Re: Print *accounting*

2010-05-04 Thread Kevin W

http://www.papercut.com/

On 5/3/2010 11:48 AM, John Aldrich wrote:

In light of a similar thread going on here, I thought I'd post a related
question. Can anyone suggest any software to help with network print
accounting? We currently print primarily through our Win2k3 print server (at
least for our MFP devices) and I'd like to help spread the pain of the
maintenance fees over the various departments who use the MFP devices by
keeping track of who prints how much.



John-AldrichTile-Tools




~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Alternatives to Exchange

2010-05-04 Thread Alex Eckelberry
I would take a hard look at the Kerio product.

 

-Original Message-
From: Brian Desmond [mailto:br...@briandesmond.com] 
Sent: Tuesday, May 04, 2010 1:50 AM
To: NT System Admin Issues
Subject: RE: Alternatives to Exchange

I've been to a number of customers that have significantly sized Zimbra 
deployments and they seem to all be pretty happy. My one observation is that 
the company seems to change hands quite a bit which would bother me as a 
manager if I were making this decision.

What's the impetus for moving in-house? Have you looked at something like BPOS 
or Google Apps which offers the calendaring integration? 

Thanks,
Brian Desmond
br...@briandesmond.com

c   - 312.731.3132


-Original Message-
From: Kurt Buff [mailto:kurt.b...@gmail.com]
Sent: Monday, May 03, 2010 11:50 PM
To: NT System Admin Issues
Subject: Re: Alternatives to Exchange

I know that a major medical research facility in Seattle just started 
implementing Zimbra - my wife works there. She's liking it for the integration 
of calendars and tasks with email, though she misses the ability in Thunderbird 
to make up templates for standard emails.

OTOH, this is a very new implementation, and they're having a brown bag 
presentation this week to explain more about how to use it, so she might well 
find out that templates can be set up.

Kurt

On Mon, May 3, 2010 at 21:11, Angus Scott-Fleming angu...@geoapps.com wrote:
 All

 Have a client who's looking to move from hosted-POP3 to an in-house 
 groupware server with calendaring and email, and I'm looking for 
 alternatives to Exchange primarily because of cost.  I've heard Good 
 Things about both Kerio Mail Server (now Kerio Connect) and mDaemon 
 from Alt-N.  I know at least one list member is running on Kerio because the 
 Kerio Connect string is in his mail headers.
 Does anyone here have any experience with either of these two mail servers?
 How about Zimbra?

 --
 Angus Scott-Fleming
 GeoApps, Tucson, Arizona
 1-520-290-5038
 Security Blog: http://geoapps.com/





 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
 http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~



Re: Print *accounting*

2010-05-04 Thread Chris Hamby
We have one customer that uses PCounter.

http://www.andtechnologies.com/

I dont know much else about it, but it seems to work pretty good.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Symantec Acquires PGP

2010-05-04 Thread David W. McSpadden
+1

-Original Message-
From: Angus Scott-Fleming [mailto:angu...@geoapps.com] 
Sent: Tuesday, May 04, 2010 12:12 AM
To: NT System Admin Issues
Subject: Re: Symantec Acquires PGP

On 3 May 2010 at 9:23, David W. McSpadden  wrote:

 Pretty Good Protection
 
 To
 
 Probably Great POS

I think you meant Phormerly Great ... ;-)

--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
Security Blog: http://geoapps.com/





~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~




~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Exchange server recommentations

2010-05-04 Thread Ziots, Edward
Michael, 

 

I just wanted to say “excellent” article in this months issue of Windows IT pro 
magazine. I am going to send that to my Exchange Admin and review it again 
before we do our Win2k8R2/Exchange 2010 Migration in a few months. 

 

Kudos, 

Z

 

Edward Ziots

CISSP,MCSA,MCP+I,Security +,Network +,CCA

Network Engineer

Lifespan Organization

401-639-3505

ezi...@lifespan.org

 

From: Michael B. Smith [mailto:mich...@smithcons.com] 
Sent: Monday, May 03, 2010 11:02 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

 

You can deploy Exchange 2010 a couple of different ways.

The traditional way, with RAID, assumes you will continue to execute regular 
backups. Since Exchange 2010’s I/O requirements is 90% LESS THAN that of 
Exchange 2003, it’s arguable whether you need to separate log and database 
files. For disk recommendations, download the mailbox calculator (you can find 
links at msexchangeteam.com).

The non-traditional way assumes that you replicate your data to a backup server 
and then to a lagged backup server. So you have just as many COPIES of the 
data, just in different formats that enhance recoverability.

You can easily put 900 users on a single server with all roles; especially if 
concurrency is very low.

Regards,

 

Michael B. Smith

Consultant and Exchange MVP

http://TheEssentialExchange.com

 

From: Tom Miller [mailto:tmil...@hnncsb.org] 
Sent: Monday, May 03, 2010 10:56 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

 

Sorry, I knew I forgot something:

 

currently t1 to each location from HQ.  Will be increased 3x once we move to 
Metro Ethernet.

 

Total mailboxes:  900, 20% have little if any activity

 

Also, does MS still recommend separate RAID configurations for the logs files 
and database files (at least for HQ servers)?

 

Tom

 Michael B. Smith mich...@smithcons.com 5/3/2010 10:49 AM 

What’s the total number of mailboxes and what kind of connectivity is available 
to the field sites?

Regards,

 

Michael B. Smith

Consultant and Exchange MVP

http://TheEssentialExchange.com

 

From: Tom Miller [mailto:tmil...@hnncsb.org] 
Sent: Monday, May 03, 2010 10:44 AM
To: NT System Admin Issues
Subject: Exchange server recommentations

 

Hi Folks,

 

I currently run a non-Exchange shop.  There is talk of moving to Exchange.  
Fine by me, whatever works...  It's been a while since I worked with Exchange 
last (Exchange 2000).

 

Anyone care to provide some general hardware recommendations for the following:

 

field sites, 10-40 staff per location.

HQ site, about 600 staff.  I currently split the staff accounts onto two 
servers.

 

Currently each field site has it's own server, but I might go with XenApp for 
Outlook, then I wouldn't have to purchase new hardware, since those servers are 
mostly 32-bit.

 

Our current mail system hardly uses any memory but I'm sure Exchange would use 
more.

 

Tom

 

Confidentiality Notice: This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message. 

 

 

 

 

 

Confidentiality Notice: This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message. 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Print Server suggestions (thanks)

2010-05-04 Thread Kennedy, Jim

I can't begin to thank everyone enough for this discussion. You have clearly 
pointed me in the right direction and saved me a ton of research time.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~



Re: Print *accounting*

2010-05-04 Thread Jonathan Link
We used pcounter, but moved away from print accounting.  We're an accounting
firm and made the decision that it was more efficient for us to allocate all
printing to overhead, and indirectly bill it through our rates than it was
to allocate directly to the client.

On Tue, May 4, 2010 at 7:05 AM, Chris Hamby tellys...@gmail.com wrote:

 We have one customer that uses PCounter.

 http://www.andtechnologies.com/

 I dont know much else about it, but it seems to work pretty good.







~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Yahoo / IM Virus New??

2010-05-04 Thread Garcia-Moran, Carlos
Hey all;

 

So of my users are reporting getting a link to a PHP page in the Yahoo
Chats from Known contacts, once clicked (of course they did) it scans
through their IM contacts and sends the exact link to all of them. Just
a heads up, don't know if it's new or not but 1st time I've seen it.

 

 

In case anyone gets it, ours is like this foto http bflmages com /
images php add dot's and stuff of course

 

Cheers!

 

Carlos Garcia-Moran


_
This e-mail, including attachments, contains information that is
confidential and may be protected by attorney/client or other privileges.
This e-mail, including attachments, constitutes non-public information
intended to be conveyed only to the designated recipient(s). If you are not
an intended recipient, you are hereby notified that any unauthorized use,
dissemination, distribution or reproduction of this e-mail, including
attachments, is strictly prohibited and may be unlawful. If you have
received this e-mail in error, please notify me by e-mail reply and delete
the original message and any attachments from your system.
_

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Alternatives to Exchange

2010-05-04 Thread N Parr
We've been using Mdaemon for 10+ years now.  Although for the past 4 or
so only as a secondary spam/virus gateway in front of Exchange.  They
have some pretty impressive features now like BB syncing, etc.  Haven't
paid much attention to the details since we aren't using it as anything
but a gateway. 

-Original Message-
From: Angus Scott-Fleming [mailto:angu...@geoapps.com] 
Sent: Monday, May 03, 2010 11:12 PM
To: NT System Admin Issues
Subject: Alternatives to Exchange

All

Have a client who's looking to move from hosted-POP3 to an in-house
groupware server with calendaring and email, and I'm looking for
alternatives to Exchange primarily because of cost.  I've heard Good
Things about both Kerio Mail Server (now Kerio Connect) and mDaemon from
Alt-N.  I know at least one list member is running on Kerio because the
Kerio Connect string is in his mail headers.  
Does anyone here have any experience with either of these two mail
servers?  
How about Zimbra?

--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
Security Blog: http://geoapps.com/





~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~



Recycler Files

2010-05-04 Thread Cameron Cooper
Is there a way to view the contents within a Recycler file in XP?

 

_

Cameron Cooper

Network Administrator | CompTIA A+ Certified

Aurico Reports, Inc

Phone: 847-890-4021 | Fax: 847-255-1896

ccoo...@aurico.com mailto:ccoo...@aurico.com  | www.aurico.com

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Yahoo / IM Virus New??

2010-05-04 Thread Garcia-Moran, Carlos
Woot! NOD32 5080 and above is blocking the Worm :0 , We are Saved, Well
until someone else clicks on another one 

 

From: Angus Scott-Fleming [mailto:angu...@geoapps.com] 
Sent: Tuesday, May 04, 2010 9:42 AM
To: NT System Admin Issues
Subject: Re: Yahoo / IM Virus New??

 

 So of my users are reporting getting a link to a PHP page in the
Yahoo

 Chats from Known contacts, once clicked (of course they did) it scans

 through their IM contacts and sends the exact link to all of them.
Just a

 heads up, don't know if it's new or not but 1st time I've seen it. In
case

 anyone gets it, ours is like this foto http bflmages com / images
php add

 dot's and stuff of course 

 

In the news right now:

 

  Yahoo! Messenger Users Infected By New Worm, Form An IRC Botnet |
CyberInsecure.com

 
http://cyberinsecure.com/yahoo-messenger-users-infected-by-new-worm-form
-an-irc-botnet/

 

A new worm is quickly spreading on Yahoo! Messenger (YM) via Web links
to fake images. Users who fall victim to this threat have an IRC botnet
client installed on their computers.

 

According to security researchers from Vietnam-based antivirus vendor
Bkis, who analyzed the new worm, it spreads though YM spam. The malware
sends out malicious links of the form
http://[rogue_domain_name]/image.php to the entire contact list of any
user logged into YM on an infected computer.

 

 

 

--

Angus Scott-Fleming

GeoApps, Tucson, Arizona

1-520-895-3270

Security Blog: http://geoapps.com/

 

  

 

 

_
This e-mail, including attachments, contains information that is
confidential and may be protected by attorney/client or other privileges.
This e-mail, including attachments, constitutes non-public information
intended to be conveyed only to the designated recipient(s). If you are not
an intended recipient, you are hereby notified that any unauthorized use,
dissemination, distribution or reproduction of this e-mail, including
attachments, is strictly prohibited and may be unlawful. If you have
received this e-mail in error, please notify me by e-mail reply and delete
the original message and any attachments from your system.
_

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Problem with RAID 5 Array

2010-05-04 Thread John Hornbuckle
I've got a Dell PowerVault RAID 5 enclosure that had a hard drive conk out over 
the weekend.

No biggie, I figured-there are multiple hotspares available. The system grabbed 
one and rebuilt the array, but fussed that there was a consistency problem. I 
ran a second, manual consistency check on Monday, though, and it came up clean. 
Peachy.

But Monday night, my backup of the PV failed; Symantec reported that four files 
were inaccessible. Today I tried to access those four files, and sure enough I 
can't do anything with them. Can't delete them. Can't copy them. Can't rename 
them. Nothing. I get Error 0x80070079: The semaphore timeout period has 
expired.

I ran chkdsk in read-only mode, and got this:

The type of the file system is NTFS.
Volume label is PowerVault.

WARNING! F parameter not specified.
Running CHKDSK in read-only mode.

CHKDSK is verifying files (stage 1 of 3)...
File record segment 575200 is corrupt.0 file records processed)
2953600 file records processed.
File verification completed.
832 large file records processed.

Errors found. CHKDSK cannot continue in read-only mode.

So, what gives? The array reports everything is fine. But obviously, something 
is funky. I can restore the four corrupt files from a backup-that's no problem. 
But not if I can't first delete the bad versions.



John Hornbuckle
MIS Department
Taylor County School District
www.taylor.k12.fl.us





NOTICE: Florida has a broad public records law. Most written communications to 
or from this entity are public records that will be disclosed to the public and 
the media upon request. E-mail communications may be subject to public 
disclosure.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Yahoo / IM Virus New??

2010-05-04 Thread John Aldrich
Hopefully Vipre blocks it as well. J

 

John-AldrichTile-Tools

 

From: Garcia-Moran, Carlos [mailto:cgarciamo...@spragueenergy.com] 
Sent: Tuesday, May 04, 2010 10:14 AM
To: NT System Admin Issues
Subject: RE: Yahoo / IM Virus New??

 

Woot! NOD32 5080 and above is blocking the Worm :0 , We are Saved, Well
until someone else clicks on another one 

 

From: Angus Scott-Fleming [mailto:angu...@geoapps.com] 
Sent: Tuesday, May 04, 2010 9:42 AM
To: NT System Admin Issues
Subject: Re: Yahoo / IM Virus New??

 

 So of my users are reporting getting a link to a PHP page in the Yahoo

 Chats from Known contacts, once clicked (of course they did) it scans

 through their IM contacts and sends the exact link to all of them. Just a

 heads up, don't know if it's new or not but 1st time I've seen it. In case

 anyone gets it, ours is like this foto http bflmages com / images php
add

 dot's and stuff of course 

 

In the news right now:

 

  Yahoo! Messenger Users Infected By New Worm, Form An IRC Botnet |
CyberInsecure.com

 
http://cyberinsecure.com/yahoo-messenger-users-infected-by-new-worm-form-an-
irc-botnet/

 

A new worm is quickly spreading on Yahoo! Messenger (YM) via Web links to
fake images. Users who fall victim to this threat have an IRC botnet client
installed on their computers.

 

According to security researchers from Vietnam-based antivirus vendor Bkis,
who analyzed the new worm, it spreads though YM spam. The malware sends out
malicious links of the form http://[rogue_domain_name]/image.php to the
entire contact list of any user logged into YM on an infected computer.

 

 

 

--

Angus Scott-Fleming

GeoApps, Tucson, Arizona

1-520-895-3270

Security Blog: http://geoapps.com/

 

  

 

 

_
This e-mail, including attachments, contains information that is
confidential and may be protected by attorney/client or other privileges.
This e-mail, including attachments, constitutes non-public information
intended to be conveyed only to the designated recipient(s). If you are not
an intended recipient, you are hereby notified that any unauthorized use,
dissemination, distribution or reproduction of this e-mail, including
attachments, is strictly prohibited and may be unlawful. If you have
received this e-mail in error, please notify me by e-mail reply and delete
the original message and any attachments from your system.
_

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

RE: Exchange server recommentations

2010-05-04 Thread Michael B. Smith
Thanks!
Regards,

Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com

From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Tuesday, May 04, 2010 8:17 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

Michael,

I just wanted to say “excellent” article in this months issue of Windows IT pro 
magazine. I am going to send that to my Exchange Admin and review it again 
before we do our Win2k8R2/Exchange 2010 Migration in a few months.

Kudos,
Z

Edward Ziots
CISSP,MCSA,MCP+I,Security +,Network +,CCA
Network Engineer
Lifespan Organization
401-639-3505
ezi...@lifespan.orgmailto:ezi...@lifespan.org

From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Monday, May 03, 2010 11:02 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

You can deploy Exchange 2010 a couple of different ways.
The traditional way, with RAID, assumes you will continue to execute regular 
backups. Since Exchange 2010’s I/O requirements is 90% LESS THAN that of 
Exchange 2003, it’s arguable whether you need to separate log and database 
files. For disk recommendations, download the mailbox calculator (you can find 
links at msexchangeteam.com).
The non-traditional way assumes that you replicate your data to a backup server 
and then to a lagged backup server. So you have just as many COPIES of the 
data, just in different formats that enhance recoverability.
You can easily put 900 users on a single server with all roles; especially if 
concurrency is very low.
Regards,

Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com

From: Tom Miller [mailto:tmil...@hnncsb.org]
Sent: Monday, May 03, 2010 10:56 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

Sorry, I knew I forgot something:

currently t1 to each location from HQ.  Will be increased 3x once we move to 
Metro Ethernet.

Total mailboxes:  900, 20% have little if any activity

Also, does MS still recommend separate RAID configurations for the logs files 
and database files (at least for HQ servers)?

Tom

 Michael B. Smith mich...@smithcons.commailto:mich...@smithcons.com 
 5/3/2010 10:49 AM 
What’s the total number of mailboxes and what kind of connectivity is available 
to the field sites?
Regards,

Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com

From: Tom Miller [mailto:tmil...@hnncsb.org]
Sent: Monday, May 03, 2010 10:44 AM
To: NT System Admin Issues
Subject: Exchange server recommentations

Hi Folks,

I currently run a non-Exchange shop.  There is talk of moving to Exchange.  
Fine by me, whatever works...  It's been a while since I worked with Exchange 
last (Exchange 2000).

Anyone care to provide some general hardware recommendations for the following:

field sites, 10-40 staff per location.
HQ site, about 600 staff.  I currently split the staff accounts onto two 
servers.

Currently each field site has it's own server, but I might go with XenApp for 
Outlook, then I wouldn't have to purchase new hardware, since those servers are 
mostly 32-bit.

Our current mail system hardly uses any memory but I'm sure Exchange would use 
more.

Tom


Confidentiality Notice: This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message.










Confidentiality Notice: This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message.













~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Exchange server recommentations

2010-05-04 Thread Eldridge, Dave
Z when did that come out? I haven’t seen it yet.

 

From: Michael B. Smith [mailto:mich...@smithcons.com] 
Sent: Tuesday, May 04, 2010 8:43 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

 

Thanks!

Regards,

 

Michael B. Smith

Consultant and Exchange MVP

http://TheEssentialExchange.com

 

From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: Tuesday, May 04, 2010 8:17 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

 

Michael, 

 

I just wanted to say “excellent” article in this months issue of Windows IT pro 
magazine. I am going to send that to my Exchange Admin and review it again 
before we do our Win2k8R2/Exchange 2010 Migration in a few months. 

 

Kudos, 

Z

 

Edward Ziots

CISSP,MCSA,MCP+I,Security +,Network +,CCA

Network Engineer

Lifespan Organization

401-639-3505

ezi...@lifespan.org

 

From: Michael B. Smith [mailto:mich...@smithcons.com] 
Sent: Monday, May 03, 2010 11:02 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

 

You can deploy Exchange 2010 a couple of different ways.

The traditional way, with RAID, assumes you will continue to execute regular 
backups. Since Exchange 2010’s I/O requirements is 90% LESS THAN that of 
Exchange 2003, it’s arguable whether you need to separate log and database 
files. For disk recommendations, download the mailbox calculator (you can find 
links at msexchangeteam.com).

The non-traditional way assumes that you replicate your data to a backup server 
and then to a lagged backup server. So you have just as many COPIES of the 
data, just in different formats that enhance recoverability.

You can easily put 900 users on a single server with all roles; especially if 
concurrency is very low.

Regards,

 

Michael B. Smith

Consultant and Exchange MVP

http://TheEssentialExchange.com

 

From: Tom Miller [mailto:tmil...@hnncsb.org] 
Sent: Monday, May 03, 2010 10:56 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

 

Sorry, I knew I forgot something:

 

currently t1 to each location from HQ.  Will be increased 3x once we move to 
Metro Ethernet.

 

Total mailboxes:  900, 20% have little if any activity

 

Also, does MS still recommend separate RAID configurations for the logs files 
and database files (at least for HQ servers)?

 

Tom

 Michael B. Smith mich...@smithcons.com 5/3/2010 10:49 AM 

What’s the total number of mailboxes and what kind of connectivity is available 
to the field sites?

Regards,

 

Michael B. Smith

Consultant and Exchange MVP

http://TheEssentialExchange.com

 

From: Tom Miller [mailto:tmil...@hnncsb.org] 
Sent: Monday, May 03, 2010 10:44 AM
To: NT System Admin Issues
Subject: Exchange server recommentations

 

Hi Folks,

 

I currently run a non-Exchange shop.  There is talk of moving to Exchange.  
Fine by me, whatever works...  It's been a while since I worked with Exchange 
last (Exchange 2000).

 

Anyone care to provide some general hardware recommendations for the following:

 

field sites, 10-40 staff per location.

HQ site, about 600 staff.  I currently split the staff accounts onto two 
servers.

 

Currently each field site has it's own server, but I might go with XenApp for 
Outlook, then I wouldn't have to purchase new hardware, since those servers are 
mostly 32-bit.

 

Our current mail system hardly uses any memory but I'm sure Exchange would use 
more.

 

Tom

 

Confidentiality Notice: This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message. 

 

 

 

 

 

Confidentiality Notice: This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message. 

 

 

 

 

 

 

 

 



This message contains confidential information and is intended only for the 
intended recipient(s). If you are not the named recipient you should not read, 
distribute or copy this e-mail. Please notify the sender immediately via e-mail 
if you have received this e-mail by mistake; then, delete this e-mail from your 
system.
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Exchange server recommentations

2010-05-04 Thread Michael B. Smith
Shipped last Thursday. Should be in your mailbox yesterday/today. If you have 
an online subscription, it’s also available there.
Regards,

Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com

From: Eldridge, Dave [mailto:d...@parkviewmc.com]
Sent: Tuesday, May 04, 2010 10:54 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

Z when did that come out? I haven’t seen it yet.

From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Tuesday, May 04, 2010 8:43 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

Thanks!
Regards,

Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com

From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Tuesday, May 04, 2010 8:17 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

Michael,

I just wanted to say “excellent” article in this months issue of Windows IT pro 
magazine. I am going to send that to my Exchange Admin and review it again 
before we do our Win2k8R2/Exchange 2010 Migration in a few months.

Kudos,
Z

Edward Ziots
CISSP,MCSA,MCP+I,Security +,Network +,CCA
Network Engineer
Lifespan Organization
401-639-3505
ezi...@lifespan.orgmailto:ezi...@lifespan.org

From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Monday, May 03, 2010 11:02 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

You can deploy Exchange 2010 a couple of different ways.
The traditional way, with RAID, assumes you will continue to execute regular 
backups. Since Exchange 2010’s I/O requirements is 90% LESS THAN that of 
Exchange 2003, it’s arguable whether you need to separate log and database 
files. For disk recommendations, download the mailbox calculator (you can find 
links at msexchangeteam.com).
The non-traditional way assumes that you replicate your data to a backup server 
and then to a lagged backup server. So you have just as many COPIES of the 
data, just in different formats that enhance recoverability.
You can easily put 900 users on a single server with all roles; especially if 
concurrency is very low.
Regards,

Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com

From: Tom Miller [mailto:tmil...@hnncsb.org]
Sent: Monday, May 03, 2010 10:56 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

Sorry, I knew I forgot something:

currently t1 to each location from HQ.  Will be increased 3x once we move to 
Metro Ethernet.

Total mailboxes:  900, 20% have little if any activity

Also, does MS still recommend separate RAID configurations for the logs files 
and database files (at least for HQ servers)?

Tom

 Michael B. Smith mich...@smithcons.commailto:mich...@smithcons.com 
 5/3/2010 10:49 AM 
What’s the total number of mailboxes and what kind of connectivity is available 
to the field sites?
Regards,

Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com

From: Tom Miller [mailto:tmil...@hnncsb.org]
Sent: Monday, May 03, 2010 10:44 AM
To: NT System Admin Issues
Subject: Exchange server recommentations

Hi Folks,

I currently run a non-Exchange shop.  There is talk of moving to Exchange.  
Fine by me, whatever works...  It's been a while since I worked with Exchange 
last (Exchange 2000).

Anyone care to provide some general hardware recommendations for the following:

field sites, 10-40 staff per location.
HQ site, about 600 staff.  I currently split the staff accounts onto two 
servers.

Currently each field site has it's own server, but I might go with XenApp for 
Outlook, then I wouldn't have to purchase new hardware, since those servers are 
mostly 32-bit.

Our current mail system hardly uses any memory but I'm sure Exchange would use 
more.

Tom


Confidentiality Notice: This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message.










Confidentiality Notice: This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message.

















This e-mail contains the thoughts and opinions of the sender and does not 
represent official Parkview Medical Center policy.

This communication is intended only for the recipient(s) named above, may be 
confidential and/or legally privileged: and, must be treated as such in 
accordance with state and federal laws. If you are not the intended recipient, 
you are hereby notified that any use of this communication, or any of its 

Re: Alternatives to Exchange

2010-05-04 Thread Angus Scott-Fleming
On 4 May 2010 at 8:34, N Parr  wrote:

 We've been using Mdaemon for 10+ years now.  Although for the past 4 or
 so only as a secondary spam/virus gateway in front of Exchange.  They
 have some pretty impressive features now like BB syncing, etc.  Haven't
 paid much attention to the details since we aren't using it as anything
 but a gateway. 

How is their calendar functionality for non-Outlook calendars like Mozilla 
Sunbird?

--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
Security Blog: http://geoapps.com/





~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


Re: Problem with RAID 5 Array

2010-05-04 Thread Ben Scott
On Tue, May 4, 2010 at 10:26 AM, John Hornbuckle
john.hornbuc...@taylor.k12.fl.us wrote:
 So, what gives? The array reports everything is fine. But obviously,
 something is funky. I can restore the four corrupt files from a
 backup—that’s no problem. But not if I can’t first delete the bad versions.

  I'd call Dell tech support.  It's free and sometimes even helpful.

  Not knowing more, my guess would be that one of the other disks has
some bad blocks.

  Scenario: Most filesystems have a lot of files which are never or
rarely read.  Plus RAID 5 provides redundancy -- the controller may
normally read the primary set of on-disk blocks and ignore the
redundant blocks.  End result, you've got blocks allocated on disk,
but which are never read.  Then a disk fails.  Now the controller has
to read *every* block of *all* the other disks, in order to rebuild
the failed member.  Boom.  That's when you discoverer that one of the
other disks has had bad blocks for years.

  Unfortunately, the only way to recovery from this scenario is to
restore from good backups.

  For this reason, good controllers have a patrol read feature (or
background scrub, etc.), where they regularly read all blocks from
all disks, to discover bad blocks as soon as they happen.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~



Exchange/Outlook - Calendar Question

2010-05-04 Thread Chyka, Robert
Is there any way to have say 11 people in a department sync their
Outlook calendars to one Public Calendar they can all access?

 

Let me know if you need more details.

 

I appreciate the help!

 

Bob

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Exchange server recommentations

2010-05-04 Thread Ziots, Edward
Windows IT Pro May 2010 Magazine, Instadoc ID 104657. 

 

Actually in this months Magazine there is 3 articles focused on Exchange 2010, 
looking at different parts namely, design, Implementation/Migration. 

 

Z

 

Edward Ziots

CISSP,MCSA,MCP+I,Security +,Network +,CCA

Network Engineer

Lifespan Organization

401-639-3505

ezi...@lifespan.org

 

From: Eldridge, Dave [mailto:d...@parkviewmc.com] 
Sent: Tuesday, May 04, 2010 10:54 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

 

Z when did that come out? I haven’t seen it yet.

 

From: Michael B. Smith [mailto:mich...@smithcons.com] 
Sent: Tuesday, May 04, 2010 8:43 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

 

Thanks!

Regards,

 

Michael B. Smith

Consultant and Exchange MVP

http://TheEssentialExchange.com

 

From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: Tuesday, May 04, 2010 8:17 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

 

Michael, 

 

I just wanted to say “excellent” article in this months issue of Windows IT pro 
magazine. I am going to send that to my Exchange Admin and review it again 
before we do our Win2k8R2/Exchange 2010 Migration in a few months. 

 

Kudos, 

Z

 

Edward Ziots

CISSP,MCSA,MCP+I,Security +,Network +,CCA

Network Engineer

Lifespan Organization

401-639-3505

ezi...@lifespan.org

 

From: Michael B. Smith [mailto:mich...@smithcons.com] 
Sent: Monday, May 03, 2010 11:02 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

 

You can deploy Exchange 2010 a couple of different ways.

The traditional way, with RAID, assumes you will continue to execute regular 
backups. Since Exchange 2010’s I/O requirements is 90% LESS THAN that of 
Exchange 2003, it’s arguable whether you need to separate log and database 
files. For disk recommendations, download the mailbox calculator (you can find 
links at msexchangeteam.com).

The non-traditional way assumes that you replicate your data to a backup server 
and then to a lagged backup server. So you have just as many COPIES of the 
data, just in different formats that enhance recoverability.

You can easily put 900 users on a single server with all roles; especially if 
concurrency is very low.

Regards,

 

Michael B. Smith

Consultant and Exchange MVP

http://TheEssentialExchange.com

 

From: Tom Miller [mailto:tmil...@hnncsb.org] 
Sent: Monday, May 03, 2010 10:56 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations

 

Sorry, I knew I forgot something:

 

currently t1 to each location from HQ.  Will be increased 3x once we move to 
Metro Ethernet.

 

Total mailboxes:  900, 20% have little if any activity

 

Also, does MS still recommend separate RAID configurations for the logs files 
and database files (at least for HQ servers)?

 

Tom

 Michael B. Smith mich...@smithcons.com 5/3/2010 10:49 AM 

What’s the total number of mailboxes and what kind of connectivity is available 
to the field sites?

Regards,

 

Michael B. Smith

Consultant and Exchange MVP

http://TheEssentialExchange.com

 

From: Tom Miller [mailto:tmil...@hnncsb.org] 
Sent: Monday, May 03, 2010 10:44 AM
To: NT System Admin Issues
Subject: Exchange server recommentations

 

Hi Folks,

 

I currently run a non-Exchange shop.  There is talk of moving to Exchange.  
Fine by me, whatever works...  It's been a while since I worked with Exchange 
last (Exchange 2000).

 

Anyone care to provide some general hardware recommendations for the following:

 

field sites, 10-40 staff per location.

HQ site, about 600 staff.  I currently split the staff accounts onto two 
servers.

 

Currently each field site has it's own server, but I might go with XenApp for 
Outlook, then I wouldn't have to purchase new hardware, since those servers are 
mostly 32-bit.

 

Our current mail system hardly uses any memory but I'm sure Exchange would use 
more.

 

Tom

 

Confidentiality Notice: This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message. 

 

 

 

 

 

Confidentiality Notice: This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message. 

 

 

 

 

 

 

 

 

This e-mail contains the thoughts and opinions of the sender and does not 
represent official Parkview Medical Center policy.

This communication is intended only for the recipient(s) named above, may be 
confidential and/or 

RE: Exchange/Outlook - Calendar Question

2010-05-04 Thread Andy Shook
Not natively within Exchange, you'll have to go 3rd party.  I've only done this 
with Add2Exchange.

http://www.diditbetter.com/Add2Exchange.aspx

Shook

From: Chyka, Robert [mailto:bch...@medaille.edu]
Sent: Tuesday, May 04, 2010 11:14 AM
To: NT System Admin Issues
Subject: Exchange/Outlook - Calendar Question

Is there any way to have say 11 people in a department sync their Outlook 
calendars to one Public Calendar they can all access?

Let me know if you need more details.

I appreciate the help!

Bob






~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Exchange/Outlook - Calendar Question

2010-05-04 Thread Don Guyer
They could always setup an address attached to this public calendar and
send it an invite.

 

Don Guyer

Systems Engineer - Information Services

Prudential, Fox  Roach/Trident Group

431 W. Lancaster Avenue

Devon, PA 19333

Direct: (610) 993-3299

Fax: (610) 650-5306

don.gu...@prufoxroach.com mailto:don.gu...@prufoxroach.com 

 

From: Chyka, Robert [mailto:bch...@medaille.edu] 
Sent: Tuesday, May 04, 2010 11:14 AM
To: NT System Admin Issues
Subject: Exchange/Outlook - Calendar Question

 

Is there any way to have say 11 people in a department sync their
Outlook calendars to one Public Calendar they can all access?

 

Let me know if you need more details.

 

I appreciate the help!

 

Bob

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Exchange/Outlook - Calendar Question

2010-05-04 Thread Chyka, Robert
Thanks Shook.  I will definitely check it out.

 

-BC

 

From: Andy Shook [mailto:andy.sh...@peak10.com] 
Sent: Tuesday, May 04, 2010 11:19 AM
To: NT System Admin Issues
Subject: RE: Exchange/Outlook - Calendar Question

 

Not natively within Exchange, you'll have to go 3rd party.  I've only
done this with Add2Exchange. 

 

http://www.diditbetter.com/Add2Exchange.aspx 

 

Shook

 

From: Chyka, Robert [mailto:bch...@medaille.edu] 
Sent: Tuesday, May 04, 2010 11:14 AM
To: NT System Admin Issues
Subject: Exchange/Outlook - Calendar Question

 

Is there any way to have say 11 people in a department sync their
Outlook calendars to one Public Calendar they can all access?

 

Let me know if you need more details.

 

I appreciate the help!

 

Bob

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Problem with RAID 5 Array

2010-05-04 Thread John Hornbuckle
Yeah, I opened a case with Dell support before sending this message. Haven't 
been blown away. The technician is Googling the error--not exactly the kind of 
expertise I was expecting.



-Original Message-
From: Ben Scott [mailto:mailvor...@gmail.com] 
Sent: Tuesday, May 04, 2010 11:16 AM
To: NT System Admin Issues
Subject: Re: Problem with RAID 5 Array

On Tue, May 4, 2010 at 10:26 AM, John Hornbuckle 
john.hornbuc...@taylor.k12.fl.us wrote:
 So, what gives? The array reports everything is fine. But obviously, 
 something is funky. I can restore the four corrupt files from a 
 backup-that's no problem. But not if I can't first delete the bad versions.

  I'd call Dell tech support.  It's free and sometimes even helpful.

  Not knowing more, my guess would be that one of the other disks has some bad 
blocks.

  Scenario: Most filesystems have a lot of files which are never or rarely 
read.  Plus RAID 5 provides redundancy -- the controller may normally read the 
primary set of on-disk blocks and ignore the redundant blocks.  End result, 
you've got blocks allocated on disk, but which are never read.  Then a disk 
fails.  Now the controller has to read *every* block of *all* the other disks, 
in order to rebuild the failed member.  Boom.  That's when you discoverer that 
one of the other disks has had bad blocks for years.

  Unfortunately, the only way to recovery from this scenario is to restore from 
good backups.

  For this reason, good controllers have a patrol read feature (or 
background scrub, etc.), where they regularly read all blocks from all disks, 
to discover bad blocks as soon as they happen.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ 
http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~



NOTICE: Florida has a broad public records law. Most written communications to 
or from this entity are public records that will be disclosed to the public and 
the media upon request. E-mail communications may be subject to public 
disclosure.


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~



Re: Recycler Files

2010-05-04 Thread Angus Scott-Fleming
On 4 May 2010 at 8:49, Cameron Cooper  wrote:

 Is there a way to view the contents within a Recycler file in XP?

I have browsed the RECYCLER folders using Total Commander from 
http://www.ghisler.com/.  You have to set it to view Hidden/System Files 
which is in the Display option.

You will have cryptic file names within the recycled folders.  What are you 
trying to do?

Angus

--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
Security Blog: http://geoapps.com/





~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Hotel room router with wifi and gigabit E-net

2010-05-04 Thread tony patton
On the other list it would've been a different story :)

Regards

Tony Patton
Desktop Operations Cavan
Ext 8078
Direct Dial 049 435 2878
email: tony.pat...@quinn-insurance.com



From:
Don Guyer don.gu...@prufoxroach.com
To:
NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com
Date:
30/04/2010 19:34
Subject:
RE: Hotel room router with wifi and gigabit E-net



?My boss travels a lot and sometimes carries several toys with her.?
 
Dang, no one picked up on this yet?!
 
You guys (and gals) are slipping!
 
J
 
Don Guyer
Systems Engineer - Information Services
Prudential, Fox  Roach/Trident Group
431 W. Lancaster Avenue
Devon, PA 19333
Direct: (610) 993-3299
Fax: (610) 650-5306
don.gu...@prufoxroach.com
 
From: Jon B. Lewis [mailto:j...@myriadds.com] 
Sent: Wednesday, April 28, 2010 11:40 AM
To: NT System Admin Issues
Subject: RE: Hotel room router with wifi and gigabit E-net
 
You might try a home router flashed with DD-WRT or Tomato.  I know you can 
get one to do 1, 2, and 3.  I have no idea on 4 and you could do 5 with an 
adapter couldn?t you? 
 
From: Leif Wahlberg [mailto:lef...@gmail.com] 
Sent: Wednesday, April 28, 2010 8:49 AM
To: NT System Admin Issues
Subject: RE: Hotel room router with wifi and gigabit E-net
 
Hi Greg,
 
Yes, you are right. PPTP client is the only VPN that will work thru a 
hotel router in this case. Her computer can do that without problems, but 
she wants to share the VPN with her other toys, that?s why I am looking 
for a router with PPTP VPN client functionality.
 
She tried a Linksys Wi-Fi access thing that could let her use a hotel 
Wi-Fi in her room, but that is not the solution here. She wants to use the 
copper cable in the room and give access to her  IPhone and iPad and also 
let the iPad get to the corporate network via the VPN handled by the 
router/Wi-Fi thing.
 
Bulky is NOT a problem. The company pays for excess baggage.
 
And Yes, she wants FAST transfer between wired laptops in her room.
 
Sigh!!
 
Leif
 
From: greg.swe...@actsconsulting.net [
mailto:greg.swe...@actsconsulting.net] 
Sent: Wednesday, April 28, 2010 9:34 PM
To: NT System Admin Issues
Subject: RE: Hotel room router with wifi and gigabit E-net
 
Leif,
 
The VPN is the only real issue.  That?s mainly an issue with the type of 
network at the hotel.  Some require you to get a static IP and then call a 
helpdesk, others its never a problem, most require some type of 
authentication before getting out to the internet..  Also if you put in a 
commercial device its most likely going to pull a NATTED IP address from 
the hotel and then you boss will grab another Natted IP from your device, 
so you will be doing double natting.  This alone could cause you some VPN 
issue, especially IPSEC.
 
Best bet is to get a portable WIFI AP that?s not a router and will just 
give you wifi in the room if hardwire is the only thing available.
http://www.dlink.com/products/?pid=346  I use this in AP mode when I need 
to.  Most hotels I stay at have wifi in the rooms so its not a problem and 
rarely do I have VPN issues, never RDP issues.  Its not N wireless, but I 
am sure there are some out there.  However N is going to be quite bulky 
with all the antennas.  This doesn?t have a USB connection for storage.
 
As to Gigabit, there is no point as you wont benefit unless you are 
transferring data between devices hardline in your room.

Greg
 
From: Leif Wahlberg [mailto:lef...@gmail.com] 
Sent: Wednesday, April 28, 2010 9:22 AM
To: NT System Admin Issues
Subject: Hotel room router with wifi and gigabit E-net
 
My boss travels a lot and sometimes carries several toys with her. She has 
expressed a wish to have the following added to her travel kit:
 
Hotel room router with the following capabilities:
1.   Gigabit wired Ethernet
2.   Wi-Fi, preferably multi type, including N
3.   PPTP client capabilities.  (Important)
4.   USB storage connection
5.   110-220 V power supply
 
I don?t mind buying her a consumer type device as long as it fulfills her 
requirements.
 
Just an explanation for the PPTP client requirement. She wants the router 
to open a VPN to our corporate network and that connection should be 
available to all the toys she connects to this router. I can set up a 
filtered PPTP host in our firewall, so that is not a problem.
 
Any suggestions?
 
Leif Wahlberg
Admin by default
(Excessive sig deleted)
 
 



 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
This e-mail is intended only for the addressee named above. The contents should 
not be copied nor disclosed to any other person. Any views or opinions 
expressed are solely those of the sender and do not necessarily represent those 
of QUINN-Insurance Limited (Under Administration), unless otherwise
specifically stated . As internet communications are not secure,
QUINN-Insurance Limited (Under Administration) is not responsible for the 
contents of this message nor
responsible for any change made to this message after it was sent by the 
original 

RE: Yahoo / IM Virus New??

2010-05-04 Thread Ziots, Edward
http://www.darkreading.com/insiderthreat/security/attacks/showArticle.jhtml?articleID=224700541

More information on this latest IM threat. 

Here is the write-up accordingly: 

http://www.symantec.com/security_response/writeup.jsp?docid=2010-050209-1610-99tabid=2

Typical nastiest on the Trojan downloader, 

Would recommend that you block the domains listed in the article writeup and 
drop all traffic outbound to them on port 2345 TCP tagged as IRC traffic. 

It doesn’t look like these domains are fast-flux: 

Non-authoritative answer:
Name:e2doo.org
Address:  123.176.40.3

Non-authoritative answer:
Name:sls.e2doo.net
Address:  216.246.31.107

Country of Origin: USA
OrgName:Server Central Network 
OrgID:  SCN-18
Address:209 W. Jackson Blvd.
Address:Suite 700
City:   Chicago
StateProv:  IL
PostalCode: 60606
Country:US

ReferralServer: rwhois://rwhois.servercentral.net:4321

NetRange:   216.246.0.0 - 216.246.127.255 
CIDR:   216.246.0.0/17 
NetName:SCN-5
NetHandle:  NET-216-246-0-0-1
Parent: NET-216-0-0-0-0
NetType:Direct Allocation
NameServer: NS1.SCSERVERS.COM
NameServer: NS2.SCSERVERS.COM
Comment:
RegDate:2006-01-17
Updated:2006-09-11

RTechHandle: JL1890-ARIN
RTechName:   Server Central, Jordan 
RTechPhone:  +1-312-829-
RTechEmail:  supp...@servercentral.net 

OrgAbuseHandle: ABUSE1669-ARIN
OrgAbuseName:   Abuse Department 
OrgAbusePhone:  +1-312-829-
OrgAbuseEmail:  ab...@servercentral.net

OrgNOCHandle: NETWO1779-ARIN
OrgNOCName:   Network Operations 
OrgNOCPhone:  +1-312-829-
OrgNOCEmail:  supp...@servercentral.net

OrgTechHandle: NETWO1779-ARIN
OrgTechName:   Network Operations 
OrgTechPhone:  +1-312-829-
OrgTechEmail:  supp...@servercentral.net

# ARIN WHOIS database, last updated 2010-05-03 20:00
# Enter ? for additional hints on searching ARIN's WHOIS database.
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at https://www.arin.net/whois_tou.html

And India: for e2doo.org

person:   Technical Admin Beam Cable System
nic-hdl:  TB103-AP
e-mail:   te...@beamtele.com
address:  Beam Telecom Pvt Ltd
address:  8-2-610/A, Road No - 10 Banjara Hills, Hyderabad
country:  IN
phone:+914066272727
changed:  te...@beamtelecom.com 20091020
mnt-by:   MAINT-NEW
source:   APNIC


EZ

Edward Ziots
CISSP,MCSA,MCP+I,Security +,Network +,CCA
Network Engineer
Lifespan Organization
401-639-3505
ezi...@lifespan.org

From: John Aldrich [mailto:jaldr...@blueridgecarpet.com] 
Sent: Tuesday, May 04, 2010 10:31 AM
To: NT System Admin Issues
Subject: RE: Yahoo / IM Virus New??

Hopefully Vipre blocks it as well. ☺



From: Garcia-Moran, Carlos [mailto:cgarciamo...@spragueenergy.com] 
Sent: Tuesday, May 04, 2010 10:14 AM
To: NT System Admin Issues
Subject: RE: Yahoo / IM Virus New??

Woot! NOD32 5080 and above is blocking the Worm :0 , We are Saved, Well until 
someone else clicks on another one 

From: Angus Scott-Fleming [mailto:angu...@geoapps.com] 
Sent: Tuesday, May 04, 2010 9:42 AM
To: NT System Admin Issues
Subject: Re: Yahoo / IM Virus New??

 So of my users are reporting getting a link to a PHP page in the Yahoo
 Chats from Known contacts, once clicked (of course they did) it scans
 through their IM contacts and sends the exact link to all of them. Just a
 heads up, don’t know if it’s new or not but 1st time I’ve seen it. In case
 anyone gets it, ours is like this “foto http bflmages com / images php” add
 dot’s and stuff of course 

In the news right now:

  Yahoo! Messenger Users Infected By New Worm, Form An IRC Botnet | 
CyberInsecure.com
  
http://cyberinsecure.com/yahoo-messenger-users-infected-by-new-worm-form-an-irc-botnet/

A new worm is quickly spreading on Yahoo! Messenger (YM) via Web links to fake 
images. Users who fall victim to this threat have an IRC botnet client 
installed on their computers.

According to security researchers from Vietnam-based antivirus vendor Bkis, who 
analyzed the new worm, it spreads though YM spam. The malware sends out 
malicious links of the form http://[rogue_domain_name]/image.php to the entire 
contact list of any user logged into YM on an infected computer.



--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-895-3270
Security Blog: http://geoapps.com/

  
 
 
_
This e-mail, including attachments, contains information that is
confidential and may be protected by attorney/client or other privileges.
This e-mail, including attachments, constitutes non-public information
intended to be conveyed only to the designated recipient(s). If you are not
an intended recipient, you are hereby notified that any unauthorized use,
dissemination, distribution or reproduction of this e-mail, including
attachments, is strictly prohibited and may be unlawful. If you have
received this e-mail in error, please notify me by e-mail reply and delete
the original message and any 

Any certification on removing malware??

2010-05-04 Thread justino garcia
Any certification on removing malware?? How about using and configuring and
setup of antimalware software.

-- 
Justin
IT-TECH

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Any certification on removing malware??

2010-05-04 Thread Richard Stovall
I've know some folks who should receive certifications for GETTING
malware...

On Tue, May 4, 2010 at 11:40 AM, justino garcia jgarciaitl...@gmail.comwrote:

 Any certification on removing malware?? How about using and configuring and
 setup of antimalware software.

 --
 Justin
 IT-TECH







~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Internet / computer usage policies

2010-05-04 Thread John Aldrich
Anyone here got a good internet  computer usage policy they'd be willing to
share? I just checked our company policy document and it says *nothing*
about computers or internet usage. Nada, zero, zip about computers or
internet. 

 

John-AldrichTile-Tools

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

Re: Internet / computer usage policies

2010-05-04 Thread Andrew S. Baker
http://www.sans.org/security-resources/policies/
http://www.sans.org/security-resources/policies/
-ASB: http://XeeSM.com/AndrewBaker


On Tue, May 4, 2010 at 11:43 AM, John Aldrich
jaldr...@blueridgecarpet.comwrote:

  Anyone here got a good internet  computer usage policy they’d be willing
 to share? I just checked our company policy document and it says **nothing
 ** about computers or internet usage. Nada, zero, zip about computers or
 internet.



 [image: John-Aldrich][image: Tile-Tools]









~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image002.jpgimage001.jpg

Re: Any certification on removing malware??

2010-05-04 Thread justino garcia
lol
was that to mean as a joke, hahaha then I know some people personally who
should be awared.

On Tue, May 4, 2010 at 11:42 AM, Richard Stovall rich...@gmail.com wrote:

 I've know some folks who should receive certifications for GETTING
 malware...


 On Tue, May 4, 2010 at 11:40 AM, justino garcia 
 jgarciaitl...@gmail.comwrote:

 Any certification on removing malware?? How about using and configuring
 and setup of antimalware software.

 --
 Justin
 IT-TECH













-- 
Justin
IT-TECH

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Watchguard Firebox update today marking all email as a virus.

2010-05-04 Thread justino garcia
HI,  did you have a recent firmware update.
HI phill hope all get worked out soon.
gopp

On Mon, May 3, 2010 at 10:58 AM, Phillip Partipilo p...@psnet.com wrote:

 Is anybody else with a Firebox having all of your email getting
 quarantined?  This is a brilliant start to a week. After one of the most
 miserable Sunfests, entertainment wise (and subsequent recovery from said
 event)...


 Phillip Partipilo
 Parametric Solutions Inc.
 Jupiter, Florida
 (561) 747-6107



 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~




-- 
Justin
IT-TECH

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Encryption

2010-05-04 Thread Chris Blair
First off, we are running a Windows 2003 Native Active Directory. There are no 
plans, or funds to move up to 2008.

We have an upcoming project that will require a location on our file server 
that encrypts folders and documents stored there. This project could last only 
a year, or up to 5, all depends on its success. The files will be uploaded from 
Outside customers, either via VPN or SFTP.

I am looking at EFS, True Crypt or PGP.

Anyone have opinions on which to use and why?

Thanks!

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Alternatives to Exchange

2010-05-04 Thread justino garcia
mDaemon from Alt-N We use that, it great and know it partialy owned by RIM.
It web client world client, does the group ware, and you can buy per user,
the outlook connector. BUt outlook connector fails to work for inboxes
larger then 2 gigs.
I have setup BIS intergration (since now they are subisdary of rim), but it
does it job at push email, but fail to provide push contacts or cal even,
unless you use a synch ml client on all your smart phone(so only push email
via bb).

I would of hopped since RIM took over, it would offer BES for alt-n.
But we also use mDaemon from Alt-N, as a gateway /antivirus / antispam for
exchange.
I would like for mDaemon from Alt-N to offer more then one antispam and
antivirus defention eningee, if VIper email security could be attached to
it, it may help in the back end, but since our clients know have vipre at
the end point (on thier workstations), it good look.
I think mDaemon from Alt-N uses karspersky, and spamm assain, and the
security plugin is extra, and you pay per user.
It still nice and cheaper for most people then exchange (small bussiness).

But you can also get them exchange, for cheap if you setup a small bussiness
server.

On Tue, May 4, 2010 at 11:10 AM, Angus Scott-Fleming angu...@geoapps.comwrote:

 On 4 May 2010 at 8:34, N Parr  wrote:

  We've been using Mdaemon for 10+ years now.  Although for the past 4 or
  so only as a secondary spam/virus gateway in front of Exchange.  They
  have some pretty impressive features now like BB syncing, etc.  Haven't
  paid much attention to the details since we aren't using it as anything
  but a gateway.

 How is their calendar functionality for non-Outlook calendars like Mozilla
 Sunbird?

 --
 Angus Scott-Fleming
 GeoApps, Tucson, Arizona
 1-520-290-5038
 Security Blog: http://geoapps.com/





 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~




-- 
Justin
IT-TECH

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Alternatives to Exchange

2010-05-04 Thread Matthew W. Ross
We have been using Kerio for a few years here. We very much like the product.

Kerio's biggest boast is their excellent web client. Using any modern browser, 
you get full (or nearly full) outlook functionality. This means any user 
anywhere can access their mail, calendars, contact lists, task lists, etc, etc. 
This also means that our support of our users is easier: We support the web 
client. We offer access using Kerio's other interfaces (Outlook, Thunderbird, 
Apple iMail.app, etc) but we make sure that the web interface is working.

For those poor souls with no broadband or older non-supported browsers, the 
Kerio simplified client is excellent. It's very basic HTML, so it works with 
any browser (Opera on Wii? Sure. Internet Explorer 3? No problem.). This client 
has no calendar access, though... something they should implement.

Installation and upgrades of Kerio couldn't be easier. A truly pain-free 
process on both Windows and Linux.

Kerio has support for a lot of different clients, including blackberry, iPhone, 
and an Outlook Offline plugin. (See the forums on that one. I haven't tried it, 
but the forums do have users who have problems with it.) The documentation is 
well written, including information on how to setup each client to best use 
Kerio.

The biggest flaw in Kerio's previous versions was that it was a single-server 
solution. This would limit your installation's size to the limits of a single 
server. Happily, they have addressed this in Kerio Connect 7. I have not tested 
their clustering, so I cannot comment on it's performance or functionality.

I would recommend anyone who is looking for a mail suite to take a good look at 
Kerio.

Zimbra... I haven't had the chance to look at Zimbra, except for screenshots. 
Looking at its interface, it looks a little busy. But the price is right, 
especially for the open source version. If we were re-evaluating mail suites 
again, Zimbra would be right up there. And it might win in a price/performance 
competition. (Ever shrinking budgets makes cost one of our most important 
factors in any implementations nowadays.)


--Matt Ross
Ephrata School District


- Original Message -
From: Angus Scott-Fleming
[mailto:angu...@geoapps.com]
To: NT System Admin Issues
[mailto:ntsysad...@lyris.sunbelt-software.com]
Sent: Mon, 03 May 2010
21:11:53 -0700
Subject: Alternatives to Exchange


 All
 
 Have a client who's looking to move from hosted-POP3 to an in-house
 groupware 
 server with calendaring and email, and I'm looking for alternatives to
 Exchange 
 primarily because of cost.  I've heard Good Things about both Kerio Mail
 Server 
 (now Kerio Connect) and mDaemon from Alt-N.  I know at least one list member
 is 
 running on Kerio because the Kerio Connect string is in his mail headers. 
 
 Does anyone here have any experience with either of these two mail servers? 
 
 How about Zimbra?
 
 --
 Angus Scott-Fleming
 GeoApps, Tucson, Arizona
 1-520-290-5038
 Security Blog: http://geoapps.com/
 
 
 
 
 
 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~
 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~



Re: Recycler Files

2010-05-04 Thread Angus Scott-Fleming
On 4 May 2010 at 8:33, Angus Scott-Fleming  wrote:

 On 4 May 2010 at 8:49, Cameron Cooper  wrote:
 
  Is there a way to view the contents within a Recycler file in XP?
 
 I have browsed the RECYCLER folders using Total Commander from 
 http://www.ghisler.com/.  You have to set it to view Hidden/System Files
 which is in the Display option.
 
 You will have cryptic file names within the recycled folders.  What are you
 trying to do?

FWIW:

http://www.google.com/search?q=explore+recycle+bin

Also, looks interesting, NO PERSONAL EXPERIENCE with it:

Manage Windows Recycle Bin From Context Menu with BinManager - KezNews.com

http://keznews.com/6604_Manage_Windows_Recycle_Bin_From_Context_Menu_with_BinManager

HTH

Angus

--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
Security Blog: http://geoapps.com/





~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Encryption

2010-05-04 Thread Ziots, Edward
I think based on the flexibility of encryption Options and some of the
items, you might want to look at the PGP Universal Suite of Products. I
just hope that Symantec doesn't screw it up. 

 

Z

 

Edward Ziots

CISSP,MCSA,MCP+I,Security +,Network +,CCA

Network Engineer

Lifespan Organization

401-639-3505

ezi...@lifespan.org

 

From: Chris Blair [mailto:chris_bl...@identisys.com] 
Sent: Tuesday, May 04, 2010 12:06 PM
To: NT System Admin Issues
Subject: Encryption

 

First off, we are running a Windows 2003 Native Active Directory. There
are no plans, or funds to move up to 2008. 

 

We have an upcoming project that will require a location on our file
server that encrypts folders and documents stored there. This project
could last only a year, or up to 5, all depends on its success. The
files will be uploaded from Outside customers, either via VPN or SFTP. 

 

I am looking at EFS, True Crypt or PGP.

 

Anyone have opinions on which to use and why?

 

Thanks!

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Internet Policies

2010-05-04 Thread John Aldrich
What restrictions, if any, do your organizations place on things like IM or
social networking sites? I sent out a warning to the office personnel this
morning regarding the new IM Virus and got an email back from the CEO
basically stating shouldn't that be a violation of company policy anyway?
and I had to tell him, I knew of no policies regarding that; and that in
fact, my former supervisor was fully aware of at least one person (who's
child is overseas in the military) who used IM on a semi-regular basis.

For this reason, I'm working on coming up with a company policy. I've looked
at the sample template from SANS as well as another one that someone sent me
off-list. I'm planning on incorporating the best of everything I get, so if
anyone has any suggested language regarding IM or social networking, please
let me have it. J

 

John-AldrichTile-Tools

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

Re: Internet Policies

2010-05-04 Thread Steve Ens
It all depends if there is a business or productivity reason for it.  We use
IM in some of the departments for meetings, quick conversations, etc.  But
if it is used for wasting time, I would not allow it.

On Tue, May 4, 2010 at 11:38 AM, John Aldrich
jaldr...@blueridgecarpet.comwrote:

  What restrictions, if any, do your organizations place on things like IM
 or social networking sites? I sent out a warning to the office personnel
 this morning regarding the new “IM Virus” and got an email back from the CEO
 basically stating “shouldn’t that be a violation of company policy anyway?”
 and I had to tell him, I knew of no policies regarding that; and that in
 fact, my former supervisor was fully aware of at least one person (who’s
 child is overseas in the military) who used IM on a semi-regular basis.

 For this reason, I’m working on coming up with a company policy. I’ve
 looked at the sample template from SANS as well as another one that someone
 sent me off-list. I’m planning on incorporating the best of everything I
 get, so if anyone has any suggested language regarding IM or social
 networking, please let me have it. J



 [image: John-Aldrich][image: Tile-Tools]









~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image002.jpgimage001.jpg

Re: Encryption

2010-05-04 Thread Andrew S. Baker
Given budget and flexibility, I would say that TrueCrypt will give you some
of the best options, especially since you'll have external parties adding
files to the server.

TrueCrypt is easy to setup, and has many options for configuration, and
won't require a whole lot in the way of key management, or client
installations.  Rather than encrypt by file or folder, create an encrypted
file-based volume and store the items there that need to be encrypted.

PGP is good, but expensive, and I'd wait to see what Symantec was doing with
them before investing in that direction.

EFS is already paid for, and can be managed by group policy, but with
external parties being involved, it will take more work to configure
properly.

-ASB: http://XeeSM.com/AndrewBaker


On Tue, May 4, 2010 at 12:05 PM, Chris Blair chris_bl...@identisys.comwrote:

  First off, we are running a Windows 2003 Native Active Directory. There
 are no plans, or funds to move up to 2008.



 We have an upcoming project that will require a location on our file server
 that encrypts folders and documents stored there. This project could last
 only a year, or up to 5, all depends on its success. The files will be
 uploaded from Outside customers, either via VPN or SFTP.



 I am looking at EFS, True Crypt or PGP.



 Anyone have opinions on which to use and why?



 Thanks!




~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Internet Policies

2010-05-04 Thread Ziots, Edward
If the CEO is willing to sign off on a policy banning the use of social
networking and IM then, there should be controls in place to enforce the
policy, a policy without the associated controls and punishments (
Administrative, enacted by Management/HR) then the policy isn't worth
the paper its written on. 

 

There should be a section for exception, due to the things that you just
specified, but the exception have to be approved in writing by the CEO
or CIO accordingly. ( I know marketing departments are using face book,
twitter, Myspace and emerging social networking sites to get the brand
name out or to communicate with new customer bases, along with those
one-offs that a member of the military is using IM/Skype to talk with
loved ones back in States. 

 

The SANS templates are pretty good shell its just the language will
actually have to come from you. Just make sure its not extremely
technical in nature, and embodies message you want to get across, and is
signed by senior management.  Also if you have controls to block the
usage of the IM/Social Networking sites, a reference back to established
policy for those users that break policy after its enacted serves as a
nice deterrent to future violations and serves as security awareness
training which always helps. 

 

Sincerely,

EZ

 

Edward Ziots

CISSP,MCSA,MCP+I,Security +,Network +,CCA

Network Engineer

Lifespan Organization

401-639-3505

ezi...@lifespan.org

 

From: John Aldrich [mailto:jaldr...@blueridgecarpet.com] 
Sent: Tuesday, May 04, 2010 12:39 PM
To: NT System Admin Issues
Subject: Internet Policies

 

What restrictions, if any, do your organizations place on things like IM
or social networking sites? I sent out a warning to the office personnel
this morning regarding the new IM Virus and got an email back from the
CEO basically stating shouldn't that be a violation of company policy
anyway? and I had to tell him, I knew of no policies regarding that;
and that in fact, my former supervisor was fully aware of at least one
person (who's child is overseas in the military) who used IM on a
semi-regular basis.

For this reason, I'm working on coming up with a company policy. I've
looked at the sample template from SANS as well as another one that
someone sent me off-list. I'm planning on incorporating the best of
everything I get, so if anyone has any suggested language regarding IM
or social networking, please let me have it. J

 

  

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

Windows 2008 R2 - GPO

2010-05-04 Thread helpdesk UK
Hello Everyone,

I am currently trying to get my head around the new Windows 2008 GPO
policies  Mgmt.

Here is the scenario:

windows 2008 R2 ( All MS Updates applied )

1. Configure Central Store  and created the Policy Def folder in Sysvol.
2. Copied the entire folder of Policy definitions folder from a brand new
Windows 7 stand alone computer to the new Sysvol location i.e. Policy
Definitions
2. Verified the New GPO are based on Central Store.
3. Created a new Test GPO.
4. Applied various settings.
5. Run Settings report in GPMC
6. It allows me to enable disable various settings

and I get this message at the bottom of the result ?



Extra Registry Settingshide
Display names for some settings cannot be found. You might be able to
resolve this issue by updating the .ADM files used by Group Policy
Management.
Setting State
SOFTWARE\Policies\Microsoft\Windows
NT\CurrentVersion\NetworkList\Signatures\EveryNetwork\CategoryReadOnly 1
SOFTWARE\Policies\Microsoft\Windows
NT\CurrentVersion\NetworkList\Signatures\EveryNetwork\IconReadOnly 1
SOFTWARE\Policies\Microsoft\Windows
NT\CurrentVersion\NetworkList\Signatures\EveryNetwork\NameReadOnly 1

Can someone please shed some light on this why is it that I get this message
? I only have *.admx files stored int he central store. To be precise I had
148 files + one folder  that folder i.e. en-US has another 148 adml files.

:(

I am confused that Win2k8 only required admx files so why is that error for
.adm files ?

cheers

Rob

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Internet Policies

2010-05-04 Thread Steven Peck
Why are you as the 'IT Manager' coming up with the companies policy?
Shouldn't this be a business decision?

In any case, technically here we have a NO EXTERNAL IM policy.  The reality
is that 'certain' senior management use it so no actual blocking occurs.  At
some point we will get the OCS edge servers with PIC setup and then begin
blocking.

The unofficial rule is do not be stupid.

As for what your company should do?  That depends on the tone and nature of
your business culture.  Is your culture regimented and controlled.  Is it
technically skilled and adept?

I would strongly suggest a variation of the don't be stupid rule that allows
your management flexibility and recognizes it's employees as trust worthy
human beings with a modicum of control.  Of course your corporate culture
may be like ours and that rule would have no chance at all.  :)

Steven

On Tue, May 4, 2010 at 9:38 AM, John Aldrich
jaldr...@blueridgecarpet.comwrote:

  What restrictions, if any, do your organizations place on things like IM
 or social networking sites? I sent out a warning to the office personnel
 this morning regarding the new “IM Virus” and got an email back from the CEO
 basically stating “shouldn’t that be a violation of company policy anyway?”
 and I had to tell him, I knew of no policies regarding that; and that in
 fact, my former supervisor was fully aware of at least one person (who’s
 child is overseas in the military) who used IM on a semi-regular basis.

 For this reason, I’m working on coming up with a company policy. I’ve
 looked at the sample template from SANS as well as another one that someone
 sent me off-list. I’m planning on incorporating the best of everything I
 get, so if anyone has any suggested language regarding IM or social
 networking, please let me have it. J



 [image: John-Aldrich][image: Tile-Tools]









~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

RE: Internet Policies

2010-05-04 Thread John Aldrich
Well, I think that management is going to want my input, and if I have a
nice template, I will be shaping the discussion and making it something I
can be comfortable enforcing. Unfortunately, from a technical standpoint,
there's not a lot we can do to enforce a no IM and no social networking
other than black-hole the domain names and any server names we can find for
those services/sites.

 

John-AldrichTile-Tools

 

From: Steven Peck [mailto:sep...@gmail.com] 
Sent: Tuesday, May 04, 2010 1:09 PM
To: NT System Admin Issues
Subject: Re: Internet Policies

 

Why are you as the 'IT Manager' coming up with the companies policy?
Shouldn't this be a business decision?

In any case, technically here we have a NO EXTERNAL IM policy.  The reality
is that 'certain' senior management use it so no actual blocking occurs.  At
some point we will get the OCS edge servers with PIC setup and then begin
blocking.

The unofficial rule is do not be stupid.

As for what your company should do?  That depends on the tone and nature of
your business culture.  Is your culture regimented and controlled.  Is it
technically skilled and adept?

I would strongly suggest a variation of the don't be stupid rule that allows
your management flexibility and recognizes it's employees as trust worthy
human beings with a modicum of control.  Of course your corporate culture
may be like ours and that rule would have no chance at all.  :)

Steven 

On Tue, May 4, 2010 at 9:38 AM, John Aldrich jaldr...@blueridgecarpet.com
wrote:

What restrictions, if any, do your organizations place on things like IM or
social networking sites? I sent out a warning to the office personnel this
morning regarding the new IM Virus and got an email back from the CEO
basically stating shouldn't that be a violation of company policy anyway?
and I had to tell him, I knew of no policies regarding that; and that in
fact, my former supervisor was fully aware of at least one person (who's
child is overseas in the military) who used IM on a semi-regular basis.

For this reason, I'm working on coming up with a company policy. I've looked
at the sample template from SANS as well as another one that someone sent me
off-list. I'm planning on incorporating the best of everything I get, so if
anyone has any suggested language regarding IM or social networking, please
let me have it. J

 

John-AldrichTile-Tools

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

Sort of OT: SPAM - should I stick with GFI MailEssentials?

2010-05-04 Thread Raper, Jonathan - Eagle
Hi everyone,

We recently replaced our AV (McAfee) with Trend for both clients and Exchange 
2007 (sorry Sunbelt - we came REALLY close to choosing VIPRE). We did not 
purchase the spam filtering option with Trend ScanMail, but are now considering 
it. We've been running GFI MailEssentials for years on a dedicated box. We're 
protecting between 400 and 500 mailboxes.

The price for GFI continues to be attractive, so much so that hosted solutions 
don't seem to be worth the cost differential... The first logical option to me 
would be to move toward Trend, but I'm not so sure that adding spam filtering 
at the Exchange Server level is a good idea from a resource perspective. We 
were there at one point years ago, with GFI and ended up moving off to a 
dedicated box, because GFI was eating up too many resources (we were getting 
HAMMERED with spam - million a month, easily).

Has anyone on this list moved away from GFI to something else? If so, what did 
you move to and what was your reasoning?

I welcome any and all thoughts/suggestions/experiences.

TIA,

Jonathan L. Raper, A+, MCSA, MCSE
Technology Coordinator
Eagle Physicians  Associates, PA
jra...@eaglemds.comBLOCKED::mailto:%20jra...@eaglemds.com
www.eaglemds.comBLOCKED::http://www.eaglemds.com/



Any medical information contained in this electronic message is CONFIDENTIAL 
and privileged. It is unlawful for unauthorized persons to view, copy, 
disclose, or disseminate CONFIDENTIAL information. This electronic message may 
contain information that is confidential and/or legally privileged. It is 
intended only for the use of the individual(s) and/or entity named as 
recipients in the message. If you are not an intended recipient of this 
message, please notify the sender immediately and delete this material from 
your computer. Do not deliver, distribute or copy this message, and do not 
disclose its contents or take any action in reliance on the information that it 
contains.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Internet Policies

2010-05-04 Thread Devin Meade
Up until last month we blocked all the social networking sites.  Now our
firm is marketing on them.  We are adjusting our policies for this.  It will
be on a user-by-user basis though.
Devin

On Tue, May 4, 2010 at 11:38 AM, John Aldrich
jaldr...@blueridgecarpet.comwrote:

  What restrictions, if any, do your organizations place on things like IM
 or social networking sites? I sent out a warning to the office personnel
 this morning regarding the new “IM Virus” and got an email back from the CEO
 basically stating “shouldn’t that be a violation of company policy anyway?”
 and I had to tell him, I knew of no policies regarding that; and that in
 fact, my former supervisor was fully aware of at least one person (who’s
 child is overseas in the military) who used IM on a semi-regular basis.

 For this reason, I’m working on coming up with a company policy. I’ve
 looked at the sample template from SANS as well as another one that someone
 sent me off-list. I’m planning on incorporating the best of everything I
 get, so if anyone has any suggested language regarding IM or social
 networking, please let me have it. J



 [image: John-Aldrich][image: Tile-Tools]









~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image002.jpgimage001.jpg

Re: Internet Policies

2010-05-04 Thread Devin Meade
Also we don't block anything.  We have an AUP and a disclaimer at logon..
We do log all activity and that's explained up front.  We hire professionals
and they are supposed to act that way.  This is an HR issue so IS just
reports lists of visited websites upon request.

On Tue, May 4, 2010 at 12:20 PM, Devin Meade devin.me...@gmail.com wrote:

 Up until last month we blocked all the social networking sites.  Now our
 firm is marketing on them.  We are adjusting our policies for this.  It will
 be on a user-by-user basis though.
 Devin


 On Tue, May 4, 2010 at 11:38 AM, John Aldrich 
 jaldr...@blueridgecarpet.com wrote:

  What restrictions, if any, do your organizations place on things like IM
 or social networking sites? I sent out a warning to the office personnel
 this morning regarding the new “IM Virus” and got an email back from the CEO
 basically stating “shouldn’t that be a violation of company policy anyway?”
 and I had to tell him, I knew of no policies regarding that; and that in
 fact, my former supervisor was fully aware of at least one person (who’s
 child is overseas in the military) who used IM on a semi-regular basis.

 For this reason, I’m working on coming up with a company policy. I’ve
 looked at the sample template from SANS as well as another one that someone
 sent me off-list. I’m planning on incorporating the best of everything I
 get, so if anyone has any suggested language regarding IM or social
 networking, please let me have it. J



 [image: John-Aldrich][image: Tile-Tools]










~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

Microsoft Forefront question

2010-05-04 Thread Joseph Heaton
How can you tell definition version on a workstation?

Trying to figure out how to manage this stuff, and it's definitely not friendly.


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~



RE: Internet Policies

2010-05-04 Thread Murray Freeman
Well, as long as we're discussing IM, we don't allow it currently. But,
I have trouble understanding how IM is better than either email or a
meeting, or using a telephone to accomplish the very same thing as an
IM. Can someone explain that to me. Oh, we've recently adopted social
networking for our organization, but primarily for our membership. I'm
having trouble understanding how social networking will help our members
too!
 

Murray

 



From: Steve Ens [mailto:stevey...@gmail.com] 
Sent: Tuesday, May 04, 2010 11:42 AM
To: NT System Admin Issues
Subject: Re: Internet Policies


It all depends if there is a business or productivity reason for it.  We
use IM in some of the departments for meetings, quick conversations,
etc.  But if it is used for wasting time, I would not allow it.


On Tue, May 4, 2010 at 11:38 AM, John Aldrich 
jaldr...@blueridgecarpet.com wrote:


What restrictions, if any, do your organizations place on things
like IM or social networking sites? I sent out a warning to the office
personnel this morning regarding the new IM Virus and got an email
back from the CEO basically stating shouldn't that be a violation of
company policy anyway? and I had to tell him, I knew of no policies
regarding that; and that in fact, my former supervisor was fully aware
of at least one person (who's child is overseas in the military) who
used IM on a semi-regular basis.

For this reason, I'm working on coming up with a company policy.
I've looked at the sample template from SANS as well as another one that
someone sent me off-list. I'm planning on incorporating the best of
everything I get, so if anyone has any suggested language regarding IM
or social networking, please let me have it. J

 

  

 

 


 






 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

RE: Sort of OT: SPAM - should I stick with GFI MailEssentials?

2010-05-04 Thread Michael B. Smith
IHateSpam from the sponsor (they renamed it, I've forgotten the new name, but 
I've got it at several clients) works pretty well.

So does Postini. So does websense.

All price attractive.

Regards,

Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com

From: Raper, Jonathan - Eagle [mailto:jra...@eaglemds.com]
Sent: Tuesday, May 04, 2010 1:20 PM
To: NT System Admin Issues
Subject: Sort of OT: SPAM - should I stick with GFI MailEssentials?

Hi everyone,

We recently replaced our AV (McAfee) with Trend for both clients and Exchange 
2007 (sorry Sunbelt - we came REALLY close to choosing VIPRE). We did not 
purchase the spam filtering option with Trend ScanMail, but are now considering 
it. We've been running GFI MailEssentials for years on a dedicated box. We're 
protecting between 400 and 500 mailboxes.

The price for GFI continues to be attractive, so much so that hosted solutions 
don't seem to be worth the cost differential... The first logical option to me 
would be to move toward Trend, but I'm not so sure that adding spam filtering 
at the Exchange Server level is a good idea from a resource perspective. We 
were there at one point years ago, with GFI and ended up moving off to a 
dedicated box, because GFI was eating up too many resources (we were getting 
HAMMERED with spam - million a month, easily).

Has anyone on this list moved away from GFI to something else? If so, what did 
you move to and what was your reasoning?

I welcome any and all thoughts/suggestions/experiences.

TIA,

Jonathan L. Raper, A+, MCSA, MCSE
Technology Coordinator
Eagle Physicians  Associates, PA
jra...@eaglemds.comBLOCKED::mailto:%20jra...@eaglemds.com
www.eaglemds.comBLOCKED::http://www.eaglemds.com/



Any medical information contained in this electronic message is CONFIDENTIAL 
and privileged. It is unlawful for unauthorized persons to view, copy, 
disclose, or disseminate CONFIDENTIAL information. This electronic message may 
contain information that is confidential and/or legally privileged. It is 
intended only for the use of the individual(s) and/or entity named as 
recipients in the message. If you are not an intended recipient of this 
message, please notify the sender immediately and delete this material from 
your computer. Do not deliver, distribute or copy this message, and do not 
disclose its contents or take any action in reliance on the information that it 
contains.





~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Internet Policies

2010-05-04 Thread Andrew S. Baker
It's not at all strange for the IT Manager to be responsible for
consolidating or initiating the acceptable use policy in an organization.
No matter which party is responsible for putting it together, it cannot be
done in a vacuum.  So, either IT does it with input from HR and the business
leaders, or HR does it with input from IT and the business leaders.

The results should be the same either way.

-ASB: http://XeeSM.com/AndrewBaker


On Tue, May 4, 2010 at 1:08 PM, Steven Peck sep...@gmail.com wrote:

 Why are you as the 'IT Manager' coming up with the companies policy?
 Shouldn't this be a business decision?

 In any case, technically here we have a NO EXTERNAL IM policy.  The reality
 is that 'certain' senior management use it so no actual blocking occurs.  At
 some point we will get the OCS edge servers with PIC setup and then begin
 blocking.

 The unofficial rule is do not be stupid.

 As for what your company should do?  That depends on the tone and nature of
 your business culture.  Is your culture regimented and controlled.  Is it
 technically skilled and adept?

 I would strongly suggest a variation of the don't be stupid rule that
 allows your management flexibility and recognizes it's employees as trust
 worthy human beings with a modicum of control.  Of course your corporate
 culture may be like ours and that rule would have no chance at all.  :)

 Steven

 On Tue, May 4, 2010 at 9:38 AM, John Aldrich jaldr...@blueridgecarpet.com
  wrote:

  What restrictions, if any, do your organizations place on things like IM
 or social networking sites? I sent out a warning to the office personnel
 this morning regarding the new “IM Virus” and got an email back from the CEO
 basically stating “shouldn’t that be a violation of company policy anyway?”
 and I had to tell him, I knew of no policies regarding that; and that in
 fact, my former supervisor was fully aware of at least one person (who’s
 child is overseas in the military) who used IM on a semi-regular basis.

 For this reason, I’m working on coming up with a company policy. I’ve
 looked at the sample template from SANS as well as another one that someone
 sent me off-list. I’m planning on incorporating the best of everything I
 get, so if anyone has any suggested language regarding IM or social
 networking, please let me have it. J



 [image: John-Aldrich][image: Tile-Tools]






~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image002.jpgimage001.jpg

RE: Sort of OT: SPAM - should I stick with GFI MailEssentials?

2010-05-04 Thread Alex Eckelberry
iHateSpam became Ninja and is now VIPRE for Exchange.

From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Tuesday, May 04, 2010 1:49 PM
To: NT System Admin Issues
Subject: RE: Sort of OT: SPAM - should I stick with GFI MailEssentials?

IHateSpam from the sponsor (they renamed it, I've forgotten the new name, but 
I've got it at several clients) works pretty well.

So does Postini. So does websense.

All price attractive.

Regards,

Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com

From: Raper, Jonathan - Eagle [mailto:jra...@eaglemds.com]
Sent: Tuesday, May 04, 2010 1:20 PM
To: NT System Admin Issues
Subject: Sort of OT: SPAM - should I stick with GFI MailEssentials?

Hi everyone,

We recently replaced our AV (McAfee) with Trend for both clients and Exchange 
2007 (sorry Sunbelt - we came REALLY close to choosing VIPRE). We did not 
purchase the spam filtering option with Trend ScanMail, but are now considering 
it. We've been running GFI MailEssentials for years on a dedicated box. We're 
protecting between 400 and 500 mailboxes.

The price for GFI continues to be attractive, so much so that hosted solutions 
don't seem to be worth the cost differential... The first logical option to me 
would be to move toward Trend, but I'm not so sure that adding spam filtering 
at the Exchange Server level is a good idea from a resource perspective. We 
were there at one point years ago, with GFI and ended up moving off to a 
dedicated box, because GFI was eating up too many resources (we were getting 
HAMMERED with spam - million a month, easily).

Has anyone on this list moved away from GFI to something else? If so, what did 
you move to and what was your reasoning?

I welcome any and all thoughts/suggestions/experiences.

TIA,

Jonathan L. Raper, A+, MCSA, MCSE
Technology Coordinator
Eagle Physicians  Associates, PA
jra...@eaglemds.comBLOCKED::mailto:%20jra...@eaglemds.com
www.eaglemds.comBLOCKED::http://www.eaglemds.com/



Any medical information contained in this electronic message is CONFIDENTIAL 
and privileged. It is unlawful for unauthorized persons to view, copy, 
disclose, or disseminate CONFIDENTIAL information. This electronic message may 
contain information that is confidential and/or legally privileged. It is 
intended only for the use of the individual(s) and/or entity named as 
recipients in the message. If you are not an intended recipient of this 
message, please notify the sender immediately and delete this material from 
your computer. Do not deliver, distribute or copy this message, and do not 
disclose its contents or take any action in reliance on the information that it 
contains.









~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

SharePont 2010 discussion with Microsoft expert

2010-05-04 Thread Tim Vander Kooi
Just a quick heads up. I am hosting a webcast on TechNet in 5 minutes with 
Bryan Porter from Microsoft on upgrading to SharePoint 2010. I know it is late 
notice but if you can attend it is your chance to ask questions directly to 
Microsoft about the product.
Registration link is here: 
https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032448763Culture=en-US
 
Tim
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


Re: Sort of OT: SPAM - should I stick with GFI MailEssentials?

2010-05-04 Thread Ben Scott
On Tue, May 4, 2010 at 1:54 PM, Alex Eckelberry
al...@sunbelt-software.com wrote:
 iHateSpam became Ninja and is now VIPRE for Exchange.

  Careful, keep renaming your products like that and Microsoft will
get you for patent infringement.  ;-)

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


Compare two AD / Exchange accounts

2010-05-04 Thread David Lum
Anyone know offhand of a tool / have a query line to compare two Active 
Directory accounts? Group and DL membership, assigned delegates/calendar 
permissions, etc...
David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Compare two AD / Exchange accounts

2010-05-04 Thread Andy Shook
Right click, properties

Shook

From: David Lum [mailto:david@nwea.org]
Sent: Tuesday, May 04, 2010 2:00 PM
To: NT System Admin Issues
Subject: Compare two AD / Exchange accounts

Anyone know offhand of a tool / have a query line to compare two Active 
Directory accounts? Group and DL membership, assigned delegates/calendar 
permissions, etc...
David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764






~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Compare two AD / Exchange accounts

2010-05-04 Thread Michael B. Smith
Doesn't exist.

I'm getting ready to release a tool to deal with delegate reporting.

For the AD stuff, use adfind or dsquery.

Regards,

Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com

From: David Lum [mailto:david@nwea.org]
Sent: Tuesday, May 04, 2010 2:00 PM
To: NT System Admin Issues
Subject: Compare two AD / Exchange accounts

Anyone know offhand of a tool / have a query line to compare two Active 
Directory accounts? Group and DL membership, assigned delegates/calendar 
permissions, etc...
David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764






~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Internet Policies

2010-05-04 Thread John Aldrich
How did you block them? Do you have an appliance or did you put in some sort
of DNS entries?

 

John-AldrichTile-Tools

 

From: Devin Meade [mailto:devin.me...@gmail.com] 
Sent: Tuesday, May 04, 2010 1:21 PM
To: NT System Admin Issues
Subject: Re: Internet Policies

 

Up until last month we blocked all the social networking sites.  Now our
firm is marketing on them.  We are adjusting our policies for this.  It will
be on a user-by-user basis though.
Devin

On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com
wrote:

What restrictions, if any, do your organizations place on things like IM or
social networking sites? I sent out a warning to the office personnel this
morning regarding the new IM Virus and got an email back from the CEO
basically stating shouldn't that be a violation of company policy anyway?
and I had to tell him, I knew of no policies regarding that; and that in
fact, my former supervisor was fully aware of at least one person (who's
child is overseas in the military) who used IM on a semi-regular basis.

For this reason, I'm working on coming up with a company policy. I've looked
at the sample template from SANS as well as another one that someone sent me
off-list. I'm planning on incorporating the best of everything I get, so if
anyone has any suggested language regarding IM or social networking, please
let me have it. J

 

John-AldrichTile-Tools

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

RE: Internet Policies -- Benefits of IM and Social Media

2010-05-04 Thread Don Guyer
Agreed. As a department, we all use IM. I have coworkers in other
physical locations that I interact with all day. No one answers their
desk phones, because it's usually a vendor or sales call.

 

J

 

E-mail is great for communicating certain things that require a record,
or are too long winded for IM, but IM is great for those hey can you
look at server X? conversations.

 

$.02

 

Don Guyer

Systems Engineer - Information Services

Prudential, Fox  Roach/Trident Group

431 W. Lancaster Avenue

Devon, PA 19333

Direct: (610) 993-3299

Fax: (610) 650-5306

don.gu...@prufoxroach.com mailto:don.gu...@prufoxroach.com 

 

From: Andrew S. Baker [mailto:asbz...@gmail.com] 
Sent: Tuesday, May 04, 2010 2:02 PM
To: NT System Admin Issues
Subject: Re: Internet Policies -- Benefits of IM and Social Media

 

IM is faster than email is faster than a meeting.Personally, I
prefer email to IM, but I understand how and why people use it as a
valid communications tool.   It facilitates quick, informal exchanges
that may not rise to the level of a full discussion.  And both IM and
email are easier to schedule than face-to-face meetings in many cases.

 

Social networking is just a prevalent, but semi-closed network where you
can interact with business partners, customers or prospective clients in
a way where the recipient has some control over who reaches them and how
they are reached, and the sender has access to some rich content without
the fear of antispam interference.   

 

All of the above means of communications are useful to various
organizations, even though abuse of them can waste time.  But so can the
abuse of any other communications vehicle, including meetings.


-ASB: http://XeeSM.com/AndrewBaker



On Tue, May 4, 2010 at 1:39 PM, Murray Freeman mfree...@alanet.org
wrote:

Well, as long as we're discussing IM, we don't allow it currently. But,
I have trouble understanding how IM is better than either email or a
meeting, or using a telephone to accomplish the very same thing as an
IM. Can someone explain that to me. Oh, we've recently adopted social
networking for our organization, but primarily for our membership. I'm
having trouble understanding how social networking will help our members
too!

 

Murray

 

 



From: Steve Ens [mailto:stevey...@gmail.com] 
Sent: Tuesday, May 04, 2010 11:42 AM


To: NT System Admin Issues
Subject: Re: Internet Policies

 

It all depends if there is a business or productivity reason for it.  We
use IM in some of the departments for meetings, quick conversations,
etc.  But if it is used for wasting time, I would not allow it.

On Tue, May 4, 2010 at 11:38 AM, John Aldrich 
jaldr...@blueridgecarpet.com wrote:

What restrictions, if any, do your organizations place on things like IM
or social networking sites? I sent out a warning to the office personnel
this morning regarding the new IM Virus and got an email back from the
CEO basically stating shouldn't that be a violation of company policy
anyway? and I had to tell him, I knew of no policies regarding that;
and that in fact, my former supervisor was fully aware of at least one
person (who's child is overseas in the military) who used IM on a
semi-regular basis.

For this reason, I'm working on coming up with a company policy. I've
looked at the sample template from SANS as well as another one that
someone sent me off-list. I'm planning on incorporating the best of
everything I get, so if anyone has any suggested language regarding IM
or social networking, please let me have it. J

 

  

 

 

 

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

Re: Sort of OT: SPAM - should I stick with GFI MailEssentials?

2010-05-04 Thread Andrew S. Baker
When not in the cloud, I generally prefer antispam appliances, rather than
server-based software.

I've used http://www.sendio.com in the past, as well as MailFrontier (now
owned by SonicWall)

-ASB: http://XeeSM.com/AndrewBaker


On Tue, May 4, 2010 at 1:19 PM, Raper, Jonathan - Eagle jra...@eaglemds.com
 wrote:

  Hi everyone,



 We recently replaced our AV (McAfee) with Trend for both clients and
 Exchange 2007 (sorry Sunbelt – we came REALLY close to choosing VIPRE). We
 did not purchase the spam filtering option with Trend ScanMail, but are now
 considering it. We’ve been running GFI MailEssentials for years on a
 dedicated box. We’re protecting between 400 and 500 mailboxes.



 The price for GFI continues to be attractive, so much so that hosted
 solutions don’t seem to be worth the cost differential… The first logical
 option to me would be to move toward Trend, but I’m not so sure that adding
 spam filtering at the Exchange Server level is a good idea from a resource
 perspective. We were there at one point years ago, with GFI and ended up
 moving off to a dedicated box, because GFI was eating up too many resources
 (we were getting HAMMERED with spam – million a month, easily).



 Has anyone on this list moved away from GFI to something else? If so, what
 did you move to and what was your reasoning?



 I welcome any and all thoughts/suggestions/experiences.



 TIA,

 Jonathan L. Raper, A+, MCSA, MCSE
 Technology Coordinator
 Eagle Physicians  Associates, PA*
 *jra...@eaglemds.com*
 *www.eaglemds.com



 --
 Any medical information contained in this electronic message is
 CONFIDENTIAL and privileged. It is unlawful for unauthorized persons to
 view, copy, disclose, or disseminate CONFIDENTIAL information. This
 electronic message may contain information that is confidential and/or
 legally privileged. It is intended only for the use of the individual(s)
 and/or entity named as recipients in the message. If you are not an intended
 recipient of this message, please notify the sender immediately and delete
 this material from your computer. Do not deliver, distribute or copy this
 message, and do not disclose its contents or take any action in reliance on
 the information that it contains.







~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Internet Policies

2010-05-04 Thread Andrew S. Baker
They can be blocked via DNS, via Firewalls, via Web Filtering technologies.

-ASB: http://XeeSM.com/AndrewBaker


On Tue, May 4, 2010 at 2:11 PM, John Aldrich
jaldr...@blueridgecarpet.comwrote:

  How did you block them? Do you have an appliance or did you put in some
 sort of DNS entries?



 [image: John-Aldrich][image: Tile-Tools]



 *From:* Devin Meade [mailto:devin.me...@gmail.com]
 *Sent:* Tuesday, May 04, 2010 1:21 PM

 *To:* NT System Admin Issues
 *Subject:* Re: Internet Policies



 Up until last month we blocked all the social networking sites.  Now our
 firm is marketing on them.  We are adjusting our policies for this.  It will
 be on a user-by-user basis though.
 Devin

 On Tue, May 4, 2010 at 11:38 AM, John Aldrich 
 jaldr...@blueridgecarpet.com wrote:

 What restrictions, if any, do your organizations place on things like IM or
 social networking sites? I sent out a warning to the office personnel this
 morning regarding the new “IM Virus” and got an email back from the CEO
 basically stating “shouldn’t that be a violation of company policy anyway?”
 and I had to tell him, I knew of no policies regarding that; and that in
 fact, my former supervisor was fully aware of at least one person (who’s
 child is overseas in the military) who used IM on a semi-regular basis.

 For this reason, I’m working on coming up with a company policy. I’ve
 looked at the sample template from SANS as well as another one that someone
 sent me off-list. I’m planning on incorporating the best of everything I
 get, so if anyone has any suggested language regarding IM or social
 networking, please let me have it. J



 [image: John-Aldrich][image: Tile-Tools]



















~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

RE: Internet Policies

2010-05-04 Thread John Aldrich
I was aware of that, but I was wondering what Devin's company used. J
Personally, I'd go for either DNS (if there was a blackhole or something
easily implemented like that) or web filtering appliance.

 

John-AldrichTile-Tools

 

From: Andrew S. Baker [mailto:asbz...@gmail.com] 
Sent: Tuesday, May 04, 2010 2:20 PM
To: NT System Admin Issues
Subject: Re: Internet Policies

 

They can be blocked via DNS, via Firewalls, via Web Filtering technologies.


-ASB: http://XeeSM.com/AndrewBaker



On Tue, May 4, 2010 at 2:11 PM, John Aldrich jaldr...@blueridgecarpet.com
wrote:

How did you block them? Do you have an appliance or did you put in some sort
of DNS entries?

 

John-AldrichTile-Tools

 

From: Devin Meade [mailto:devin.me...@gmail.com] 
Sent: Tuesday, May 04, 2010 1:21 PM


To: NT System Admin Issues
Subject: Re: Internet Policies

 

Up until last month we blocked all the social networking sites.  Now our
firm is marketing on them.  We are adjusting our policies for this.  It will
be on a user-by-user basis though.
Devin

On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com
wrote:

What restrictions, if any, do your organizations place on things like IM or
social networking sites? I sent out a warning to the office personnel this
morning regarding the new IM Virus and got an email back from the CEO
basically stating shouldn't that be a violation of company policy anyway?
and I had to tell him, I knew of no policies regarding that; and that in
fact, my former supervisor was fully aware of at least one person (who's
child is overseas in the military) who used IM on a semi-regular basis.

For this reason, I'm working on coming up with a company policy. I've looked
at the sample template from SANS as well as another one that someone sent me
off-list. I'm planning on incorporating the best of everything I get, so if
anyone has any suggested language regarding IM or social networking, please
let me have it. J

 

John-AldrichTile-Tools

 

 

 

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

Re: Sort of OT: SPAM - should I stick with GFI MailEssentials?

2010-05-04 Thread Phil Brutsche
I have 2 thoughts on the matter:

a) I'm sure you're familiar with the saying devil you know vs the devil
you don't. You know the GFI product works. Your other options are
unknown quantities.

b) Consider defense in depth. These days most anti-spam implementations
also include anti-virus. If you use the same scanning engine on your
desktop as well as the inbound mail path, and the mail antivirus misses
some piece of malware...

On 5/4/2010 12:19 PM, Raper, Jonathan - Eagle wrote:
 Hi everyone,
 
 We recently replaced our AV (McAfee) with Trend for both clients and
 Exchange 2007 (sorry Sunbelt – we came REALLY close to choosing VIPRE).
 We did not purchase the spam filtering option with Trend ScanMail, but
 are now considering it. We’ve been running GFI MailEssentials for years
 on a dedicated box. We’re protecting between 400 and 500 mailboxes.
 
 The price for GFI continues to be attractive, so much so that hosted
 solutions don’t seem to be worth the cost differential… The first
 logical option to me would be to move toward Trend, but I’m not so sure
 that adding spam filtering at the Exchange Server level is a good idea
 from a resource perspective. We were there at one point years ago, with
 GFI and ended up moving off to a dedicated box, because GFI was eating
 up too many resources (we were getting HAMMERED with spam – million a
 month, easily).
 
 Has anyone on this list moved away from GFI to something else? If so,
 what did you move to and what was your reasoning?
 
 I welcome any and all thoughts/suggestions/experiences.

-- 

Phil Brutsche
p...@optimumdata.com


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~



Re: Sort of OT: SPAM - should I stick with GFI MailEssentials?

2010-05-04 Thread Andrew S. Baker
Very good points...

-ASB: http://XeeSM.com/AndrewBaker


On Tue, May 4, 2010 at 2:30 PM, Phil Brutsche p...@optimumdata.com wrote:

 I have 2 thoughts on the matter:

 a) I'm sure you're familiar with the saying devil you know vs the devil
 you don't. You know the GFI product works. Your other options are
 unknown quantities.

 b) Consider defense in depth. These days most anti-spam implementations
 also include anti-virus. If you use the same scanning engine on your
 desktop as well as the inbound mail path, and the mail antivirus misses
 some piece of malware...

 On 5/4/2010 12:19 PM, Raper, Jonathan - Eagle wrote:
  Hi everyone,
 
  We recently replaced our AV (McAfee) with Trend for both clients and
  Exchange 2007 (sorry Sunbelt – we came REALLY close to choosing VIPRE).
  We did not purchase the spam filtering option with Trend ScanMail, but
  are now considering it. We’ve been running GFI MailEssentials for years
  on a dedicated box. We’re protecting between 400 and 500 mailboxes.
 
  The price for GFI continues to be attractive, so much so that hosted
  solutions don’t seem to be worth the cost differential… The first
  logical option to me would be to move toward Trend, but I’m not so sure
  that adding spam filtering at the Exchange Server level is a good idea
  from a resource perspective. We were there at one point years ago, with
  GFI and ended up moving off to a dedicated box, because GFI was eating
  up too many resources (we were getting HAMMERED with spam – million a
  month, easily).
 
  Has anyone on this list moved away from GFI to something else? If so,
  what did you move to and what was your reasoning?
 
  I welcome any and all thoughts/suggestions/experiences.

 --

 Phil Brutsche
 p...@optimumdata.com




~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Internet Policies

2010-05-04 Thread Devin Meade
I used a fake DNS entry for twitter.com and the others that I found in the
ISA log.  I made a new forward lookup zone for each one in our Active Dir
integrated DNS system.  I know it wont block sub-domains but it made the
point.  It has since been removed.  I can use Trend micro officescan if we
want to actively block though.
Devin

On Tue, May 4, 2010 at 1:22 PM, John Aldrich
jaldr...@blueridgecarpet.comwrote:

  I was aware of that, but I was wondering what Devin’s company used. 
 JPersonally, I’d go for either DNS (if there was a blackhole or something
 easily implemented like that) or web filtering appliance.



 [image: John-Aldrich][image: Tile-Tools]



 *From:* Andrew S. Baker [mailto:asbz...@gmail.com]
 *Sent:* Tuesday, May 04, 2010 2:20 PM

 *To:* NT System Admin Issues
 *Subject:* Re: Internet Policies



 They can be blocked via DNS, via Firewalls, via Web Filtering technologies.


 -ASB: http://XeeSM.com/AndrewBaker

  On Tue, May 4, 2010 at 2:11 PM, John Aldrich 
 jaldr...@blueridgecarpet.com wrote:

 How did you block them? Do you have an appliance or did you put in some
 sort of DNS entries?



 [image: John-Aldrich][image: Tile-Tools]



 *From:* Devin Meade [mailto:devin.me...@gmail.com]
 *Sent:* Tuesday, May 04, 2010 1:21 PM


 *To:* NT System Admin Issues
 *Subject:* Re: Internet Policies



 Up until last month we blocked all the social networking sites.  Now our
 firm is marketing on them.  We are adjusting our policies for this.  It will
 be on a user-by-user basis though.
 Devin

 On Tue, May 4, 2010 at 11:38 AM, John Aldrich 
 jaldr...@blueridgecarpet.com wrote:

 What restrictions, if any, do your organizations place on things like IM or
 social networking sites? I sent out a warning to the office personnel this
 morning regarding the new “IM Virus” and got an email back from the CEO
 basically stating “shouldn’t that be a violation of company policy anyway?”
 and I had to tell him, I knew of no policies regarding that; and that in
 fact, my former supervisor was fully aware of at least one person (who’s
 child is overseas in the military) who used IM on a semi-regular basis.

 For this reason, I’m working on coming up with a company policy. I’ve
 looked at the sample template from SANS as well as another one that someone
 sent me off-list. I’m planning on incorporating the best of everything I
 get, so if anyone has any suggested language regarding IM or social
 networking, please let me have it. J



 [image: John-Aldrich][image: Tile-Tools]





























~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image002.jpgimage001.jpg

Re: Internet Policies

2010-05-04 Thread Steven Peck
IM isn't just chat.  Especially if you have OCS installed.

There are tons of things that can be dispensed with a quick 2-3 line IM
session that would require waiting and delays for other things.  With IM you
can see if a user if actually present and can be contacted now.  It's faster
then email for yes/no questions and is less disruptive then a phone call.
If I see a user status as 'Busy' then I don't bug them, but if they are
listed as 'Available' then I can ping them on quick short questions.

During phone conferences having the ability to contact people not on the
line, (outage, check with engineers working the issue) to then relay
information to the call is invaluable.  Our help desk uses it.  Our help
desk is scattered over 4 physical locations and if there is a major issue,
then they can't call the other locations because everyone is on the phone.
Late night troubleshooting sessions from home that don't need a call means
my boss isn't calling for status, he just checks me on IM.  My wife and kids
do not get woken up.  It is often easier to arrange lunch, etc through IM
rather then email.  In a tightly controlled messaging environment it means
less clutter in the archives.

Once people actually start using IM for business reasons it's seriously
addictive and helps substantially but it's one of those 'you have to
experience it to understand it' type of things.

Out of all the enabled IM accounts we have 3/4 signed on during business
hours which is a huge buy in for us.  We do not mandate people use it,
merely make it available as a service.

Steven Peck




On Tue, May 4, 2010 at 10:39 AM, Murray Freeman mfree...@alanet.org wrote:

  Well, as long as we're discussing IM, we don't allow it currently. But, I
 have trouble understanding how IM is better than either email or a meeting,
 or using a telephone to accomplish the very same thing as an IM. Can someone
 explain that to me. Oh, we've recently adopted social networking for our
 organization, but primarily for our membership. I'm having trouble
 understanding how social networking will help our members too!


 *Murray*


  --
 *From:* Steve Ens [mailto:stevey...@gmail.com]
 *Sent:* Tuesday, May 04, 2010 11:42 AM

 *To:* NT System Admin Issues
 *Subject:* Re: Internet Policies

 It all depends if there is a business or productivity reason for it.  We
 use IM in some of the departments for meetings, quick conversations, etc.
 But if it is used for wasting time, I would not allow it.

 On Tue, May 4, 2010 at 11:38 AM, John Aldrich 
 jaldr...@blueridgecarpet.com wrote:

  What restrictions, if any, do your organizations place on things like IM
 or social networking sites? I sent out a warning to the office personnel
 this morning regarding the new “IM Virus” and got an email back from the CEO
 basically stating “shouldn’t that be a violation of company policy anyway?”
 and I had to tell him, I knew of no policies regarding that; and that in
 fact, my former supervisor was fully aware of at least one person (who’s
 child is overseas in the military) who used IM on a semi-regular basis.

 For this reason, I’m working on coming up with a company policy. I’ve
 looked at the sample template from SANS as well as another one that someone
 sent me off-list. I’m planning on incorporating the best of everything I
 get, so if anyone has any suggested language regarding IM or social
 networking, please let me have it. J



 [image: John-Aldrich][image: Tile-Tools]


















~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image002.jpgimage001.jpg

RE: Internet Policies

2010-05-04 Thread John Aldrich
Ahh. We don't have an ISA server. I suppose I could enable logging on the
ASA and check those logs and do similar things.Hmm. something to think
about.

 

John-AldrichTile-Tools

 

From: Devin Meade [mailto:devin.me...@gmail.com] 
Sent: Tuesday, May 04, 2010 2:44 PM
To: NT System Admin Issues
Subject: Re: Internet Policies

 

I used a fake DNS entry for twitter.com and the others that I found in the
ISA log.  I made a new forward lookup zone for each one in our Active Dir
integrated DNS system.  I know it wont block sub-domains but it made the
point.  It has since been removed.  I can use Trend micro officescan if we
want to actively block though.
Devin

On Tue, May 4, 2010 at 1:22 PM, John Aldrich jaldr...@blueridgecarpet.com
wrote:

I was aware of that, but I was wondering what Devin's company used. J
Personally, I'd go for either DNS (if there was a blackhole or something
easily implemented like that) or web filtering appliance.

 

John-AldrichTile-Tools

 

From: Andrew S. Baker [mailto:asbz...@gmail.com] 
Sent: Tuesday, May 04, 2010 2:20 PM


To: NT System Admin Issues
Subject: Re: Internet Policies

 

They can be blocked via DNS, via Firewalls, via Web Filtering technologies.


-ASB: http://XeeSM.com/AndrewBaker

On Tue, May 4, 2010 at 2:11 PM, John Aldrich jaldr...@blueridgecarpet.com
wrote:

How did you block them? Do you have an appliance or did you put in some sort
of DNS entries?

 

John-AldrichTile-Tools

 

From: Devin Meade [mailto:devin.me...@gmail.com] 
Sent: Tuesday, May 04, 2010 1:21 PM


To: NT System Admin Issues
Subject: Re: Internet Policies

 

Up until last month we blocked all the social networking sites.  Now our
firm is marketing on them.  We are adjusting our policies for this.  It will
be on a user-by-user basis though.
Devin

On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com
wrote:

What restrictions, if any, do your organizations place on things like IM or
social networking sites? I sent out a warning to the office personnel this
morning regarding the new IM Virus and got an email back from the CEO
basically stating shouldn't that be a violation of company policy anyway?
and I had to tell him, I knew of no policies regarding that; and that in
fact, my former supervisor was fully aware of at least one person (who's
child is overseas in the military) who used IM on a semi-regular basis.

For this reason, I'm working on coming up with a company policy. I've looked
at the sample template from SANS as well as another one that someone sent me
off-list. I'm planning on incorporating the best of everything I get, so if
anyone has any suggested language regarding IM or social networking, please
let me have it. J

 

John-AldrichTile-Tools

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

RE: Internet Policies

2010-05-04 Thread Mayo, Bill
If you have ISA, you can also make a rule to deny access to the domain
or URL.



From: Devin Meade [mailto:devin.me...@gmail.com] 
Sent: Tuesday, May 04, 2010 2:44 PM
To: NT System Admin Issues
Subject: Re: Internet Policies


I used a fake DNS entry for twitter.com and the others that I found in
the ISA log.  I made a new forward lookup zone for each one in our
Active Dir integrated DNS system.  I know it wont block sub-domains but
it made the point.  It has since been removed.  I can use Trend micro
officescan if we want to actively block though.
Devin


On Tue, May 4, 2010 at 1:22 PM, John Aldrich 
jaldr...@blueridgecarpet.com wrote:


I was aware of that, but I was wondering what Devin's company
used. J Personally, I'd go for either DNS (if there was a blackhole or
something easily implemented like that) or web filtering appliance.

 



 

From: Andrew S. Baker [mailto:asbz...@gmail.com] 
Sent: Tuesday, May 04, 2010 2:20 PM 

To: NT System Admin Issues
Subject: Re: Internet Policies



 

They can be blocked via DNS, via Firewalls, via Web Filtering
technologies.


-ASB: http://XeeSM.com/AndrewBaker



On Tue, May 4, 2010 at 2:11 PM, John Aldrich 
jaldr...@blueridgecarpet.com wrote:

How did you block them? Do you have an appliance or did you put
in some sort of DNS entries?

 

  

 

From: Devin Meade [mailto:devin.me...@gmail.com] 
Sent: Tuesday, May 04, 2010 1:21 PM


To: NT System Admin Issues
Subject: Re: Internet Policies

 

Up until last month we blocked all the social networking sites.
Now our firm is marketing on them.  We are adjusting our policies for
this.  It will be on a user-by-user basis though.
Devin

On Tue, May 4, 2010 at 11:38 AM, John Aldrich 
jaldr...@blueridgecarpet.com wrote:

What restrictions, if any, do your organizations place on things
like IM or social networking sites? I sent out a warning to the office
personnel this morning regarding the new IM Virus and got an email
back from the CEO basically stating shouldn't that be a violation of
company policy anyway? and I had to tell him, I knew of no policies
regarding that; and that in fact, my former supervisor was fully aware
of at least one person (who's child is overseas in the military) who
used IM on a semi-regular basis.

For this reason, I'm working on coming up with a company policy.
I've looked at the sample template from SANS as well as another one that
someone sent me off-list. I'm planning on incorporating the best of
everything I get, so if anyone has any suggested language regarding IM
or social networking, please let me have it. J

 



 

 

 

 

 

 

 

 

 

 

 

 



 


 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

Re: Microsoft Forefront question

2010-05-04 Thread Jon Harris
I seem to remember that if you call up the interface on the client it will
tell you date and time of last update.  If it does just compare the server
and client.  Otherwise look in the logs under application for when the last
update was.

Jon

On Tue, May 4, 2010 at 1:36 PM, Joseph Heaton jhea...@dfg.ca.gov wrote:

 How can you tell definition version on a workstation?
 Trying to figure out how to manage this stuff, and it's definitely not
 friendly.


 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Encryption

2010-05-04 Thread Jon Harris
Do you actually believe they will leave a good product alone?  Go with
something other than PGP unless you are not going to be updating it then it
will be safe to use.

Jon

On Tue, May 4, 2010 at 12:32 PM, Ziots, Edward ezi...@lifespan.org wrote:

  I think based on the flexibility of encryption Options and some of the
 items, you might want to look at the PGP Universal Suite of Products. I just
 hope that Symantec doesn’t screw it up.



 Z



 Edward Ziots

 CISSP,MCSA,MCP+I,Security +,Network +,CCA

 Network Engineer

 Lifespan Organization

 401-639-3505

 ezi...@lifespan.org



 *From:* Chris Blair [mailto:chris_bl...@identisys.com]
 *Sent:* Tuesday, May 04, 2010 12:06 PM
 *To:* NT System Admin Issues
 *Subject:* Encryption



 First off, we are running a Windows 2003 Native Active Directory. There are
 no plans, or funds to move up to 2008.



 We have an upcoming project that will require a location on our file server
 that encrypts folders and documents stored there. This project could last
 only a year, or up to 5, all depends on its success. The files will be
 uploaded from Outside customers, either via VPN or SFTP.



 I am looking at EFS, True Crypt or PGP.



 Anyone have opinions on which to use and why?



 Thanks!











~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Microsoft Forefront question

2010-05-04 Thread Hart, Robert
When you open the console on the workstation, click on the Home button
and it is listed on the bottom as Antivirus definition

 

 

Bob

 

 

From: Jon Harris [mailto:jk.har...@gmail.com] 
Sent: Tuesday, May 04, 2010 2:49 PM
To: NT System Admin Issues
Subject: Re: Microsoft Forefront question

 

I seem to remember that if you call up the interface on the client it
will tell you date and time of last update.  If it does just compare the
server and client.  Otherwise look in the logs under application for
when the last update was.

 

Jon

On Tue, May 4, 2010 at 1:36 PM, Joseph Heaton jhea...@dfg.ca.gov
wrote:

How can you tell definition version on a workstation?
Trying to figure out how to manage this stuff, and it's definitely not
friendly.


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Sort of OT: SPAM - should I stick with GFI MailEssentials?

2010-05-04 Thread David Lum
I run both when the environment / client permits. If you can keep the bulk of 
it off your network all the better. I have one cluent with both a Barracuda AND 
Trend's anti-spam. The 'Cuda is upstream and catches 99% of the spam, Trend 
catches the occasional leaker but since it doesn't have much to look for it 
doesn't affect Exchange server load at all.

Dave

From: Andrew S. Baker [mailto:asbz...@gmail.com]
Sent: Tuesday, May 04, 2010 11:41 AM
To: NT System Admin Issues
Subject: Re: Sort of OT: SPAM - should I stick with GFI MailEssentials?

Very good points...

-ASB: http://XeeSM.com/AndrewBaker

On Tue, May 4, 2010 at 2:30 PM, Phil Brutsche 
p...@optimumdata.commailto:p...@optimumdata.com wrote:
I have 2 thoughts on the matter:

a) I'm sure you're familiar with the saying devil you know vs the devil
you don't. You know the GFI product works. Your other options are
unknown quantities.

b) Consider defense in depth. These days most anti-spam implementations
also include anti-virus. If you use the same scanning engine on your
desktop as well as the inbound mail path, and the mail antivirus misses
some piece of malware...

On 5/4/2010 12:19 PM, Raper, Jonathan - Eagle wrote:
 Hi everyone,

 We recently replaced our AV (McAfee) with Trend for both clients and
 Exchange 2007 (sorry Sunbelt - we came REALLY close to choosing VIPRE).
 We did not purchase the spam filtering option with Trend ScanMail, but
 are now considering it. We've been running GFI MailEssentials for years
 on a dedicated box. We're protecting between 400 and 500 mailboxes.

 The price for GFI continues to be attractive, so much so that hosted
 solutions don't seem to be worth the cost differential... The first
 logical option to me would be to move toward Trend, but I'm not so sure
 that adding spam filtering at the Exchange Server level is a good idea
 from a resource perspective. We were there at one point years ago, with
 GFI and ended up moving off to a dedicated box, because GFI was eating
 up too many resources (we were getting HAMMERED with spam - million a
 month, easily).

 Has anyone on this list moved away from GFI to something else? If so,
 what did you move to and what was your reasoning?

 I welcome any and all thoughts/suggestions/experiences.
--

Phil Brutsche
p...@optimumdata.commailto:p...@optimumdata.com






~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Hotel room router with wifi and gigabit E-net

2010-05-04 Thread Angus Scott-Fleming
On 4 May 2010 at 16:36, tony patton  wrote:

 On the other list it would've been a different story :) 

What other list?

--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
Security Blog: http://geoapps.com/





~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


Re: Internet Policies

2010-05-04 Thread Angus Scott-Fleming
On 4 May 2010 at 12:39, Murray Freeman  wrote:

 Well, as long as we're discussing IM, we don't allow it currently. But, I
 have trouble understanding how IM is better than either email or a meeting,
 or using a telephone to accomplish the very same thing as an IM. Can someone
 explain that to me. Oh, we've recently adopted social networking for our
 organization, but primarily for our membership. I'm having trouble
 understanding how social networking will help our members too! 

IM is Instant whereas email isn't, but it can be ignored if you're on a 
critical phone call or busy doing something that requires thought, which a 
phone call can't.  I use IM with my-son-the-university-tech-support-geek when 
I'm picking his brains while debugging a client situation that's more up his 
alley, very useful as I can get links from him and dump screenshots back to him 
instantly which email doesn't allow.

Also, for a multi-building company I can see where an internal Jabber network 
could be very useful.

Social networking is a different disallowed beast altogether IMHO, although I 
can see where LinkedIn might be useful in some businesses.

--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
Security Blog: http://geoapps.com/





~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


Re: Alternatives to Exchange

2010-05-04 Thread Angus Scott-Fleming
On 4 May 2010 at 9:16, Matthew W. Ross  wrote:

 I would recommend anyone who is looking for a mail suite to take a good look
 at Kerio.

Thanks for the feedback.  WRT multi-server, do you know if it supports 
distributed subdomains (e.g. tucson.mydomain.com, denver.mydomain.com, etc.) 
with servers in different cities or just a local multi-server cluster?  Haven't 
had the time yet to delve into this.

 Zimbra... I haven't had the chance to look at Zimbra, except for
 screenshots. Looking at its interface, it looks a little busy. But the
 price is right, especially for the open source version. If we were
 re-evaluating mail suites again, Zimbra would be right up there. And it
 might win in a price/performance competition. (Ever shrinking budgets makes
 cost one of our most important factors in any implementations nowadays.)

From what I've managed to read quickly, the biggest issue with the free 
version 
of Zimbra is no connectors for iPhone, BB, and I think maybe even Outlook.  
This makes the free version a non-starter for my client's needs, since they 
have lots of roaming laptop users, some of whom will be using Outlook.  And the 
paid-for versions ain't cheap.

= Included Stuff Follows =
  Zimbra - Product Editions
http://www.zimbra.com/products/product_editions.html
...
  External client compatibility:
  Outlook/MAPI sync
MAPI-based Outlook synchronization with cached mode and offline 
support -- requires Zimbra Professional

  Apple iSync
Two-way synchronization with Apple iSync enabling compatibility 
with Apple iCal, Address Book, and other applications in the Apple 
iSync framework -- requires Zimbra Professional

  Mobility:
  Zimbra Mobile
Over-the-air push synchronization of mail, contacts, and calendar 
to Palm, Symbian, and Windows Mobile 5 devices with no additional 
server -- requires Zimbra Standard or Zimbra Professional

  Blackberry support
Over-the-air synchronization of mail, contacts, and calendar to 
Blackberry devices  -- requires Zimbra Standard or Zimbra 
Professional

= Included Stuff Ends =

--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
Security Blog: http://geoapps.com/





~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Compare two AD / Exchange accounts

2010-05-04 Thread Brian Desmond
I'd probably just use adfind and kick each one to a text file (Joe has a switch 
to sort the attribute names alphabetically, you want this) and then windiff the 
two text files. This is what I usually do.

Thanks,
Brian Desmond
br...@briandesmond.com

c   - 312.731.3132

From: David Lum [mailto:david@nwea.org]
Sent: Tuesday, May 04, 2010 1:00 PM
To: NT System Admin Issues
Subject: Compare two AD / Exchange accounts

Anyone know offhand of a tool / have a query line to compare two Active 
Directory accounts? Group and DL membership, assigned delegates/calendar 
permissions, etc...
David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764






~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Exchange/Outlook - Calendar Question

2010-05-04 Thread Jon Harris
You can do this in Exchange but you will need to create and account and
allow all the users that will post meetings/what not to add and/or delete.
Major pain to maintain but it does work you will just have to trust the
users will not use it for something they are not supposed to do like send
emails under this account unless it is a meeting announcement.

Jon

On Tue, May 4, 2010 at 11:20 AM, Chyka, Robert bch...@medaille.edu wrote:

  Thanks Shook.  I will definitely check it out.



 -BC



 *From:* Andy Shook [mailto:andy.sh...@peak10.com]
 *Sent:* Tuesday, May 04, 2010 11:19 AM

 *To:* NT System Admin Issues
 *Subject:* RE: Exchange/Outlook - Calendar Question



 Not natively within Exchange, you’ll have to go 3rd party.  I’ve only done
 this with Add2Exchange.



 *http://www.diditbetter.com/Add2Exchange.aspx *



 Shook



 *From:* Chyka, Robert [mailto:bch...@medaille.edu]
 *Sent:* Tuesday, May 04, 2010 11:14 AM
 *To:* NT System Admin Issues
 *Subject:* Exchange/Outlook - Calendar Question



 Is there any way to have say 11 people in a department “sync” their Outlook
 calendars to one Public Calendar they can all access?



 Let me know if you need more details.



 I appreciate the help!



 Bob

















~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Exchange/Outlook - Calendar Question

2010-05-04 Thread Jon Harris
It is also a security risk but that goes without saying.

Jon

On Tue, May 4, 2010 at 3:01 PM, Jon Harris jk.har...@gmail.com wrote:

  You can do this in Exchange but you will need to create and account and
 allow all the users that will post meetings/what not to add and/or delete.
 Major pain to maintain but it does work you will just have to trust the
 users will not use it for something they are not supposed to do like send
 emails under this account unless it is a meeting announcement.

 Jon

  On Tue, May 4, 2010 at 11:20 AM, Chyka, Robert bch...@medaille.eduwrote:

  Thanks Shook.  I will definitely check it out.



 -BC



 *From:* Andy Shook [mailto:andy.sh...@peak10.com]
 *Sent:* Tuesday, May 04, 2010 11:19 AM

 *To:* NT System Admin Issues
 *Subject:* RE: Exchange/Outlook - Calendar Question



 Not natively within Exchange, you’ll have to go 3rd party.  I’ve only
 done this with Add2Exchange.



 *http://www.diditbetter.com/Add2Exchange.aspx *



 Shook



 *From:* Chyka, Robert [mailto:bch...@medaille.edu]
 *Sent:* Tuesday, May 04, 2010 11:14 AM
 *To:* NT System Admin Issues
 *Subject:* Exchange/Outlook - Calendar Question



 Is there any way to have say 11 people in a department “sync” their
 Outlook calendars to one Public Calendar they can all access?



 Let me know if you need more details.



 I appreciate the help!



 Bob






















~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Internet Policies

2010-05-04 Thread Chad Leeper


We use web marshal. http://www.8e6security.com/webmarshal.asp
Works pretty well and is pretty cheap.You can add antivirus and anit spyware scanning modules as well.
There is also a fairly robust reporting engine for it.
I had it enabled for 60 users and it was running on Windows Xp. I have since moved it to a Win2003 VM.

/Chad


Ahh… We don’t have an ISA server. I suppose I could enable logging on the ASA and check those logs and do similar things…Hmm… something to think about.




From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 2:44 PMTo: NT System Admin IssuesSubject: Re: Internet Policies

I used a "fake DNS" entry for twitter.com and the others that I found in the ISA log. I made a new forward lookup zone for each one in our Active Dir integrated DNS system. I know it wont block sub-domains but it made the point. It has since been removed. I can use Trend micro officescan if we want to actively block though.Devin

On Tue, May 4, 2010 at 1:22 PM, John Aldrich jaldr...@blueridgecarpet.com wrote:


I was aware of that, but I was wondering what Devin’s company used. J Personally, I’d go for either DNS (if there was a blackhole or something easily implemented like that) or web filtering appliance.





From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Tuesday, May 04, 2010 2:20 PM

To: NT System Admin IssuesSubject: Re: Internet Policies


They can be blocked via DNS, via Firewalls, via Web Filtering technologies.

-ASB: http://XeeSM.com/AndrewBaker

On Tue, May 4, 2010 at 2:11 PM, John Aldrich jaldr...@blueridgecarpet.com wrote:


How did you block them? Do you have an appliance or did you put in some sort of DNS entries?





From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 1:21 PM

To: NT System Admin IssuesSubject: Re: Internet Policies

Up until last month we blocked all the social networking sites. Now our firm is marketing on them. We are adjusting our policies for this. It will be on a user-by-user basis though.Devin


On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote:


What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new “IM Virus” and got an email back from the CEO basically stating “shouldn’t that be a violation of company policy anyway?” and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who’s child is overseas in the military) who used IM on a semi-regular basis.
For this reason, I’m working on coming up with a company policy. I’ve looked at the sample template from SANS as well as another one that someone sent me off-list. I’m planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J
















Think green. Please consider 
the environment before printing 


CONFIDENTIALITY NOTE:
The information contained in this transmission is privileged 
and confidential information intended only for the use of the 
individual or entity named above. If the reader of this message 
is not the intended recipient, you are hereby notified that any 
dissemination, distribution or copying of this communication is 
strictly prohibited. If you have received this transmission in 
error, do not read it. Please immediately reply to the sender 
that you have received this communication in error and then 
delete it. Thank you.
*

  







RE: Internet Policies -- Benefits of IM and Social Media

2010-05-04 Thread Murray Freeman
It sounds like the telephone may become extinct, doesn't it! Our
organization is small, all in one bldg on one floor, so it's very easy
to just walk down to an office. When I get a help desk call, I always
walk to the requestor's office. The young man who works with me uses
Remote Assistance and the telephone. Here, an email is just as fast as
an IM.
 

Murray

 



From: Don Guyer [mailto:don.gu...@prufoxroach.com] 
Sent: Tuesday, May 04, 2010 1:12 PM
To: NT System Admin Issues
Subject: RE: Internet Policies -- Benefits of IM and Social Media



Agreed. As a department, we all use IM. I have coworkers in other
physical locations that I interact with all day. No one answers their
desk phones, because it's usually a vendor or sales call.

 

J

 

E-mail is great for communicating certain things that require a record,
or are too long winded for IM, but IM is great for those hey can you
look at server X? conversations.

 

$.02

 

Don Guyer

Systems Engineer - Information Services

Prudential, Fox  Roach/Trident Group

431 W. Lancaster Avenue

Devon, PA 19333

Direct: (610) 993-3299

Fax: (610) 650-5306

don.gu...@prufoxroach.com mailto:don.gu...@prufoxroach.com 

 

From: Andrew S. Baker [mailto:asbz...@gmail.com] 
Sent: Tuesday, May 04, 2010 2:02 PM
To: NT System Admin Issues
Subject: Re: Internet Policies -- Benefits of IM and Social Media

 

IM is faster than email is faster than a meeting.Personally, I
prefer email to IM, but I understand how and why people use it as a
valid communications tool.   It facilitates quick, informal exchanges
that may not rise to the level of a full discussion.  And both IM and
email are easier to schedule than face-to-face meetings in many cases.

 

Social networking is just a prevalent, but semi-closed network where you
can interact with business partners, customers or prospective clients in
a way where the recipient has some control over who reaches them and how
they are reached, and the sender has access to some rich content without
the fear of antispam interference.   

 

All of the above means of communications are useful to various
organizations, even though abuse of them can waste time.  But so can the
abuse of any other communications vehicle, including meetings.


-ASB: http://XeeSM.com/AndrewBaker



On Tue, May 4, 2010 at 1:39 PM, Murray Freeman mfree...@alanet.org
wrote:

Well, as long as we're discussing IM, we don't allow it currently. But,
I have trouble understanding how IM is better than either email or a
meeting, or using a telephone to accomplish the very same thing as an
IM. Can someone explain that to me. Oh, we've recently adopted social
networking for our organization, but primarily for our membership. I'm
having trouble understanding how social networking will help our members
too!

 

Murray

 

 



From: Steve Ens [mailto:stevey...@gmail.com] 
Sent: Tuesday, May 04, 2010 11:42 AM


To: NT System Admin Issues
Subject: Re: Internet Policies

 

It all depends if there is a business or productivity reason for it.  We
use IM in some of the departments for meetings, quick conversations,
etc.  But if it is used for wasting time, I would not allow it.

On Tue, May 4, 2010 at 11:38 AM, John Aldrich 
jaldr...@blueridgecarpet.com wrote:

What restrictions, if any, do your organizations place on things like IM
or social networking sites? I sent out a warning to the office personnel
this morning regarding the new IM Virus and got an email back from the
CEO basically stating shouldn't that be a violation of company policy
anyway? and I had to tell him, I knew of no policies regarding that;
and that in fact, my former supervisor was fully aware of at least one
person (who's child is overseas in the military) who used IM on a
semi-regular basis.

For this reason, I'm working on coming up with a company policy. I've
looked at the sample template from SANS as well as another one that
someone sent me off-list. I'm planning on incorporating the best of
everything I get, so if anyone has any suggested language regarding IM
or social networking, please let me have it. J

 

  

 

 

 

 

 

 

 

 

 

 

 

 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

Re: Internet Policies

2010-05-04 Thread Jon Harris
When you are building the policy put everything you can in it to deal with
as many issues as possible.  Issues like who can and can not install
software, what kind of monitoring is allowed on the clients or in the
network traffic, get HR involved early on and make sure there is some real
teeth in the policy and don't go with something that is easly to work
around.  Been there and gotten bitten more than one time.  If you are one of
the few that still allows users to be power users or admins now is the time
to strip them if you can of this.  Since the CEO/Owner is concerned work
fast their attention span is not as long as a mill-second.

Jon

On Tue, May 4, 2010 at 2:53 PM, Angus Scott-Fleming angu...@geoapps.comwrote:

 On 4 May 2010 at 12:39, Murray Freeman  wrote:

  Well, as long as we're discussing IM, we don't allow it currently. But, I
  have trouble understanding how IM is better than either email or a
 meeting,
  or using a telephone to accomplish the very same thing as an IM. Can
 someone
  explain that to me. Oh, we've recently adopted social networking for our
  organization, but primarily for our membership. I'm having trouble
  understanding how social networking will help our members too!

 IM is Instant whereas email isn't, but it can be ignored if you're on a
 critical phone call or busy doing something that requires thought, which a
 phone call can't.  I use IM with my-son-the-university-tech-support-geek
 when
 I'm picking his brains while debugging a client situation that's more up
 his
 alley, very useful as I can get links from him and dump screenshots back to
 him
 instantly which email doesn't allow.

 Also, for a multi-building company I can see where an internal Jabber
 network
 could be very useful.

 Social networking is a different disallowed beast altogether IMHO, although
 I
 can see where LinkedIn might be useful in some businesses.

 --
 Angus Scott-Fleming
 GeoApps, Tucson, Arizona
 1-520-290-5038
 Security Blog: http://geoapps.com/





 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Internet Policies

2010-05-04 Thread Ziots, Edward
Yep the good old blackhole technique, most of the naughty domains are
going to 127.0.0.1 which helps if the malware is programmed to go back
to a specific domain name, but that doesn't help those malware that is
using google or other public available sites, that might have been
compromised to get back to its instruction set. 

 

Also there is the fast-flux domains which is usually tied with
malware/botnets, that this approach has a good affect on. Again nothing
is full proof but if you can reduce your risk and quickly, that is
better than sitting there praying for forgiveness after you get owned. 

 

Z

 

Edward Ziots

CISSP,MCSA,MCP+I,Security +,Network +,CCA

Network Engineer

Lifespan Organization

401-639-3505

ezi...@lifespan.org

 

From: Devin Meade [mailto:devin.me...@gmail.com] 
Sent: Tuesday, May 04, 2010 2:44 PM
To: NT System Admin Issues
Subject: Re: Internet Policies

 

I used a fake DNS entry for twitter.com and the others that I found in
the ISA log.  I made a new forward lookup zone for each one in our
Active Dir integrated DNS system.  I know it wont block sub-domains but
it made the point.  It has since been removed.  I can use Trend micro
officescan if we want to actively block though.
Devin

On Tue, May 4, 2010 at 1:22 PM, John Aldrich 
jaldr...@blueridgecarpet.com wrote:

I was aware of that, but I was wondering what Devin's company used. J
Personally, I'd go for either DNS (if there was a blackhole or something
easily implemented like that) or web filtering appliance.

 

  

 

From: Andrew S. Baker [mailto:asbz...@gmail.com] 
Sent: Tuesday, May 04, 2010 2:20 PM


To: NT System Admin Issues
Subject: Re: Internet Policies

 

They can be blocked via DNS, via Firewalls, via Web Filtering
technologies.


-ASB: http://XeeSM.com/AndrewBaker

On Tue, May 4, 2010 at 2:11 PM, John Aldrich 
jaldr...@blueridgecarpet.com wrote:

How did you block them? Do you have an appliance or did you put in some
sort of DNS entries?

 



 

From: Devin Meade [mailto:devin.me...@gmail.com] 
Sent: Tuesday, May 04, 2010 1:21 PM


To: NT System Admin Issues
Subject: Re: Internet Policies

 

Up until last month we blocked all the social networking sites.  Now our
firm is marketing on them.  We are adjusting our policies for this.  It
will be on a user-by-user basis though.
Devin

On Tue, May 4, 2010 at 11:38 AM, John Aldrich 
jaldr...@blueridgecarpet.com wrote:

What restrictions, if any, do your organizations place on things like IM
or social networking sites? I sent out a warning to the office personnel
this morning regarding the new IM Virus and got an email back from the
CEO basically stating shouldn't that be a violation of company policy
anyway? and I had to tell him, I knew of no policies regarding that;
and that in fact, my former supervisor was fully aware of at least one
person (who's child is overseas in the military) who used IM on a
semi-regular basis.

For this reason, I'm working on coming up with a company policy. I've
looked at the sample template from SANS as well as another one that
someone sent me off-list. I'm planning on incorporating the best of
everything I get, so if anyone has any suggested language regarding IM
or social networking, please let me have it. J

 



 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

Re: Internet Policies -- Benefits of IM and Social Media

2010-05-04 Thread Jon Harris
One advantage of IM over phone conversations is proof of what is said in the
conversation.  Some times it is quite useful when you need to CYA.

Jon

On Tue, May 4, 2010 at 3:19 PM, Murray Freeman mfree...@alanet.org wrote:

  It sounds like the telephone may become extinct, doesn't it! Our
 organization is small, all in one bldg on one floor, so it's very easy to
 just walk down to an office. When I get a help desk call, I always walk to
 the requestor's office. The young man who works with me uses Remote
 Assistance and the telephone. Here, an email is just as fast as an IM.


 *Murray*


  --
 *From:* Don Guyer [mailto:don.gu...@prufoxroach.com]
 *Sent:* Tuesday, May 04, 2010 1:12 PM

 *To:* NT System Admin Issues
 *Subject:* RE: Internet Policies -- Benefits of IM and Social Media

Agreed. As a department, we all use IM. I have coworkers in other
 physical locations that I interact with all day. No one answers their desk
 phones, because it’s usually a vendor or sales call.



 J



 E-mail is great for communicating certain things that require a record, or
 are too long winded for IM, but IM is great for those “hey can you look at
 server X?” conversations.



 $.02



 Don Guyer

 Systems Engineer - Information Services

 Prudential, Fox  Roach/Trident Group

 431 W. Lancaster Avenue

 Devon, PA 19333

 Direct: (610) 993-3299

 Fax: (610) 650-5306

 don.gu...@prufoxroach.com



 *From:* Andrew S. Baker [mailto:asbz...@gmail.com]
 *Sent:* Tuesday, May 04, 2010 2:02 PM
 *To:* NT System Admin Issues
 *Subject:* Re: Internet Policies -- Benefits of IM and Social Media



 IM is faster than email is faster than a meeting.Personally, I prefer
 email to IM, but I understand how and why people use it as a valid
 communications tool.   It facilitates quick, informal exchanges that may not
 rise to the level of a full discussion.  And both IM and email are easier to
 schedule than face-to-face meetings in many cases.



 Social networking is just a prevalent, but semi-closed network where you
 can interact with business partners, customers or prospective clients in a
 way where the recipient has some control over who reaches them and how they
 are reached, and the sender has access to some rich content without the fear
 of antispam interference.



 All of the above means of communications are useful to various
 organizations, even though abuse of them can waste time.  But so can the
 abuse of any other communications vehicle, including meetings.


 -ASB: http://XeeSM.com/AndrewBaker http://xeesm.com/AndrewBaker

  On Tue, May 4, 2010 at 1:39 PM, Murray Freeman mfree...@alanet.org
 wrote:

 Well, as long as we're discussing IM, we don't allow it currently. But, I
 have trouble understanding how IM is better than either email or a meeting,
 or using a telephone to accomplish the very same thing as an IM. Can someone
 explain that to me. Oh, we've recently adopted social networking for our
 organization, but primarily for our membership. I'm having trouble
 understanding how social networking will help our members too!



 *Murray*




  --

 *From:* Steve Ens [mailto:stevey...@gmail.com]
 *Sent:* Tuesday, May 04, 2010 11:42 AM


 *To:* NT System Admin Issues
 *Subject:* Re: Internet Policies



 It all depends if there is a business or productivity reason for it.  We
 use IM in some of the departments for meetings, quick conversations, etc.
 But if it is used for wasting time, I would not allow it.

 On Tue, May 4, 2010 at 11:38 AM, John Aldrich 
 jaldr...@blueridgecarpet.com wrote:

 What restrictions, if any, do your organizations place on things like IM or
 social networking sites? I sent out a warning to the office personnel this
 morning regarding the new “IM Virus” and got an email back from the CEO
 basically stating “shouldn’t that be a violation of company policy anyway?”
 and I had to tell him, I knew of no policies regarding that; and that in
 fact, my former supervisor was fully aware of at least one person (who’s
 child is overseas in the military) who used IM on a semi-regular basis.

 For this reason, I’m working on coming up with a company policy. I’ve
 looked at the sample template from SANS as well as another one that someone
 sent me off-list. I’m planning on incorporating the best of everything I
 get, so if anyone has any suggested language regarding IM or social
 networking, please let me have it. J



 [image: John-Aldrich][image: Tile-Tools]

































~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image002.jpgimage001.jpg

RE: Internet Policies

2010-05-04 Thread John Aldrich
Interesting. Might actually be something to look into, although I’d prefer an 
“appliance” so I don’t have to buy a server (we don’t have any Win2K8 
servers…only 2003 R2)

 

John-AldrichTile-Tools

 

From: Chad Leeper [mailto:c...@capitalcityfruit.com] 
Sent: Tuesday, May 04, 2010 3:15 PM
To: NT System Admin Issues
Subject: RE: Internet Policies

 

We use web marshal.  http://www.8e6security.com/webmarshal.asp

Works pretty well and is pretty cheap. You can add antivirus and anit spyware 
scanning modules as well.

There is also a fairly robust reporting engine for it.

I had it enabled for 60 users and it was running on Windows Xp.  I have since 
moved it to a Win2003 VM.

 

/Chad

Ahh… We don’t have an ISA server. I suppose I could enable logging on the ASA 
and check those logs and do similar things…Hmm… something to think about.

 

John-AldrichTile-Tools

 

From: Devin Meade [mailto:devin.me...@gmail.com] 
Sent: Tuesday, May 04, 2010 2:44 PM
To: NT System Admin Issues
Subject: Re: Internet Policies

 

I used a fake DNS entry for twitter.com http://twitter.com/  and the others 
that I found in the ISA log.  I made a new forward lookup zone for each one in 
our Active Dir integrated DNS system.  I know it wont block sub-domains but it 
made the point.  It has since been removed.  I can use Trend micro officescan 
if we want to actively block though.
Devin

On Tue, May 4, 2010 at 1:22 PM, John Aldrich jaldr...@blueridgecarpet.com 
wrote:

I was aware of that, but I was wondering what Devin’s company used. J 
Personally, I’d go for either DNS (if there was a blackhole or something easily 
implemented like that) or web filtering appliance.

 

John-AldrichTile-Tools

 

From: Andrew S. Baker [mailto:asbz...@gmail.com] 
Sent: Tuesday, May 04, 2010 2:20 PM


To: NT System Admin Issues
Subject: Re: Internet Policies

 

They can be blocked via DNS, via Firewalls, via Web Filtering technologies.


-ASB: http://XeeSM.com/AndrewBaker

On Tue, May 4, 2010 at 2:11 PM, John Aldrich jaldr...@blueridgecarpet.com 
wrote:

How did you block them? Do you have an appliance or did you put in some sort of 
DNS entries?

 

John-AldrichTile-Tools

 

From: Devin Meade [mailto:devin.me...@gmail.com] 
Sent: Tuesday, May 04, 2010 1:21 PM


To: NT System Admin Issues
Subject: Re: Internet Policies

 

Up until last month we blocked all the social networking sites.  Now our firm 
is marketing on them.  We are adjusting our policies for this.  It will be on a 
user-by-user basis though.
Devin

On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com 
wrote:

What restrictions, if any, do your organizations place on things like IM or 
social networking sites? I sent out a warning to the office personnel this 
morning regarding the new “IM Virus” and got an email back from the CEO 
basically stating “shouldn’t that be a violation of company policy anyway?” and 
I had to tell him, I knew of no policies regarding that; and that in fact, my 
former supervisor was fully aware of at least one person (who’s child is 
overseas in the military) who used IM on a semi-regular basis.

For this reason, I’m working on coming up with a company policy. I’ve looked at 
the sample template from SANS as well as another one that someone sent me 
off-list. I’m planning on incorporating the best of everything I get, so if 
anyone has any suggested language regarding IM or social networking, please let 
me have it. J

 

John-AldrichTile-Tools

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


Think green. Please consider the environment before printing 
 CONFIDENTIALITY 
NOTE: The information contained in this transmission is privileged and 
confidential information intended only for the use of the individual or entity 
named above. If the reader of this message is not the intended recipient, you 
are hereby notified that any dissemination, distribution or copying of this 
communication is strictly prohibited. If you have received this transmission in 
error, do not read it. Please immediately reply to the sender that you have 
received this communication in error and then delete it. Thank you. 
* 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

RE: Internet Policies

2010-05-04 Thread Tim Evans
We redirect ours to an internal webpage that lets the user know the site was 
blocked and then we can look thru the logs to see who has been trying to go 
where.

...Tim

From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Tuesday, May 04, 2010 12:22 PM
To: NT System Admin Issues
Subject: RE: Internet Policies

Yep the good old blackhole technique, most of the naughty domains are going 
to 127.0.0.1 which helps if the malware is programmed to go back to a specific 
domain name, but that doesn't help those malware that is using google or other 
public available sites, that might have been compromised to get back to its 
instruction set.

Also there is the fast-flux domains which is usually tied with malware/botnets, 
that this approach has a good affect on. Again nothing is full proof but if you 
can reduce your risk and quickly, that is better than sitting there praying for 
forgiveness after you get owned.

Z

Edward Ziots
CISSP,MCSA,MCP+I,Security +,Network +,CCA
Network Engineer
Lifespan Organization
401-639-3505
ezi...@lifespan.org

From: Devin Meade [mailto:devin.me...@gmail.com]
Sent: Tuesday, May 04, 2010 2:44 PM
To: NT System Admin Issues
Subject: Re: Internet Policies

I used a fake DNS entry for twitter.comhttp://twitter.com and the others 
that I found in the ISA log.  I made a new forward lookup zone for each one in 
our Active Dir integrated DNS system.  I know it wont block sub-domains but it 
made the point.  It has since been removed.  I can use Trend micro officescan 
if we want to actively block though.
Devin
On Tue, May 4, 2010 at 1:22 PM, John Aldrich 
jaldr...@blueridgecarpet.commailto:jaldr...@blueridgecarpet.com wrote:
I was aware of that, but I was wondering what Devin's company used. :) 
Personally, I'd go for either DNS (if there was a blackhole or something easily 
implemented like that) or web filtering appliance.

[cid:image001.jpg@01CAEB85.31F92630][cid:image002@01caeb85.31f92630]

From: Andrew S. Baker [mailto:asbz...@gmail.commailto:asbz...@gmail.com]
Sent: Tuesday, May 04, 2010 2:20 PM

To: NT System Admin Issues
Subject: Re: Internet Policies

They can be blocked via DNS, via Firewalls, via Web Filtering technologies.

-ASB: http://XeeSM.com/AndrewBaker
On Tue, May 4, 2010 at 2:11 PM, John Aldrich 
jaldr...@blueridgecarpet.commailto:jaldr...@blueridgecarpet.com wrote:
How did you block them? Do you have an appliance or did you put in some sort of 
DNS entries?

[cid:image001.jpg@01CAEB85.31F92630][cid:image002@01caeb85.31f92630]

From: Devin Meade [mailto:devin.me...@gmail.commailto:devin.me...@gmail.com]
Sent: Tuesday, May 04, 2010 1:21 PM

To: NT System Admin Issues
Subject: Re: Internet Policies

Up until last month we blocked all the social networking sites.  Now our firm 
is marketing on them.  We are adjusting our policies for this.  It will be on a 
user-by-user basis though.
Devin
On Tue, May 4, 2010 at 11:38 AM, John Aldrich 
jaldr...@blueridgecarpet.commailto:jaldr...@blueridgecarpet.com wrote:
What restrictions, if any, do your organizations place on things like IM or 
social networking sites? I sent out a warning to the office personnel this 
morning regarding the new IM Virus and got an email back from the CEO 
basically stating shouldn't that be a violation of company policy anyway? and 
I had to tell him, I knew of no policies regarding that; and that in fact, my 
former supervisor was fully aware of at least one person (who's child is 
overseas in the military) who used IM on a semi-regular basis.
For this reason, I'm working on coming up with a company policy. I've looked at 
the sample template from SANS as well as another one that someone sent me 
off-list. I'm planning on incorporating the best of everything I get, so if 
anyone has any suggested language regarding IM or social networking, please let 
me have it. :)

[cid:image001.jpg@01CAEB85.31F92630][cid:image002@01caeb85.31f92630]

































~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~inline: image001.jpginline: image002.jpg

RE: Internet Policies

2010-05-04 Thread Murray Freeman
I've just got to disagree with one comment, ...less disruptive then a
phone call... The person receiving a phone call, an IM or email, not to
mention a tweet is ALWAYS distracted. One thing we've done is put a Do
Not Disturb button on our phones, so you know if a person is busy and
doesn't want to be disturbed. The phone doesn't ring, just goes directly
into voice mail. Getting back to social networking, the real problem is
the fact that there doesn't seem to be a way to block non-business
tweets. It's just another distraction, like IM and email from friends
and family.
 

Murray

 



From: Steven Peck [mailto:sep...@gmail.com] 
Sent: Tuesday, May 04, 2010 1:46 PM
To: NT System Admin Issues
Subject: Re: Internet Policies


IM isn't just chat.  Especially if you have OCS installed.

There are tons of things that can be dispensed with a quick 2-3 line IM
session that would require waiting and delays for other things.  With IM
you can see if a user if actually present and can be contacted now.
It's faster then email for yes/no questions and is less disruptive then
a phone call.  If I see a user status as 'Busy' then I don't bug them,
but if they are listed as 'Available' then I can ping them on quick
short questions.  

During phone conferences having the ability to contact people not on the
line, (outage, check with engineers working the issue) to then relay
information to the call is invaluable.  Our help desk uses it.  Our help
desk is scattered over 4 physical locations and if there is a major
issue, then they can't call the other locations because everyone is on
the phone.  Late night troubleshooting sessions from home that don't
need a call means my boss isn't calling for status, he just checks me on
IM.  My wife and kids do not get woken up.  It is often easier to
arrange lunch, etc through IM rather then email.  In a tightly
controlled messaging environment it means less clutter in the archives.


Once people actually start using IM for business reasons it's seriously
addictive and helps substantially but it's one of those 'you have to
experience it to understand it' type of things.

Out of all the enabled IM accounts we have 3/4 signed on during business
hours which is a huge buy in for us.  We do not mandate people use it,
merely make it available as a service.

Steven Peck





On Tue, May 4, 2010 at 10:39 AM, Murray Freeman mfree...@alanet.org
wrote:


Well, as long as we're discussing IM, we don't allow it
currently. But, I have trouble understanding how IM is better than
either email or a meeting, or using a telephone to accomplish the very
same thing as an IM. Can someone explain that to me. Oh, we've recently
adopted social networking for our organization, but primarily for our
membership. I'm having trouble understanding how social networking will
help our members too!
 

Murray

 



From: Steve Ens [mailto:stevey...@gmail.com] 
Sent: Tuesday, May 04, 2010 11:42 AM 

To: NT System Admin Issues
Subject: Re: Internet Policies


It all depends if there is a business or productivity reason for
it.  We use IM in some of the departments for meetings, quick
conversations, etc.  But if it is used for wasting time, I would not
allow it.


On Tue, May 4, 2010 at 11:38 AM, John Aldrich 
jaldr...@blueridgecarpet.com wrote:


What restrictions, if any, do your organizations place
on things like IM or social networking sites? I sent out a warning to
the office personnel this morning regarding the new IM Virus and got
an email back from the CEO basically stating shouldn't that be a
violation of company policy anyway? and I had to tell him, I knew of no
policies regarding that; and that in fact, my former supervisor was
fully aware of at least one person (who's child is overseas in the
military) who used IM on a semi-regular basis.

For this reason, I'm working on coming up with a company
policy. I've looked at the sample template from SANS as well as another
one that someone sent me off-list. I'm planning on incorporating the
best of everything I get, so if anyone has any suggested language
regarding IM or social networking, please let me have it. J

 

  

 

 



 






 



 



 



 


 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

Re: Sort of OT: SPAM - should I stick with GFI MailEssentials?

2010-05-04 Thread Sean Martin
Phil makes a good point, specifically regarding defense in depth. If you're
relying on the same engine/dats, it doesn't matter how many gateways or
levels of software protection you have. We made the same mistake here when
management decided a certain vendors total protection suite was a good idea
and proceded to implement their respective software/gateways. It wasn't a
big deal until we realized our hosted AV/Spam solution also relied on the
same engine/dats. As a result, new gateways are on the way...

- Sean

On Tue, May 4, 2010 at 10:30 AM, Phil Brutsche p...@optimumdata.com wrote:

 I have 2 thoughts on the matter:

 a) I'm sure you're familiar with the saying devil you know vs the devil
 you don't. You know the GFI product works. Your other options are
 unknown quantities.

 b) Consider defense in depth. These days most anti-spam implementations
 also include anti-virus. If you use the same scanning engine on your
 desktop as well as the inbound mail path, and the mail antivirus misses
 some piece of malware...

 On 5/4/2010 12:19 PM, Raper, Jonathan - Eagle wrote:
  Hi everyone,
 
  We recently replaced our AV (McAfee) with Trend for both clients and
  Exchange 2007 (sorry Sunbelt – we came REALLY close to choosing VIPRE).
  We did not purchase the spam filtering option with Trend ScanMail, but
  are now considering it. We’ve been running GFI MailEssentials for years
  on a dedicated box. We’re protecting between 400 and 500 mailboxes.
 
  The price for GFI continues to be attractive, so much so that hosted
  solutions don’t seem to be worth the cost differential… The first
  logical option to me would be to move toward Trend, but I’m not so sure
  that adding spam filtering at the Exchange Server level is a good idea
  from a resource perspective. We were there at one point years ago, with
  GFI and ended up moving off to a dedicated box, because GFI was eating
  up too many resources (we were getting HAMMERED with spam – million a
  month, easily).
 
  Has anyone on this list moved away from GFI to something else? If so,
  what did you move to and what was your reasoning?
 
  I welcome any and all thoughts/suggestions/experiences.

 --

 Phil Brutsche
 p...@optimumdata.com


 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Internet Policies

2010-05-04 Thread Ziots, Edward
Actually, Policies are broad reaching statements of what Senior
Management views are on security, they are not all encompassing
documents, nor do they have all the details of how the controls are to
be applied, those are done in the process and procedures of the
implementation of the controls ( Technical, Administrative, and
Physical) to meet the letter of the policy. You have system specific
polices to cover things like email use, internet use ( usually covered
under acceptable use policy, or broke out to its own policy altogether).


 

I tend to favor the approach of more individual/system specific policies
that are linked back to the greater institution security policy but
cover the required items to cover items facing the business. I do agree
if HR isn't a partner with you from the beginning then you have less
muscle in the policy but if Management doesn't support or enforce the
policy, then the policy isn't worth the paper its written on, and trust
me there are plenty of managers out there that don't enforce the
policies they should be enforcing which sets a bad tone for their
companies accordingly. 

 

Nobody comes out unscathed from policy writing or enforcement nor is it
a pretty process, but it is necessary to maintain law and order within
the organization, or things will run wild in a hurry and you will be
looking at the wild wild west, with no recourse as compared to structure
and organization accordingly. 

 

Z  

 

Edward Ziots

CISSP,MCSA,MCP+I,Security +,Network +,CCA

Network Engineer

Lifespan Organization

401-639-3505

ezi...@lifespan.org

 

From: Jon Harris [mailto:jk.har...@gmail.com] 
Sent: Tuesday, May 04, 2010 3:21 PM
To: NT System Admin Issues
Subject: Re: Internet Policies

 

When you are building the policy put everything you can in it to deal
with as many issues as possible.  Issues like who can and can not
install software, what kind of monitoring is allowed on the clients or
in the network traffic, get HR involved early on and make sure there is
some real teeth in the policy and don't go with something that is easly
to work around.  Been there and gotten bitten more than one time.  If
you are one of the few that still allows users to be power users or
admins now is the time to strip them if you can of this.  Since the
CEO/Owner is concerned work fast their attention span is not as long as
a mill-second.

 

Jon

On Tue, May 4, 2010 at 2:53 PM, Angus Scott-Fleming
angu...@geoapps.com wrote:

On 4 May 2010 at 12:39, Murray Freeman  wrote:

 Well, as long as we're discussing IM, we don't allow it currently.
But, I
 have trouble understanding how IM is better than either email or a
meeting,
 or using a telephone to accomplish the very same thing as an IM. Can
someone
 explain that to me. Oh, we've recently adopted social networking for
our
 organization, but primarily for our membership. I'm having trouble
 understanding how social networking will help our members too!

IM is Instant whereas email isn't, but it can be ignored if you're on
a
critical phone call or busy doing something that requires thought, which
a
phone call can't.  I use IM with my-son-the-university-tech-support-geek
when
I'm picking his brains while debugging a client situation that's more up
his
alley, very useful as I can get links from him and dump screenshots back
to him
instantly which email doesn't allow.

Also, for a multi-building company I can see where an internal Jabber
network
could be very useful.

Social networking is a different disallowed beast altogether IMHO,
although I
can see where LinkedIn might be useful in some businesses.

--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
Security Blog: http://geoapps.com/





~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Internet Policies

2010-05-04 Thread John Aldrich
Well, it's somewhat of a moot point now as HR came to me with a paper copy
of a document they have all new employees sign (I never signed it, though.
J) and I scanned and converted it via OCR and added a few tweaks, such as
specifying that AIM, Yahoo and other instant messaging clients are not
permitted and that social networking sites are only allowed for business
uses and must be pre-authorized by management. I also outlawed bringing in
data disks (including USB Thumb Drives) from outside for the purposes of
combating viruses and other mal-ware.

I've given a copy of the revised document to the CEO for his review along
with a copy of the original. *shrug* out of my hands now unless/until he
wants to make changes. J

 

John-AldrichTile-Tools

 

From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: Tuesday, May 04, 2010 3:31 PM
To: NT System Admin Issues
Subject: RE: Internet Policies

 

Actually, Policies are broad reaching statements of what Senior Management
views are on security, they are not all encompassing documents, nor do they
have all the details of how the controls are to be applied, those are done
in the process and procedures of the  implementation of the controls (
Technical, Administrative, and Physical) to meet the letter of the policy.
You have system specific polices to cover things like email use, internet
use ( usually covered under acceptable use policy, or broke out to its own
policy altogether). 

 

I tend to favor the approach of more individual/system specific policies
that are linked back to the greater institution security policy but cover
the required items to cover items facing the business. I do agree if HR
isn't a partner with you from the beginning then you have less muscle in the
policy but if Management doesn't support or enforce the policy, then the
policy isn't worth the paper its written on, and trust me there are plenty
of managers out there that don't enforce the policies they should be
enforcing which sets a bad tone for their companies accordingly. 

 

Nobody comes out unscathed from policy writing or enforcement nor is it a
pretty process, but it is necessary to maintain law and order within the
organization, or things will run wild in a hurry and you will be looking at
the wild wild west, with no recourse as compared to structure and
organization accordingly. 

 

Z  

 

Edward Ziots

CISSP,MCSA,MCP+I,Security +,Network +,CCA

Network Engineer

Lifespan Organization

401-639-3505

ezi...@lifespan.org

 

From: Jon Harris [mailto:jk.har...@gmail.com] 
Sent: Tuesday, May 04, 2010 3:21 PM
To: NT System Admin Issues
Subject: Re: Internet Policies

 

When you are building the policy put everything you can in it to deal with
as many issues as possible.  Issues like who can and can not install
software, what kind of monitoring is allowed on the clients or in the
network traffic, get HR involved early on and make sure there is some real
teeth in the policy and don't go with something that is easly to work
around.  Been there and gotten bitten more than one time.  If you are one of
the few that still allows users to be power users or admins now is the time
to strip them if you can of this.  Since the CEO/Owner is concerned work
fast their attention span is not as long as a mill-second.

 

Jon

On Tue, May 4, 2010 at 2:53 PM, Angus Scott-Fleming angu...@geoapps.com
wrote:

On 4 May 2010 at 12:39, Murray Freeman  wrote:

 Well, as long as we're discussing IM, we don't allow it currently. But, I
 have trouble understanding how IM is better than either email or a
meeting,
 or using a telephone to accomplish the very same thing as an IM. Can
someone
 explain that to me. Oh, we've recently adopted social networking for our
 organization, but primarily for our membership. I'm having trouble
 understanding how social networking will help our members too!

IM is Instant whereas email isn't, but it can be ignored if you're on a
critical phone call or busy doing something that requires thought, which a
phone call can't.  I use IM with my-son-the-university-tech-support-geek
when
I'm picking his brains while debugging a client situation that's more up his
alley, very useful as I can get links from him and dump screenshots back to
him
instantly which email doesn't allow.

Also, for a multi-building company I can see where an internal Jabber
network
could be very useful.

Social networking is a different disallowed beast altogether IMHO, although
I
can see where LinkedIn might be useful in some businesses.

--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
Security Blog: http://geoapps.com/





~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~image001.jpgimage002.jpg

RE: Internet Policies -- Benefits of IM and Social Media

2010-05-04 Thread Ziots, Edward
Jon, 

 

I don't think that can constitute as Primary/Best evidence in a court of law, 
especially when electronic communications is usually considered Heresay, and 
therefore needs to be corroborated with other sources. 

 

Also: The evidence only shows a communication from the source communication to 
the destination computer, and doesn't accurately reflect the person or entity 
behind the communications ( Anyone can refute there Login ID was hacked, and it 
wasn't them that sent the communications) and I haven't seen many IM packages 
provide two factor authentication, that provide additional evidence that said 
user/entity is who they claim to be...

 

Another item of interest with IM communications:

Electronic Communications Privacy Act of 1986 ( Updated in 2000)

http://en.wikipedia.org/wiki/Electronic_Communications_Privacy_Act

 

Possibly monitoring or intercepting the communications, via IM without the 
authorization for a wiretap could constitute a violation of existing wiretap 
laws:  IM conversions are internet conversations. 

Telephone tapping (or wire tapping/wiretapping in the USA 
http://en.wikipedia.org/wiki/USA ) is the monitoring of telephone 
http://en.wikipedia.org/wiki/Telephone  and Internet 
http://en.wikipedia.org/wiki/Internet  conversations by a third party, often 
by covert means.

 

While workplace communications are in theory protected an employer must simply 
give notice or a supervisor must feel that the employee's actions are not in 
the company's interest to gain access to communiqué. This means that with 
minimal assumptions an employer can monitor communications within the company. 
(Reason why you want these things in policy, and the users to sign off on the 
policy, either acceptable use, or a system specific or issue specific policy)

 

Plus its a lot easier for information disclosure on unregulated IM that goes 
outside the organization, which raises the risk of insider threat, which makes 
you really think, was that IM project a good idea anyways? Why are the bossess 
still allowing IM from 3rd parties to carry communications and possibly the 
company secrets right out the door over networks they don't own to endpoints 
around the world. 

 

Just food for thought, 

 

PS: Disclaimer, this does not constitute in any way shape or form legal advice, 
consult your company legal departments for further guidance on these and all 
legal matters...

 

EZ

 

 

Edward Ziots

CISSP,MCSA,MCP+I,Security +,Network +,CCA

Network Engineer

Lifespan Organization

401-639-3505

ezi...@lifespan.org

 

From: Jon Harris [mailto:jk.har...@gmail.com] 
Sent: Tuesday, May 04, 2010 3:23 PM
To: NT System Admin Issues
Subject: Re: Internet Policies -- Benefits of IM and Social Media

 

One advantage of IM over phone conversations is proof of what is said in the 
conversation.  Some times it is quite useful when you need to CYA.

 

Jon

On Tue, May 4, 2010 at 3:19 PM, Murray Freeman mfree...@alanet.org wrote:

It sounds like the telephone may become extinct, doesn't it! Our organization 
is small, all in one bldg on one floor, so it's very easy to just walk down to 
an office. When I get a help desk call, I always walk to the requestor's 
office. The young man who works with me uses Remote Assistance and the 
telephone. Here, an email is just as fast as an IM.

 

Murray

 

 



From: Don Guyer [mailto:don.gu...@prufoxroach.com] 
Sent: Tuesday, May 04, 2010 1:12 PM 


To: NT System Admin Issues

Subject: RE: Internet Policies -- Benefits of IM and Social Media

Agreed. As a department, we all use IM. I have coworkers in other physical 
locations that I interact with all day. No one answers their desk phones, 
because it's usually a vendor or sales call.

 

J

 

E-mail is great for communicating certain things that require a record, or are 
too long winded for IM, but IM is great for those hey can you look at server 
X? conversations.

 

$.02

 

Don Guyer

Systems Engineer - Information Services

Prudential, Fox  Roach/Trident Group

431 W. Lancaster Avenue

Devon, PA 19333

Direct: (610) 993-3299

Fax: (610) 650-5306

don.gu...@prufoxroach.com

 

From: Andrew S. Baker [mailto:asbz...@gmail.com] 
Sent: Tuesday, May 04, 2010 2:02 PM
To: NT System Admin Issues
Subject: Re: Internet Policies -- Benefits of IM and Social Media

 

IM is faster than email is faster than a meeting.Personally, I prefer email 
to IM, but I understand how and why people use it as a valid communications 
tool.   It facilitates quick, informal exchanges that may not rise to the level 
of a full discussion.  And both IM and email are easier to schedule than 
face-to-face meetings in many cases.

 

Social networking is just a prevalent, but semi-closed network where you can 
interact with business partners, customers or prospective clients in a way 
where the recipient has some control over who reaches them and how they are 
reached, and the sender has access to 

RE: Compare two AD / Exchange accounts

2010-05-04 Thread David Lum
Rock on, thanks everyone.

Dave

From: Brian Desmond [mailto:br...@briandesmond.com]
Sent: Tuesday, May 04, 2010 12:00 PM
To: NT System Admin Issues
Subject: RE: Compare two AD / Exchange accounts

I'd probably just use adfind and kick each one to a text file (Joe has a switch 
to sort the attribute names alphabetically, you want this) and then windiff the 
two text files. This is what I usually do.

Thanks,
Brian Desmond
br...@briandesmond.com

c   - 312.731.3132

From: David Lum [mailto:david@nwea.org]
Sent: Tuesday, May 04, 2010 1:00 PM
To: NT System Admin Issues
Subject: Compare two AD / Exchange accounts

Anyone know offhand of a tool / have a query line to compare two Active 
Directory accounts? Group and DL membership, assigned delegates/calendar 
permissions, etc...
David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764










~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Internet Policies -- Benefits of IM and Social Media

2010-05-04 Thread Murray Freeman
Are you suggesting that IM is treated differently than email under the laws of 
evidence?
 

Murray 

 



From: Ziots, Edward [mailto:ezi...@lifespan.org] 
Sent: Tuesday, May 04, 2010 2:48 PM
To: NT System Admin Issues
Subject: RE: Internet Policies -- Benefits of IM and Social Media



Jon, 

 

I don't think that can constitute as Primary/Best evidence in a court of law, 
especially when electronic communications is usually considered Heresay, and 
therefore needs to be corroborated with other sources. 

 

Also: The evidence only shows a communication from the source communication to 
the destination computer, and doesn't accurately reflect the person or entity 
behind the communications ( Anyone can refute there Login ID was hacked, and it 
wasn't them that sent the communications) and I haven't seen many IM packages 
provide two factor authentication, that provide additional evidence that said 
user/entity is who they claim to be...

 

Another item of interest with IM communications:

Electronic Communications Privacy Act of 1986 ( Updated in 2000)

http://en.wikipedia.org/wiki/Electronic_Communications_Privacy_Act

 

Possibly monitoring or intercepting the communications, via IM without the 
authorization for a wiretap could constitute a violation of existing wiretap 
laws:  IM conversions are internet conversations. 

Telephone tapping (or wire tapping/wiretapping in the USA 
http://en.wikipedia.org/wiki/USA ) is the monitoring of telephone 
http://en.wikipedia.org/wiki/Telephone  and Internet 
http://en.wikipedia.org/wiki/Internet  conversations by a third party, often 
by covert means.

 

While workplace communications are in theory protected an employer must simply 
give notice or a supervisor must feel that the employee's actions are not in 
the company's interest to gain access to communiqué. This means that with 
minimal assumptions an employer can monitor communications within the company. 
(Reason why you want these things in policy, and the users to sign off on the 
policy, either acceptable use, or a system specific or issue specific policy)

 

Plus its a lot easier for information disclosure on unregulated IM that goes 
outside the organization, which raises the risk of insider threat, which makes 
you really think, was that IM project a good idea anyways? Why are the bossess 
still allowing IM from 3rd parties to carry communications and possibly the 
company secrets right out the door over networks they don't own to endpoints 
around the world. 

 

Just food for thought, 

 

PS: Disclaimer, this does not constitute in any way shape or form legal advice, 
consult your company legal departments for further guidance on these and all 
legal matters...

 

EZ

 

 

Edward Ziots

CISSP,MCSA,MCP+I,Security +,Network +,CCA

Network Engineer

Lifespan Organization

401-639-3505

ezi...@lifespan.org

 

From: Jon Harris [mailto:jk.har...@gmail.com] 
Sent: Tuesday, May 04, 2010 3:23 PM
To: NT System Admin Issues
Subject: Re: Internet Policies -- Benefits of IM and Social Media

 

One advantage of IM over phone conversations is proof of what is said in the 
conversation.  Some times it is quite useful when you need to CYA.

 

Jon

On Tue, May 4, 2010 at 3:19 PM, Murray Freeman mfree...@alanet.org wrote:

It sounds like the telephone may become extinct, doesn't it! Our organization 
is small, all in one bldg on one floor, so it's very easy to just walk down to 
an office. When I get a help desk call, I always walk to the requestor's 
office. The young man who works with me uses Remote Assistance and the 
telephone. Here, an email is just as fast as an IM.

 

Murray

 

 



From: Don Guyer [mailto:don.gu...@prufoxroach.com] 
Sent: Tuesday, May 04, 2010 1:12 PM 


To: NT System Admin Issues

Subject: RE: Internet Policies -- Benefits of IM and Social Media

Agreed. As a department, we all use IM. I have coworkers in other physical 
locations that I interact with all day. No one answers their desk phones, 
because it's usually a vendor or sales call.

 

J

 

E-mail is great for communicating certain things that require a record, or are 
too long winded for IM, but IM is great for those hey can you look at server 
X? conversations.

 

$.02

 

Don Guyer

Systems Engineer - Information Services

Prudential, Fox  Roach/Trident Group

431 W. Lancaster Avenue

Devon, PA 19333

Direct: (610) 993-3299

Fax: (610) 650-5306

don.gu...@prufoxroach.com

 

From: Andrew S. Baker [mailto:asbz...@gmail.com] 
Sent: Tuesday, May 04, 2010 2:02 PM
To: NT System Admin Issues
Subject: Re: Internet Policies -- Benefits of IM and Social Media

 

IM is faster than email is faster than a meeting.Personally, I prefer email 
to IM, but I understand how and why people use it as a valid communications 
tool.   It facilitates quick, informal exchanges that may not rise to the level 
of a full discussion.  And both IM and email are easier to 

Re: Sort of OT: SPAM - should I stick with GFI MailEssentials?

2010-05-04 Thread Phil Brutsche
I think you misunderstand - I'm not saying you shouldn't run some sort
of mail gateway protection. I'm simply saying you shouldn't use the same
product on your desktops *and* the mail gateway.

On 5/4/2010 1:53 PM, David Lum wrote:
 I run both when the environment / client permits. If you can keep the
 bulk of it off your network all the better. I have one cluent with both
 a Barracuda AND Trend’s anti-spam. The ‘Cuda is upstream and catches 99%
 of the spam, Trend catches the occasional leaker but since it doesn’t
 have much to look for it doesn’t affect Exchange server load at all.

-- 

Phil Brutsche
p...@optimumdata.com


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~



RE: Internet Policies

2010-05-04 Thread Chad Leeper

Webmarshal will run on an old PC, Win 2003, Win 2008. It also ties into ISA if need be.


Interesting. Might actually be something to look into, although I’d prefer an “appliance” so I don’t have to buy a server (we don’t have any Win2K8 servers…only 2003 R2)






From: Chad Leeper [mailto:c...@capitalcityfruit.com] Sent: Tuesday, May 04, 2010 3:15 PMTo: NT System Admin IssuesSubject: RE: Internet Policies


We use web marshal. http://www.8e6security.com/webmarshal.asp

Works pretty well and is pretty cheap.You can add antivirus and anit spyware scanning modules as well.

There is also a fairly robust reporting engine for it.

I had it enabled for 60 users and it was running on Windows Xp. I have since moved it to a Win2003 VM.



/Chad


Ahh… We don’t have an ISA server. I suppose I could enable logging on the ASA and check those logs and do similar things…Hmm… something to think about.




From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 2:44 PMTo: NT System Admin IssuesSubject: Re: Internet Policies

I used a "fake DNS" entry for twitter.com and the others that I found in the ISA log. I made a new forward lookup zone for each one in our Active Dir integrated DNS system. I know it wont block sub-domains but it made the point. It has since been removed. I can use Trend micro officescan if we want to actively block though.Devin

On Tue, May 4, 2010 at 1:22 PM, John Aldrich jaldr...@blueridgecarpet.com wrote:


I was aware of that, but I was wondering what Devin’s company used. J Personally, I’d go for either DNS (if there was a blackhole or something easily implemented like that) or web filtering appliance.





From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Tuesday, May 04, 2010 2:20 PM

To: NT System Admin IssuesSubject: Re: Internet Policies


They can be blocked via DNS, via Firewalls, via Web Filtering technologies.

-ASB: http://XeeSM.com/AndrewBaker

On Tue, May 4, 2010 at 2:11 PM, John Aldrich jaldr...@blueridgecarpet.com wrote:


How did you block them? Do you have an appliance or did you put in some sort of DNS entries?





From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 1:21 PM

To: NT System Admin IssuesSubject: Re: Internet Policies

Up until last month we blocked all the social networking sites. Now our firm is marketing on them. We are adjusting our policies for this. It will be on a user-by-user basis though.Devin


On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote:


What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new “IM Virus” and got an email back from the CEO basically stating “shouldn’t that be a violation of company policy anyway?” and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who’s child is overseas in the military) who used IM on a semi-regular basis.
For this reason, I’m working on coming up with a company policy. I’ve looked at the sample template from SANS as well as another one that someone sent me off-list. I’m planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J













Think green. Please consider the environment before printing  CONFIDENTIALITY NOTE: The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it. Thank you. * 





Think green. Please consider 
the environment before printing 


CONFIDENTIALITY NOTE:
The information contained in this transmission is privileged 
and confidential information intended only for the use of the 
individual or entity named above. If the reader of this message 
is not the intended recipient, you are hereby notified that any 
dissemination, distribution or copying of this communication is 
strictly prohibited. If you have received this transmission in 
error, do not read it. Please immediately reply to the sender 
that you have received this communication in error and then 
delete it. Thank you.
*

  







Re: Sort of OT: SPAM - should I stick with GFI MailEssentials?

2010-05-04 Thread Roger Wright
I think the difference is where you want to do your filtering.

With significantly smaller environments than yours, I opted to move
filtering to the cloud with Postini for two organizations and it was
great.  The threats and junk are removed before they hit your circuit
- 90+% of incoming SMTP traffic never makes it to the network edge.
Postini uses McAfee for threat management and their spam filters are
very good.  We operated with them set to max; a few false positives
here but users can easily manage their own quarantines and sender
lists.

Sunbelt's VIPRE for Exchange also does an outstanding job, is a breeze
to manage, very cost effective, and provides multiple scan engines but
is filtering inside your network. In addition to spam and threat
management, it also protects your info store, something Postini
doesn't do.


Die dulci fruere!

Roger Wright
___




On Tue, May 4, 2010 at 1:19 PM, Raper, Jonathan - Eagle
jra...@eaglemds.com wrote:
 Hi everyone,



 We recently replaced our AV (McAfee) with Trend for both clients and
 Exchange 2007 (sorry Sunbelt – we came REALLY close to choosing VIPRE). We
 did not purchase the spam filtering option with Trend ScanMail, but are now
 considering it. We’ve been running GFI MailEssentials for years on a
 dedicated box. We’re protecting between 400 and 500 mailboxes.



 The price for GFI continues to be attractive, so much so that hosted
 solutions don’t seem to be worth the cost differential… The first logical
 option to me would be to move toward Trend, but I’m not so sure that adding
 spam filtering at the Exchange Server level is a good idea from a resource
 perspective. We were there at one point years ago, with GFI and ended up
 moving off to a dedicated box, because GFI was eating up too many resources
 (we were getting HAMMERED with spam – million a month, easily).



 Has anyone on this list moved away from GFI to something else? If so, what
 did you move to and what was your reasoning?



 I welcome any and all thoughts/suggestions/experiences.



 TIA,

 Jonathan L. Raper, A+, MCSA, MCSE
 Technology Coordinator
 Eagle Physicians  Associates, PA
 jra...@eaglemds.com
 www.eaglemds.com



 
 Any medical information contained in this electronic message is CONFIDENTIAL
 and privileged. It is unlawful for unauthorized persons to view, copy,
 disclose, or disseminate CONFIDENTIAL information. This electronic message
 may contain information that is confidential and/or legally privileged. It
 is intended only for the use of the individual(s) and/or entity named as
 recipients in the message. If you are not an intended recipient of this
 message, please notify the sender immediately and delete this material from
 your computer. Do not deliver, distribute or copy this message, and do not
 disclose its contents or take any action in reliance on the information that
 it contains.





~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~



Re: Internet Policies

2010-05-04 Thread Steven Peck
It would depend on your company and corporate culture.  If someone sends me
an IM, it is in place of a phone call or email.  So a 'distraction' will
occur.  In the case of IM, it's generally 30 seconds or less.  Not unlike
checking email technical lists from work instead of working.

We used some documents from Microsoft and customized to our sites to
establish courtesies when we introduced LCS.  We use this for business.  The
latest stats average 30 messages a minute during the day.  LCS 2005 had a
'do not disturb' setting but was fairly useless except as a visual
indicator.  Communicator 2007 has one that prevents interruptions except for
people allowed to interrupt and I look forward to deploying it.

Steven


On Tue, May 4, 2010 at 12:28 PM, Murray Freeman mfree...@alanet.org wrote:

  I've just got to disagree with one comment, ...less disruptive then a
 phone call... The person receiving a phone call, an IM or email, not to
 mention a tweet is ALWAYS distracted. One thing we've done is put a Do Not
 Disturb button on our phones, so you know if a person is busy and doesn't
 want to be disturbed. The phone doesn't ring, just goes directly into voice
 mail. Getting back to social networking, the real problem is the fact that
 there doesn't seem to be a way to block non-business tweets. It's just
 another distraction, like IM and email from friends and family.


 *Murray*


  --
 *From:* Steven Peck [mailto:sep...@gmail.com]
 *Sent:* Tuesday, May 04, 2010 1:46 PM

 *To:* NT System Admin Issues
 *Subject:* Re: Internet Policies

 IM isn't just chat.  Especially if you have OCS installed.

 There are tons of things that can be dispensed with a quick 2-3 line IM
 session that would require waiting and delays for other things.  With IM you
 can see if a user if actually present and can be contacted now.  It's faster
 then email for yes/no questions and is less disruptive then a phone call.
 If I see a user status as 'Busy' then I don't bug them, but if they are
 listed as 'Available' then I can ping them on quick short questions.

 During phone conferences having the ability to contact people not on the
 line, (outage, check with engineers working the issue) to then relay
 information to the call is invaluable.  Our help desk uses it.  Our help
 desk is scattered over 4 physical locations and if there is a major issue,
 then they can't call the other locations because everyone is on the phone.
 Late night troubleshooting sessions from home that don't need a call means
 my boss isn't calling for status, he just checks me on IM.  My wife and kids
 do not get woken up.  It is often easier to arrange lunch, etc through IM
 rather then email.  In a tightly controlled messaging environment it means
 less clutter in the archives.

 Once people actually start using IM for business reasons it's seriously
 addictive and helps substantially but it's one of those 'you have to
 experience it to understand it' type of things.

 Out of all the enabled IM accounts we have 3/4 signed on during business
 hours which is a huge buy in for us.  We do not mandate people use it,
 merely make it available as a service.

 Steven Peck




 On Tue, May 4, 2010 at 10:39 AM, Murray Freeman mfree...@alanet.orgwrote:

  Well, as long as we're discussing IM, we don't allow it currently. But,
 I have trouble understanding how IM is better than either email or a
 meeting, or using a telephone to accomplish the very same thing as an IM.
 Can someone explain that to me. Oh, we've recently adopted social networking
 for our organization, but primarily for our membership. I'm having trouble
 understanding how social networking will help our members too!


 *Murray*


  --
 *From:* Steve Ens [mailto:stevey...@gmail.com]
 *Sent:* Tuesday, May 04, 2010 11:42 AM

 *To:* NT System Admin Issues
 *Subject:* Re: Internet Policies

  It all depends if there is a business or productivity reason for it.  We
 use IM in some of the departments for meetings, quick conversations, etc.
 But if it is used for wasting time, I would not allow it.

  On Tue, May 4, 2010 at 11:38 AM, John Aldrich 
 jaldr...@blueridgecarpet.com wrote:

  What restrictions, if any, do your organizations place on things like
 IM or social networking sites? I sent out a warning to the office personnel
 this morning regarding the new “IM Virus” and got an email back from the CEO
 basically stating “shouldn’t that be a violation of company policy anyway?”
 and I had to tell him, I knew of no policies regarding that; and that in
 fact, my former supervisor was fully aware of at least one person (who’s
 child is overseas in the military) who used IM on a semi-regular basis.

 For this reason, I’m working on coming up with a company policy. I’ve
 looked at the sample template from SANS as well as another one that someone
 sent me off-list. I’m planning on incorporating the best of everything I
 get, so if anyone has any suggested 

Re: Any certification on removing malware??

2010-05-04 Thread Kurt Buff
The only certification I know for removing malware is fdisk.

On Tue, May 4, 2010 at 08:40, justino garcia jgarciaitl...@gmail.com wrote:
 Any certification on removing malware?? How about using and configuring and
 setup of antimalware software.

 --
 Justin
 IT-TECH





~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


Citrix Best Practices for Satellite Connections was RE: www.Sunbelt-software.com down?

2010-05-04 Thread Webster
Just came across this while searching for some other Best practice
documents.

http://support.citrix.com/article/ctx118256

Deployment Best Practices for Citrix XenApp over Hughes Satellite Networks



Carl Webster
Citrix Technology Professional
http://dabcc.com/Webster

 -Original Message-
 From: Steven M. Caesare [mailto:scaes...@caesare.com]
 Subject: RE: www.Sunbelt-software.com down?
 
 In Ken's defense, although we think of RT in terms of to the remote
 machine and back, it was not uncommon for the term within the
 satellite
 industry to mean up to the bird and back down.
 
 Particularly as early implementations were asymmetrical in that the
 head
 end would talk to the remote node via the sat, but the remote replies
 came back via analog modem. This you often spoke of each leg of the
 communication individually...
 
 But ya, I get what you mean.
 
 -sc
 
  -Original Message-
  From: Erik Goldoff [mailto:egold...@gmail.com]
  Subject: RE: www.Sunbelt-software.com down?
 
  With all due respect, why would I care about to the satellite and
 back, I do
  NOT ever communicate with the satellite.  I do not know of ANY VSAT
  customer that communicates with the satellite that would define round
 trip
  as did you.
 
 
  My round trip is to the node I communicate with.  I though that would
 be
  obvious within the context of the discussion ...


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Recycler Files

2010-05-04 Thread Cameron Cooper
Trying to find files that a user (who was let go) might have deleted on
their computer (email)  altho, this would be more on the exchange
server.

_
Cameron Cooper
Network Administrator | CompTIA A+ Certified
Aurico Reports, Inc
Phone: 847-890-4021 | Fax: 847-255-1896
ccoo...@aurico.com | www.aurico.com


-Original Message-
From: Angus Scott-Fleming [mailto:angu...@geoapps.com] 
Sent: Tuesday, May 04, 2010 10:34 AM
To: NT System Admin Issues
Subject: Re: Recycler Files

On 4 May 2010 at 8:49, Cameron Cooper  wrote:

 Is there a way to view the contents within a Recycler file in XP?

I have browsed the RECYCLER folders using Total Commander from
http://www.ghisler.com/.  You have to set it to view Hidden/System
Files 
which is in the Display option.

You will have cryptic file names within the recycled folders.  What are
you trying to do?

Angus

--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
Security Blog: http://geoapps.com/





~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~



  1   2   >