How to capture crash dump for Desktop Bridge Converted or UWP app

Here is the guide on how to capture crash dump for UWP and Desktop Bridge Converted Apps: 1. Install Windows SDK which includes Windows Debugger (by clicking Install SDK) https://developer.microsoft.com/en-us/windows/downloads/sdk-archive     2. Only select Debugging Tools for Windows to finish install.   3. Open Powershell Command, run this command to get your application ID:…

0

IIS 8.5 binds to all IP addresses on a server

  If you have multiple IPs in one windows server 2008 and above, when you add a website in IIS, you might found that 0.0.0.0 is listening on 80 or 443, rather than the IP address you just added. In this article, I will talk about the root cause and workarounds for this kind of…

0

“Transfer-encoding: chunked” is not in the response header when using ARR

  One of my customer is using ARR (Application Request Routing) in IIS8.5 as a reverse proxy to route the incoming requests to an application which does its own chunked transfer encoding. However, they find the “transfer-encoding: chunked” is not in the response header when using ARR, which causes the failure of the application connection….

0

How to send a email to the subscription’s admin in Logic Apps

  Logic Apps provide a way to simplify and implement scalable integrations and workflows in the cloud. Using Logic Apps and Azure Service Management REST API (https://msdn.microsoft.com/en-us/library/azure/ee460799.aspx), you can create an application to manage your service’s resources programmatically. In this article, we will demonstrate how to get the email address of Azure subscription and send…

0

How IIS interferes in Group policy “Log on as a service”

  Since windows server 2008, there exists a Group policy called Log on as a service, it’s located in Group policy\Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment. As introduced in the Microsoft official document https://technet.microsoft.com/en-us/library/dn221981(v=ws.11).aspx , it’s used to determine which service accounts can register a process as a service. By checking into this group…

0

How to keep escape characters of slash ‘/’ in URL when using IIS ARR

  Recently I encountered an issue that customer would like to keep Escape Characters (in this case, it’s slash ‘/’, which is encoded to ‘%2F’) in URL, when using IIS ARR to forward the request to backend server. For example, if the Browser send a request containing /a%2Fb to IIS, then ARR would forward the…

0

Take Action: Convert your Windows Desktop App and bring it to Windows 10 Store

  Microsoft released the Desktop App Converter (DAC) several months ago, which enables you to bring your existing desktop apps written for .NET 4.6.1 or Win32 to the Universal Windows Platform (UWP). And DAC is also available in Windows Store now. The tool makes the conversion process quite easy and help you determine what minor…

0

IE11 Migration Guide: Understanding Browser Mode, Document Mode, User-Agent and X-UA-Compatible

  Browser Mode determines the User-Agent that Internet Explorer sends to servers and the document mode Internet Explorer defaults to. This article is going to explain the relationship between them in detail. Browser Mode Internet Explorer sends different User-Agent strings in different browser modes. Internet Explorer 8, 9 and 10 have two kinds of browser…

1

Single sign-on feature not working with Microsoft Edge on Window 10

  After upgrading to Windows 10, you may find SSO feature doesn’t work with Microsoft Edge in your corporate network. Solution: Step.1 Adding Microsoft Edge support for ADFS 1. Identify you Edge version in User-Agent string. Press F12 to launch dev tool in Edge. Find the User-Agent string in HTTP Request send by Edge: 2….

0

Checklist for multi hop delegation in ASP.NET and WCF using wsHttpBinding.

  If you need to access resources by using the authenticated caller’s identity or by using a specific Windows identity other than the process identity, you can configure your ASP.NET application to use impersonation. Moreover, delegation allows you to use an impersonation token to access multiple network resources, such as the following scenario: We have…

0