R: NAV 2009 incredibly light

2008-09-18 Thread HELP_PC
NAV 2009 is consumer
 
GuidoElia
HELPPC
 

  _  

Da: Sam Cayze [mailto:[EMAIL PROTECTED] 
Inviato: venerdì 19 settembre 2008 7.21
A: NT System Admin Issues
Oggetto: RE: NAV 2009 incredibly light


Interesting... Consumer or corporate edition?  

  _  

From: HELP_PC [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:08 PM
To: NT System Admin Issues
Subject: NAV 2009 incredibly light




Hoping catching malware will work as well, I installed NAV 2009 on several 
standalone Xp or Vista machines and I was really impressed by the "no" weight 
of the software.

Also the install was "not" as usual Symantec . Quich and smooth. 

?? 



GuidoElia 
HELPPC 


 


 


 


 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: NAV 2009 incredibly light

2008-09-18 Thread Sam Cayze
Interesting... Consumer or corporate edition?  



From: HELP_PC [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:08 PM
To: NT System Admin Issues
Subject: NAV 2009 incredibly light




Hoping catching malware will work as well, I installed NAV 2009 on
several standalone Xp or Vista machines and I was really impressed by
the "no" weight of the software.

Also the install was "not" as usual Symantec . Quich and smooth. 

?? 



GuidoElia 
HELPPC 


 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

R: ESET Rant // ESET == The New CA

2008-09-18 Thread HELP_PC
Also Avira should be taken in consideration
 
GuidoElia
HELPPC
 

  _  

Da: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
Inviato: venerdì 19 settembre 2008 3.42
A: NT System Admin Issues
Oggetto: RE: ESET Rant // ESET == The New CA



Sorry we installed Kapersky and tried it in several environments.  It does the 
job, but we saw a performance decrease across the board whether on XP, Vista or 
Server.  Not bad enough to not use the pc, but a slowdown none the less.  Vipre 
has had virtually zero impact in the dozen environments we have moved to.  The 
hardest part of the migration was removing the previous installations of 
Symantec, Trend, or McCrapee.  Symantec by far being the worst.  Sunbelts 
console is simply and easy to use, its needs some management tweaking for 
controls, but so far its been pretty painless.  Support is as always best of 
breed in my book.

 

Greg

 

From: Durf [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 8:26 PM
To: NT System Admin Issues
Subject: Re: ESET Rant // ESET == The New CA

 

Nothing against Sunbelt, but try Kaspersky - we've been demoing it for the last 
few weeks at my office, and it seems very nice, flexible, well-designed, and 
has good management.  Plus the engine and defs are fairly widely used in 3rd 
party products (GFI, etc), and I have yet to hear of their engine/defs blowing 
anything up.

-- Durf

On Thu, Sep 18, 2008 at 6:05 PM, Joseph L. Casale <[EMAIL PROTECTED]> wrote:

When the bad dat got pushed out lastweek (and trust me, according to the 
forums, many were effected) there wasn't a trace of issues in the console.

Today when it blew out my DVR's, there was not a trace in the console for any 
of the clients. All the clients were updating regularly and connecting with the 
console.

 

So I guess ESET thinks I should just walk around to every PC and physically 
check them? Bah, I don't have nothing better to do!

 

My license expires Nov 15, me thinks I will try Sunbelts product, I have had 
enough of this and coupled with bugs in deployment I am not impressed anymore.

 

jlc

 

From: Stefan Jafs [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 3:57 PM


To: NT System Admin Issues

Subject: RE: ESET Rant // ESET == The New CA

 

I'm also running ESET but have not had any problems!

 

__
Stefan Jafs 

 

From: Joseph L. Casale [mailto:[EMAIL PROTECTED] 
Sent: September-18-08 17:49
To: NT System Admin Issues
Subject: ESET Rant // ESET == The New CA

 

So, after the bad dat from ESET tried to ruin my life, today all my DVR systems 
stopped working. Today's dat decided the exe is "probably a variant of some 
genetic" virus.

What a farking POS! They want to ruin my life, I am sure...

 

jlc

 

Ps. And no one would return my support messages since last week's incident. I 
guess they it wouldn't be pleasant J Can you say no-renewal eset?

 

 

 

 

 

 

 

 

 




-- 
--
Give a man a fish, and he'll eat for a day. 
Give a fish a man, and he'll eat for weeks!

 

 


 


 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

(OT) Adobe InDesign (CS3) Will Not Start

2008-09-18 Thread Jon B. Lewis
I've got an install of Adobe CS3 that simply refuses to start.  Here's the 
error log I'm getting.  This is driving me crazy so any help appreciated.  It 
makes it to initializing plug-ins then just quits.

//=
Exception code: C005 ACCESS_VIOLATION
Fault address:  6975515C 6D657473:4955515C CKT~۔
S

Registers:
EAX:656D6954
EBX:0066
ECX:0DF26ED0
EDX:69546B63
ESI:0DF49BE4
EDI:
CS:EIP:001B:6975515C
SS:ESP:0023:0012F9DC  EBP:6170706C
DS:0023  ES:0023  FS:003B  GS:
Flags:00210286

Call stack:
Address   Frame Logical addr  Module

Jon Lewis



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

NAV 2009 incredibly light

2008-09-18 Thread HELP_PC

Hoping catching malware will work as well, I installed NAV 2009 on
several standalone Xp or Vista machines and I was really impressed by
the "no" weight of the software.
Also the install was "not" as usual Symantec . Quich and smooth.

??



GuidoElia
HELPPC


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: new computers

2008-09-18 Thread Ken Schaefer
Please note the following issue from 2002:
http://support.microsoft.com/?id=319182

IE will not accept cookies from servers with invalid host names (e.g. they 
contain an underscore). So, you can use these names in the DNS, but if you are 
running a webserver at that address, you may have issues with your browser (if 
it's IE)

Cheers
Ken

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Friday, 19 September 2008 5:28 AM
To: NT System Admin Issues
Subject: Re: new computers


"Jonathan Link" <[EMAIL PROTECTED]> wrote on 09/18/2008 03:25:05 PM:

> DNS lookups. Underscores are not valid in DNS names.

But they will work ..

Z:\>nslookup admin_nt9
Server:  admnwdc001.wrk.ads.pha.phila.gov
Address:  10.64.7.53

Name:admin_nt9.wrk.ads.pha.phila.gov
Address:  10.64.13.3


In Win2000 AD. This is internal only, of course.



> On Thu, Sep 18, 2008 at 3:09 PM, Joe Heaton <[EMAIL PROTECTED]> wrote:
> Second question.  Anyone know what could break using underscores in PC
> naming?  i.e. loc_pcname
>
> Joe Heaton
>
> -Original Message-
> From: Phil Brutsche [mailto:[EMAIL PROTECTED]
> Sent: Thursday, September 18, 2008 11:45 AM
> To: NT System Admin Issues
> Subject: Re: new computers
>
> I've done it both ways. I usually try to have the AD objects created
> first.
>
> If you create the AD object first the machine will get the right GPOs
> right off the bat. It's less work that way, especially if you use
> software installation GPOs. The machine is 100% ready to go sooner.
>
> Joe Heaton wrote:
> > When you guys build new PCs, do you create the AD object first, or
> > simply join the domain from the PC afterwards?  I've always created
> the
> > PC, then joined the domain, but our desktop guy just mentioned that
> our
> > manager wanted him to create the AD object first.  My first instinct
> is
> > to say no, because then you're creating an AD object for something
> that
> > doesn't exist yet, but other than that, I didn't have a real reason.
> > Anyone have a better reason?



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: new computers

2008-09-18 Thread Kennedy, Jim

Yes it would, but then you have to mess with blocking and filtering in some 
cases. Auto moving them to their own OU works best for us.

From: David Lum [EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 6:16 PM
To: NT System Admin Issues
Subject: RE: new computers

Wouldn't applying said GPO's at the domain root accomplish the same thing? 
Having said that I like your idea much better..

Dave

-Original Message-
From: Tim Vander Kooi [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 1:37 PM
To: NT System Admin Issues
Subject: RE: new computers

I do something similar, but I simply changed where new computers are put by 
default. My computers now go to an OU with GPOs applied by default instead of 
going to "Computers", after that they can be further moved if necessary to 
receive additional GPOs and/or software which I install via SCE. The really 
nice part about this is that we use ForeFront for Anti-Malware which you can 
apply to any OU or Group, so now every machine that joins our domain gets AM 
software installed as a part of joining the domain. No manual intervention 
required to protect all computers in the domain by default.
Tim


-Original Message-
From: Joe Heaton [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 2:02 PM
To: NT System Admin Issues
Subject: RE: new computers

Hmm, interesting reasons Phil.  I can see the idea, create the object,
put it in the right OU, the right group for GPO, etc.  Thanks for
that...

Joe Heaton

-Original Message-
From: Phil Brutsche [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 11:45 AM
To: NT System Admin Issues
Subject: Re: new computers

I've done it both ways. I usually try to have the AD objects created
first.

If you create the AD object first the machine will get the right GPOs
right off the bat. It's less work that way, especially if you use
software installation GPOs. The machine is 100% ready to go sooner.

Joe Heaton wrote:
> When you guys build new PCs, do you create the AD object first, or
> simply join the domain from the PC afterwards?  I've always created
the
> PC, then joined the domain, but our desktop guy just mentioned that
our
> manager wanted him to create the AD object first.  My first instinct
is
> to say no, because then you're creating an AD object for something
that
> doesn't exist yet, but other than that, I didn't have a real reason.
> Anyone have a better reason?

--

Phil Brutsche
[EMAIL PROTECTED]


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

No virus found in this incoming message.
Checked by AVG - http://www.avg.com
Version: 8.0.169 / Virus Database: 270.6.21/1678 - Release Date:
9/18/2008 9:01 AM

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: SNMP event server

2008-09-18 Thread Kennedy, Jim

In addition to that, the paid verions (real cheap) can drop it into SQL or 
Access for reporting.


From: Kurt Buff [EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 6:55 PM
To: NT System Admin Issues
Subject: Re: SNMP event server

While it's name implies that it only does something else, I beleive
the Kiwisoft syslog server is capable of receiving SNMP traps. It also
can parse received data with vbscript/jscript:

http://www.kiwisyslog.com/kiwi-syslog-daemon-features-and-benefits/

On Thu, Sep 18, 2008 at 9:50 AM, Marc Maiffret
<[EMAIL PROTECTED]> wrote:
> Hey, does anyone have any recommendations on an SNMP server that will
> receive raw snmp events and allow you to create various rules and reports to
> slice and dice raw snmp event data and if it can do alerting that is a
> bonus… again the ability to receive and manipulate raw SNMP event data is
> important, not looking for the standard SNMP server software that does
> system health monitoring.
>
> -Marc
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: ESET Rant // ESET == The New CA

2008-09-18 Thread gsweers
Sorry we installed Kapersky and tried it in several environments.  It
does the job, but we saw a performance decrease across the board whether
on XP, Vista or Server.  Not bad enough to not use the pc, but a
slowdown none the less.  Vipre has had virtually zero impact in the
dozen environments we have moved to.  The hardest part of the migration
was removing the previous installations of Symantec, Trend, or McCrapee.
Symantec by far being the worst.  Sunbelts console is simply and easy to
use, its needs some management tweaking for controls, but so far its
been pretty painless.  Support is as always best of breed in my book.

 

Greg

 

From: Durf [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 8:26 PM
To: NT System Admin Issues
Subject: Re: ESET Rant // ESET == The New CA

 

Nothing against Sunbelt, but try Kaspersky - we've been demoing it for
the last few weeks at my office, and it seems very nice, flexible,
well-designed, and has good management.  Plus the engine and defs are
fairly widely used in 3rd party products (GFI, etc), and I have yet to
hear of their engine/defs blowing anything up.

-- Durf

On Thu, Sep 18, 2008 at 6:05 PM, Joseph L. Casale
<[EMAIL PROTECTED]> wrote:

When the bad dat got pushed out lastweek (and trust me, according to the
forums, many were effected) there wasn't a trace of issues in the
console.

Today when it blew out my DVR's, there was not a trace in the console
for any of the clients. All the clients were updating regularly and
connecting with the console.

 

So I guess ESET thinks I should just walk around to every PC and
physically check them? Bah, I don't have nothing better to do!

 

My license expires Nov 15, me thinks I will try Sunbelts product, I have
had enough of this and coupled with bugs in deployment I am not
impressed anymore.

 

jlc

 

From: Stefan Jafs [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 3:57 PM


To: NT System Admin Issues

Subject: RE: ESET Rant // ESET == The New CA

 

I'm also running ESET but have not had any problems!

 

__
Stefan Jafs 

 

From: Joseph L. Casale [mailto:[EMAIL PROTECTED] 
Sent: September-18-08 17:49
To: NT System Admin Issues
Subject: ESET Rant // ESET == The New CA

 

So, after the bad dat from ESET tried to ruin my life, today all my DVR
systems stopped working. Today's dat decided the exe is "probably a
variant of some genetic" virus.

What a farking POS! They want to ruin my life, I am sure...

 

jlc

 

Ps. And no one would return my support messages since last week's
incident. I guess they it wouldn't be pleasant J Can you say no-renewal
eset?

 

 

 

 

 

 

 

 

 




-- 
--
Give a man a fish, and he'll eat for a day. 
Give a fish a man, and he'll eat for weeks!

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

Re: ESET Rant // ESET == The New CA

2008-09-18 Thread Durf
Nothing against Sunbelt, but try Kaspersky - we've been demoing it for the
last few weeks at my office, and it seems very nice, flexible,
well-designed, and has good management.  Plus the engine and defs are fairly
widely used in 3rd party products (GFI, etc), and I have yet to hear of
their engine/defs blowing anything up.

-- Durf

On Thu, Sep 18, 2008 at 6:05 PM, Joseph L. Casale <[EMAIL PROTECTED]
> wrote:

>  When the bad dat got pushed out lastweek (and trust me, according to the
> forums, many were effected) there wasn't a trace of issues in the console.
>
> Today when it blew out my DVR's, there was not a trace in the console for
> any of the clients. All the clients were updating regularly and connecting
> with the console.
>
>
>
> So I guess ESET thinks I should just walk around to every PC and physically
> check them? Bah, I don't have nothing better to do!
>
>
>
> My license expires Nov 15, me thinks I will try Sunbelts product, I have
> had enough of this and coupled with bugs in deployment I am not impressed
> anymore.
>
>
>
> jlc
>
>
>
> *From:* Stefan Jafs [mailto:[EMAIL PROTECTED]
> *Sent:* Thursday, September 18, 2008 3:57 PM
> *To:* NT System Admin Issues
> *Subject:* RE: ESET Rant // ESET == The New CA
>
>
>
> I'm also running ESET but have not had any problems!
>
>
>
> *__*
> *Stefan Jafs** *
>
>
>
> *From:* Joseph L. Casale [mailto:[EMAIL PROTECTED]
> *Sent:* September-18-08 17:49
> *To:* NT System Admin Issues
> *Subject:* ESET Rant // ESET == The New CA
>
>
>
> So, after the bad dat from ESET tried to ruin my life, today all my DVR
> systems stopped working. Today's dat decided the exe is "probably a variant
> of some genetic" virus.
>
> What a farking POS! They want to ruin my life, I am sure…
>
>
>
> jlc
>
>
>
> Ps. And no one would return my support messages since last week's incident.
> I guess they it wouldn't be pleasant J Can you say no-renewal eset?
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>


-- 
--
Give a man a fish, and he'll eat for a day.
Give a fish a man, and he'll eat for weeks!

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

Re: new computers

2008-09-18 Thread Kurt Buff
My desktop guys (and all of IT, actually) are admins on all of the
desktops, but not domain admins, so I've delegated an OU for them to
put the PCs into. I've written a little script that joins the machine
to the domain and makes sure it goes into the correct OU at the same
time. It also makes sure that the IT department are local
administrators on the box, not just the domain admins.

--begin batch file--
set /p wkst=Name of Workstation to be added:
set /p name=Your Domain ID:

netdom join %wkst% /domain:mycompany
/ou:ou=workstations,ou=computers,dc=mycompany,dc=com /ud:%name%
/passwordd:*

set /p name=Your Domain ID:
net use \\dc1\ipc$ /u:%name%
net localgroup administrators mycompany\it /add

shutdown -r -t 01
--end batch file--

Kurt



On Thu, Sep 18, 2008 at 11:39 AM, Joe Heaton <[EMAIL PROTECTED]> wrote:
> When you guys build new PCs, do you create the AD object first, or simply
> join the domain from the PC afterwards?  I've always created the PC, then
> joined the domain, but our desktop guy just mentioned that our manager
> wanted him to create the AD object first.  My first instinct is to say no,
> because then you're creating an AD object for something that doesn't exist
> yet, but other than that, I didn't have a real reason.  Anyone have a better
> reason?
>
>
>
> Joe Heaton
>
> AISA
>
> Employment Training Panel
>
> 1100 J Street, 4th Floor
>
> Sacramento, CA  95814
>
> (916) 327-5276
>
> [EMAIL PROTECTED]
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


Re: SNMP event server

2008-09-18 Thread Kurt Buff
While it's name implies that it only does something else, I beleive
the Kiwisoft syslog server is capable of receiving SNMP traps. It also
can parse received data with vbscript/jscript:

http://www.kiwisyslog.com/kiwi-syslog-daemon-features-and-benefits/

On Thu, Sep 18, 2008 at 9:50 AM, Marc Maiffret
<[EMAIL PROTECTED]> wrote:
> Hey, does anyone have any recommendations on an SNMP server that will
> receive raw snmp events and allow you to create various rules and reports to
> slice and dice raw snmp event data and if it can do alerting that is a
> bonus… again the ability to receive and manipulate raw SNMP event data is
> important, not looking for the standard SNMP server software that does
> system health monitoring.
>
> -Marc
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: new computers

2008-09-18 Thread David Lum
Wouldn't applying said GPO's at the domain root accomplish the same thing? 
Having said that I like your idea much better..

Dave

-Original Message-
From: Tim Vander Kooi [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 1:37 PM
To: NT System Admin Issues
Subject: RE: new computers

I do something similar, but I simply changed where new computers are put by 
default. My computers now go to an OU with GPOs applied by default instead of 
going to "Computers", after that they can be further moved if necessary to 
receive additional GPOs and/or software which I install via SCE. The really 
nice part about this is that we use ForeFront for Anti-Malware which you can 
apply to any OU or Group, so now every machine that joins our domain gets AM 
software installed as a part of joining the domain. No manual intervention 
required to protect all computers in the domain by default.
Tim


-Original Message-
From: Joe Heaton [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 2:02 PM
To: NT System Admin Issues
Subject: RE: new computers

Hmm, interesting reasons Phil.  I can see the idea, create the object,
put it in the right OU, the right group for GPO, etc.  Thanks for
that...

Joe Heaton

-Original Message-
From: Phil Brutsche [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 11:45 AM
To: NT System Admin Issues
Subject: Re: new computers

I've done it both ways. I usually try to have the AD objects created
first.

If you create the AD object first the machine will get the right GPOs
right off the bat. It's less work that way, especially if you use
software installation GPOs. The machine is 100% ready to go sooner.

Joe Heaton wrote:
> When you guys build new PCs, do you create the AD object first, or
> simply join the domain from the PC afterwards?  I've always created
the
> PC, then joined the domain, but our desktop guy just mentioned that
our
> manager wanted him to create the AD object first.  My first instinct
is
> to say no, because then you're creating an AD object for something
that
> doesn't exist yet, but other than that, I didn't have a real reason.
> Anyone have a better reason?

--

Phil Brutsche
[EMAIL PROTECTED]


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

No virus found in this incoming message.
Checked by AVG - http://www.avg.com
Version: 8.0.169 / Virus Database: 270.6.21/1678 - Release Date:
9/18/2008 9:01 AM

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: ESET Rant // ESET == The New CA

2008-09-18 Thread Joseph L. Casale
ROTFLMAO,
http://www.wilderssecurity.com/ is down. I wonder why :)

From: Joseph L. Casale [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 4:06 PM
To: NT System Admin Issues
Subject: RE: ESET Rant // ESET == The New CA

When the bad dat got pushed out lastweek (and trust me, according to the 
forums, many were effected) there wasn't a trace of issues in the console.
Today when it blew out my DVR's, there was not a trace in the console for any 
of the clients. All the clients were updating regularly and connecting with the 
console.

So I guess ESET thinks I should just walk around to every PC and physically 
check them? Bah, I don't have nothing better to do!

My license expires Nov 15, me thinks I will try Sunbelts product, I have had 
enough of this and coupled with bugs in deployment I am not impressed anymore.

jlc

From: Stefan Jafs [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 3:57 PM
To: NT System Admin Issues
Subject: RE: ESET Rant // ESET == The New CA

I'm also running ESET but have not had any problems!

__
Stefan Jafs

From: Joseph L. Casale [mailto:[EMAIL PROTECTED]
Sent: September-18-08 17:49
To: NT System Admin Issues
Subject: ESET Rant // ESET == The New CA

So, after the bad dat from ESET tried to ruin my life, today all my DVR systems 
stopped working. Today's dat decided the exe is "probably a variant of some 
genetic" virus.
What a farking POS! They want to ruin my life, I am sure...

jlc

Ps. And no one would return my support messages since last week's incident. I 
guess they it wouldn't be pleasant :) Can you say no-renewal eset?
















~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: ESET Rant // ESET == The New CA

2008-09-18 Thread Joseph L. Casale
When the bad dat got pushed out lastweek (and trust me, according to the 
forums, many were effected) there wasn't a trace of issues in the console.
Today when it blew out my DVR's, there was not a trace in the console for any 
of the clients. All the clients were updating regularly and connecting with the 
console.

So I guess ESET thinks I should just walk around to every PC and physically 
check them? Bah, I don't have nothing better to do!

My license expires Nov 15, me thinks I will try Sunbelts product, I have had 
enough of this and coupled with bugs in deployment I am not impressed anymore.

jlc

From: Stefan Jafs [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 3:57 PM
To: NT System Admin Issues
Subject: RE: ESET Rant // ESET == The New CA

I'm also running ESET but have not had any problems!

__
Stefan Jafs

From: Joseph L. Casale [mailto:[EMAIL PROTECTED]
Sent: September-18-08 17:49
To: NT System Admin Issues
Subject: ESET Rant // ESET == The New CA

So, after the bad dat from ESET tried to ruin my life, today all my DVR systems 
stopped working. Today's dat decided the exe is "probably a variant of some 
genetic" virus.
What a farking POS! They want to ruin my life, I am sure...

jlc

Ps. And no one would return my support messages since last week's incident. I 
guess they it wouldn't be pleasant :) Can you say no-renewal eset?











~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: logging deleted files

2008-09-18 Thread Paul Everett
Thanks, it refreshed the policy already without the reboot.

Looks like have what I need now.

I appreciate the guidance.

 

Paul

 



From: James Winzenz [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 5:31 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

You shouldn't have to wait for the server to reboot for the GPO to be
updated - if you want, you can force the group policy settings to be
refreshed sooner than the default group policy refresh interval.

 

Thanks,

 

James Winzenz

Infrastructure Engineer - Security

Pulte Homes Information Services

 



From: Paul Everett [mailto:[EMAIL PROTECTED] 
Posted At: Thursday, September 18, 2008 2:12 PM
Posted To: NTSysadmin
Conversation: logging deleted files
Subject: RE: logging deleted files
  

I don't know if that would be a nightmare or a revelation to find out
that my DC wasn't my DC, but alas it is.  It just doesn't show either of
the Domain Security Policy's in Admin Tools.  I did however find the
Domain Controller Security Policy in the GP of the Domain Controllers in
Active Directory.  I made the change and expect it to show up with my
next Server roboot.

Thanks!

 



From: Steve Moffat [mailto:[EMAIL PROTECTED] On Behalf Of NTSysAdmin
Sent: Thursday, September 18, 2008 4:22 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

If it's a DC then you "should" have both Domain Controller Security
Policy and Domain Security Policy in Admin Tools, if not, it's not your
DC.

 

S

 

From: Paul Everett [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 3:34 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

I don't have a Domain Controller Security Policy in Admin Tools, just
Local Security Policy and "yes" the "Define these policy settings" box
is missing.

I just meant the files in question are on the DC.

 



From: Ralph Smith [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 2:15 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

I think you want to go to 

 

Administrative Tools > Domain Controller Security Policy > Local
Security Policy

 

if this applies to the domain controller.

 

There should be a box for "Define these policy settings".  Is that
what's missing?

 

I'm not sure what you mean by the file being located in the Domain Group
Policy on the DC.  Do you mean the file is on the Domain Controller
under the C:\WINDOWS\SYSVOL\domain\Policies folder?

Ralph Smith
Gateway Community Industries
845-331-1261 x234

 



From: Paul Everett [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 1:31 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

Thanks for the link Ralph.

 

I have auditing from the folder in question's Properties enabled and
also in Domain Group Policy on the DC, which is were the file is
located.

I can't get anything to show up in event log.

 

In the Local Security Policy the "audit local object" success and
failures are grayed out with no "enable" box.

 

 



From: Ralph Smith [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:47 AM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

http://sogeeky.blogspot.com/2006/07/how-to-audit-and-track-file-deletion
s.html

 

Ralph Smith
Gateway Community Industries
845-331-1261 x234

 



From: James Rankin [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 10:43 AM
To: NT System Admin Issues
Subject: Re: logging deleted files

 

 You can turn on file auditing for particular folders if you know which
folders are at risk

Right-click folder Properties, Security, Advanced, Auditing

2008/9/18 Paul Everett <[EMAIL PROTECTED]>

Is there anything that logs the event when files are deleted over the
network?

 

A user in one of our departments is deleting files, either
unintentionally or not.  The best I can do is check my daily backups to
find out which day it happened, but we'd like to find out who it is.  We
don't need something to recover deleted network files, just something
that logs the event that includes the username.  Is there anything out
there that can do this?

We have a 2003 AD Domain.

Thanks,

Paul Everett 
IS Dept. 


Confidentiality Notice:  This e-mail message, including any attachments,
is for the sole use of the intended recipient(s) and may contain
confidential and privileged information.  Any unauthorized review, use,
disclosure, or distribution is prohibited.   If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message, including attachments.

 

 

 

 

 

 

 

 

 

 

Confidentiality Notice:

**

This communication, including any attachments, may contain confidential
inf

RE: ESET Rant // ESET == The New CA

2008-09-18 Thread Stefan Jafs
I'm also running ESET but have not had any problems!

 

__
Stefan Jafs 

 

From: Joseph L. Casale [mailto:[EMAIL PROTECTED] 
Sent: September-18-08 17:49
To: NT System Admin Issues
Subject: ESET Rant // ESET == The New CA

 

So, after the bad dat from ESET tried to ruin my life, today all my DVR
systems stopped working. Today's dat decided the exe is "probably a
variant of some genetic" virus.

What a farking POS! They want to ruin my life, I am sure...

 

jlc

 

Ps. And no one would return my support messages since last week's
incident. I guess they it wouldn't be pleasant J Can you say no-renewal
eset?

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

ESET Rant // ESET == The New CA

2008-09-18 Thread Joseph L. Casale
So, after the bad dat from ESET tried to ruin my life, today all my DVR systems 
stopped working. Today's dat decided the exe is "probably a variant of some 
genetic" virus.
What a farking POS! They want to ruin my life, I am sure...

jlc

Ps. And no one would return my support messages since last week's incident. I 
guess they it wouldn't be pleasant :) Can you say no-renewal eset?

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: Dell OEM XP Pro cd w/ SP3

2008-09-18 Thread Michael B. Smith
Oh!

Yessiree bob.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange


-Original Message-
From: Joseph L. Casale [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 5:28 PM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Point I was trying to make was ImageX is merely an "imaging" application
with the feature that it can mount a wim such that you can modify it later.
BDD, SIM, WDS and all that jazz can drop in files that extend the
functionality of a wim image.

All I was saying was ImageX doesn't "do the driver" part :)
Stop arguing with me, or I'll wait outside for you, heh .

jlc

-Original Message-
From: Michael B. Smith [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 3:12 PM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

I admit that my experience using WDS (Windows Deployment Services) with XP
is limited. However, it is a constant that you can use an XML file for both
instead of sysprep.inf and that winpe can inject drivers along the way. I've
always used vista as my host, not winpe, so I'm not familiar with "peimg". I
always use imagex.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange


-Original Message-
From: Joseph L. Casale [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 2:54 PM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

CMIIW,
Doesn't imagex just create/mount images, and peimg /inf is what "injected"
drivers. In the case of XP, you still use sysprep, but can mount the image
and adjust the sysprep.inf? So you ImageX doesn't relaly have anything to do
with the drivers, its peimg in vista, and still sysprep in XP?

Right?

jlc

-Original Message-
From: Michael B. Smith [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 12:18 PM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Imagex can inject drivers into an XP image.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange


-Original Message-
From: Joseph L. Casale [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 2:14 PM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Sorry, missed the post before.
ImageX would work fine for "imaging" but it cant inject drivers into XP.
Sysprep will *very* much help you. It's designed to do just this, it will
allow additional Mass Storage Drivers to be included in the image, then it
will remove what's not present after.

nLite is cool, but its more than a GUI front end, it's a bit of a hack.

KB303786 which leads to KB302577

HTH,
jlc

-Original Message-
From: Michael B. Smith [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 11:57 AM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Imagex.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange

-Original Message-
From: Silvio L. Nisgoski [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 1:31 PM
To: NT System Admin Issues
Subject: Re: Dell OEM XP Pro cd w/ SP3

Due to the big difference in machine hardware, sysprepping won´t help me
very much.  I need a customized install, with the selections for keyboard,
timezones, group names, accounts, etc, a bunch of SATA drivers, other
drivers for the most common hardware pieces we use. Would like to add Adobe
Reader, Java, media player updates to that also.

What would be the MS-approved name for the technology to do that, so that I
can google for it ? I considered nLite to be just a graphical frontend for
the .inf file modifications necessary to integrate drivers and pre-define
configurations



- Original Message -
From: "Phil Brutsche" <[EMAIL PROTECTED]>
To: "NT System Admin Issues" 
Sent: Wednesday, September 17, 2008 10:09 PM
Subject: Re: Dell OEM XP Pro cd w/ SP3


> That's one of the reasons I dropped nLite for sysprep'ed ghost images.
>
> Joseph L. Casale wrote:
>> I always use MS methods for all my deployments, which often means a tad
>> extra work
>> but its peace of mind from supportability when the merde hits the fan...
>
> --
>
> Phil Brutsche
> [EMAIL PROTECTED]
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ 

Cached Credentials?

2008-09-18 Thread Roger Wright
Any utility available to be able to view or modify cached credentials on
a PC to other network or users' resources?

 

 

 

Roger Wright

Network Administrator

Evatone, Inc.

727.572.7076  x388

  

 

_

 

 

"The most likely way for the world to be destroyed, most experts agree,
is by accident. That's where we come in; we're computer professionals.
We cause accidents." - Nathaniel Borenstein 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~<>

RE: logging deleted files

2008-09-18 Thread James Winzenz
You shouldn't have to wait for the server to reboot for the GPO to be
updated - if you want, you can force the group policy settings to be
refreshed sooner than the default group policy refresh interval.

 

Thanks,

 

James Winzenz

Infrastructure Engineer - Security

Pulte Homes Information Services

 



From: Paul Everett [mailto:[EMAIL PROTECTED] 
Posted At: Thursday, September 18, 2008 2:12 PM
Posted To: NTSysadmin
Conversation: logging deleted files
Subject: RE: logging deleted files
  

I don't know if that would be a nightmare or a revelation to find out
that my DC wasn't my DC, but alas it is.  It just doesn't show either of
the Domain Security Policy's in Admin Tools.  I did however find the
Domain Controller Security Policy in the GP of the Domain Controllers in
Active Directory.  I made the change and expect it to show up with my
next Server roboot.

Thanks!

 



From: Steve Moffat [mailto:[EMAIL PROTECTED] On Behalf Of NTSysAdmin
Sent: Thursday, September 18, 2008 4:22 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

If it's a DC then you "should" have both Domain Controller Security
Policy and Domain Security Policy in Admin Tools, if not, it's not your
DC.

 

S

 

From: Paul Everett [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 3:34 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

I don't have a Domain Controller Security Policy in Admin Tools, just
Local Security Policy and "yes" the "Define these policy settings" box
is missing.

I just meant the files in question are on the DC.

 



From: Ralph Smith [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 2:15 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

I think you want to go to 

 

Administrative Tools > Domain Controller Security Policy > Local
Security Policy

 

if this applies to the domain controller.

 

There should be a box for "Define these policy settings".  Is that
what's missing?

 

I'm not sure what you mean by the file being located in the Domain Group
Policy on the DC.  Do you mean the file is on the Domain Controller
under the C:\WINDOWS\SYSVOL\domain\Policies folder?

Ralph Smith
Gateway Community Industries
845-331-1261 x234

 



From: Paul Everett [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 1:31 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

Thanks for the link Ralph.

 

I have auditing from the folder in question's Properties enabled and
also in Domain Group Policy on the DC, which is were the file is
located.

I can't get anything to show up in event log.

 

In the Local Security Policy the "audit local object" success and
failures are grayed out with no "enable" box.

 

 



From: Ralph Smith [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:47 AM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

http://sogeeky.blogspot.com/2006/07/how-to-audit-and-track-file-deletion
s.html

 

Ralph Smith
Gateway Community Industries
845-331-1261 x234

 



From: James Rankin [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 10:43 AM
To: NT System Admin Issues
Subject: Re: logging deleted files

 

 You can turn on file auditing for particular folders if you know which
folders are at risk

Right-click folder Properties, Security, Advanced, Auditing

2008/9/18 Paul Everett <[EMAIL PROTECTED]>

Is there anything that logs the event when files are deleted over the
network?

 

A user in one of our departments is deleting files, either
unintentionally or not.  The best I can do is check my daily backups to
find out which day it happened, but we'd like to find out who it is.  We
don't need something to recover deleted network files, just something
that logs the event that includes the username.  Is there anything out
there that can do this?

We have a 2003 AD Domain.

Thanks,

Paul Everett 
IS Dept. 


Confidentiality Notice:  This e-mail message, including any attachments,
is for the sole use of the intended recipient(s) and may contain
confidential and privileged information.  Any unauthorized review, use,
disclosure, or distribution is prohibited.   If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message, including attachments.

 

 

 

 

 

 

 

 

 

 

Confidentiality Notice:

**

This communication, including any attachments, may contain confidential
information and is intended only for the individual or entity to whom it
is addressed. Any review, dissemination, or copying of this
communication by anyone other than the intended recipient is strictly
prohibited. If you are not the intended recipient, please contact the
sender by reply email, delete and destroy all copies of

RE: Dell OEM XP Pro cd w/ SP3

2008-09-18 Thread Joseph L. Casale
Point I was trying to make was ImageX is merely an "imaging" application with 
the feature that it can mount a wim such that you can modify it later.
BDD, SIM, WDS and all that jazz can drop in files that extend the functionality 
of a wim image.

All I was saying was ImageX doesn't "do the driver" part :)
Stop arguing with me, or I'll wait outside for you, heh .

jlc

-Original Message-
From: Michael B. Smith [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 3:12 PM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

I admit that my experience using WDS (Windows Deployment Services) with XP
is limited. However, it is a constant that you can use an XML file for both
instead of sysprep.inf and that winpe can inject drivers along the way. I've
always used vista as my host, not winpe, so I'm not familiar with "peimg". I
always use imagex.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange


-Original Message-
From: Joseph L. Casale [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 2:54 PM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

CMIIW,
Doesn't imagex just create/mount images, and peimg /inf is what "injected"
drivers. In the case of XP, you still use sysprep, but can mount the image
and adjust the sysprep.inf? So you ImageX doesn't relaly have anything to do
with the drivers, its peimg in vista, and still sysprep in XP?

Right?

jlc

-Original Message-
From: Michael B. Smith [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 12:18 PM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Imagex can inject drivers into an XP image.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange


-Original Message-
From: Joseph L. Casale [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 2:14 PM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Sorry, missed the post before.
ImageX would work fine for "imaging" but it cant inject drivers into XP.
Sysprep will *very* much help you. It's designed to do just this, it will
allow additional Mass Storage Drivers to be included in the image, then it
will remove what's not present after.

nLite is cool, but its more than a GUI front end, it's a bit of a hack.

KB303786 which leads to KB302577

HTH,
jlc

-Original Message-
From: Michael B. Smith [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 11:57 AM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Imagex.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange

-Original Message-
From: Silvio L. Nisgoski [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 1:31 PM
To: NT System Admin Issues
Subject: Re: Dell OEM XP Pro cd w/ SP3

Due to the big difference in machine hardware, sysprepping won´t help me
very much.  I need a customized install, with the selections for keyboard,
timezones, group names, accounts, etc, a bunch of SATA drivers, other
drivers for the most common hardware pieces we use. Would like to add Adobe
Reader, Java, media player updates to that also.

What would be the MS-approved name for the technology to do that, so that I
can google for it ? I considered nLite to be just a graphical frontend for
the .inf file modifications necessary to integrate drivers and pre-define
configurations



- Original Message -
From: "Phil Brutsche" <[EMAIL PROTECTED]>
To: "NT System Admin Issues" 
Sent: Wednesday, September 17, 2008 10:09 PM
Subject: Re: Dell OEM XP Pro cd w/ SP3


> That's one of the reasons I dropped nLite for sysprep'ed ghost images.
>
> Joseph L. Casale wrote:
>> I always use MS methods for all my deployments, which often means a tad
>> extra work
>> but its peace of mind from supportability when the merde hits the fan...
>
> --
>
> Phil Brutsche
> [EMAIL PROTECTED]
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ 

RE: Dell OEM XP Pro cd w/ SP3

2008-09-18 Thread Michael B. Smith
I admit that my experience using WDS (Windows Deployment Services) with XP
is limited. However, it is a constant that you can use an XML file for both
instead of sysprep.inf and that winpe can inject drivers along the way. I've
always used vista as my host, not winpe, so I'm not familiar with "peimg". I
always use imagex.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange


-Original Message-
From: Joseph L. Casale [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 2:54 PM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

CMIIW,
Doesn't imagex just create/mount images, and peimg /inf is what "injected"
drivers. In the case of XP, you still use sysprep, but can mount the image
and adjust the sysprep.inf? So you ImageX doesn't relaly have anything to do
with the drivers, its peimg in vista, and still sysprep in XP?

Right?

jlc

-Original Message-
From: Michael B. Smith [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 12:18 PM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Imagex can inject drivers into an XP image.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange


-Original Message-
From: Joseph L. Casale [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 2:14 PM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Sorry, missed the post before.
ImageX would work fine for "imaging" but it cant inject drivers into XP.
Sysprep will *very* much help you. It's designed to do just this, it will
allow additional Mass Storage Drivers to be included in the image, then it
will remove what's not present after.

nLite is cool, but its more than a GUI front end, it's a bit of a hack.

KB303786 which leads to KB302577

HTH,
jlc

-Original Message-
From: Michael B. Smith [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 11:57 AM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Imagex.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange

-Original Message-
From: Silvio L. Nisgoski [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 1:31 PM
To: NT System Admin Issues
Subject: Re: Dell OEM XP Pro cd w/ SP3

Due to the big difference in machine hardware, sysprepping won´t help me
very much.  I need a customized install, with the selections for keyboard,
timezones, group names, accounts, etc, a bunch of SATA drivers, other
drivers for the most common hardware pieces we use. Would like to add Adobe
Reader, Java, media player updates to that also.

What would be the MS-approved name for the technology to do that, so that I
can google for it ? I considered nLite to be just a graphical frontend for
the .inf file modifications necessary to integrate drivers and pre-define
configurations



- Original Message -
From: "Phil Brutsche" <[EMAIL PROTECTED]>
To: "NT System Admin Issues" 
Sent: Wednesday, September 17, 2008 10:09 PM
Subject: Re: Dell OEM XP Pro cd w/ SP3


> That's one of the reasons I dropped nLite for sysprep'ed ghost images.
>
> Joseph L. Casale wrote:
>> I always use MS methods for all my deployments, which often means a tad
>> extra work
>> but its peace of mind from supportability when the merde hits the fan...
>
> --
>
> Phil Brutsche
> [EMAIL PROTECTED]
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


Continued Printer Driver Corruption

2008-09-18 Thread Mike Gill
We have an HP9065 MFP. I have the Postscript and PCL driver installed on our
Win2K3 server and we've been using this printer for more than a couple years
this way. Recently, when using the PS driver, you can't select Printer
Preferences or the application (all of them) simply bombs out and disappears
from the screen. If you look at the printer properties and choose
Preferences from there, you get a protection fault error dialogue (exception
code 0xc005). I have tried uninstalling the driver from the server using
the Server Properties as well as using the Cleanspl.exe tool. I fixed it by
once reinstalling the printer but I had to use a different share name or the
error would persist on the clients. But now it's happening again and I'm not
sure why this one particular driver is giving so much grief. I can't keep
recreating the printer every week or so.

 

-- 
Mike Gill

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: logging deleted files

2008-09-18 Thread Paul Everett
I don't know if that would be a nightmare or a revelation to find out
that my DC wasn't my DC, but alas it is.  It just doesn't show either of
the Domain Security Policy's in Admin Tools.  I did however find the
Domain Controller Security Policy in the GP of the Domain Controllers in
Active Directory.  I made the change and expect it to show up with my
next Server roboot.

Thanks!

 



From: Steve Moffat [mailto:[EMAIL PROTECTED] On Behalf Of NTSysAdmin
Sent: Thursday, September 18, 2008 4:22 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

If it's a DC then you "should" have both Domain Controller Security
Policy and Domain Security Policy in Admin Tools, if not, it's not your
DC.

 

S

 

From: Paul Everett [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 3:34 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

I don't have a Domain Controller Security Policy in Admin Tools, just
Local Security Policy and "yes" the "Define these policy settings" box
is missing.

I just meant the files in question are on the DC.

 



From: Ralph Smith [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 2:15 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

I think you want to go to 

 

Administrative Tools > Domain Controller Security Policy > Local
Security Policy

 

if this applies to the domain controller.

 

There should be a box for "Define these policy settings".  Is that
what's missing?

 

I'm not sure what you mean by the file being located in the Domain Group
Policy on the DC.  Do you mean the file is on the Domain Controller
under the C:\WINDOWS\SYSVOL\domain\Policies folder?

Ralph Smith
Gateway Community Industries
845-331-1261 x234

 



From: Paul Everett [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 1:31 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

Thanks for the link Ralph.

 

I have auditing from the folder in question's Properties enabled and
also in Domain Group Policy on the DC, which is were the file is
located.

I can't get anything to show up in event log.

 

In the Local Security Policy the "audit local object" success and
failures are grayed out with no "enable" box.

 

 



From: Ralph Smith [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:47 AM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

http://sogeeky.blogspot.com/2006/07/how-to-audit-and-track-file-deletion
s.html

 

Ralph Smith
Gateway Community Industries
845-331-1261 x234

 



From: James Rankin [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 10:43 AM
To: NT System Admin Issues
Subject: Re: logging deleted files

 

 You can turn on file auditing for particular folders if you know which
folders are at risk

Right-click folder Properties, Security, Advanced, Auditing

2008/9/18 Paul Everett <[EMAIL PROTECTED]>

Is there anything that logs the event when files are deleted over the
network?

 

A user in one of our departments is deleting files, either
unintentionally or not.  The best I can do is check my daily backups to
find out which day it happened, but we'd like to find out who it is.  We
don't need something to recover deleted network files, just something
that logs the event that includes the username.  Is there anything out
there that can do this?

We have a 2003 AD Domain.

Thanks,

Paul Everett 
IS Dept. 


Confidentiality Notice:  This e-mail message, including any attachments,
is for the sole use of the intended recipient(s) and may contain
confidential and privileged information.  Any unauthorized review, use,
disclosure, or distribution is prohibited.   If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message, including attachments.

 

 

 

 

 

 

 

 

 

 

Confidentiality Notice:

**

This communication, including any attachments, may contain confidential
information and is intended only for the individual or entity to whom it
is addressed. Any review, dissemination, or copying of this
communication by anyone other than the intended recipient is strictly
prohibited. If you are not the intended recipient, please contact the
sender by reply email, delete and destroy all copies of the original
message.

 

 

 

 

 

 

 

Confidentiality Notice:

**

This communication, including any attachments, may contain confidential
information and is intended only for the individual or entity to whom it
is addressed. Any review, dissemination, or copying of this
communication by anyone other than the intended recipient is strictly
prohibited. If you are not the intended recipient, please contact the
sender by reply email, delete and destroy all copies of the original
message.

 

 

 

 

 

 

 

RE: new computers

2008-09-18 Thread Tim Vander Kooi
This shows you how and explains why.
http://support.microsoft.com/kb/324949
HTH,
Tim


-Original Message-
From: John Cook [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 3:40 PM
To: NT System Admin Issues
Subject: RE: new computers

Interesting, how do you change that? I really never thought about doing it that 
way since we do it so rarely.

John W. Cook
Systems Administrator
Partnership For Strong Families
315 SE 2nd Ave
Gainesville, Fl 32601
Office (352) 393-2741 x320
Cell (352) 215-6944
Fax (352) 393-2746
MCSE, MCTS, MCP+I,CompTIA A+, N+

-Original Message-
From: Tim Vander Kooi [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 4:37 PM
To: NT System Admin Issues
Subject: RE: new computers

I do something similar, but I simply changed where new computers are put by 
default. My computers now go to an OU with GPOs applied by default instead of 
going to "Computers", after that they can be further moved if necessary to 
receive additional GPOs and/or software which I install via SCE. The really 
nice part about this is that we use ForeFront for Anti-Malware which you can 
apply to any OU or Group, so now every machine that joins our domain gets AM 
software installed as a part of joining the domain. No manual intervention 
required to protect all computers in the domain by default.
Tim


-Original Message-
From: Joe Heaton [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 2:02 PM
To: NT System Admin Issues
Subject: RE: new computers

Hmm, interesting reasons Phil.  I can see the idea, create the object,
put it in the right OU, the right group for GPO, etc.  Thanks for
that...

Joe Heaton

-Original Message-
From: Phil Brutsche [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 11:45 AM
To: NT System Admin Issues
Subject: Re: new computers

I've done it both ways. I usually try to have the AD objects created
first.

If you create the AD object first the machine will get the right GPOs
right off the bat. It's less work that way, especially if you use
software installation GPOs. The machine is 100% ready to go sooner.

Joe Heaton wrote:
> When you guys build new PCs, do you create the AD object first, or
> simply join the domain from the PC afterwards?  I've always created
the
> PC, then joined the domain, but our desktop guy just mentioned that
our
> manager wanted him to create the AD object first.  My first instinct
is
> to say no, because then you're creating an AD object for something
that
> doesn't exist yet, but other than that, I didn't have a real reason.
> Anyone have a better reason?

--

Phil Brutsche
[EMAIL PROTECTED]


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

No virus found in this incoming message.
Checked by AVG - http://www.avg.com
Version: 8.0.169 / Virus Database: 270.6.21/1678 - Release Date:
9/18/2008 9:01 AM

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

CONFIDENTIALITY STATEMENT: The information transmitted, or contained or 
attached to or with this Notice is intended only for the person or entity to 
which it is addressed and may contain Protected Health Information (PHI), 
confidential and/or privileged material. Any review, transmission, 
dissemination, or other use of, and taking any action in reliance upon this 
information by persons or entities other than the intended recipient without 
the express written consent of the sender are prohibited. This information may 
be protected by the Health Insurance Portability and Accountability Act of 1996 
(HIPAA), and other Federal and Florida laws. Improper or unauthorized use or 
disclosure of this information could result in civil and/or criminal penalties.
 Consider the environment. Please don't print this e-mail unless you really 
need to.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: new computers

2008-09-18 Thread John Cook
Interesting, how do you change that? I really never thought about doing it that 
way since we do it so rarely.

John W. Cook
Systems Administrator
Partnership For Strong Families
315 SE 2nd Ave
Gainesville, Fl 32601
Office (352) 393-2741 x320
Cell (352) 215-6944
Fax (352) 393-2746
MCSE, MCTS, MCP+I,CompTIA A+, N+

-Original Message-
From: Tim Vander Kooi [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 4:37 PM
To: NT System Admin Issues
Subject: RE: new computers

I do something similar, but I simply changed where new computers are put by 
default. My computers now go to an OU with GPOs applied by default instead of 
going to "Computers", after that they can be further moved if necessary to 
receive additional GPOs and/or software which I install via SCE. The really 
nice part about this is that we use ForeFront for Anti-Malware which you can 
apply to any OU or Group, so now every machine that joins our domain gets AM 
software installed as a part of joining the domain. No manual intervention 
required to protect all computers in the domain by default.
Tim


-Original Message-
From: Joe Heaton [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 2:02 PM
To: NT System Admin Issues
Subject: RE: new computers

Hmm, interesting reasons Phil.  I can see the idea, create the object,
put it in the right OU, the right group for GPO, etc.  Thanks for
that...

Joe Heaton

-Original Message-
From: Phil Brutsche [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 11:45 AM
To: NT System Admin Issues
Subject: Re: new computers

I've done it both ways. I usually try to have the AD objects created
first.

If you create the AD object first the machine will get the right GPOs
right off the bat. It's less work that way, especially if you use
software installation GPOs. The machine is 100% ready to go sooner.

Joe Heaton wrote:
> When you guys build new PCs, do you create the AD object first, or
> simply join the domain from the PC afterwards?  I've always created
the
> PC, then joined the domain, but our desktop guy just mentioned that
our
> manager wanted him to create the AD object first.  My first instinct
is
> to say no, because then you're creating an AD object for something
that
> doesn't exist yet, but other than that, I didn't have a real reason.
> Anyone have a better reason?

--

Phil Brutsche
[EMAIL PROTECTED]


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

No virus found in this incoming message.
Checked by AVG - http://www.avg.com
Version: 8.0.169 / Virus Database: 270.6.21/1678 - Release Date:
9/18/2008 9:01 AM

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

CONFIDENTIALITY STATEMENT: The information transmitted, or contained or 
attached to or with this Notice is intended only for the person or entity to 
which it is addressed and may contain Protected Health Information (PHI), 
confidential and/or privileged material. Any review, transmission, 
dissemination, or other use of, and taking any action in reliance upon this 
information by persons or entities other than the intended recipient without 
the express written consent of the sender are prohibited. This information may 
be protected by the Health Insurance Portability and Accountability Act of 1996 
(HIPAA), and other Federal and Florida laws. Improper or unauthorized use or 
disclosure of this information could result in civil and/or criminal penalties.
 Consider the environment. Please don't print this e-mail unless you really 
need to.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: new computers

2008-09-18 Thread Tim Vander Kooi
I do something similar, but I simply changed where new computers are put by 
default. My computers now go to an OU with GPOs applied by default instead of 
going to "Computers", after that they can be further moved if necessary to 
receive additional GPOs and/or software which I install via SCE. The really 
nice part about this is that we use ForeFront for Anti-Malware which you can 
apply to any OU or Group, so now every machine that joins our domain gets AM 
software installed as a part of joining the domain. No manual intervention 
required to protect all computers in the domain by default.
Tim


-Original Message-
From: Joe Heaton [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 2:02 PM
To: NT System Admin Issues
Subject: RE: new computers

Hmm, interesting reasons Phil.  I can see the idea, create the object,
put it in the right OU, the right group for GPO, etc.  Thanks for
that...

Joe Heaton

-Original Message-
From: Phil Brutsche [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 11:45 AM
To: NT System Admin Issues
Subject: Re: new computers

I've done it both ways. I usually try to have the AD objects created
first.

If you create the AD object first the machine will get the right GPOs
right off the bat. It's less work that way, especially if you use
software installation GPOs. The machine is 100% ready to go sooner.

Joe Heaton wrote:
> When you guys build new PCs, do you create the AD object first, or
> simply join the domain from the PC afterwards?  I've always created
the
> PC, then joined the domain, but our desktop guy just mentioned that
our
> manager wanted him to create the AD object first.  My first instinct
is
> to say no, because then you're creating an AD object for something
that
> doesn't exist yet, but other than that, I didn't have a real reason.
> Anyone have a better reason?

--

Phil Brutsche
[EMAIL PROTECTED]


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

No virus found in this incoming message.
Checked by AVG - http://www.avg.com
Version: 8.0.169 / Virus Database: 270.6.21/1678 - Release Date:
9/18/2008 9:01 AM

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


MS SQL Server Failover/Replication scenarios

2008-09-18 Thread Jonathan Link
We have a client that handles lots of data.  I can't be more descriptive of
that because of the environment we're in.  I need a good primer on MS SQL
Server failover and replication.  Right now, their vendor is using log
shipping to replicate data between their main site and their DR site.
My understanding of log shipping and the client makes me suspect that there
is a large potential for data loss.  There is a lot of information I don't
know and what I really need is a good place to start reading so I don't end
up asking stupid questions of the client and their vendor.  For example, I
don't know what the interval is.  I know that the client didn't want
automated failover (not sure why, yet),

Any tips you could provide me to get started besides the typical google
search, which I am undertaking while composing this email would be extremely
helpful.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: logging deleted files

2008-09-18 Thread James Winzenz
Check the following Group Policy Objects to see if you have auditing
enabled:

 

1.  Default Domain Controllers Policy
2.  Default Server Policy
3.  Default Computer Policy

 

Do you have auditing enabled for the Default Domain Policy?  Which
specific GPO do you have this setting applied to?  BTW, our Default
Domain Controllers Policy has the audit object access set to No
Auditing.  If yours is configured this way, it would override any domain
gpo if "No Override" is not specified, and I really don't think you
would want to do that with your domain controller(s).  Since the Default
Domain Controllers Policy is linked to the Domain Controllers OU, it
would take precedence over the Default Domain Policy.

 

The audit setting (as previously mentioned) is audit object access, and
you would at least need to enable for success.  Then on the folder (and
subfolders and files) in question, you would need to configure auditing
for delete, delete subfolder and files.  You would also need to specify
the individual (or group) that should be audited against.  It appears
this would be logged under event ID 560.  

 

Thanks,

 

James Winzenz

Infrastructure Engineer - Security

Pulte Homes Information Services

 



From: Paul Everett [mailto:[EMAIL PROTECTED] 
Posted At: Thursday, September 18, 2008 11:34 AM
Posted To: NTSysadmin
Conversation: logging deleted files
Subject: RE: logging deleted files
  

I don't have a Domain Controller Security Policy in Admin Tools, just
Local Security Policy and "yes" the "Define these policy settings" box
is missing.

I just meant the files in question are on the DC.

 



From: Ralph Smith [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 2:15 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

I think you want to go to 

 

Administrative Tools > Domain Controller Security Policy > Local
Security Policy

 

if this applies to the domain controller.

 

There should be a box for "Define these policy settings".  Is that
what's missing?

 

I'm not sure what you mean by the file being located in the Domain Group
Policy on the DC.  Do you mean the file is on the Domain Controller
under the C:\WINDOWS\SYSVOL\domain\Policies folder?

Ralph Smith
Gateway Community Industries
845-331-1261 x234

 



From: Paul Everett [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 1:31 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

Thanks for the link Ralph.

 

I have auditing from the folder in question's Properties enabled and
also in Domain Group Policy on the DC, which is were the file is
located.

I can't get anything to show up in event log.

 

In the Local Security Policy the "audit local object" success and
failures are grayed out with no "enable" box.

 

 



From: Ralph Smith [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:47 AM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

http://sogeeky.blogspot.com/2006/07/how-to-audit-and-track-file-deletion
s.html

 

Ralph Smith
Gateway Community Industries
845-331-1261 x234

 



From: James Rankin [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 10:43 AM
To: NT System Admin Issues
Subject: Re: logging deleted files

 

 You can turn on file auditing for particular folders if you know which
folders are at risk

Right-click folder Properties, Security, Advanced, Auditing

2008/9/18 Paul Everett <[EMAIL PROTECTED]>

Is there anything that logs the event when files are deleted over the
network?

 

A user in one of our departments is deleting files, either
unintentionally or not.  The best I can do is check my daily backups to
find out which day it happened, but we'd like to find out who it is.  We
don't need something to recover deleted network files, just something
that logs the event that includes the username.  Is there anything out
there that can do this?

We have a 2003 AD Domain.

Thanks,

Paul Everett 
IS Dept. 


Confidentiality Notice:  This e-mail message, including any attachments,
is for the sole use of the intended recipient(s) and may contain
confidential and privileged information.  Any unauthorized review, use,
disclosure, or distribution is prohibited.   If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message, including attachments.

 

 

 

 

 

 

 

 

 

 

Confidentiality Notice:

**

This communication, including any attachments, may contain confidential
information and is intended only for the individual or entity to whom it
is addressed. Any review, dissemination, or copying of this
communication by anyone other than the intended recipient is strictly
prohibited. If you are not the intended recipient, please contact the
sender by reply email, delete and de

RE: logging deleted files

2008-09-18 Thread NTSysAdmin
If it's a DC then you "should" have both Domain Controller Security Policy and 
Domain Security Policy in Admin Tools, if not, it's not your DC.

S

From: Paul Everett [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 3:34 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

I don't have a Domain Controller Security Policy in Admin Tools, just Local 
Security Policy and "yes" the "Define these policy settings" box is missing.
I just meant the files in question are on the DC.


From: Ralph Smith [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 2:15 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

I think you want to go to

Administrative Tools > Domain Controller Security Policy > Local Security Policy

if this applies to the domain controller.

There should be a box for "Define these policy settings".  Is that what's 
missing?

I'm not sure what you mean by the file being located in the Domain Group Policy 
on the DC.  Do you mean the file is on the Domain Controller under the 
C:\WINDOWS\SYSVOL\domain\Policies folder?
Ralph Smith
Gateway Community Industries
845-331-1261 x234


From: Paul Everett [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 1:31 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

Thanks for the link Ralph.

I have auditing from the folder in question's Properties enabled and also in 
Domain Group Policy on the DC, which is were the file is located.
I can't get anything to show up in event log.

In the Local Security Policy the "audit local object" success and failures are 
grayed out with no "enable" box.



From: Ralph Smith [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 11:47 AM
To: NT System Admin Issues
Subject: RE: logging deleted files

http://sogeeky.blogspot.com/2006/07/how-to-audit-and-track-file-deletions.html

Ralph Smith
Gateway Community Industries
845-331-1261 x234


From: James Rankin [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 10:43 AM
To: NT System Admin Issues
Subject: Re: logging deleted files

 You can turn on file auditing for particular folders if you know which folders 
are at risk

Right-click folder Properties, Security, Advanced, Auditing
2008/9/18 Paul Everett <[EMAIL PROTECTED]>

Is there anything that logs the event when files are deleted over the network?



A user in one of our departments is deleting files, either unintentionally or 
not.  The best I can do is check my daily backups to find out which day it 
happened, but we'd like to find out who it is.  We don't need something to 
recover deleted network files, just something that logs the event that includes 
the username.  Is there anything out there that can do this?

We have a 2003 AD Domain.

Thanks,

Paul Everett
IS Dept.

Confidentiality Notice:  This e-mail message, including any attachments, is for 
the sole use of the intended recipient(s) and may contain confidential and 
privileged information.  Any unauthorized review, use, disclosure, or 
distribution is prohibited.   If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message, including attachments.


















Confidentiality Notice:

**

This communication, including any attachments, may contain confidential 
information and is intended only for the individual or entity to whom it is 
addressed. Any review, dissemination, or copying of this communication by 
anyone other than the intended recipient is strictly prohibited. If you are not 
the intended recipient, please contact the sender by reply email, delete and 
destroy all copies of the original message.












Confidentiality Notice:

**

This communication, including any attachments, may contain confidential 
information and is intended only for the individual or entity to whom it is 
addressed. Any review, dissemination, or copying of this communication by 
anyone other than the intended recipient is strictly prohibited. If you are not 
the intended recipient, please contact the sender by reply email, delete and 
destroy all copies of the original message.











~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: Remote Desktop Users

2008-09-18 Thread David Lum
Thanks everyone for your responses, this is EXACTLY what I was looking for!

Dave

From: Ken Schaefer [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 7:12 AM
To: NT System Admin Issues
Subject: RE: Remote Desktop Users

Restricted Groups

Cheers
Ken

From: David Lum [mailto:[EMAIL PROTECTED]
Sent: Friday, 19 September 2008 12:04 AM
To: NT System Admin Issues
Subject: Remote Desktop Users

What's the easiest way to add a domain group (say "Network support staff") to 
the local Remote Desktop Users group of say, 200 domain-attached servers? One I 
have this answer I imagine this same method could add the same group to the 
local administrator group on 400 desktops, right?






~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

Re: just plain old copying CDs

2008-09-18 Thread Lenny Bensman
UltraISO does a good job as well...

On Thu, Sep 18, 2008 at 1:34 PM, Holstrom, Don <[EMAIL PROTECTED]> wrote:

>  My apologies, CloneCd is still out there, sold by slysoft. Google is my
> friend, Google is my friend…
>
>
>
> *From:* Silvio L. Nisgoski [mailto:[EMAIL PROTECTED]
> *Sent:* Thursday, September 18, 2008 1:19 PM
> *To:* NT System Admin Issues
> *Subject:* Re: just plain old copying CDs
>
>
>
> Nero does the job well.  Is that anything strange about the original cd
> that some program could not interpret correctly ?
>
>
>
>  - Original Message -
>
> *From:* Holstrom, Don <[EMAIL PROTECTED]>
>
> *To:* NT System Admin Issues 
>
> *Sent:* Thursday, September 18, 2008 1:51 PM
>
> *Subject:* just plain old copying CDs
>
>
>
> I just copied a CD and it won't work as it should. I used to use CloneCD, I
> may even have copy somewhere. I think they closed shop at the behest of some
> organization or another. I also have the latest Roxio and Nero laying around
> somewhere. I just want a perfectly copied CD, byte for byte, down & dirty,
> easy, so it cannot be recognized as something other than the original. I
> have all sorts of machines with both XP & Vista & OSX so that is not a
> problem. Is there a consensus on CD duplication out there?
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

2008-09-18 Thread Murray Freeman
Well, we have spent a lot of time on this, but we finally solved it, and
I thought I'd share this with everyone. When we originally created the
floppy disk with the drivers, we did it on a workstation with a standard
floppy disk drive interface. We would then attach a USB floppy disk
drive that we have to the new server, and that just wasn't getting the
job done. So, we finally connected the USB floppy disk drive to our
workstation and copied the necessary driver files to another diskette
using the USB floppy disk drive. When we then connected the USB floppy
disk drive to the new server, problem solved. I can't tell why this
worked, but it did. Thanks for the suggestions.


Murray

-Original Message-
From: Terry Dickson [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 2:41 PM
To: NT System Admin Issues
Subject: RE: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

Check your Bios again.  Just because it recognizes the Drive in the Bios
you will still need to change the appropriate setting in the Bios to
allow it to use the USB Floppy.  At least that is what we have had to do
on some of ours.  



-Original Message-
From: Murray Freeman [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 2:00 PM
To: NT System Admin Issues
Subject: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

We're trying to build a new Windows Server 2K3, and since our server has
no floppy drive, we're using a USB floppy and while the BIOS recognizes
the drive, Windoes Server can't find the file it's looking for. We have
also used a USB thumb wheel which we formated to look like a Floppy
Drive, and same result. Unfortunately, Windows Server 2K3 will only look
for the Hard drive drivers on a "floppy" disk. We have a HP Proliant
ML110 and were trying to set up a raid. Any ideas on how to get around
the floppy issue?
 

Murray

 


 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


Re: new computers

2008-09-18 Thread Jonathan Link
That's what I get for being old school.  I had an NT 4 domain that I had
used underscores on years ago and had internal dns issues with our FreeBSD
DNS server.  I changed to dashes and never looked back. :-)

On Thu, Sep 18, 2008 at 3:27 PM, <[EMAIL PROTECTED]> wrote:

>
> "Jonathan Link" <[EMAIL PROTECTED]> wrote on 09/18/2008 03:25:05 PM:
>
> > DNS lookups. Underscores are not valid in DNS names.
>
> But they will work ..
>
> Z:\>nslookup admin_nt9
> Server:  admnwdc001.wrk.ads.pha.phila.gov
> Address:  10.64.7.53
>
> Name:admin_nt9.wrk.ads.pha.phila.gov
> Address:  10.64.13.3
>
>
> In Win2000 AD. This is internal only, of course.
>
>
>
> > On Thu, Sep 18, 2008 at 3:09 PM, Joe Heaton <[EMAIL PROTECTED]> wrote:
>  > Second question.  Anyone know what could break using underscores in PC
> > naming?  i.e. loc_pcname
> >
> > Joe Heaton
> >
> > -Original Message-
> > From: Phil Brutsche [mailto:[EMAIL PROTECTED]
> > Sent: Thursday, September 18, 2008 11:45 AM
> > To: NT System Admin Issues
> > Subject: Re: new computers
> >
> > I've done it both ways. I usually try to have the AD objects created
> > first.
> >
> > If you create the AD object first the machine will get the right GPOs
> > right off the bat. It's less work that way, especially if you use
> > software installation GPOs. The machine is 100% ready to go sooner.
> >
> > Joe Heaton wrote:
> > > When you guys build new PCs, do you create the AD object first, or
> > > simply join the domain from the PC afterwards?  I've always created
> > the
> > > PC, then joined the domain, but our desktop guy just mentioned that
> > our
> > > manager wanted him to create the AD object first.  My first instinct
> > is
> > > to say no, because then you're creating an AD object for something
> > that
> > > doesn't exist yet, but other than that, I didn't have a real reason.
> > > Anyone have a better reason?
>
> > --
> >
> > Phil Brutsche
> > [EMAIL PROTECTED]
> >
> >
> > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> > ~   ~
> >
> > No virus found in this incoming message.
> > Checked by AVG - http://www.avg.com
> > Version: 8.0.169 / Virus Database: 270.6.21/1678 - Release Date:
> > 9/18/2008 9:01 AM
> >
> > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> > ~   ~
> >
> >
> >
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

2008-09-18 Thread Mike Gill
Nlite does too much mojo. It's like doing html with frontpage. Mass storage
drivers are pretty easy to integrate manually. If you need any help Murry
email me offlist.

 

-- 
Mike Gill

 

From: MarvinC [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 12:24 PM
To: NT System Admin Issues
Subject: Re: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

 

I've run into this issue with DL140's and other servers that didn't come
with floppy drives. I suggest downloading nLite and adding the drivers to
the install process. Once that's done grab this tool and create a bootable
CD: 

 

http://isorecorder.alexfeinman.com/isorecorder.htm

 

hth

 

On Thu, Sep 18, 2008 at 3:11 PM, Murray Freeman <[EMAIL PROTECTED]> wrote:

We've got lots of floppies, but the Server doesn't have a floppy interface,
so we are using USB floppies. The Proliant recognizes the floppy, but the
Windows Server 2K3 is having trouble recognizing the floppy.

 

Murray

 

 

  _  

From: Christopher J. Bosak [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 2:04 PM 


To: NT System Admin Issues

Subject: RE: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

Can't temporally grab a floppy drive from another machine?

 

Christopher J. Bosak

Vector Company

c. 847.603.4673

[EMAIL PROTECTED]

 

"You need to install an RTFM Interface, due to an LBNC issue."

- B.O.F.H. (Merged 2 into 1) - Me

 

From: Murray Freeman [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 14:00 hrs 


To: NT System Admin Issues
Subject: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

 

We're trying to build a new Windows Server 2K3, and since our server has no
floppy drive, we're using a USB floppy and while the BIOS recognizes the
drive, Windoes Server can't find the file it's looking for. We have also
used a USB thumb wheel which we formated to look like a Floppy Drive, and
same result. Unfortunately, Windows Server 2K3 will only look for the Hard
drive drivers on a "floppy" disk. We have a HP Proliant ML110 and were
trying to set up a raid. Any ideas on how to get around the floppy issue?

 

Murray

 

 

 

 

 

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: Citrix farm issue

2008-09-18 Thread Webster
From: James Rankin [mailto:[EMAIL PROTECTED] 
Subject: Re: Citrix farm issue

 

Unfortunately no. This could be by far the worst application I have ever had
to deploy on a large scale. It runs on FoxPro, for starters. You can't
delete users without actually doing it via the SQL database, and the
"database" server relies on having a mapped R: drive (which means a
logged-in user). Absolute POS of the highest order.

I was the lead architect/developer for one of the largest (if not the
largest) provider of software for the Public Housing market in a past life.
There are two things that really just do not go together: Citrix and FoxPro.
I have never seen a FoxPro app that runs properly in a Citrix/TS
environment.  I know the company I used to work for is now writing all new
dev work in Delphi but they are still using FoxPro data files and indexes.

Webster


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

2008-09-18 Thread Terry Dickson
Check your Bios again.  Just because it recognizes the Drive in the Bios
you will still need to change the appropriate setting in the Bios to
allow it to use the USB Floppy.  At least that is what we have had to do
on some of ours.  



-Original Message-
From: Murray Freeman [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 2:00 PM
To: NT System Admin Issues
Subject: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

We're trying to build a new Windows Server 2K3, and since our server has
no floppy drive, we're using a USB floppy and while the BIOS recognizes
the drive, Windoes Server can't find the file it's looking for. We have
also used a USB thumb wheel which we formated to look like a Floppy
Drive, and same result. Unfortunately, Windows Server 2K3 will only look
for the Hard drive drivers on a "floppy" disk. We have a HP Proliant
ML110 and were trying to set up a raid. Any ideas on how to get around
the floppy issue?
 

Murray

 


 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: GPO settings for power management?

2008-09-18 Thread David Mazzaccaro
Awesome!
Thank you.
 



From: Ralph Smith [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:40 AM
To: NT System Admin Issues
Subject: RE: GPO settings for power management?



Here is a link I saved a while ago but never followed up on.  It is EZ
GPO which if remember correctly is a template for Group Policy created
by Energy Star that is supposed to work with Windows 2003 server for
2000 and XP clients.

Now I'll have to go check this out myself.

 

http://www.energystar.gov/index.cfm?c=power_mgt.pr_power_mgt_ez_gpo

Ralph Smith
Gateway Community Industries
845-331-1261 x234

 



From: David Mazzaccaro [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 10:52 AM
To: NT System Admin Issues
Subject: GPO settings for power management?

 

In Win2003 server, you cannot use GPOs to configure Windows XP power
settings (turn off monitor, turn off hard disk, standby, etc)...correct?

How about Win2008 sever? 

 

 

 

Confidentiality Notice:

**

This communication, including any attachments, may contain confidential
information and is intended only for the individual or entity to whom it
is addressed. Any review, dissemination, or copying of this
communication by anyone other than the intended recipient is strictly
prohibited. If you are not the intended recipient, please contact the
sender by reply email, delete and destroy all copies of the original
message.



 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

Re: new computers

2008-09-18 Thread Michael . Leone
"Jonathan Link" <[EMAIL PROTECTED]> wrote on 09/18/2008 03:25:05 PM:

> DNS lookups. Underscores are not valid in DNS names.

But they will work ..

Z:\>nslookup admin_nt9
Server:  admnwdc001.wrk.ads.pha.phila.gov
Address:  10.64.7.53

Name:admin_nt9.wrk.ads.pha.phila.gov
Address:  10.64.13.3


In Win2000 AD. This is internal only, of course.



> On Thu, Sep 18, 2008 at 3:09 PM, Joe Heaton <[EMAIL PROTECTED]> wrote:
> Second question.  Anyone know what could break using underscores in PC
> naming?  i.e. loc_pcname
> 
> Joe Heaton
> 
> -Original Message-
> From: Phil Brutsche [mailto:[EMAIL PROTECTED]
> Sent: Thursday, September 18, 2008 11:45 AM
> To: NT System Admin Issues
> Subject: Re: new computers
> 
> I've done it both ways. I usually try to have the AD objects created
> first.
> 
> If you create the AD object first the machine will get the right GPOs
> right off the bat. It's less work that way, especially if you use
> software installation GPOs. The machine is 100% ready to go sooner.
> 
> Joe Heaton wrote:
> > When you guys build new PCs, do you create the AD object first, or
> > simply join the domain from the PC afterwards?  I've always created
> the
> > PC, then joined the domain, but our desktop guy just mentioned that
> our
> > manager wanted him to create the AD object first.  My first instinct
> is
> > to say no, because then you're creating an AD object for something
> that
> > doesn't exist yet, but other than that, I didn't have a real reason.
> > Anyone have a better reason?

> --
> 
> Phil Brutsche
> [EMAIL PROTECTED]
> 
> 
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~
> 
> No virus found in this incoming message.
> Checked by AVG - http://www.avg.com
> Version: 8.0.169 / Virus Database: 270.6.21/1678 - Release Date:
> 9/18/2008 9:01 AM
> 
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~
> 
> 
> 
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: new computers

2008-09-18 Thread Michael B. Smith
Actually, they are allowed in Windows DNS and BIND since 8.4 (at least) has
had an option to support them.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange


-Original Message-
From: Salvador Manzo [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 3:18 PM
To: NT System Admin Issues
Subject: RE: new computers

Underscored are not valid in DNS names.  No FQDN for you.

-Original Message-
From: Joe Heaton [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 12:10 PM
To: NT System Admin Issues
Subject: RE: new computers

Second question.  Anyone know what could break using underscores in PC
naming?  i.e. loc_pcname

Joe Heaton

-Original Message-
From: Phil Brutsche [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:45 AM
To: NT System Admin Issues
Subject: Re: new computers

I've done it both ways. I usually try to have the AD objects created
first.

If you create the AD object first the machine will get the right GPOs
right off the bat. It's less work that way, especially if you use
software installation GPOs. The machine is 100% ready to go sooner.

Joe Heaton wrote:
> When you guys build new PCs, do you create the AD object first, or
> simply join the domain from the PC afterwards?  I've always created
the
> PC, then joined the domain, but our desktop guy just mentioned that
our
> manager wanted him to create the AD object first.  My first instinct
is
> to say no, because then you're creating an AD object for something
that
> doesn't exist yet, but other than that, I didn't have a real reason. 
> Anyone have a better reason?

-- 

Phil Brutsche
[EMAIL PROTECTED]


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

No virus found in this incoming message.
Checked by AVG - http://www.avg.com 
Version: 8.0.169 / Virus Database: 270.6.21/1678 - Release Date:
9/18/2008 9:01 AM

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: new computers

2008-09-18 Thread Michael . Leone
"Salvador Manzo" <[EMAIL PROTECTED]> wrote on 09/18/2008 03:18:24 PM:

> Underscored are not valid in DNS names.  No FQDN for you.

I have a few older servers with "_" in the names. They work fine in DNS.

Internally, of course. Win2K DNS, AD-integrated 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: new computers

2008-09-18 Thread Chinnery, Paul
It'll work, though.  I don't want to get into the reasons or details why they 
still have an underscore as it's not germaine to the question.

-Original Message-
From: Salvador Manzo [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 3:18 PM
To: NT System Admin Issues
Subject: RE: new computers


Underscored are not valid in DNS names.  No FQDN for you.

-Original Message-
From: Joe Heaton [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 12:10 PM
To: NT System Admin Issues
Subject: RE: new computers

Second question.  Anyone know what could break using underscores in PC
naming?  i.e. loc_pcname

Joe Heaton

-Original Message-
From: Phil Brutsche [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:45 AM
To: NT System Admin Issues
Subject: Re: new computers

I've done it both ways. I usually try to have the AD objects created
first.

If you create the AD object first the machine will get the right GPOs
right off the bat. It's less work that way, especially if you use
software installation GPOs. The machine is 100% ready to go sooner.

Joe Heaton wrote:
> When you guys build new PCs, do you create the AD object first, or
> simply join the domain from the PC afterwards?  I've always created
the
> PC, then joined the domain, but our desktop guy just mentioned that
our
> manager wanted him to create the AD object first.  My first instinct
is
> to say no, because then you're creating an AD object for something
that
> doesn't exist yet, but other than that, I didn't have a real reason. 
> Anyone have a better reason?

-- 

Phil Brutsche
[EMAIL PROTECTED]


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

No virus found in this incoming message.
Checked by AVG - http://www.avg.com 
Version: 8.0.169 / Virus Database: 270.6.21/1678 - Release Date:
9/18/2008 9:01 AM

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


Re: new computers

2008-09-18 Thread Jonathan Link
DNS lookups. Underscores are not valid in DNS names.

On Thu, Sep 18, 2008 at 3:09 PM, Joe Heaton <[EMAIL PROTECTED]> wrote:

> Second question.  Anyone know what could break using underscores in PC
> naming?  i.e. loc_pcname
>
> Joe Heaton
>
> -Original Message-
> From: Phil Brutsche [mailto:[EMAIL PROTECTED]
> Sent: Thursday, September 18, 2008 11:45 AM
> To: NT System Admin Issues
> Subject: Re: new computers
>
> I've done it both ways. I usually try to have the AD objects created
> first.
>
> If you create the AD object first the machine will get the right GPOs
> right off the bat. It's less work that way, especially if you use
> software installation GPOs. The machine is 100% ready to go sooner.
>
> Joe Heaton wrote:
> > When you guys build new PCs, do you create the AD object first, or
> > simply join the domain from the PC afterwards?  I've always created
> the
> > PC, then joined the domain, but our desktop guy just mentioned that
> our
> > manager wanted him to create the AD object first.  My first instinct
> is
> > to say no, because then you're creating an AD object for something
> that
> > doesn't exist yet, but other than that, I didn't have a real reason.
> > Anyone have a better reason?
>
>  --
>
> Phil Brutsche
> [EMAIL PROTECTED]
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~
>
> No virus found in this incoming message.
> Checked by AVG - http://www.avg.com
> Version: 8.0.169 / Virus Database: 270.6.21/1678 - Release Date:
> 9/18/2008 9:01 AM
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: new computers

2008-09-18 Thread Joe Heaton
That's what I was thinking.  Thanks Salvador.

Joe Heaton

-Original Message-
From: Salvador Manzo [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 12:18 PM
To: NT System Admin Issues
Subject: RE: new computers

Underscored are not valid in DNS names.  No FQDN for you.

-Original Message-
From: Joe Heaton [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 12:10 PM
To: NT System Admin Issues
Subject: RE: new computers

Second question.  Anyone know what could break using underscores in PC
naming?  i.e. loc_pcname

Joe Heaton

-Original Message-
From: Phil Brutsche [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:45 AM
To: NT System Admin Issues
Subject: Re: new computers

I've done it both ways. I usually try to have the AD objects created
first.

If you create the AD object first the machine will get the right GPOs
right off the bat. It's less work that way, especially if you use
software installation GPOs. The machine is 100% ready to go sooner.

Joe Heaton wrote:
> When you guys build new PCs, do you create the AD object first, or
> simply join the domain from the PC afterwards?  I've always created
the
> PC, then joined the domain, but our desktop guy just mentioned that
our
> manager wanted him to create the AD object first.  My first instinct
is
> to say no, because then you're creating an AD object for something
that
> doesn't exist yet, but other than that, I didn't have a real reason. 
> Anyone have a better reason?

-- 

Phil Brutsche
[EMAIL PROTECTED]


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

No virus found in this incoming message.
Checked by AVG - http://www.avg.com 
Version: 8.0.169 / Virus Database: 270.6.21/1678 - Release Date:
9/18/2008 9:01 AM

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

No virus found in this incoming message.
Checked by AVG - http://www.avg.com 
Version: 8.0.169 / Virus Database: 270.6.21/1678 - Release Date:
9/18/2008 9:01 AM

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


Re: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

2008-09-18 Thread MarvinC
I've run into this issue with DL140's and other servers that didn't come
with floppy drives. I suggest downloading nLite and adding the drivers to
the install process. Once that's done grab this tool and create a bootable
CD:

http://isorecorder.alexfeinman.com/isorecorder.htm

hth


On Thu, Sep 18, 2008 at 3:11 PM, Murray Freeman <[EMAIL PROTECTED]> wrote:

>  We've got lots of floppies, but the Server doesn't have a floppy
> interface, so we are using USB floppies. The Proliant recognizes the floppy,
> but the Windows Server 2K3 is having trouble recognizing the floppy.
>
>
> *Murray*
>
>
>  --
> *From:* Christopher J. Bosak [mailto:[EMAIL PROTECTED]
> *Sent:* Thursday, September 18, 2008 2:04 PM
> *To:* NT System Admin Issues
> *Subject:* RE: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR
>
>   Can't temporally grab a floppy drive from another machine?
>
>
>
> Christopher J. Bosak
>
> Vector Company
>
> c. 847.603.4673
>
> [EMAIL PROTECTED]
>
>
>
> *"You need to install an RTFM Interface, due to an LBNC issue."*
>
> *- B.O.F.H. (Merged 2 into 1) - Me*
>
>
>
> *From:* Murray Freeman [mailto:[EMAIL PROTECTED]
> *Sent:* Thursday, September 18, 2008 14:00 hrs
> *To:* NT System Admin Issues
> *Subject:* CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR
>
>
>
> We're trying to build a new Windows Server 2K3, and since our server has no
> floppy drive, we're using a USB floppy and while the BIOS recognizes the
> drive, Windoes Server can't find the file it's looking for. We have also
> used a USB thumb wheel which we formated to look like a Floppy Drive, and
> same result. Unfortunately, Windows Server 2K3 will only look for the Hard
> drive drivers on a "floppy" disk. We have a HP Proliant ML110 and were
> trying to set up a raid. Any ideas on how to get around the floppy issue?
>
>
>
> *Murray*
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: new computers

2008-09-18 Thread John Cook
We join them to the domain but we only do 3 or 4 a month so it's no big deal 
but our naming convention requires a machine to be identified by the office 
it's in so that's a major factor in just doing it when it's sitting in its 
final resting place.

John W. Cook
Systems Administrator
Partnership For Strong Families
315 SE 2nd Ave
Gainesville, Fl 32601
Office (352) 393-2741 x320
Cell (352) 215-6944
Fax (352) 393-2746
MCSE, MCTS, MCP+I,CompTIA A+, N+

From: Joe Heaton [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 2:39 PM
To: NT System Admin Issues
Subject: new computers

When you guys build new PCs, do you create the AD object first, or simply join 
the domain from the PC afterwards?  I've always created the PC, then joined the 
domain, but our desktop guy just mentioned that our manager wanted him to 
create the AD object first.  My first instinct is to say no, because then 
you're creating an AD object for something that doesn't exist yet, but other 
than that, I didn't have a real reason.  Anyone have a better reason?

Joe Heaton
AISA
Employment Training Panel
1100 J Street, 4th Floor
Sacramento, CA  95814
(916) 327-5276
[EMAIL PROTECTED]








CONFIDENTIALITY STATEMENT: The information transmitted, or contained or 
attached to or with this Notice is intended only for the person or entity to 
which it is addressed and may contain Protected Health Information (PHI), 
confidential and/or privileged material. Any review, transmission, 
dissemination, or other use of, and taking any action in reliance upon this 
information by persons or entities other than the intended recipient without 
the express written consent of the sender are prohibited. This information may 
be protected by the Health Insurance Portability and Accountability Act of 1996 
(HIPAA), and other Federal and Florida laws. Improper or unauthorized use or 
disclosure of this information could result in civil and/or criminal penalties.
Consider the environment. Please don't print this e-mail unless you really need 
to.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: new computers

2008-09-18 Thread Salvador Manzo
Underscored are not valid in DNS names.  No FQDN for you.

-Original Message-
From: Joe Heaton [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 12:10 PM
To: NT System Admin Issues
Subject: RE: new computers

Second question.  Anyone know what could break using underscores in PC
naming?  i.e. loc_pcname

Joe Heaton

-Original Message-
From: Phil Brutsche [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:45 AM
To: NT System Admin Issues
Subject: Re: new computers

I've done it both ways. I usually try to have the AD objects created
first.

If you create the AD object first the machine will get the right GPOs
right off the bat. It's less work that way, especially if you use
software installation GPOs. The machine is 100% ready to go sooner.

Joe Heaton wrote:
> When you guys build new PCs, do you create the AD object first, or
> simply join the domain from the PC afterwards?  I've always created
the
> PC, then joined the domain, but our desktop guy just mentioned that
our
> manager wanted him to create the AD object first.  My first instinct
is
> to say no, because then you're creating an AD object for something
that
> doesn't exist yet, but other than that, I didn't have a real reason. 
> Anyone have a better reason?

-- 

Phil Brutsche
[EMAIL PROTECTED]


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

No virus found in this incoming message.
Checked by AVG - http://www.avg.com 
Version: 8.0.169 / Virus Database: 270.6.21/1678 - Release Date:
9/18/2008 9:01 AM

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


Re: creaig new 2k3 server problem with loading from floppy dr

2008-09-18 Thread Steve Ens
I've seen this before Murray, but can I remember what I did?  I think it was
because I was using the wrong RAID driver...yes make sure you have the
correct driver...intel series driver I think.
It's night and day setting up the 1xx series compared to the real 3xx
servers
have you got a USB floppy drive?

On Thu, Sep 18, 2008 at 2:03 PM, <[EMAIL PROTECTED]> wrote:

>  Talk about attention, Attencion
>
>
>
> *From:* Murray Freeman [mailto:[EMAIL PROTECTED]
> *Sent:* Thursday, September 18, 2008 2:00 PM
> *To:* NT System Admin Issues
> *Subject:* CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR
>
>
>
> We're trying to build a new Windows Server 2K3, and since our server has no
> floppy drive, we're using a USB floppy and while the BIOS recognizes the
> drive, Windoes Server can't find the file it's looking for. We have also
> used a USB thumb wheel which we formated to look like a Floppy Drive, and
> same result. Unfortunately, Windows Server 2K3 will only look for the Hard
> drive drivers on a "floppy" disk. We have a HP Proliant ML110 and were
> trying to set up a raid. Any ideas on how to get around the floppy issue?
>
>
>
> *Murray*
>
>
>
>
>
>
>
>
>
> This email and any attached files are confidential and intended solely for
> the intended recipient(s). If you are not the named recipient you should not
> read, distribute, copy or alter this email. Any views or opinions expressed
> in this email are those of the author and do not represent those of the Girl
> Scouts of Southwest Texas. Warning: Although precautions have been taken to
> make sure no viruses are present in this email, Girl Scouts of Southwest
> Texas cannot accept responsibility for any loss or damage that arise from
> the use of this email or attachments.
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

2008-09-18 Thread Murray Freeman
We've got lots of floppies, but the Server doesn't have a floppy
interface, so we are using USB floppies. The Proliant recognizes the
floppy, but the Windows Server 2K3 is having trouble recognizing the
floppy.
 

Murray

 



From: Christopher J. Bosak [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 2:04 PM
To: NT System Admin Issues
Subject: RE: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR



Can't temporally grab a floppy drive from another machine?

 

Christopher J. Bosak

Vector Company

c. 847.603.4673

[EMAIL PROTECTED]

 

"You need to install an RTFM Interface, due to an LBNC issue."

- B.O.F.H. (Merged 2 into 1) - Me

 

From: Murray Freeman [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 14:00 hrs
To: NT System Admin Issues
Subject: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

 

We're trying to build a new Windows Server 2K3, and since our server has
no floppy drive, we're using a USB floppy and while the BIOS recognizes
the drive, Windoes Server can't find the file it's looking for. We have
also used a USB thumb wheel which we formated to look like a Floppy
Drive, and same result. Unfortunately, Windows Server 2K3 will only look
for the Hard drive drivers on a "floppy" disk. We have a HP Proliant
ML110 and were trying to set up a raid. Any ideas on how to get around
the floppy issue?

 

Murray

 

 

 

 


 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: new computers

2008-09-18 Thread Joe Heaton
Second question.  Anyone know what could break using underscores in PC
naming?  i.e. loc_pcname

Joe Heaton

-Original Message-
From: Phil Brutsche [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:45 AM
To: NT System Admin Issues
Subject: Re: new computers

I've done it both ways. I usually try to have the AD objects created
first.

If you create the AD object first the machine will get the right GPOs
right off the bat. It's less work that way, especially if you use
software installation GPOs. The machine is 100% ready to go sooner.

Joe Heaton wrote:
> When you guys build new PCs, do you create the AD object first, or
> simply join the domain from the PC afterwards?  I've always created
the
> PC, then joined the domain, but our desktop guy just mentioned that
our
> manager wanted him to create the AD object first.  My first instinct
is
> to say no, because then you're creating an AD object for something
that
> doesn't exist yet, but other than that, I didn't have a real reason. 
> Anyone have a better reason?

-- 

Phil Brutsche
[EMAIL PROTECTED]


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

No virus found in this incoming message.
Checked by AVG - http://www.avg.com 
Version: 8.0.169 / Virus Database: 270.6.21/1678 - Release Date:
9/18/2008 9:01 AM

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

2008-09-18 Thread Salvador Manzo
If it absotively, posilutely won't take recognize the USB connections
(presuming you've gone through and made sure any necessary BIOS settings
are enabled)... you're probably looking at needing to make a custom
install disk for it with the mass storage drivers injected should HP not
offer a SmartStart equivalent that's W2k3 compatible.

 



From: Murray Freeman [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 12:00 PM
To: NT System Admin Issues
Subject: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

 

We're trying to build a new Windows Server 2K3, and since our server has
no floppy drive, we're using a USB floppy and while the BIOS recognizes
the drive, Windoes Server can't find the file it's looking for. We have
also used a USB thumb wheel which we formated to look like a Floppy
Drive, and same result. Unfortunately, Windows Server 2K3 will only look
for the Hard drive drivers on a "floppy" disk. We have a HP Proliant
ML110 and were trying to set up a raid. Any ideas on how to get around
the floppy issue?

 

Murray

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: logging deleted files

2008-09-18 Thread Holstrom, Don
Anyone using, used Undelete Server version 2009?

 

From: Paul Everett [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 3:00 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

There is a 2009 version that supports Server 08.

 



From: Holstrom, Don [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 2:51 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

I have tried this program in different versions in different iterations
at different times over the last few years, and it has always brought
down my file servers. Is there a new version that would work with Server
08?

 

From: Geling, Jos HS [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 2:46 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

The program Undelete Server can help

1. it put file in the recoverybin, so they can be recovered.

2. it logs, who did delete the file.

 

Jos

 

 

 



From: Paul Everett [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 16:34
To: NT System Admin Issues
Subject: logging deleted files

Is there anything that logs the event when files are deleted over the
network?

 

A user in one of our departments is deleting files, either
unintentionally or not.  The best I can do is check my daily backups to
find out which day it happened, but we'd like to find out who it is.  We
don't need something to recover deleted network files, just something
that logs the event that includes the username.  Is there anything out
there that can do this?

We have a 2003 AD Domain.

Thanks,

Paul Everett 
IS Dept. 


Confidentiality Notice:  This e-mail message, including any attachments,
is for the sole use of the intended recipient(s) and may contain
confidential and privileged information.  Any unauthorized review, use,
disclosure, or distribution is prohibited.   If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message, including attachments.

 

 

 

 

 

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

2008-09-18 Thread Christopher J. Bosak
Can't temporally grab a floppy drive from another machine?

 

Christopher J. Bosak

Vector Company

c. 847.603.4673

[EMAIL PROTECTED]

 

"You need to install an RTFM Interface, due to an LBNC issue."

- B.O.F.H. (Merged 2 into 1) - Me

 

From: Murray Freeman [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 14:00 hrs
To: NT System Admin Issues
Subject: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

 

We're trying to build a new Windows Server 2K3, and since our server has no
floppy drive, we're using a USB floppy and while the BIOS recognizes the
drive, Windoes Server can't find the file it's looking for. We have also
used a USB thumb wheel which we formated to look like a Floppy Drive, and
same result. Unfortunately, Windows Server 2K3 will only look for the Hard
drive drivers on a "floppy" disk. We have a HP Proliant ML110 and were
trying to set up a raid. Any ideas on how to get around the floppy issue?

 

Murray

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

Re: new computers

2008-09-18 Thread Michael . Leone
"Joe Heaton" <[EMAIL PROTECTED]> wrote on 09/18/2008 02:39:21 PM:

> When you guys build new PCs, do you create the AD object first, or 
> simply join the domain from the PC afterwards? 

Just join.

> I?ve always created 
> the PC, then joined the domain, but our desktop guy just mentioned 
> that our manager wanted him to create the AD object first.  My first
> instinct is to say no, because then you?re creating an AD object for
> something that doesn?t exist yet, but other than that, I didn?t have
> a real reason.  Anyone have a better reason?

It'll work ... but what do you gain?


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: creaig new 2k3 server problem with loading from floppy dr

2008-09-18 Thread tgonzalez
Talk about attention, Attencion

 

From: Murray Freeman [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 2:00 PM
To: NT System Admin Issues
Subject: CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

 

We're trying to build a new Windows Server 2K3, and since our server has
no floppy drive, we're using a USB floppy and while the BIOS recognizes
the drive, Windoes Server can't find the file it's looking for. We have
also used a USB thumb wheel which we formated to look like a Floppy
Drive, and same result. Unfortunately, Windows Server 2K3 will only look
for the Hard drive drivers on a "floppy" disk. We have a HP Proliant
ML110 and were trying to set up a raid. Any ideas on how to get around
the floppy issue?

 

Murray

 

 

 

 



This email and any attached files are confidential and intended solely for the 
intended recipient(s). If you are not the named recipient you should not read, 
distribute, copy or alter this email. Any views or opinions expressed in this 
email are those of the author and do not represent those of the Girl Scouts of 
Southwest Texas company. Warning: Although precautions have been taken to make 
sure no viruses are present in this email, the company cannot accept 
responsibility for any loss or damage that arise from the use of this email or 
attachments.
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: new computers

2008-09-18 Thread Joe Heaton
Hmm, interesting reasons Phil.  I can see the idea, create the object,
put it in the right OU, the right group for GPO, etc.  Thanks for
that...

Joe Heaton

-Original Message-
From: Phil Brutsche [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:45 AM
To: NT System Admin Issues
Subject: Re: new computers

I've done it both ways. I usually try to have the AD objects created
first.

If you create the AD object first the machine will get the right GPOs
right off the bat. It's less work that way, especially if you use
software installation GPOs. The machine is 100% ready to go sooner.

Joe Heaton wrote:
> When you guys build new PCs, do you create the AD object first, or
> simply join the domain from the PC afterwards?  I've always created
the
> PC, then joined the domain, but our desktop guy just mentioned that
our
> manager wanted him to create the AD object first.  My first instinct
is
> to say no, because then you're creating an AD object for something
that
> doesn't exist yet, but other than that, I didn't have a real reason. 
> Anyone have a better reason?

-- 

Phil Brutsche
[EMAIL PROTECTED]


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

No virus found in this incoming message.
Checked by AVG - http://www.avg.com 
Version: 8.0.169 / Virus Database: 270.6.21/1678 - Release Date:
9/18/2008 9:01 AM

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


CREATING NEW 2K3 SERVER PROBLEM WITH LOADING FROM FLOPPY DR

2008-09-18 Thread Murray Freeman
We're trying to build a new Windows Server 2K3, and since our server has
no floppy drive, we're using a USB floppy and while the BIOS recognizes
the drive, Windoes Server can't find the file it's looking for. We have
also used a USB thumb wheel which we formated to look like a Floppy
Drive, and same result. Unfortunately, Windows Server 2K3 will only look
for the Hard drive drivers on a "floppy" disk. We have a HP Proliant
ML110 and were trying to set up a raid. Any ideas on how to get around
the floppy issue?
 

Murray

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: logging deleted files

2008-09-18 Thread Paul Everett
There is a 2009 version that supports Server 08.

 



From: Holstrom, Don [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 2:51 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

I have tried this program in different versions in different iterations
at different times over the last few years, and it has always brought
down my file servers. Is there a new version that would work with Server
08?

 

From: Geling, Jos HS [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 2:46 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

The program Undelete Server can help

1. it put file in the recoverybin, so they can be recovered.

2. it logs, who did delete the file.

 

Jos

 

 

 



From: Paul Everett [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 16:34
To: NT System Admin Issues
Subject: logging deleted files

Is there anything that logs the event when files are deleted over the
network?

 

A user in one of our departments is deleting files, either
unintentionally or not.  The best I can do is check my daily backups to
find out which day it happened, but we'd like to find out who it is.  We
don't need something to recover deleted network files, just something
that logs the event that includes the username.  Is there anything out
there that can do this?

We have a 2003 AD Domain.

Thanks,

Paul Everett 
IS Dept. 


Confidentiality Notice:  This e-mail message, including any attachments,
is for the sole use of the intended recipient(s) and may contain
confidential and privileged information.  Any unauthorized review, use,
disclosure, or distribution is prohibited.   If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message, including attachments.

 

 

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: Dell OEM XP Pro cd w/ SP3

2008-09-18 Thread Joseph L. Casale
CMIIW,
Doesn't imagex just create/mount images, and peimg /inf is what "injected" 
drivers. In the case of XP, you still use sysprep, but can mount the image and 
adjust the sysprep.inf? So you ImageX doesn't relaly have anything to do with 
the drivers, its peimg in vista, and still sysprep in XP?

Right?

jlc

-Original Message-
From: Michael B. Smith [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 12:18 PM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Imagex can inject drivers into an XP image.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange


-Original Message-
From: Joseph L. Casale [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 2:14 PM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Sorry, missed the post before.
ImageX would work fine for "imaging" but it cant inject drivers into XP.
Sysprep will *very* much help you. It's designed to do just this, it will
allow additional Mass Storage Drivers to be included in the image, then it
will remove what's not present after.

nLite is cool, but its more than a GUI front end, it's a bit of a hack.

KB303786 which leads to KB302577

HTH,
jlc

-Original Message-
From: Michael B. Smith [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 11:57 AM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Imagex.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange

-Original Message-
From: Silvio L. Nisgoski [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 1:31 PM
To: NT System Admin Issues
Subject: Re: Dell OEM XP Pro cd w/ SP3

Due to the big difference in machine hardware, sysprepping won´t help me
very much.  I need a customized install, with the selections for keyboard,
timezones, group names, accounts, etc, a bunch of SATA drivers, other
drivers for the most common hardware pieces we use. Would like to add Adobe
Reader, Java, media player updates to that also.

What would be the MS-approved name for the technology to do that, so that I
can google for it ? I considered nLite to be just a graphical frontend for
the .inf file modifications necessary to integrate drivers and pre-define
configurations



- Original Message -
From: "Phil Brutsche" <[EMAIL PROTECTED]>
To: "NT System Admin Issues" 
Sent: Wednesday, September 17, 2008 10:09 PM
Subject: Re: Dell OEM XP Pro cd w/ SP3


> That's one of the reasons I dropped nLite for sysprep'ed ghost images.
>
> Joseph L. Casale wrote:
>> I always use MS methods for all my deployments, which often means a tad
>> extra work
>> but its peace of mind from supportability when the merde hits the fan...
>
> --
>
> Phil Brutsche
> [EMAIL PROTECTED]
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: logging deleted files

2008-09-18 Thread Holstrom, Don
I have tried this program in different versions in different iterations
at different times over the last few years, and it has always brought
down my file servers. Is there a new version that would work with Server
08?

 

From: Geling, Jos HS [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 2:46 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

The program Undelete Server can help

1. it put file in the recoverybin, so they can be recovered.

2. it logs, who did delete the file.

 

Jos

 

 

 



From: Paul Everett [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 16:34
To: NT System Admin Issues
Subject: logging deleted files

Is there anything that logs the event when files are deleted over the
network?

 

A user in one of our departments is deleting files, either
unintentionally or not.  The best I can do is check my daily backups to
find out which day it happened, but we'd like to find out who it is.  We
don't need something to recover deleted network files, just something
that logs the event that includes the username.  Is there anything out
there that can do this?

We have a 2003 AD Domain.

Thanks,

Paul Everett 
IS Dept. 


Confidentiality Notice:  This e-mail message, including any attachments,
is for the sole use of the intended recipient(s) and may contain
confidential and privileged information.  Any unauthorized review, use,
disclosure, or distribution is prohibited.   If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message, including attachments.

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: logging deleted files

2008-09-18 Thread Geling, Jos HS
The program Undelete Server can help
1. it put file in the recoverybin, so they can be recovered.
2. it logs, who did delete the file.
 
Jos
 
 

  _  

From: Paul Everett [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 16:34
To: NT System Admin Issues
Subject: logging deleted files



Is there anything that logs the event when files are deleted over the
network?

 

A user in one of our departments is deleting files, either unintentionally
or not.  The best I can do is check my daily backups to find out which day
it happened, but we'd like to find out who it is.  We don't need something
to recover deleted network files, just something that logs the event that
includes the username.  Is there anything out there that can do this?

We have a 2003 AD Domain.

Thanks,

Paul Everett 
IS Dept. 


Confidentiality Notice:  This e-mail message, including any attachments, is
for the sole use of the intended recipient(s) and may contain confidential
and privileged information.  Any unauthorized review, use, disclosure, or
distribution is prohibited.   If you are not the intended recipient, please
contact the sender by reply e-mail and destroy all copies of the original
message, including attachments.

 


 


 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

Re: new computers

2008-09-18 Thread Phil Brutsche
I've done it both ways. I usually try to have the AD objects created first.

If you create the AD object first the machine will get the right GPOs
right off the bat. It's less work that way, especially if you use
software installation GPOs. The machine is 100% ready to go sooner.

Joe Heaton wrote:
> When you guys build new PCs, do you create the AD object first, or
> simply join the domain from the PC afterwards?  I’ve always created the
> PC, then joined the domain, but our desktop guy just mentioned that our
> manager wanted him to create the AD object first.  My first instinct is
> to say no, because then you’re creating an AD object for something that
> doesn’t exist yet, but other than that, I didn’t have a real reason. 
> Anyone have a better reason?

-- 

Phil Brutsche
[EMAIL PROTECTED]


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


Re: new computers

2008-09-18 Thread Jeff Brown
I don't have a "better" reason, but with SBS you have to create the account
on the server first to use the wizard.  Maybe that's where the other
arguement comes from???  We do it like you do.

On Thu, Sep 18, 2008 at 1:39 PM, Joe Heaton <[EMAIL PROTECTED]> wrote:

>  When you guys build new PCs, do you create the AD object first, or simply
> join the domain from the PC afterwards?  I've always created the PC, then
> joined the domain, but our desktop guy just mentioned that our manager
> wanted him to create the AD object first.  My first instinct is to say no,
> because then you're creating an AD object for something that doesn't exist
> yet, but other than that, I didn't have a real reason.  Anyone have a better
> reason?
>
>
>
> Joe Heaton
>
> AISA
>
> Employment Training Panel
>
> 1100 J Street, 4th Floor
>
> Sacramento, CA  95814
>
> (916) 327-5276
>
> [EMAIL PROTECTED]
>
>
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: new computers

2008-09-18 Thread Salvador Manzo
How structured is the creation process?  For us, if the account isn't
pre-staged, it tends to stay in our generic New PC OU.  Given that the
field guys don't get local Admin unless it's specifically in _their_
structure (5 branches within AD), the options are - A) pre-stage and be
sure it's right out of the box or B) revert to local Admin and leave it
in the generic OU.

 



From: Joe Heaton [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:39 AM
To: NT System Admin Issues
Subject: new computers

 

When you guys build new PCs, do you create the AD object first, or
simply join the domain from the PC afterwards?  I've always created the
PC, then joined the domain, but our desktop guy just mentioned that our
manager wanted him to create the AD object first.  My first instinct is
to say no, because then you're creating an AD object for something that
doesn't exist yet, but other than that, I didn't have a real reason.
Anyone have a better reason?

 

Joe Heaton

AISA

Employment Training Panel

1100 J Street, 4th Floor

Sacramento, CA  95814

(916) 327-5276

[EMAIL PROTECTED]

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

Re: Dell OEM XP Pro cd w/ SP3

2008-09-18 Thread Phil Brutsche
Hardware is a non issue. Take a look at my sysprep.inf to see how I do it:

http://www.optimumdata.net/phil/sysprep.inf

Because of the SysprepMassStorage section it does not matter if the
machine has SCSI drives, SAS drives, IDE drives, or SATA drives.

IMO the general rule of thumb for application installation should be:
applications are not ever put on the deployment image. That's what
software installation GPOs are for. I make an exception for IE7, a VNC
server, WMP, and .NET Framework.

The only thing I don't have an answer for is the localization settings
(keyboard, timezone).

Silvio L. Nisgoski wrote:
> Due to the big difference in machine hardware, sysprepping won´t help me 
> very much.  I need a customized install, with the selections for keyboard, 
> timezones, group names, accounts, etc, a bunch of SATA drivers, other 
> drivers for the most common hardware pieces we use. Would like to add Adobe 
> Reader, Java, media player updates to that also.
> 
> What would be the MS-approved name for the technology to do that, so that I 
> can google for it ? I considered nLite to be just a graphical frontend for 
> the .inf file modifications necessary to integrate drivers and pre-define 
> configurations

-- 

Phil Brutsche
[EMAIL PROTECTED]


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


new computers

2008-09-18 Thread Joe Heaton
When you guys build new PCs, do you create the AD object first, or
simply join the domain from the PC afterwards?  I've always created the
PC, then joined the domain, but our desktop guy just mentioned that our
manager wanted him to create the AD object first.  My first instinct is
to say no, because then you're creating an AD object for something that
doesn't exist yet, but other than that, I didn't have a real reason.
Anyone have a better reason?

 

Joe Heaton

AISA

Employment Training Panel

1100 J Street, 4th Floor

Sacramento, CA  95814

(916) 327-5276

[EMAIL PROTECTED]

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: OT: We're all doomed

2008-09-18 Thread Christopher J. Bosak
I second that. (From Wheeling, IL)

Christopher J. Bosak
Vector Company
c. 847.603.4673
[EMAIL PROTECTED]

"You need to install an RTFM Interface, due to an LBNC issue."
- B.O.F.H. (Merged 2 into 1) - Me


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 13:35 hrs
To: NT System Admin Issues
Subject: RE: OT: We're all doomed

Well, it is the beautiful time of year for Springfield.  We'd love to have 
him test it there!
--
Richard McClary, Systems Administrator
ASPCA Knowledge Management
1717 S Philo Rd, Ste 36, Urbana, IL  61802
217-337-9761
http://www.aspca.org


Tim Vander Kooi <[EMAIL PROTECTED]> wrote on 09/18/2008 01:19:35 PM:

> So we need to come up with a Politico Plunger? Sounds like a job for
> Shookie Monster, he's the best design guy I know.
> TVK
> 
> 
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
> Sent: Thursday, September 18, 2008 10:47 AM
> To: NT System Admin Issues
> Subject: Re: OT: We're all doomed
> 
> I don't know... might too large a mass of politicians clog up a black
> hole?  Sort-of like a toilet?
> --
> Richard McClary, Systems Administrator
> ASPCA Knowledge Management
> 1717 S Philo Rd, Ste 36, Urbana, IL  61802
> 217-337-9761
> http://www.aspca.org
> 
> 
> "Jon Harris" <[EMAIL PROTECTED]> wrote on 09/18/2008 10:03:34 AM:
> 
> > Then we would get a planetary size Black Hole!  Even 2 would risk
> > that.  I would prefer letting them test the atmosphere and water
> > availability on Mars as the way to deal with them.  Much cleaner and
> > we get something truly useful out of it.
> >
> > Jon
> 
> > On Thu, Sep 18, 2008 at 10:12 AM, Lee Douglas <[EMAIL PROTECTED]>
> wrote:
> > Let's make it ALL politicians and then we can start over 
> >
> >
> 
> > On Thu, Sep 18, 2008 at 10:07 AM, Mike French
> <[EMAIL PROTECTED]
> > > wrote:
> > LOL! Maybe the scientific community should shoot some politicians
> > through the collider?
> >
> > 
> > From: TJ [mailto:[EMAIL PROTECTED]
> > Sent: Thursday, September 18, 2008 8:36 AM
> > To: NT System Admin Issues
> > Subject: Re: OT: We're all doomed
> >
> >
> >
> >
> > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> > ~   ~
> >
> >
> >
> >
> >
> >
> 
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~
> 
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: OT: We're all doomed

2008-09-18 Thread RichardMcClary
Well, it is the beautiful time of year for Springfield.  We'd love to have 
him test it there!
--
Richard McClary, Systems Administrator
ASPCA Knowledge Management
1717 S Philo Rd, Ste 36, Urbana, IL  61802
217-337-9761
http://www.aspca.org


Tim Vander Kooi <[EMAIL PROTECTED]> wrote on 09/18/2008 01:19:35 PM:

> So we need to come up with a Politico Plunger? Sounds like a job for
> Shookie Monster, he's the best design guy I know.
> TVK
> 
> 
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
> Sent: Thursday, September 18, 2008 10:47 AM
> To: NT System Admin Issues
> Subject: Re: OT: We're all doomed
> 
> I don't know... might too large a mass of politicians clog up a black
> hole?  Sort-of like a toilet?
> --
> Richard McClary, Systems Administrator
> ASPCA Knowledge Management
> 1717 S Philo Rd, Ste 36, Urbana, IL  61802
> 217-337-9761
> http://www.aspca.org
> 
> 
> "Jon Harris" <[EMAIL PROTECTED]> wrote on 09/18/2008 10:03:34 AM:
> 
> > Then we would get a planetary size Black Hole!  Even 2 would risk
> > that.  I would prefer letting them test the atmosphere and water
> > availability on Mars as the way to deal with them.  Much cleaner and
> > we get something truly useful out of it.
> >
> > Jon
> 
> > On Thu, Sep 18, 2008 at 10:12 AM, Lee Douglas <[EMAIL PROTECTED]>
> wrote:
> > Let's make it ALL politicians and then we can start over 
> >
> >
> 
> > On Thu, Sep 18, 2008 at 10:07 AM, Mike French
> <[EMAIL PROTECTED]
> > > wrote:
> > LOL! Maybe the scientific community should shoot some politicians
> > through the collider?
> >
> > 
> > From: TJ [mailto:[EMAIL PROTECTED]
> > Sent: Thursday, September 18, 2008 8:36 AM
> > To: NT System Admin Issues
> > Subject: Re: OT: We're all doomed
> >
> >
> >
> >
> > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> > ~   ~
> >
> >
> >
> >
> >
> >
> 
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~
> 
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: logging deleted files

2008-09-18 Thread Paul Everett
I don't have a Domain Controller Security Policy in Admin Tools, just
Local Security Policy and "yes" the "Define these policy settings" box
is missing.

I just meant the files in question are on the DC.

 



From: Ralph Smith [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 2:15 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

I think you want to go to 

 

Administrative Tools > Domain Controller Security Policy > Local
Security Policy

 

if this applies to the domain controller.

 

There should be a box for "Define these policy settings".  Is that
what's missing?

 

I'm not sure what you mean by the file being located in the Domain Group
Policy on the DC.  Do you mean the file is on the Domain Controller
under the C:\WINDOWS\SYSVOL\domain\Policies folder?

Ralph Smith
Gateway Community Industries
845-331-1261 x234

 



From: Paul Everett [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 1:31 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

Thanks for the link Ralph.

 

I have auditing from the folder in question's Properties enabled and
also in Domain Group Policy on the DC, which is were the file is
located.

I can't get anything to show up in event log.

 

In the Local Security Policy the "audit local object" success and
failures are grayed out with no "enable" box.

 

 



From: Ralph Smith [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:47 AM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

http://sogeeky.blogspot.com/2006/07/how-to-audit-and-track-file-deletion
s.html

 

Ralph Smith
Gateway Community Industries
845-331-1261 x234

 



From: James Rankin [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 10:43 AM
To: NT System Admin Issues
Subject: Re: logging deleted files

 

 You can turn on file auditing for particular folders if you know which
folders are at risk

Right-click folder Properties, Security, Advanced, Auditing

2008/9/18 Paul Everett <[EMAIL PROTECTED]>

Is there anything that logs the event when files are deleted over the
network?

 

A user in one of our departments is deleting files, either
unintentionally or not.  The best I can do is check my daily backups to
find out which day it happened, but we'd like to find out who it is.  We
don't need something to recover deleted network files, just something
that logs the event that includes the username.  Is there anything out
there that can do this?

We have a 2003 AD Domain.

Thanks,

Paul Everett 
IS Dept. 


Confidentiality Notice:  This e-mail message, including any attachments,
is for the sole use of the intended recipient(s) and may contain
confidential and privileged information.  Any unauthorized review, use,
disclosure, or distribution is prohibited.   If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message, including attachments.

 

 

 

 

 

 

 

 

 

 

Confidentiality Notice:

**

This communication, including any attachments, may contain confidential
information and is intended only for the individual or entity to whom it
is addressed. Any review, dissemination, or copying of this
communication by anyone other than the intended recipient is strictly
prohibited. If you are not the intended recipient, please contact the
sender by reply email, delete and destroy all copies of the original
message.

 

 

 

 

 

 

 

Confidentiality Notice:

**

This communication, including any attachments, may contain confidential
information and is intended only for the individual or entity to whom it
is addressed. Any review, dissemination, or copying of this
communication by anyone other than the intended recipient is strictly
prohibited. If you are not the intended recipient, please contact the
sender by reply email, delete and destroy all copies of the original
message.

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: Dell OEM XP Pro cd w/ SP3

2008-09-18 Thread Tim Vander Kooi
Absolutely, I do it all the time.


-Original Message-
From: Michael B. Smith [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 1:18 PM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Imagex can inject drivers into an XP image.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange


-Original Message-
From: Joseph L. Casale [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 2:14 PM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Sorry, missed the post before.
ImageX would work fine for "imaging" but it cant inject drivers into XP.
Sysprep will *very* much help you. It's designed to do just this, it will
allow additional Mass Storage Drivers to be included in the image, then it
will remove what's not present after.

nLite is cool, but its more than a GUI front end, it's a bit of a hack.

KB303786 which leads to KB302577

HTH,
jlc

-Original Message-
From: Michael B. Smith [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 11:57 AM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Imagex.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange

-Original Message-
From: Silvio L. Nisgoski [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 1:31 PM
To: NT System Admin Issues
Subject: Re: Dell OEM XP Pro cd w/ SP3

Due to the big difference in machine hardware, sysprepping won´t help me
very much.  I need a customized install, with the selections for keyboard,
timezones, group names, accounts, etc, a bunch of SATA drivers, other
drivers for the most common hardware pieces we use. Would like to add Adobe
Reader, Java, media player updates to that also.

What would be the MS-approved name for the technology to do that, so that I
can google for it ? I considered nLite to be just a graphical frontend for
the .inf file modifications necessary to integrate drivers and pre-define
configurations



- Original Message -
From: "Phil Brutsche" <[EMAIL PROTECTED]>
To: "NT System Admin Issues" 
Sent: Wednesday, September 17, 2008 10:09 PM
Subject: Re: Dell OEM XP Pro cd w/ SP3


> That's one of the reasons I dropped nLite for sysprep'ed ghost images.
>
> Joseph L. Casale wrote:
>> I always use MS methods for all my deployments, which often means a tad
>> extra work
>> but its peace of mind from supportability when the merde hits the fan...
>
> --
>
> Phil Brutsche
> [EMAIL PROTECTED]
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: OT: We're all doomed

2008-09-18 Thread Tim Vander Kooi
So we need to come up with a Politico Plunger? Sounds like a job for Shookie 
Monster, he's the best design guy I know.
TVK


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 10:47 AM
To: NT System Admin Issues
Subject: Re: OT: We're all doomed

I don't know... might too large a mass of politicians clog up a black
hole?  Sort-of like a toilet?
--
Richard McClary, Systems Administrator
ASPCA Knowledge Management
1717 S Philo Rd, Ste 36, Urbana, IL  61802
217-337-9761
http://www.aspca.org


"Jon Harris" <[EMAIL PROTECTED]> wrote on 09/18/2008 10:03:34 AM:

> Then we would get a planetary size Black Hole!  Even 2 would risk
> that.  I would prefer letting them test the atmosphere and water
> availability on Mars as the way to deal with them.  Much cleaner and
> we get something truly useful out of it.
>
> Jon

> On Thu, Sep 18, 2008 at 10:12 AM, Lee Douglas <[EMAIL PROTECTED]>
wrote:
> Let's make it ALL politicians and then we can start over 
>
>

> On Thu, Sep 18, 2008 at 10:07 AM, Mike French
<[EMAIL PROTECTED]
> > wrote:
> LOL! Maybe the scientific community should shoot some politicians
> through the collider?
>
> 
> From: TJ [mailto:[EMAIL PROTECTED]
> Sent: Thursday, September 18, 2008 8:36 AM
> To: NT System Admin Issues
> Subject: Re: OT: We're all doomed
>
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~
>
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: Dell OEM XP Pro cd w/ SP3

2008-09-18 Thread Michael B. Smith
Imagex can inject drivers into an XP image.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange


-Original Message-
From: Joseph L. Casale [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 2:14 PM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Sorry, missed the post before.
ImageX would work fine for "imaging" but it cant inject drivers into XP.
Sysprep will *very* much help you. It's designed to do just this, it will
allow additional Mass Storage Drivers to be included in the image, then it
will remove what's not present after.

nLite is cool, but its more than a GUI front end, it's a bit of a hack.

KB303786 which leads to KB302577

HTH,
jlc

-Original Message-
From: Michael B. Smith [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 11:57 AM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Imagex.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange

-Original Message-
From: Silvio L. Nisgoski [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 1:31 PM
To: NT System Admin Issues
Subject: Re: Dell OEM XP Pro cd w/ SP3

Due to the big difference in machine hardware, sysprepping won´t help me
very much.  I need a customized install, with the selections for keyboard,
timezones, group names, accounts, etc, a bunch of SATA drivers, other
drivers for the most common hardware pieces we use. Would like to add Adobe
Reader, Java, media player updates to that also.

What would be the MS-approved name for the technology to do that, so that I
can google for it ? I considered nLite to be just a graphical frontend for
the .inf file modifications necessary to integrate drivers and pre-define
configurations



- Original Message -
From: "Phil Brutsche" <[EMAIL PROTECTED]>
To: "NT System Admin Issues" 
Sent: Wednesday, September 17, 2008 10:09 PM
Subject: Re: Dell OEM XP Pro cd w/ SP3


> That's one of the reasons I dropped nLite for sysprep'ed ghost images.
>
> Joseph L. Casale wrote:
>> I always use MS methods for all my deployments, which often means a tad
>> extra work
>> but its peace of mind from supportability when the merde hits the fan...
>
> --
>
> Phil Brutsche
> [EMAIL PROTECTED]
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: logging deleted files

2008-09-18 Thread Ralph Smith
I think you want to go to 

 

Administrative Tools > Domain Controller Security Policy > Local
Security Policy

 

if this applies to the domain controller.

 

There should be a box for "Define these policy settings".  Is that
what's missing?

 

I'm not sure what you mean by the file being located in the Domain Group
Policy on the DC.  Do you mean the file is on the Domain Controller
under the C:\WINDOWS\SYSVOL\domain\Policies folder?

Ralph Smith
Gateway Community Industries
845-331-1261 x234

 



From: Paul Everett [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 1:31 PM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

Thanks for the link Ralph.

 

I have auditing from the folder in question's Properties enabled and
also in Domain Group Policy on the DC, which is were the file is
located.

I can't get anything to show up in event log.

 

In the Local Security Policy the "audit local object" success and
failures are grayed out with no "enable" box.

 

 



From: Ralph Smith [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:47 AM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

http://sogeeky.blogspot.com/2006/07/how-to-audit-and-track-file-deletion
s.html

 

Ralph Smith
Gateway Community Industries
845-331-1261 x234

 



From: James Rankin [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 10:43 AM
To: NT System Admin Issues
Subject: Re: logging deleted files

 

 You can turn on file auditing for particular folders if you know which
folders are at risk

Right-click folder Properties, Security, Advanced, Auditing

2008/9/18 Paul Everett <[EMAIL PROTECTED]>

Is there anything that logs the event when files are deleted over the
network?

 

A user in one of our departments is deleting files, either
unintentionally or not.  The best I can do is check my daily backups to
find out which day it happened, but we'd like to find out who it is.  We
don't need something to recover deleted network files, just something
that logs the event that includes the username.  Is there anything out
there that can do this?

We have a 2003 AD Domain.

Thanks,

Paul Everett 
IS Dept. 


Confidentiality Notice:  This e-mail message, including any attachments,
is for the sole use of the intended recipient(s) and may contain
confidential and privileged information.  Any unauthorized review, use,
disclosure, or distribution is prohibited.   If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message, including attachments.

 

 

 

 

 

 

 

 

 

 

Confidentiality Notice:

**

This communication, including any attachments, may contain confidential
information and is intended only for the individual or entity to whom it
is addressed. Any review, dissemination, or copying of this
communication by anyone other than the intended recipient is strictly
prohibited. If you are not the intended recipient, please contact the
sender by reply email, delete and destroy all copies of the original
message.

 

 

 

 

 

 

Confidentiality Notice: 

--



This communication, including any attachments, may contain confidential 
information and is intended only for the individual or entity to whom it is 
addressed. Any review, dissemination, or copying of this communication by 
anyone other than the intended recipient is strictly prohibited. If you are not 
the intended recipient, please contact the sender by reply email, delete and 
destroy all copies of the original message.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: Dell OEM XP Pro cd w/ SP3

2008-09-18 Thread Joseph L. Casale
Sorry, missed the post before.
ImageX would work fine for "imaging" but it cant inject drivers into XP.
Sysprep will *very* much help you. It's designed to do just this, it will allow 
additional Mass Storage Drivers to be included in the image, then it will 
remove what's not present after.

nLite is cool, but its more than a GUI front end, it's a bit of a hack.

KB303786 which leads to KB302577

HTH,
jlc

-Original Message-
From: Michael B. Smith [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 11:57 AM
To: NT System Admin Issues
Subject: RE: Dell OEM XP Pro cd w/ SP3

Imagex.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange

-Original Message-
From: Silvio L. Nisgoski [mailto:[EMAIL PROTECTED]
Sent: Thursday, September 18, 2008 1:31 PM
To: NT System Admin Issues
Subject: Re: Dell OEM XP Pro cd w/ SP3

Due to the big difference in machine hardware, sysprepping won´t help me
very much.  I need a customized install, with the selections for keyboard,
timezones, group names, accounts, etc, a bunch of SATA drivers, other
drivers for the most common hardware pieces we use. Would like to add Adobe
Reader, Java, media player updates to that also.

What would be the MS-approved name for the technology to do that, so that I
can google for it ? I considered nLite to be just a graphical frontend for
the .inf file modifications necessary to integrate drivers and pre-define
configurations



- Original Message -
From: "Phil Brutsche" <[EMAIL PROTECTED]>
To: "NT System Admin Issues" 
Sent: Wednesday, September 17, 2008 10:09 PM
Subject: Re: Dell OEM XP Pro cd w/ SP3


> That's one of the reasons I dropped nLite for sysprep'ed ghost images.
>
> Joseph L. Casale wrote:
>> I always use MS methods for all my deployments, which often means a tad
>> extra work
>> but its peace of mind from supportability when the merde hits the fan...
>
> --
>
> Phil Brutsche
> [EMAIL PROTECTED]
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: Dell OEM XP Pro cd w/ SP3

2008-09-18 Thread Michael B. Smith
Imagex.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange

-Original Message-
From: Silvio L. Nisgoski [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 1:31 PM
To: NT System Admin Issues
Subject: Re: Dell OEM XP Pro cd w/ SP3

Due to the big difference in machine hardware, sysprepping won´t help me 
very much.  I need a customized install, with the selections for keyboard, 
timezones, group names, accounts, etc, a bunch of SATA drivers, other 
drivers for the most common hardware pieces we use. Would like to add Adobe 
Reader, Java, media player updates to that also.

What would be the MS-approved name for the technology to do that, so that I 
can google for it ? I considered nLite to be just a graphical frontend for 
the .inf file modifications necessary to integrate drivers and pre-define 
configurations



- Original Message - 
From: "Phil Brutsche" <[EMAIL PROTECTED]>
To: "NT System Admin Issues" 
Sent: Wednesday, September 17, 2008 10:09 PM
Subject: Re: Dell OEM XP Pro cd w/ SP3


> That's one of the reasons I dropped nLite for sysprep'ed ghost images.
>
> Joseph L. Casale wrote:
>> I always use MS methods for all my deployments, which often means a tad 
>> extra work
>> but its peace of mind from supportability when the merde hits the fan...
>
> -- 
>
> Phil Brutsche
> [EMAIL PROTECTED]
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~ 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: just plain old copying CDs

2008-09-18 Thread Phillip Partipilo
Nothing really all that wrong about that.  My car's radio plays music from a
data CD burned full of MP3 files, so ripping a "protected" CD is a rather
valid thing to desire IMHO - cramming 10 CDs worth of music onto a single
disc reduces clutter.
 
 
Phillip Partipilo
Parametric Solutions Inc.
Jupiter, Florida
(561) 747-6107
 
 
 

  _  

From: Klint Price - ArizonaITPro [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 1:23 PM
To: NT System Admin Issues
Subject: Re: just plain old copying CDs


Any chance you are stumbling on anti-piracy measures built into many CD's
these days.

Klint

Silvio L. Nisgoski wrote: 

Nero does the job well.  Is that anything strange about the original cd that
some program could not interpret correctly ?
 

- Original Message - 
From: Holstrom, Don   
To: NT System Admin Issues   
Sent: Thursday, September 18, 2008 1:51 PM
Subject: just plain old copying CDs


I just copied a CD and it won't work as it should. I used to use CloneCD, I
may even have copy somewhere. I think they closed shop at the behest of some
organization or another. I also have the latest Roxio and Nero laying around
somewhere. I just want a perfectly copied CD, byte for byte, down & dirty,
easy, so it cannot be recognized as something other than the original. I
have all sorts of machines with both XP & Vista & OSX so that is not a
problem. Is there a consensus on CD duplication out there?


 

 


 



 



 


 


  _  

If this email is spam, report it here:
http://www.OnlyMyEmail.com/ReportSpam
  

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: iPhone Exchange Prep Walk Thru

2008-09-18 Thread Salvador Manzo
Now, it's exactly the same as setting up access for Windows Mobile
ActiveSync connections.  Search for configuration steps for Active Sync,
but without the iPhone qualifier.

-Original Message-
From: Anthony [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 10:27 AM
To: NT System Admin Issues
Subject: iPhone Exchange Prep Walk Thru

Anyone care to recommend a link for a good walk through on setting up
Exchange 2003 to work with the newer iPhone 2.x Active Sync technology?
I
getting a lot of noise when I google the subject.

I'm not a big Exchange guru so detailed steps would be most helpful.

This is in a Windows 2003 SBS Premium environment.

Thanks,

Anthony


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: logging deleted files

2008-09-18 Thread Paul Everett
 

I have auditing from the folder in question's Properties enabled and
also in Domain Group Policy on the DC, which is were the file is
located.

I can't get anything to show up in event log of the DC.

 

In the Local Security Policy of the DC the "audit local object" success
and failures are grayed out with no "enable" box.

 

 



From: James Rankin [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 10:43 AM
To: NT System Admin Issues
Subject: Re: logging deleted files

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: just plain old copying CDs

2008-09-18 Thread Holstrom, Don
My apologies, CloneCd is still out there, sold by slysoft. Google is my
friend, Google is my friend...

 

From: Silvio L. Nisgoski [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 1:19 PM
To: NT System Admin Issues
Subject: Re: just plain old copying CDs

 

Nero does the job well.  Is that anything strange about the original cd
that some program could not interpret correctly ?

 

- Original Message - 

From: Holstrom, Don   

To: NT System Admin Issues
  

Sent: Thursday, September 18, 2008 1:51 PM

Subject: just plain old copying CDs

 

I just copied a CD and it won't work as it should. I used to use
CloneCD, I may even have copy somewhere. I think they closed shop at the
behest of some organization or another. I also have the latest Roxio and
Nero laying around somewhere. I just want a perfectly copied CD, byte
for byte, down & dirty, easy, so it cannot be recognized as something
other than the original. I have all sorts of machines with both XP &
Vista & OSX so that is not a problem. Is there a consensus on CD
duplication out there?

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: logging deleted files

2008-09-18 Thread Paul Everett
Thanks for the link Ralph.

 

I have auditing from the folder in question's Properties enabled and
also in Domain Group Policy on the DC, which is were the file is
located.

I can't get anything to show up in event log.

 

In the Local Security Policy the "audit local object" success and
failures are grayed out with no "enable" box.

 

 



From: Ralph Smith [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:47 AM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

http://sogeeky.blogspot.com/2006/07/how-to-audit-and-track-file-deletion
s.html

 

Ralph Smith
Gateway Community Industries
845-331-1261 x234

 



From: James Rankin [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 10:43 AM
To: NT System Admin Issues
Subject: Re: logging deleted files

 

 You can turn on file auditing for particular folders if you know which
folders are at risk

Right-click folder Properties, Security, Advanced, Auditing

2008/9/18 Paul Everett <[EMAIL PROTECTED]>

Is there anything that logs the event when files are deleted over the
network?

 

A user in one of our departments is deleting files, either
unintentionally or not.  The best I can do is check my daily backups to
find out which day it happened, but we'd like to find out who it is.  We
don't need something to recover deleted network files, just something
that logs the event that includes the username.  Is there anything out
there that can do this?

We have a 2003 AD Domain.

Thanks,

Paul Everett 
IS Dept. 


Confidentiality Notice:  This e-mail message, including any attachments,
is for the sole use of the intended recipient(s) and may contain
confidential and privileged information.  Any unauthorized review, use,
disclosure, or distribution is prohibited.   If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message, including attachments.

 

 

 

 

 

 

 

 

 

 

Confidentiality Notice:

**

This communication, including any attachments, may contain confidential
information and is intended only for the individual or entity to whom it
is addressed. Any review, dissemination, or copying of this
communication by anyone other than the intended recipient is strictly
prohibited. If you are not the intended recipient, please contact the
sender by reply email, delete and destroy all copies of the original
message.

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

Re: Dell OEM XP Pro cd w/ SP3

2008-09-18 Thread Silvio L. Nisgoski
Due to the big difference in machine hardware, sysprepping won´t help me 
very much.  I need a customized install, with the selections for keyboard, 
timezones, group names, accounts, etc, a bunch of SATA drivers, other 
drivers for the most common hardware pieces we use. Would like to add Adobe 
Reader, Java, media player updates to that also.


What would be the MS-approved name for the technology to do that, so that I 
can google for it ? I considered nLite to be just a graphical frontend for 
the .inf file modifications necessary to integrate drivers and pre-define 
configurations




- Original Message - 
From: "Phil Brutsche" <[EMAIL PROTECTED]>

To: "NT System Admin Issues" 
Sent: Wednesday, September 17, 2008 10:09 PM
Subject: Re: Dell OEM XP Pro cd w/ SP3



That's one of the reasons I dropped nLite for sysprep'ed ghost images.

Joseph L. Casale wrote:
I always use MS methods for all my deployments, which often means a tad 
extra work

but its peace of mind from supportability when the merde hits the fan...


--

Phil Brutsche
[EMAIL PROTECTED]

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~ 



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: logging deleted files

2008-09-18 Thread Paul Everett
Thanks for the link Ralph.

 

I have auditing from the folder in question's Properties enabled and
also in Domain Group Policy on the DC, which is were the file is
located.

I can't get anything to show up in event log.

 

In the Local Security Policy the "audit local object" success and
failures are grayed out with no "enable" box.

 

 



From: Ralph Smith [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:47 AM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

http://sogeeky.blogspot.com/2006/07/how-to-audit-and-track-file-deletion
s.html

 

Ralph Smith
Gateway Community Industries
845-331-1261 x234

 



From: James Rankin [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 10:43 AM
To: NT System Admin Issues
Subject: Re: logging deleted files

 

 You can turn on file auditing for particular folders if you know which
folders are at risk

Right-click folder Properties, Security, Advanced, Auditing

2008/9/18 Paul Everett <[EMAIL PROTECTED]>

Is there anything that logs the event when files are deleted over the
network?

 

A user in one of our departments is deleting files, either
unintentionally or not.  The best I can do is check my daily backups to
find out which day it happened, but we'd like to find out who it is.  We
don't need something to recover deleted network files, just something
that logs the event that includes the username.  Is there anything out
there that can do this?

We have a 2003 AD Domain.

Thanks,

Paul Everett 
IS Dept. 


Confidentiality Notice:  This e-mail message, including any attachments,
is for the sole use of the intended recipient(s) and may contain
confidential and privileged information.  Any unauthorized review, use,
disclosure, or distribution is prohibited.   If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message, including attachments.

 

 

 

 

 

 

 

 

 

 

Confidentiality Notice:

**

This communication, including any attachments, may contain confidential
information and is intended only for the individual or entity to whom it
is addressed. Any review, dissemination, or copying of this
communication by anyone other than the intended recipient is strictly
prohibited. If you are not the intended recipient, please contact the
sender by reply email, delete and destroy all copies of the original
message.

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: just plain old copying CDs

2008-09-18 Thread Holstrom, Don
Not audio CDs. Nor video DVDs.

 

From: Ken Cornetet [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 1:25 PM
To: NT System Admin Issues
Subject: RE: just plain old copying CDs

 

Are you talking about audio CDs?

 

If so, you need to understand that although the data on the CD is in
fact ones and zeros, CDROMs cannot access that data as they would for a
data CD. A special mode is used to read the bits of an audio CD, and not
all CDROM drives are equally adept at doing so. To get a "perfect" rip
of an audio CD is not a trivial task from a programming point of view.
The "gold standard" for reading audio CDs and creating wav files is
Exact Audio Copy (EAC). Another program which is easier to use and
generally considered as good as EAC is CDex. 

 

From: Holstrom, Don [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 12:52 PM
To: NT System Admin Issues
Subject: just plain old copying CDs

 

I just copied a CD and it won't work as it should. I used to use
CloneCD, I may even have copy somewhere. I think they closed shop at the
behest of some organization or another. I also have the latest Roxio and
Nero laying around somewhere. I just want a perfectly copied CD, byte
for byte, down & dirty, easy, so it cannot be recognized as something
other than the original. I have all sorts of machines with both XP &
Vista & OSX so that is not a problem. Is there a consensus on CD
duplication out there?

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

iPhone Exchange Prep Walk Thru

2008-09-18 Thread Anthony
Anyone care to recommend a link for a good walk through on setting up
Exchange 2003 to work with the newer iPhone 2.x Active Sync technology?  I
getting a lot of noise when I google the subject.

I'm not a big Exchange guru so detailed steps would be most helpful.

This is in a Windows 2003 SBS Premium environment.

Thanks,

Anthony


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: just plain old copying CDs

2008-09-18 Thread Holstrom, Don
Very good chance. But I hate to use the original when I have to do a
couple of machines. I am a oldie and remember that CloneCD circumvented
all that...

 

From: Klint Price - ArizonaITPro [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 1:23 PM
To: NT System Admin Issues
Subject: Re: just plain old copying CDs

 

Any chance you are stumbling on anti-piracy measures built into many
CD's these days.

Klint

Silvio L. Nisgoski wrote: 

Nero does the job well.  Is that anything strange about the original cd
that some program could not interpret correctly ?

 

- Original Message - 

From: Holstrom, Don   

To: NT System Admin Issues
  

Sent: Thursday, September 18, 2008 1:51 PM

Subject: just plain old copying CDs

 

I just copied a CD and it won't work as it should. I used to use
CloneCD, I may even have copy somewhere. I think they closed shop at the
behest of some organization or another. I also have the latest Roxio and
Nero laying around somewhere. I just want a perfectly copied CD, byte
for byte, down & dirty, easy, so it cannot be recognized as something
other than the original. I have all sorts of machines with both XP &
Vista & OSX so that is not a problem. Is there a consensus on CD
duplication out there?

 

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: just plain old copying CDs

2008-09-18 Thread Ken Cornetet
Are you talking about audio CDs?

 

If so, you need to understand that although the data on the CD is in
fact ones and zeros, CDROMs cannot access that data as they would for a
data CD. A special mode is used to read the bits of an audio CD, and not
all CDROM drives are equally adept at doing so. To get a "perfect" rip
of an audio CD is not a trivial task from a programming point of view.
The "gold standard" for reading audio CDs and creating wav files is
Exact Audio Copy (EAC). Another program which is easier to use and
generally considered as good as EAC is CDex. 

 

From: Holstrom, Don [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 12:52 PM
To: NT System Admin Issues
Subject: just plain old copying CDs

 

I just copied a CD and it won't work as it should. I used to use
CloneCD, I may even have copy somewhere. I think they closed shop at the
behest of some organization or another. I also have the latest Roxio and
Nero laying around somewhere. I just want a perfectly copied CD, byte
for byte, down & dirty, easy, so it cannot be recognized as something
other than the original. I have all sorts of machines with both XP &
Vista & OSX so that is not a problem. Is there a consensus on CD
duplication out there?

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

Re: just plain old copying CDs

2008-09-18 Thread Klint Price - ArizonaITPro
Any chance you are stumbling on anti-piracy measures built into many 
CD's these days.

Klint

Silvio L. Nisgoski wrote:
> Nero does the job well.  Is that anything strange about the original 
> cd that some program could not interpret correctly ?
>  
>
> - Original Message -
> *From:* Holstrom, Don 
> *To:* NT System Admin Issues
> 
> *Sent:* Thursday, September 18, 2008 1:51 PM
> *Subject:* just plain old copying CDs
>
> I just copied a CD and it won't work as it should. I used to use
> CloneCD, I may even have copy somewhere. I think they closed shop
> at the behest of some organization or another. I also have the
> latest Roxio and Nero laying around somewhere. I just want a
> perfectly copied CD, byte for byte, down & dirty, easy, so it
> cannot be recognized as something other than the original. I have
> all sorts of machines with both XP & Vista & OSX so that is not a
> problem. Is there a consensus on CD duplication out there?
>
>
>  
>
>  
>
>
>  
>
>  


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: logging deleted files

2008-09-18 Thread Paul Everett
Thanks for the link Ralph.

 

I have auditing from the folder in question's Properties enabled and
also in Domain Group Policy on the DC, which is were the file is
located.

I can't get anything to show up in event log.

 

In the Local Security Policy the "audit local object" success and
failures are grayed out with no "enable" box.

 



From: Ralph Smith [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:47 AM
To: NT System Admin Issues
Subject: RE: logging deleted files

 

http://sogeeky.blogspot.com/2006/07/how-to-audit-and-track-file-deletion
s.html

 

Ralph Smith
Gateway Community Industries
845-331-1261 x234

 



From: James Rankin [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 10:43 AM
To: NT System Admin Issues
Subject: Re: logging deleted files

 

 You can turn on file auditing for particular folders if you know which
folders are at risk

Right-click folder Properties, Security, Advanced, Auditing

2008/9/18 Paul Everett <[EMAIL PROTECTED]>

Is there anything that logs the event when files are deleted over the
network?

 

A user in one of our departments is deleting files, either
unintentionally or not.  The best I can do is check my daily backups to
find out which day it happened, but we'd like to find out who it is.  We
don't need something to recover deleted network files, just something
that logs the event that includes the username.  Is there anything out
there that can do this?

We have a 2003 AD Domain.

Thanks,

Paul Everett 
IS Dept. 


Confidentiality Notice:  This e-mail message, including any attachments,
is for the sole use of the intended recipient(s) and may contain
confidential and privileged information.  Any unauthorized review, use,
disclosure, or distribution is prohibited.   If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message, including attachments.

 

 

 

 

 

 

 

 

 

 

Confidentiality Notice:

**

This communication, including any attachments, may contain confidential
information and is intended only for the individual or entity to whom it
is addressed. Any review, dissemination, or copying of this
communication by anyone other than the intended recipient is strictly
prohibited. If you are not the intended recipient, please contact the
sender by reply email, delete and destroy all copies of the original
message.

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

Re: just plain old copying CDs

2008-09-18 Thread Silvio L. Nisgoski
Nero does the job well.  Is that anything strange about the original cd that 
some program could not interpret correctly ?

  - Original Message - 
  From: Holstrom, Don 
  To: NT System Admin Issues 
  Sent: Thursday, September 18, 2008 1:51 PM
  Subject: just plain old copying CDs


  I just copied a CD and it won't work as it should. I used to use CloneCD, I 
may even have copy somewhere. I think they closed shop at the behest of some 
organization or another. I also have the latest Roxio and Nero laying around 
somewhere. I just want a perfectly copied CD, byte for byte, down & dirty, 
easy, so it cannot be recognized as something other than the original. I have 
all sorts of machines with both XP & Vista & OSX so that is not a problem. Is 
there a consensus on CD duplication out there?






 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

Re: OT: We're all doomed

2008-09-18 Thread Lee Douglas
Almost entirely hot air - quite compressible



On Thu, Sep 18, 2008 at 11:46 AM, <[EMAIL PROTECTED]> wrote:

> I don't know... might too large a mass of politicians clog up a black
> hole?  Sort-of like a toilet?
> --
> Richard McClary, Systems Administrator
> ASPCA Knowledge Management
> 1717 S Philo Rd, Ste 36, Urbana, IL  61802
> 217-337-9761
> http://www.aspca.org
>
>
> "Jon Harris" <[EMAIL PROTECTED]> wrote on 09/18/2008 10:03:34 AM:
>
> > Then we would get a planetary size Black Hole!  Even 2 would risk
> > that.  I would prefer letting them test the atmosphere and water
> > availability on Mars as the way to deal with them.  Much cleaner and
> > we get something truly useful out of it.
> >
> > Jon
>
> > On Thu, Sep 18, 2008 at 10:12 AM, Lee Douglas <[EMAIL PROTECTED]>
> wrote:
> > Let's make it ALL politicians and then we can start over 
> >
> >
>
> > On Thu, Sep 18, 2008 at 10:07 AM, Mike French
> <[EMAIL PROTECTED]
> > > wrote:
> > LOL! Maybe the scientific community should shoot some politicians
> > through the collider?
> >
> > 
> > From: TJ [mailto:[EMAIL PROTECTED]
> > Sent: Thursday, September 18, 2008 8:36 AM
> > To: NT System Admin Issues
> > Subject: Re: OT: We're all doomed
> >
> >
> >
> >
> > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> > ~   ~
> >
> >
> >
> >
> >
> >
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

Re: OT: iphone update - how long does it take?

2008-09-18 Thread Jonathan Link
Your opinion doesn't offend me.  I never really claimed that you in
particular were anti-apple, but alluded to a pattern of comments I've seen
on the list that tends to discount products that won't work in their
environment and dismissing any potential value those products may have in *
other* environments..
Your comment I guess set me off.  And to boot, the original poster's problem
was not even a configuration problem, more like a Murphy's law problem  If
you apply an update immediately before the application device needs to be
functional the update will fail and (temporarily) brick your system.
I apologize to you for bearing the brunt of my opinion.

-Jonathan
On Thu, Sep 18, 2008 at 11:49 AM, Christopher J. Bosak <[EMAIL PROTECTED]
> wrote:

>  Did I say I was anti-apple? No. Was I bowing to the Micro$oft gods? No.
> I'm a Linux man myself. I was just stating, that in *my opinion* WM 6.1
> was easier to configure then the iPhone.
>
>
>
> Sorry if my *opinion* offended you.
>
>
>
> Christopher J. Bosak
>
> Vector Company
>
> c. 847.603.4673
>
> [EMAIL PROTECTED]
>
>
>
> *"You need to install an RTFM Interface, due to an LBNC issue."*
>
> *- B.O.F.H. (Merged 2 into 1) - Me*
>
>
>
> *From:* Jonathan Link [mailto:[EMAIL PROTECTED]
> *Sent:* Thursday, September 18, 2008 10:31 hrs
> *To:* NT System Admin Issues
> *Subject:* Re: OT: iphone update - how long does it take?
>
>
>
> Perhaps.
>
> My main problem is that generally this list is quite open about alternative
> technologies to solving a particular problem, even though it's officially an
> nt system administrators list.  Many of us here are working with varied and
> mixed environments, some by choice and some by fiat or inheritence.
>
> I have trouble when that same open attitude can't be extended to Apple.
> Does Apple have control issues?  Sure, but then so does Microsoft.  So does
> IBM, HP, Dell, any vendor wants to exercise as much control over their
> product as possible.  Apple just happens to be a bit more successful in
> exercising that control to fulfill their vision.  If you happen to disagree
> with that vision, that's fine, too, but my feeling is that this list
> generally doesn't discount any company regardless of their vision if they're
> capable of providing the right tool for a given application.  I try and use
> the best tool for the job.  To wit, I bought a Macbook Pro as my last
> notebook, because I wanted to play some games on it, and I wanted to do some
> video editing work with video's we've collected of our daughter since she
> was born.  I spec'ed out similar systems from HP, Dell, and Apple
> (obviously).  All were about comparable in price for what I wanted to do,
> but the Apple won because it had great easy to use video editing software
> and, I could run Windows in Bootcamp.  I run Bootcamp 75% of the time, and a
> lot of the time I'm on the OS X side, I'm running my Bootcamp partition
> through Fusion.
>
>
>
>
>
> On Thu, Sep 18, 2008 at 11:18 AM, Tim Vander Kooi <[EMAIL PROTECTED]>
> wrote:
>
> Jonathan must have accidentally slipped on Don's cranky pants this morning
> when he was sneaking out of the house in the dark.
>
> ;-P
>
>
>
> *From:* Christopher J. Bosak [mailto:[EMAIL PROTECTED]
> *Sent:* Thursday, September 18, 2008 10:10 AM
>
>
> *To:* NT System Admin Issues
>
> *Subject:* RE: OT: iphone update - how long does it take?
>
>
>
> Sheesh, take a sedative. I was just trying to state it worked out of the
> box without excessive configuration and without installing anything. Way to
> over-read into things.
>
>
>
> Christopher J. Bosak
>
> Vector Company
>
> c. 847.603.4673
>
> [EMAIL PROTECTED]
>
>
>
> *"You need to install an RTFM Interface, due to an LBNC issue."*
>
> *- B.O.F.H. (Merged 2 into 1) - Me*
>
>
>
> *From:* Jonathan Link [mailto:[EMAIL PROTECTED]
> *Sent:* Thursday, September 18, 2008 08:32 hrs
> *To:* NT System Admin Issues
> *Subject:* Re: OT: iphone update - how long does it take?
>
>
>
> Silly tools?
>
> 
>
> Sheesh, cut the hyperbole.  Perhaps there's a good application where the
> iPhone fits and another model cellphone wouldn't.
>
> My iPhone just works, too.  I don't make a big deal about it until someone
> has to needlessly comment that it's a toy or it doesn't work.  Is it
> perfect, of course not, but I'd venture to say that there is no perfect
> device, just a best fit.  For many people that will be an iPhone.  Some
> people will want it to be a best fit, and fewer still will recognize that it
> can't be a best fit for their needs.  I'm really glad you have a phone that
> perfectly fits your usage needs.  Is there any reason to condescend to
> someone who has also found one that meets their needs, but it just happens
> to be different?
>
> 
>
>
>
> Regards
>
> Jonathan
>
> On Thu, Sep 18, 2008 at 8:44 AM, Christopher J. Bosak <
> [EMAIL PROTECTED]> wrote:
>
> I'll keep my BlackJack II with WM 6.1, sync'd with Exchange.
> No silly tools to configure. Just works.
>
>
> Christopher J. Bosak
>

Re: OT: iphone update - how long does it take?

2008-09-18 Thread Jonathan Link
It's already a sunk cost.  VirtualBox wasn't to the point I needed it.
Also, in order to run games, I need more direct access to hardware, so
BootCamp is a necessity.



On Thu, Sep 18, 2008 at 12:31 PM, Phillip Partipilo <[EMAIL PROTECTED]> wrote:

>  As another Macbook user, I'd like to suggest VirtualBox.  It's something
> that Sun created and let loose for free.  It also has a seamless windowing
> system like Fusion.  Runs XP Pro beautifully.  Oh, did I mention it is free?
>
>
> Phillip Partipilo
> Parametric Solutions Inc.
> Jupiter, Florida
> (561) 747-6107
>
>
>
>
>  --
>  *From:* Jonathan Link [mailto:[EMAIL PROTECTED]
> *Sent:* Thursday, September 18, 2008 11:31 AM
>
> *To:* NT System Admin Issues
> *Subject:* Re: OT: iphone update - how long does it take?
>
>Perhaps.
> My main problem is that generally this list is quite open about alternative
> technologies to solving a particular problem, even though it's officially an
> nt system administrators list.  Many of us here are working with varied and
> mixed environments, some by choice and some by fiat or inheritence.
> I have trouble when that same open attitude can't be extended to Apple.
> Does Apple have control issues?  Sure, but then so does Microsoft.  So does
> IBM, HP, Dell, any vendor wants to exercise as much control over their
> product as possible.  Apple just happens to be a bit more successful in
> exercising that control to fulfill their vision.  If you happen to disagree
> with that vision, that's fine, too, but my feeling is that this list
> generally doesn't discount any company regardless of their vision if they're
> capable of providing the right tool for a given application.  I try and use
> the best tool for the job.  To wit, I bought a Macbook Pro as my last
> notebook, because I wanted to play some games on it, and I wanted to do some
> video editing work with video's we've collected of our daughter since she
> was born.  I spec'ed out similar systems from HP, Dell, and Apple
> (obviously).  All were about comparable in price for what I wanted to do,
> but the Apple won because it had great easy to use video editing software
> and, I could run Windows in Bootcamp.  I run Bootcamp 75% of the time, and a
> lot of the time I'm on the OS X side, I'm running my Bootcamp partition
> through Fusion.
>
>
>
> On Thu, Sep 18, 2008 at 11:18 AM, Tim Vander Kooi <[EMAIL PROTECTED]>wrote:
>
>>  Jonathan must have accidentally slipped on Don's cranky pants this
>> morning when he was sneaking out of the house in the dark.
>>
>> ;-P
>>
>>
>>
>> *From:* Christopher J. Bosak [mailto:[EMAIL PROTECTED]
>> *Sent:* Thursday, September 18, 2008 10:10 AM
>> *To:* NT System Admin Issues
>>  *Subject:* RE: OT: iphone update - how long does it take?
>>
>>
>>
>> Sheesh, take a sedative. I was just trying to state it worked out of the
>> box without excessive configuration and without installing anything. Way to
>> over-read into things.
>>
>>
>>
>> Christopher J. Bosak
>>
>> Vector Company
>>
>> c. 847.603.4673
>>
>> [EMAIL PROTECTED]
>>
>>
>>
>> *"You need to install an RTFM Interface, due to an LBNC issue."*
>>
>> *- B.O.F.H. (Merged 2 into 1) - Me*
>>
>>
>>
>> *From:* Jonathan Link [mailto:[EMAIL PROTECTED]
>> *Sent:* Thursday, September 18, 2008 08:32 hrs
>> *To:* NT System Admin Issues
>> *Subject:* Re: OT: iphone update - how long does it take?
>>
>>
>>
>> Silly tools?
>>
>> 
>>
>> Sheesh, cut the hyperbole.  Perhaps there's a good application where the
>> iPhone fits and another model cellphone wouldn't.
>>
>> My iPhone just works, too.  I don't make a big deal about it until someone
>> has to needlessly comment that it's a toy or it doesn't work.  Is it
>> perfect, of course not, but I'd venture to say that there is no perfect
>> device, just a best fit.  For many people that will be an iPhone.  Some
>> people will want it to be a best fit, and fewer still will recognize that it
>> can't be a best fit for their needs.  I'm really glad you have a phone that
>> perfectly fits your usage needs.  Is there any reason to condescend to
>> someone who has also found one that meets their needs, but it just happens
>> to be different?
>>
>> 
>>
>>
>>
>> Regards
>>
>> Jonathan
>>
>> On Thu, Sep 18, 2008 at 8:44 AM, Christopher J. Bosak <
>> [EMAIL PROTECTED]> wrote:
>>
>> I'll keep my BlackJack II with WM 6.1, sync'd with Exchange.
>> No silly tools to configure. Just works.
>>
>>
>> Christopher J. Bosak
>> Vector Company
>> c. 847.603.4673
>> [EMAIL PROTECTED]
>>
>> "You need to install an RTFM Interface, due to an LBNC issue."
>> - B.O.F.H. (Merged 2 into 1) - Me
>>
>> -Original Message-
>> From: Troy Meyer [mailto:[EMAIL PROTECTED]
>> Sent: Wednesday, September 17, 2008 16:03 hrs
>> To: NT System Admin Issues
>>
>> Subject: RE: OT: iphone update - how long does it take?
>>
>> See how long it takes you to create a calendar appointment and invite 3
>> users on that touch ;)
>>
>> -Troy
>>
>> -Original Message-

just plain old copying CDs

2008-09-18 Thread Holstrom, Don
I just copied a CD and it won't work as it should. I used to use
CloneCD, I may even have copy somewhere. I think they closed shop at the
behest of some organization or another. I also have the latest Roxio and
Nero laying around somewhere. I just want a perfectly copied CD, byte
for byte, down & dirty, easy, so it cannot be recognized as something
other than the original. I have all sorts of machines with both XP &
Vista & OSX so that is not a problem. Is there a consensus on CD
duplication out there?


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

SNMP event server

2008-09-18 Thread Marc Maiffret
Hey, does anyone have any recommendations on an SNMP server that will
receive raw snmp events and allow you to create various rules and reports to
slice and dice raw snmp event data and if it can do alerting that is a
bonus. again the ability to receive and manipulate raw SNMP event data is
important, not looking for the standard SNMP server software that does
system health monitoring.

-Marc


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~

RE: Looking for the Group Policy setting....

2008-09-18 Thread Jeremy
I Have done a RSOP, maybe I am missing a key.  The RSOP can be viewed here:

http://www.mapiadmin.net/music/rsop.htm

I can save an email as an HTML file, just not as a OFT Outlook Template.  Users 
Not in that OU can save as an OFT Outlook Template.  

The exact error is : 

"This operation has been canceled due to restrictions in effect on this 
computer.  Please contact your system administrator."

This is Outlook 2007.

Thanks again.

Jeremy


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: OT: iphone update - how long does it take?

2008-09-18 Thread Phillip Partipilo
As another Macbook user, I'd like to suggest VirtualBox.  It's something
that Sun created and let loose for free.  It also has a seamless windowing
system like Fusion.  Runs XP Pro beautifully.  Oh, did I mention it is free?
 
 
Phillip Partipilo
Parametric Solutions Inc.
Jupiter, Florida
(561) 747-6107
 
 
 

  _  

From: Jonathan Link [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:31 AM
To: NT System Admin Issues
Subject: Re: OT: iphone update - how long does it take?


Perhaps.
My main problem is that generally this list is quite open about alternative
technologies to solving a particular problem, even though it's officially an
nt system administrators list.  Many of us here are working with varied and
mixed environments, some by choice and some by fiat or inheritence.  
I have trouble when that same open attitude can't be extended to Apple.
Does Apple have control issues?  Sure, but then so does Microsoft.  So does
IBM, HP, Dell, any vendor wants to exercise as much control over their
product as possible.  Apple just happens to be a bit more successful in
exercising that control to fulfill their vision.  If you happen to disagree
with that vision, that's fine, too, but my feeling is that this list
generally doesn't discount any company regardless of their vision if they're
capable of providing the right tool for a given application.  I try and use
the best tool for the job.  To wit, I bought a Macbook Pro as my last
notebook, because I wanted to play some games on it, and I wanted to do some
video editing work with video's we've collected of our daughter since she
was born.  I spec'ed out similar systems from HP, Dell, and Apple
(obviously).  All were about comparable in price for what I wanted to do,
but the Apple won because it had great easy to use video editing software
and, I could run Windows in Bootcamp.  I run Bootcamp 75% of the time, and a
lot of the time I'm on the OS X side, I'm running my Bootcamp partition
through Fusion.


 
On Thu, Sep 18, 2008 at 11:18 AM, Tim Vander Kooi <[EMAIL PROTECTED]>
wrote:


Jonathan must have accidentally slipped on Don's cranky pants this morning
when he was sneaking out of the house in the dark. 

;-P

 

From: Christopher J. Bosak [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 10:10 AM 


To: NT System Admin Issues

Subject: RE: OT: iphone update - how long does it take?





 

Sheesh, take a sedative. I was just trying to state it worked out of the box
without excessive configuration and without installing anything. Way to
over-read into things. 

 

Christopher J. Bosak

Vector Company

c. 847.603.4673

[EMAIL PROTECTED]

 

"You need to install an RTFM Interface, due to an LBNC issue."

- B.O.F.H. (Merged 2 into 1) - Me

 

From: Jonathan Link [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 08:32 hrs
To: NT System Admin Issues
Subject: Re: OT: iphone update - how long does it take?

 

Silly tools?  



Sheesh, cut the hyperbole.  Perhaps there's a good application where the
iPhone fits and another model cellphone wouldn't.  

My iPhone just works, too.  I don't make a big deal about it until someone
has to needlessly comment that it's a toy or it doesn't work.  Is it
perfect, of course not, but I'd venture to say that there is no perfect
device, just a best fit.  For many people that will be an iPhone.  Some
people will want it to be a best fit, and fewer still will recognize that it
can't be a best fit for their needs.  I'm really glad you have a phone that
perfectly fits your usage needs.  Is there any reason to condescend to
someone who has also found one that meets their needs, but it just happens
to be different?



 

Regards

Jonathan

On Thu, Sep 18, 2008 at 8:44 AM, Christopher J. Bosak <[EMAIL PROTECTED]>
wrote:

I'll keep my BlackJack II with WM 6.1, sync'd with Exchange.
No silly tools to configure. Just works.


Christopher J. Bosak
Vector Company
c. 847.603.4673
[EMAIL PROTECTED]

"You need to install an RTFM Interface, due to an LBNC issue."
- B.O.F.H. (Merged 2 into 1) - Me

-Original Message-
From: Troy Meyer [mailto:[EMAIL PROTECTED]
Sent: Wednesday, September 17, 2008 16:03 hrs
To: NT System Admin Issues

Subject: RE: OT: iphone update - how long does it take?

See how long it takes you to create a calendar appointment and invite 3
users on that touch ;)

-Troy

-Original Message-
From: Ben Schorr [mailto:[EMAIL PROTECTED]
Sent: Wednesday, September 17, 2008 1:57 PM
To: NT System Admin Issues
Subject: RE: OT: iphone update - how long does it take?

Funny - I got my iPod touch set up to sync with my Exchange server and get
e-mail, calendar and contacts pretty quickly.  Took almost twice as long to
get a Blackberry Curve to ONLY get e-mail.  J



Ben M. Schorr
Chief Executive Officer
__
Roland Schorr & Tower
www.rolandschorr.com 

[EMAIL PROTECTED] 

Re: OT: We're all doomed

2008-09-18 Thread RichardMcClary
I don't know... might too large a mass of politicians clog up a black 
hole?  Sort-of like a toilet?
--
Richard McClary, Systems Administrator
ASPCA Knowledge Management
1717 S Philo Rd, Ste 36, Urbana, IL  61802
217-337-9761
http://www.aspca.org


"Jon Harris" <[EMAIL PROTECTED]> wrote on 09/18/2008 10:03:34 AM:

> Then we would get a planetary size Black Hole!  Even 2 would risk 
> that.  I would prefer letting them test the atmosphere and water 
> availability on Mars as the way to deal with them.  Much cleaner and
> we get something truly useful out of it.
> 
> Jon

> On Thu, Sep 18, 2008 at 10:12 AM, Lee Douglas <[EMAIL PROTECTED]> 
wrote:
> Let's make it ALL politicians and then we can start over  
> 
> 

> On Thu, Sep 18, 2008 at 10:07 AM, Mike French 
<[EMAIL PROTECTED]
> > wrote:
> LOL! Maybe the scientific community should shoot some politicians 
> through the collider?
> 
> 
> From: TJ [mailto:[EMAIL PROTECTED]
> Sent: Thursday, September 18, 2008 8:36 AM
> To: NT System Admin Issues
> Subject: Re: OT: We're all doomed
> 
> 
> 
> 
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~   ~
> 
> 
> 
> 
> 
> 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: GPO settings for power management?

2008-09-18 Thread Stephen Wimberly
I have been using EZ GPO for years, just for turning off the monitor on
Windows 2000 and Windows XP machines.

Recently we have been using it to be a bit more aggressive, put the computer
to sleep... my challenge was _not_ to turn off those computers that are used
by users off campus for remote desktop, so I created a WMI filter that
bypasses machines on Static IP Addresses.  (we only use static IP for remote
access.)


-Original Message-
From: Matt Cross [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 11:45 AM
To: NT System Admin Issues
Subject: Re: GPO settings for power management?

I just implemented the EZ GPO and it works like a champ for XP.

Ralph Smith wrote:
>
> Here is a link I saved a while ago but never followed up on. It is EZ 
> GPO which if remember correctly is a template for Group Policy created 
> by Energy Star that is supposed to work with Windows 2003 server for 
> 2000 and XP clients.
>
> Now I'll have to go check this out myself.
>
> http://www.energystar.gov/index.cfm?c=power_mgt.pr_power_mgt_ez_gpo
>
> Ralph Smith
> Gateway Community Industries
> 845-331-1261 x234
>
> --
> --
>
> *From:* David Mazzaccaro [mailto:[EMAIL PROTECTED]
> *Sent:* Thursday, September 18, 2008 10:52 AM
> *To:* NT System Admin Issues
> *Subject:* GPO settings for power management?
>
> In Win2003 server, you cannot use GPOs to configure Windows XP power 
> settings (turn off monitor, turn off hard disk, standby, etc).correct?
>
> How about Win2008 sever?
>
>  
>
> **
>
> *Confidentiality Notice:*
>
> 
>
> *This communication, including any attachments, may contain 
> confidential information and is intended only for the individual or 
> entity to whom it is addressed. Any review, dissemination, or copying 
> of this communication by anyone other than the intended recipient is 
> strictly prohibited. If you are not the intended recipient, please 
> contact the sender by reply email, delete and destroy all copies of 
> the original message.*
>
>
>
>  

--
Matt Cross, MCSE: Messaging
mailto:[EMAIL PROTECTED]


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~   ~


RE: OT: iphone update - how long does it take?

2008-09-18 Thread Christopher J. Bosak
Did I say I was anti-apple? No. Was I bowing to the Micro$oft gods? No. I'm
a Linux man myself. I was just stating, that in my opinion WM 6.1 was easier
to configure then the iPhone. 

 

Sorry if my opinion offended you.

 

Christopher J. Bosak

Vector Company

c. 847.603.4673

[EMAIL PROTECTED]

 

"You need to install an RTFM Interface, due to an LBNC issue."

- B.O.F.H. (Merged 2 into 1) - Me

 

From: Jonathan Link [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 10:31 hrs
To: NT System Admin Issues
Subject: Re: OT: iphone update - how long does it take?

 

Perhaps.

My main problem is that generally this list is quite open about alternative
technologies to solving a particular problem, even though it's officially an
nt system administrators list.  Many of us here are working with varied and
mixed environments, some by choice and some by fiat or inheritence.  

I have trouble when that same open attitude can't be extended to Apple.
Does Apple have control issues?  Sure, but then so does Microsoft.  So does
IBM, HP, Dell, any vendor wants to exercise as much control over their
product as possible.  Apple just happens to be a bit more successful in
exercising that control to fulfill their vision.  If you happen to disagree
with that vision, that's fine, too, but my feeling is that this list
generally doesn't discount any company regardless of their vision if they're
capable of providing the right tool for a given application.  I try and use
the best tool for the job.  To wit, I bought a Macbook Pro as my last
notebook, because I wanted to play some games on it, and I wanted to do some
video editing work with video's we've collected of our daughter since she
was born.  I spec'ed out similar systems from HP, Dell, and Apple
(obviously).  All were about comparable in price for what I wanted to do,
but the Apple won because it had great easy to use video editing software
and, I could run Windows in Bootcamp.  I run Bootcamp 75% of the time, and a
lot of the time I'm on the OS X side, I'm running my Bootcamp partition
through Fusion.



 

On Thu, Sep 18, 2008 at 11:18 AM, Tim Vander Kooi <[EMAIL PROTECTED]>
wrote:

Jonathan must have accidentally slipped on Don's cranky pants this morning
when he was sneaking out of the house in the dark. 

;-P

 

From: Christopher J. Bosak [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 10:10 AM 


To: NT System Admin Issues

Subject: RE: OT: iphone update - how long does it take?

 

Sheesh, take a sedative. I was just trying to state it worked out of the box
without excessive configuration and without installing anything. Way to
over-read into things. 

 

Christopher J. Bosak

Vector Company

c. 847.603.4673

[EMAIL PROTECTED]

 

"You need to install an RTFM Interface, due to an LBNC issue."

- B.O.F.H. (Merged 2 into 1) - Me

 

From: Jonathan Link [mailto:[EMAIL PROTECTED] 
Sent: Thursday, September 18, 2008 08:32 hrs
To: NT System Admin Issues
Subject: Re: OT: iphone update - how long does it take?

 

Silly tools?  



Sheesh, cut the hyperbole.  Perhaps there's a good application where the
iPhone fits and another model cellphone wouldn't.  

My iPhone just works, too.  I don't make a big deal about it until someone
has to needlessly comment that it's a toy or it doesn't work.  Is it
perfect, of course not, but I'd venture to say that there is no perfect
device, just a best fit.  For many people that will be an iPhone.  Some
people will want it to be a best fit, and fewer still will recognize that it
can't be a best fit for their needs.  I'm really glad you have a phone that
perfectly fits your usage needs.  Is there any reason to condescend to
someone who has also found one that meets their needs, but it just happens
to be different?



 

Regards

Jonathan

On Thu, Sep 18, 2008 at 8:44 AM, Christopher J. Bosak <[EMAIL PROTECTED]>
wrote:

I'll keep my BlackJack II with WM 6.1, sync'd with Exchange.
No silly tools to configure. Just works.


Christopher J. Bosak
Vector Company
c. 847.603.4673
[EMAIL PROTECTED]

"You need to install an RTFM Interface, due to an LBNC issue."
- B.O.F.H. (Merged 2 into 1) - Me

-Original Message-
From: Troy Meyer [mailto:[EMAIL PROTECTED]
Sent: Wednesday, September 17, 2008 16:03 hrs
To: NT System Admin Issues

Subject: RE: OT: iphone update - how long does it take?

See how long it takes you to create a calendar appointment and invite 3
users on that touch ;)

-Troy

-Original Message-
From: Ben Schorr [mailto:[EMAIL PROTECTED]
Sent: Wednesday, September 17, 2008 1:57 PM
To: NT System Admin Issues
Subject: RE: OT: iphone update - how long does it take?

Funny - I got my iPod touch set up to sync with my Exchange server and get
e-mail, calendar and contacts pretty quickly.  Took almost twice as long to
get a Blackberry Curve to ONLY get e-mail.  J



Ben M. Schorr
Chief Executive Officer
__
Roland Schorr & Tower
www.rolandschorr.com 

  1   2   >