change in the legal environment’s view of what responsibilities an anti-malware provider really has. And it may have nothing to do with any of these occurances.

IT should be noted that anti-malware has always been a reactive science; you can never perfectly predict what a person will do, you can only report what they have done. Malware creation is no longer a hobby, but a real profession with real monetary rewards.

Does this mean that you should just forget about keeping your anti-malware up to date, or even run it on your machine? Just ask anyone how has done this. Ask them how well their machine runs, or should I say crawls.

I think that this is just a case of a company that was not doing the best job out there decided to cut its losses and move to another segment where it thinks it can do better.

So the Cloud is “Safe”

It’s National Cyber Security Awareness Month! Of course you should be aware of cyber security every month. Intel has done an interesting page of cyber security suggestions at https://www-ssl.intel.com/content/www/us/en/security/lifehacks.html. Check it out.

I know it seems like I have been picking on Google for the last couple of posts, but they are such an easy target. This time, Google’s CIO, Ben Fried had some interesting things to say in an article written by Liz Gammes of All Thngs D. The article talks about how Google employees are insulated from what is used in the outside consumer world. Google’s mantra is that everyone should trust the cloud to handle their communications and data storage. Employees should collaborate and develop corporate strategy on the web rather than their own internal networks.

Now, Google follows its philosophy by using its own products, like Google Apps and Google Drive for their internal development in their internal cloud. But how does it feel about using other’s products, or the cloud in general? “The important thing to understand about Dropbox,” Fried said, “is that when your users use it in a corporate context, your corporate data is being held in someone else’s data center.” To put that in a real context, Google’s basic philosophy, from my understanding, is anything that is stored on Google’s servers is Google’s property. That may be a bit of an overstatement, but they do feel they have the right to mine your data in order to target ads to you. What is to prevent and Edward Snowden from coping your information and passing it to others? You are relying on Google to tell you that your data has been compromised, and it is because of a breach of their security. Can you say “lawsuit”?

This is not to say that Google is worse than any other cloud provider. They are open about their position on data mining and I am not saying that anyone else is data mining or not data mining. What I am saying is that moving your data to the cloud means that you are consciously giving up control of your information to someone else. You are trusting them to prevent anyone other than yourself from accessing, destroying or changing that data.

As the old consumer adage goes “Buyer beware”.

Android on course for One Million Malware Apps

After taking some time off to attend to my real business, I have found some time to write again. The article the peaked my attention the most was a recent article in Fox Business News. The headline to this article is “Cyber Hackers on Course for One Million Malware Apps” and they are talking just about the Android operating system! According to the article it took over a decade to reach that many malware applications on the “much” beleaguered Microsoft operating environments. However, do we hear a cry from the public about how bad the Google Android operating system is? Not really, we just hear sales numbers on how that OS is selling better than anyone else.

I can go on about the details in the article, but it is written in plain English and doesn’t need any technical translation. What I really what you to think about is how this affects your policy on Bring Your Own Device (BYOD). It is evident the malicious software industry is turning its attention from the evermore hardening arena of the PC environment to the easy pastures of the mobile environment. Not to get too into Google bashing, but it is evident that Google has not learned from the mistakes of its predecessors in the industry. I will not say they are ignoring the security of their customer’s data and money, but they are evidently not doing what is necessary to control the massive outbreak of malware in their OS environment. The excuse that they just create the OS with associated patches and it is up to the licensees to distribute and implement those patch is ludicrous. If Google wants to be recognized as a true software vendor for the business environment, it needs to step up to the responsibilities of a true software vendor. This means they have to reach out beyond the environment that they completely control and make sure that the people using their software are protected as much as reasonable possible.

It’s 6 Months later. What should you do about the end of life for Small Business Server?

Hiding the announcement like a politician hides bad news, Microsoft announced the end of life for their Small Business Server (SBS) last July. It’s now nearly six months later, and they are still trying to figure out what the replacement for Small Business Server should really be. Just this month, Microsoft has changed the licensing rights for those that purchase Small Business Server 2011 with Software Assurance. The original announcement gave Software Assurance purchasers rights to one Windows Server 2012 Standard license, one Exchange 2010 Standard license and the associated CALs to match the Small Business Server CALs. The new announcement gives the purchaser rights to two Windows Server 2012 Standard licenses along with the Exchange 2010 license. Additionally, you will be able to upgrade to Exchange 2013 if you wish.

One other announcement that has been made by Microsoft is how to transmogrify Windows 2012 Server Essentials into a normal Windows 2012 Server environment. Transmogrification (yes, this is a real word according to Microsoft), can be simply accomplished by activating a Windows 2012 Server Essentials environment with a Windows 2012 Server product code. There are no additional charges outside of the CAL requirement for every user/device connected to server. This act also increase the number of computers that can be backed by the Essentials server up from 25 to 75

So what does this really mean to the business owner? The choices have become more numerous than before which really means you need an expert to determine what is best for your business. Let’s assume that you are moving from SBS 2003 to something. What should you choose?

One choice would be Small Business Server 2011. Although you can no longer purchase Software Assurance for the product, you can still purchase it until July of this year. Jeff Middleton of IT Pro Experts argues that SBS 2011 will have validity for the next five years. I think this is a valid assumption if you think your company will grow within the restraints of SBS (75 users).

Another choice would be to move to either Small Business Server Essentials 2011 or Windows 2012 Server Essentials for your internal server as long as you will stay within the 25 user limit. For this size business, I would recommend an outside mail server such as Microsoft Office 365.

For larger businesses, you could go to a Windows Server version and either have your email hosted in-house or in the cloud. In doing analysis for a number of different clients, I have found that the conversion costs to cloud email versus keeping mail in-house break even at about 5 years.

These are just high level overviews of what choices are available. There are many variations within the choices I have mentioned. If you have more questions, let me know an I will try to address them.

What are your younger employees thinking about IT Policies?

Cisco has released their “Connected World Technology Report 2011“. This was a worldwide study of 1,441 College Students (age 18–24) and 1,412 End Users (21–29) who completed an online survey between May 13 and June 8, 2011. The study covered 14 countries with about 200 entries per country. The End Users were screened were college graduates or higher, employed full time in a non-IT role, and worked for an organization that employs 10+ people worldwide. The purpose of the study was to examine the behavior and expectations of the world’s next generation of workers and how their demands for information access are changing business communications and the future of work.

Among other findings, the 2011 Cisco Connected World Technology Report revealed:

  • One of every three college students and young employees believes the Internet is as important as air, water, food, and shelter.
  • Two of five said they would accept a lower-paying job that had more flexibility with regard to device choice, social media access, and mobility than a higher-paying job with less flexibility.
  • Regarding security-related issues in the workplace, seven of ten employees admitted to knowingly breaking IT policies on a regular basis, and three of five believe they are not responsible for protecting corporate information and devices.

     

When looking into the detailed answers of End Users from the US, your current employees, some things definitely pop out.

  • Nearly Two-Thirds of End Users believe ‘Company-Issued Devices Should Be Available for Both Work and Play.’
  • When asked, US End Users were split evenly on whether their company should give the same equipment to everyone, or they should be given a budget to buy their own equipment, or they should have company supplied equipment but be able to use their own devices at work.
  • Over half thought they should be able to access their corporate network from their home computer and nearly as many thought they should be able to from personal mobile devices. A third thought they should be able to access the corporate network from any computer anywhere.
  • In an answer to that expectation, over half the End Users could access their corporate network remotely, but not always from all locations.
  • In deference to their international colleagues, nearly two-thirds US End Users would take a higher salary over the ability to work remotely.
  • About a third of US End Users report their company restricts access to Online games and Social Networking sites. Of those restricted, a third thinks it would be nice for work/life balance issues if these sites were available. While nearly as many think that they and their co-workers would waste a huge amount of time if the sites were available.
  • 40% believe that their company IT policies need slight improvement or updating. Even though, over half believe the company policies are fair.
  • Only 34% always follow their company IT policies while another 53% say they follow those policies most of the time.
  • 64% of those that break the company policies believe that they are doing nothing wrong.

 

Most of the US End Users responding to the survey were between the ages of 25 and 29. Half of the End Users worked for companies with more than 750 people. A third of the respondents worked for companies with less than 100 people.

 

So what can be drawn from this study? From the employee’s point of view, remote access is desirable and may lead to better productivity. There is no real consensus on who should supply end user equipment, but employers should be looking at or developing policies on Bring-Your-Own-Device (BYOD) questions. But for most employees in the US, pay is more important than remote access and flexibility.

 

Employers should recognize that they need to define policies. Those policies can be restrictive if fair. Once policies are defined, they need to be updated on a regular basis.

 

There were a lot of other issues questioned in this study, but I believe these are the key points for the small business owner that is looking ahead:

  • Be aware that younger users expect more in IT connectivity.
  • They will basically follow the rules if the rules seem logical. Otherwise, they will find a way around them.
  • Times have changed. If you aren’t already doing it, you should look at restricting Internet access during your work day. Tomorrow may be too late because expectation of access is already there.
  • Make sure your employees understand their responsibility for the security of the company’s data and equipment.

 

Why I joined the MDA lockup

I’m not really one to push donations for charities, for that matter I don’t like doing collections! But when I received the call from MDA to join their Lockup fund raiser to support MDA Summer Camp, I decided that this was one time I could reach out to ask others to donate their hard earned money.

MDA Summer Camp holds a special place in my wife’s and my heart. For those of you that don’t know, I had three brother-in-laws with Muscular Dystrophy. I never knew them not to be quadriplegics resigned to live life in a wheelchair. The” boys” would come back a haunt me if I made this into a “feel sorry for them” piece. So let me just say that high point of every year for them was the MDA summer camp.

Jeff and Kevin Brinkman

MDA Summer Camp gives both the families and those stricken with the disease a chance to have a “normal” life for a week each year. The campers get to have a week away from their families and to have as normal a camp experience as they are able. Think about what it takes to take a person in a 500 pound wheelchair out on a boat to go fishing. Then have to do everything for that person because they don’t have the ability to do it themselves. That is what MDA does for the campers. The aides that work MDA camp are really dedicated to their charges. Two aides once flew to Florida on their own dime to drive one of my brother-in-laws (one was in the hospital at the time and the other had died) from Tampa Florida back to Chicago for “Adult” camp (most those stricken with the disease never live to adulthood). Back then, Chicago was the only location in the country that ran an Adult camp, now there are none.

For the families, they get a week where they do not have to plan their lives around doing for someone that can’t do for themselves. This gives them a chance to live like you and I do on a daily basis for just a short time.

I need your help to reach my bail! The MDA Lock-Up takes place on 09/26/2012, but I’m raising my bail before I go to jail! All you have to do is click here to make a secure, online donation today. Your support will help families living in our community with muscle disease, and help guarantee that I get out of jail. I will be sure to add you to my list of contributors.

Please support me in this important goal by visiting my fundraising page and making a contribution. Your tax-deductible donation makes a difference to the hundreds of kids, adults and their families who live right here in our local community.

Thanks in advance for your help.