RE: exploit tests on security suites

2008-10-21 Thread Ziots, Edward
Honestly, 

AV and Antimalware isn't cutting it like Marc says, but people are lulled into 
a false sense of security thinking if they have these on there systems they are 
protected. They are based on signatures which the Anti malware and Anti Virus 
must detect to be effective, which can be bypass or even disabled pretty easy. 
It comes down to a simple point. (Authorized Code execution) which a good HIPS 
based technology will assist with (Cisco CSA Agent, BIT Parity (If you can 
really call that a HIPS, its more like application white-listing, but it does 
control code execution which is the meat of my argument)

Until you have technologies to control what is executing on your 
workstations/servers, you are in a loosing battle because the exploits are 
coming out faster and there are more variations of them then the AV/AntiMalware 
folks can keep up with. 

IMHO,
Z

Edward E. Ziots
Network Engineer
Lifespan Organization
MCSE,MCSA,MCP,Security+,Network+,CCA
Phone: 401-639-3505
-Original Message-
From: Marc Maiffret [mailto:[EMAIL PROTECTED] 
Sent: Monday, October 20, 2008 7:57 PM
To: NT System Admin Issues
Subject: RE: exploit tests on security suites

Your missing the point completely. It has nothing to do with AV telling you
where you are vulnerable.

It has everything to do with these solutions being marked to IT people as
actually having the capability to prevent attacks against your systems. Most
people these days are not simply buying the latest AV because it will
protect them against executables that signatures exist for. People are buyin
these new security suites because they are suppose to protect you from the
attacks we all read about day in and day out.

And the fact of the matter is that most of these suites do not merely miss a
thing here or there but simply DO NOT DO ANYTHING in the way of preventing
real world attacks. And if everyone is paying attention they will also have
noticed that an increasing number of vulnerabilities are surfacing before a
vendor has had a chance to create a patch and therefore patch management is
useless in that sense.

Security software vendors continue to release garbage that offers little in
terms of real world protection for the exact reasons of responses like
yours.

I am not trying to be overly harsh but instead I am passionate and hate
seeing time after time IT people being way off the mark in their
understanding of these issues. Just as it was sad to see so many IT people
screwed over into believing they had to buy anti-virus and anti-spyware even
though the detection technology underneath is the same. Yet another sham and
to many people, just as they do with Microsoft security, chalks it up to
being the way things are. 

Let me put it another way in the form of a question... I can take anyone of
the major security suites that exists right now and use 2+ year old, or 2+
week old vulnerabilities to compromise systems running the suites. Do you
think that is right or that is snake oil? I don't think Secunia was cut out
to ask or answer that question, however the problem remains.

-Marc

 -Original Message-
 From: David Lum [mailto:[EMAIL PROTECTED]
 Sent: Monday, October 20, 2008 8:35 AM
 To: NT System Admin Issues
 Subject: RE: exploit tests on security suites
 
 Their point? Yeah, patch :-).
 
 It also says don't be so ignorant to think your AV will tell you where
 you're vulnerable, no different than expecting your patch management to
 tell you when you've got a virus. Until someone packages patch
 management with AV/Malware and probably even some kind of data
 encryption there won't be a single app to handle endpoint security.
 David Lum // SYSTEMS ENGINEER
 NORTHWEST EVALUATION ASSOCIATION
 (Desk) 971.222.1025 // (Cell) 503.267.9764
 
 
 -Original Message-
 From: Marc Maiffret [mailto:[EMAIL PROTECTED]
 Sent: Saturday, October 18, 2008 3:25 PM
 To: NT System Admin Issues
 Subject: RE: exploit tests on security suites
 
 Secunia does sound like they could have done their testing better.
 However,
 they are trying to highlight something that is indeed a real problem
 for
 most every security suite, AV or otherwise.
 
 The fact is that the majority of the solutions people are using from
 McAfee
 to NOD32 (VIPRE maybe although I have not played with it yet) do
 absolutely
 nothing in the way of preventing systems from being compromised through
 the
 use of exploits that leveraging software vulnerabilities.
 
 All of these security suites are just better versions of each other in
 terms
 of trying to have better ways to more generically detect files that
 appear
 to be malicious. That however is not even nearly close to a complete
 defense
 against the attacks that organizations face today.
 
 Even suites such as McAfee and CSA that have added some level of
 vulnerability prevention simply fail to prevent anything.
 
 Secunia might have done their testing wrong, but their point is real
 and
 accurate.
 
 -Marc Maiffret
 
  

RE: Event logging every executable ran

2008-10-21 Thread Ziots, Edward
I think you have to turn on auditing, of Process tracking success and
failure but your logs are going to full up really quick and look like
soup..

Z

Edward E. Ziots
Network Engineer
Lifespan Organization
MCSE,MCSA,MCP,Security+,Network+,CCA
Phone: 401-639-3505

-Original Message-
From: Phillip Partipilo [mailto:[EMAIL PROTECTED] 
Sent: Monday, October 20, 2008 1:37 PM
To: NT System Admin Issues
Subject: Event logging every executable ran

Is it possible to log the full path of every executable a user runs into
the
security event log?

 
Phillip Partipilo
Parametric Solutions Inc.
Jupiter, Florida
(561) 747-6107
 
 



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


Good book for the Cisco ASA series

2008-10-21 Thread Jon Harris
Who has a recommendation for a good book on the Cisco ASA series of
firewalls?  I am in need of some information as per usual the Cisco site is
less than helpful.  I have 2 for the PIX line but they don't cover any of
the new stuff I am finding on the ASA.  I would prefer something that will
get the the meat of configuring one and less on how it works.  I also am
looking at some of the new protocol filtering, like IM and such.

I am just now off to do some research on books but recommendations are what
I am looking for.

Thanks in advance,

Jon

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Good book for the Cisco ASA series

2008-10-21 Thread Eldridge, Dave
I have the (Cisco Press) Cisco ASA, PIX, and FWSM Firewall Handbook.
From what I've looked into it seems ok. Very disappointed it has zilch
on vpn configurations. I still have to migrate over my concentrator so
I'll have to look for another reference.

 

From: Jon Harris [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 4:57 AM
To: NT System Admin Issues
Subject: Good book for the Cisco ASA series

 

Who has a recommendation for a good book on the Cisco ASA series of
firewalls?  I am in need of some information as per usual the Cisco site
is less than helpful.  I have 2 for the PIX line but they don't cover
any of the new stuff I am finding on the ASA.  I would prefer something
that will get the the meat of configuring one and less on how it works.
I also am looking at some of the new protocol filtering, like IM and
such.

 

I am just now off to do some research on books but recommendations are
what I am looking for.

 

Thanks in advance,

 

Jon

 

 



This message contains confidential information and is intended only for the 
intended recipient(s). If you are not the named recipient you should not read, 
distribute or copy this e-mail. Please notify the sender immediately via e-mail 
if you have received this e-mail by mistake; then, delete this e-mail from your 
system.
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Good book for the Cisco ASA series

2008-10-21 Thread Adam Greene
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance 
(Networking Technology) 
ISBN: 1-58705-209-1
http://www.amazon.com/Cisco-ASA-All-One-Networking/dp/1587052091/ref=sr_11_1?ie=UTF8qid=1224594725sr=11-1

Our net admins got this when learning the ASA and it served them well, though 
was not the only resource they consulted.

Have not looked at it extensively myself ...

Thanks,
Adam

  - Original Message - 
  From: Eldridge, Dave 
  To: NT System Admin Issues 
  Sent: Tuesday, October 21, 2008 8:40 AM
  Subject: RE: Good book for the Cisco ASA series


  I have the (Cisco Press) Cisco ASA, PIX, and FWSM Firewall Handbook. From 
what I've looked into it seems ok. Very disappointed it has zilch on vpn 
configurations. I still have to migrate over my concentrator so I'll have to 
look for another reference.

   

  From: Jon Harris [mailto:[EMAIL PROTECTED] 
  Sent: Tuesday, October 21, 2008 4:57 AM
  To: NT System Admin Issues
  Subject: Good book for the Cisco ASA series

   

  Who has a recommendation for a good book on the Cisco ASA series of 
firewalls?  I am in need of some information as per usual the Cisco site is 
less than helpful.  I have 2 for the PIX line but they don't cover any of the 
new stuff I am finding on the ASA.  I would prefer something that will get the 
the meat of configuring one and less on how it works.  I also am looking at 
some of the new protocol filtering, like IM and such.

   

  I am just now off to do some research on books but recommendations are what I 
am looking for.

   

  Thanks in advance,

   

  Jon

   

 This e-mail contains the thoughts and opinions of the sender and does not 
represent official Parkview Medical Center policy.

  This communication is intended only for the recipient(s) named above, may be 
confidential and/or legally privileged: and, must be treated as such in 
accordance with state and federal laws. If you are not the intended recipient, 
you are hereby notified that any use of this communication, or any of its 
contents, is prohibited. If you have received this communication in error, 
please return to sender and delete the message from your computer system.






 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: exploit tests on security suites

2008-10-21 Thread David Lum
Be as harsh as you feel necessary Marc, you're the security expert here not me. 
:)

It has everything to do with these solutions being marked to IT people as 
actually having the capability to prevent attacks against your systems.

Actually my read was these solutions are marketed to non-IT folks who don't 
know that endpoint security from AV vendors is nothing more than 
AV/antimalware and maybe a firewall, I simply take for granted that a seasoned 
IT person will know these suites are only a small part of protecting any one 
system.

Security software vendors continue to release garbage that offers little in 
terms of real world protection for the exact reasons of responses like yours.

Yes my response wasn't elegant, I was simply saying the point of their article 
was to patch: Security software alone isn't sufficient to protect a PC, 
Kristensen said. People need to patch all their programs. Patching is 
absolutely necessary, and not just the main programs, but third-party software 
as well. I wasn't trying to imply that patching + some fancy AV endpoint = a 
secure system, I gave a one-word summary of the article, not a summary on what 
I think it takes to fully protect a system. I think we agree that the endpoint 
security solutions aren't what they claim (on at least infer) to be.

Most people these days are not simply buying the latest AV because it will 
protect them against executables that signatures exist for. People are buying 
these new security suites because they are suppose to protect you from the
attacks we all read about day in and day out.

I guess I'm not most people, *I* sure don't buy  recommend AV products with 
the expectation it will do anything other than protect against what a signature 
(or heuristic) exists for. I don't expect it to stop an attack via buffer 
overflow or anything else.

And if everyone is paying attention they will also have noticed that an 
increasing number of vulnerabilities are surfacing before a vendor has had a 
chance to create a patch and therefore patch management is useless in that 
sense

Agreed! What do you recommend for those kind of exploits?

David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764

-Original Message-
From: Marc Maiffret [mailto:[EMAIL PROTECTED]
Sent: Monday, October 20, 2008 4:57 PM
To: NT System Admin Issues
Subject: RE: exploit tests on security suites

Your missing the point completely. It has nothing to do with AV telling you
where you are vulnerable.

It has everything to do with these solutions being marked to IT people as
actually having the capability to prevent attacks against your systems. Most
people these days are not simply buying the latest AV because it will
protect them against executables that signatures exist for. People are buyin
these new security suites because they are suppose to protect you from the
attacks we all read about day in and day out.

And the fact of the matter is that most of these suites do not merely miss a
thing here or there but simply DO NOT DO ANYTHING in the way of preventing
real world attacks. And if everyone is paying attention they will also have
noticed that an increasing number of vulnerabilities are surfacing before a
vendor has had a chance to create a patch and therefore patch management is
useless in that sense.

Security software vendors continue to release garbage that offers little in
terms of real world protection for the exact reasons of responses like
yours.

I am not trying to be overly harsh but instead I am passionate and hate
seeing time after time IT people being way off the mark in their
understanding of these issues. Just as it was sad to see so many IT people
screwed over into believing they had to buy anti-virus and anti-spyware even
though the detection technology underneath is the same. Yet another sham and
to many people, just as they do with Microsoft security, chalks it up to
being the way things are.

Let me put it another way in the form of a question... I can take anyone of
the major security suites that exists right now and use 2+ year old, or 2+
week old vulnerabilities to compromise systems running the suites. Do you
think that is right or that is snake oil? I don't think Secunia was cut out
to ask or answer that question, however the problem remains.

-Marc

 -Original Message-
 From: David Lum [mailto:[EMAIL PROTECTED]
 Sent: Monday, October 20, 2008 8:35 AM
 To: NT System Admin Issues
 Subject: RE: exploit tests on security suites

 Their point? Yeah, patch :-).

 It also says don't be so ignorant to think your AV will tell you where
 you're vulnerable, no different than expecting your patch management to
 tell you when you've got a virus. Until someone packages patch
 management with AV/Malware and probably even some kind of data
 encryption there won't be a single app to handle endpoint security.
 David Lum // SYSTEMS ENGINEER
 NORTHWEST EVALUATION ASSOCIATION
 (Desk) 

RE: Laptop security and data protection options

2008-10-21 Thread Ames Matthew B
We use BeCrypt on our laptop and desktop machines.  Requires a username
and 2 passwords after POST before the OS starts to load.  Does not
really help if you have multiple users on one machine, but fine when you
allocate one machine per user (as is the case with laptops I guess).
This will help to prevent access of your data on the machine's disks,
but won't help you get it back should a machine be stolen..

-Original Message-
From: Lumumba, Juma (ILRI-ICRAF) [mailto:[EMAIL PROTECTED] 
Sent: 21 October 2008 12:55
To: NT System Admin Issues
Subject: Laptop security and data protection options

Hi All,

We have fallen victim of laptops being stolen in the organisation,
thereby losing valuable data. Our standard is Dell. We are exploring the
following laptop security and data protection options as below.

Dell ControlVaultTM  secure credential management

Multi-factor authentication via an integrated contactless smart card
reader, Trusted Platform Module v1.2 and optional biometric fingerprint
reader

Solid State Drive technology for improved data protection

Dell Mobile Asset Protection Services4 can help maximise uptime while
protecting your investment with Extended Battery Service4 and Laptop
Tracking  Recovery4

Dell Mobile Data Protection Services4 include Remote Data Delete4, Hard
Drive Data Recovery4 and Certified Data Destruction services4 - with
these optional services, Dell can remotely delete your sensitive data,
prevent potential loss of valuable data, certify destruction of data or
recover data from a failed hard drive without a backup

Anybody with an idea what works best?

Thanks,

Lumumba.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~
The information contained in this E-Mail and any subsequent 
correspondence is private and is intended solely for the intended 
recipient(s).  The information in this communication may be 
confidential and/or legally privileged.  Nothing in this e-mail is 
intended to conclude a contract on behalf of QinetiQ or make QinetiQ 
subject to any other legally binding commitments, unless the e-mail 
contains an express statement to the contrary or incorporates a formal Purchase 
Order.

For those other than the recipient any disclosure, copying, 
distribution, or any action taken or omitted to be taken in reliance 
on such information is prohibited and may be unlawful.

Emails and other electronic communication with QinetiQ may be 
monitored and recorded for business purposes including security, audit 
and archival purposes.  Any response to this email indicates consent 
to this.

Telephone calls to QinetiQ may be monitored or recorded for quality 
control, security and other business purposes.

QinetiQ Limited
Registered in England  Wales: Company Number:3796233
Registered office: 85 Buckingham Gate, London SW1E 6PD, United Kingdom
Trading address: Cody Technology Park, Cody Building, Ively Road, Farnborough, 
Hampshire, GU14 0LX, United Kingdom 
http://www.qinetiq.com/home/notices/legal.html

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


Re: Good book for the Cisco ASA series

2008-10-21 Thread Jon Harris
What about these two I know the second one should be good I have one of his
for the PIX.

http://www.amazon.com/Cisco-Firewall-Handbook-Networking-Technology/dp/1587054574

http://safari.oreilly.com/1587052091

Thanks,

Jon

On Tue, Oct 21, 2008 at 9:14 AM, Adam Greene [EMAIL PROTECTED] wrote:

  Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
 (Networking Technology)
 ISBN: 1-58705-209-1

 http://www.amazon.com/Cisco-ASA-All-One-Networking/dp/1587052091/ref=sr_11_1?ie=UTF8qid=1224594725sr=11-1

 Our net admins got this when learning the ASA and it served them well,
 though was not the only resource they consulted.

 Have not looked at it extensively myself ...

 Thanks,
 Adam


  - Original Message -
 *From:* Eldridge, Dave [EMAIL PROTECTED]
 *To:* NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com
   *Sent:* Tuesday, October 21, 2008 8:40 AM
 *Subject:* RE: Good book for the Cisco ASA series

  I have the (Cisco Press) Cisco ASA, PIX, and FWSM Firewall Handbook.
 From what I've looked into it seems ok. Very disappointed it has zilch on
 vpn configurations. I still have to migrate over my concentrator so I'll
 have to look for another reference.



 *From:* Jon Harris [mailto:[EMAIL PROTECTED]
 *Sent:* Tuesday, October 21, 2008 4:57 AM
 *To:* NT System Admin Issues
 *Subject:* Good book for the Cisco ASA series



 Who has a recommendation for a good book on the Cisco ASA series of
 firewalls?  I am in need of some information as per usual the Cisco site is
 less than helpful.  I have 2 for the PIX line but they don't cover any of
 the new stuff I am finding on the ASA.  I would prefer something that will
 get the the meat of configuring one and less on how it works.  I also am
 looking at some of the new protocol filtering, like IM and such.



 I am just now off to do some research on books but recommendations are what
 I am looking for.



 Thanks in advance,



 Jon





 This e-mail contains the thoughts and opinions of the sender and does not
 represent official Parkview Medical Center policy.

 This communication is intended only for the recipient(s) named above, may
 be confidential and/or legally privileged: and, must be treated as such in
 accordance with state and federal laws. If you are not the intended
 recipient, you are hereby notified that any use of this communication, or
 any of its contents, is prohibited. If you have received this communication
 in error, please return to sender and delete the message from your computer
 system.












~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Password management app?

2008-10-21 Thread Damien Solodow
I'm looking for some suggestions for a password management program. 
 
I use KeePass for my own things, but am looking for something a little 
different for the IT department. Ideally it would be able to use AD/LDAP for 
user authentication and all different access levels based on user or group.
 
For example, I'd like to be able to make only a subset of password available to 
the Helpdesk, and a different subset to the network guys.
 
Free or OSS would be great, but willing to buy something if it's not too 
pricey, and has a trial or eval available.
 
Suggestions, preferences, etc?
TIA
 
Damien Solodow
Senior System Administrator
Infrastructure Services Group
Information Services
Indiana Business College
[EMAIL PROTECTED] mailto:[EMAIL PROTECTED] 
Direct - (317) 217-6881
We are the Foundation of how Business Gets Done!

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

alternate browser for Treo 700wx

2008-10-21 Thread Joe Heaton
Anyone know how to install an alternate browser on this phone?  It's
running WM5.  I've tried installing Opera, following their directions,
and it downloads a file, but never installs it.

 

Joe Heaton

AISA

Employment Training Panel

1100 J Street, 4th Floor

Sacramento, CA  95814

(916) 327-5276

[EMAIL PROTECTED]

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Password management app?

2008-10-21 Thread James Winzenz
Enterprise Password Safe.  It does everything you are asking for and
more.

 

http://www.enterprise-password-safe.com/

 

IIRC, it was not too pricey.  We are rolling this out to all of our IT
departments right now.

 

Thanks,

 

James Winzenz

Infrastructure Systems Engineer II - Security

Pulte Homes Information Services

 



From: Damien Solodow [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 7:22 AM
To: NT System Admin Issues
Subject: Password management app?

 

I'm looking for some suggestions for a password management program. 

 

I use KeePass for my own things, but am looking for something a little
different for the IT department. Ideally it would be able to use AD/LDAP
for user authentication and all different access levels based on user or
group.

 

For example, I'd like to be able to make only a subset of password
available to the Helpdesk, and a different subset to the network guys.

 

Free or OSS would be great, but willing to buy something if it's not too
pricey, and has a trial or eval available.

 

Suggestions, preferences, etc?

TIA

 

Damien Solodow

Senior System Administrator

Infrastructure Services Group

Information Services

Indiana Business College

[EMAIL PROTECTED]

Direct - (317) 217-6881

We are the Foundation of how Business Gets Done! 

CONFIDENTIALITY NOTICE:  This email may contain confidential and privileged 
material for the sole use of the intended recipient(s).  Any review, use, 
distribution or disclosure by others is strictly prohibited.  If you have 
received this communication in error, please notify the sender immediately by 
email and delete the message and any file attachments from your computer.  
Thank you.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: alternate browser for Treo 700wx

2008-10-21 Thread Ames Matthew B
If it downloads a .cab file, just clicking on it should launch the setup
process.
 
Cheers,
Matt



From: Joe Heaton [mailto:[EMAIL PROTECTED] 
Sent: 21 October 2008 15:36
To: NT System Admin Issues
Subject: alternate browser for Treo 700wx



Anyone know how to install an alternate browser on this phone?  It's
running WM5.  I've tried installing Opera, following their directions,
and it downloads a file, but never installs it.

 

Joe Heaton

AISA

Employment Training Panel

1100 J Street, 4th Floor

Sacramento, CA  95814

(916) 327-5276

[EMAIL PROTECTED]

 


 

 


The information contained in this E-Mail and any subsequent 
correspondence is private and is intended solely for the intended 
recipient(s).  The information in this communication may be 
confidential and/or legally privileged.  Nothing in this e-mail is 
intended to conclude a contract on behalf of QinetiQ or make QinetiQ 
subject to any other legally binding commitments, unless the e-mail 
contains an express statement to the contrary or incorporates a formal Purchase 
Order.

For those other than the recipient any disclosure, copying, 
distribution, or any action taken or omitted to be taken in reliance 
on such information is prohibited and may be unlawful.

Emails and other electronic communication with QinetiQ may be 
monitored and recorded for business purposes including security, audit 
and archival purposes.  Any response to this email indicates consent 
to this.

Telephone calls to QinetiQ may be monitored or recorded for quality 
control, security and other business purposes.

QinetiQ Limited
Registered in England  Wales: Company Number:3796233
Registered office: 85 Buckingham Gate, London SW1E 6PD, United Kingdom
Trading address: Cody Technology Park, Cody Building, Ively Road, Farnborough, 
Hampshire, GU14 0LX, United Kingdom 
http://www.qinetiq.com/home/notices/legal.html

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Monitoring program

2008-10-21 Thread Joe Heaton
Anyone know of a product, or process, that I can use to find out who
changed a file at 9:00 last night?  That's an example, but I would like
to be able to tell what user account last changed a file.

 

Joe Heaton

AISA

Employment Training Panel

1100 J Street, 4th Floor

Sacramento, CA  95814

(916) 327-5276

[EMAIL PROTECTED]

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Monitoring program

2008-10-21 Thread Ziots, Edward
Auditing for everyone on create, read, write access and then parsing the
audit logs, would help you out. 

 

Z

 

Edward E. Ziots

Network Engineer

Lifespan Organization

MCSE,MCSA,MCP,Security+,Network+,CCA

Phone: 401-639-3505



From: Joe Heaton [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 10:47 AM
To: NT System Admin Issues
Subject: Monitoring program

 

Anyone know of a product, or process, that I can use to find out who
changed a file at 9:00 last night?  That's an example, but I would like
to be able to tell what user account last changed a file.

 

Joe Heaton

AISA

Employment Training Panel

1100 J Street, 4th Floor

Sacramento, CA  95814

(916) 327-5276

[EMAIL PROTECTED]

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: alternate browser for Treo 700wx

2008-10-21 Thread Joe Heaton
Running the process through the current browser on the phone downloaded
a .jad file.  Downloading the mobile browser on my desktop downloaded a
cab file.  If I copy the cab file to the phone, I should be able to run
it from there?

 

Joe Heaton

Employment Training Panel

 

From: Ames Matthew B [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 7:46 AM
To: NT System Admin Issues
Subject: RE: alternate browser for Treo 700wx

 

If it downloads a .cab file, just clicking on it should launch the setup
process.

 

Cheers,

Matt

 



From: Joe Heaton [mailto:[EMAIL PROTECTED] 
Sent: 21 October 2008 15:36
To: NT System Admin Issues
Subject: alternate browser for Treo 700wx

Anyone know how to install an alternate browser on this phone?  It's
running WM5.  I've tried installing Opera, following their directions,
and it downloads a file, but never installs it.

 

Joe Heaton

AISA

Employment Training Panel

1100 J Street, 4th Floor

Sacramento, CA  95814

(916) 327-5276

[EMAIL PROTECTED]

 

 

 

 

The information contained in this E-Mail and any subsequent 
correspondence is private and is intended solely for the intended 
recipient(s).  The information in this communication may be 
confidential and/or legally privileged.  Nothing in this e-mail is 
intended to conclude a contract on behalf of QinetiQ or make QinetiQ 
subject to any other legally binding commitments, unless the e-mail 
contains an express statement to the contrary or incorporates a formal
Purchase Order.

For those other than the recipient any disclosure, copying, 
distribution, or any action taken or omitted to be taken in reliance 
on such information is prohibited and may be unlawful.

Emails and other electronic communication with QinetiQ may be 
monitored and recorded for business purposes including security, audit 
and archival purposes.  Any response to this email indicates consent 
to this.

Telephone calls to QinetiQ may be monitored or recorded for quality 
control, security and other business purposes.

QinetiQ Limited
Registered in England  Wales: Company Number:3796233
Registered office: 85 Buckingham Gate, London SW1E 6PD, United Kingdom
Trading address: Cody Technology Park, Cody Building, Ively Road,
Farnborough, Hampshire, GU14 0LX, United Kingdom 
http://www.qinetiq.com/home/notices/legal.html

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: alternate browser for Treo 700wx

2008-10-21 Thread Ames Matthew B
try opening the .cab file on your desktop in winzip (or similar, it
should just open as per a normal cabinet file).  Copy that to the device
and try it.  I used to do a bit of PPC development, and we used to just
download cab files to the PPC and run them as part of the
installation.



From: Joe Heaton [mailto:[EMAIL PROTECTED] 
Sent: 21 October 2008 16:43
To: NT System Admin Issues
Subject: RE: alternate browser for Treo 700wx



Running the process through the current browser on the phone downloaded
a .jad file.  Downloading the mobile browser on my desktop downloaded a
cab file.  If I copy the cab file to the phone, I should be able to run
it from there?

 

Joe Heaton

Employment Training Panel

 

From: Ames Matthew B [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 7:46 AM
To: NT System Admin Issues
Subject: RE: alternate browser for Treo 700wx

 

If it downloads a .cab file, just clicking on it should launch the setup
process.

 

Cheers,

Matt

 



From: Joe Heaton [mailto:[EMAIL PROTECTED] 
Sent: 21 October 2008 15:36
To: NT System Admin Issues
Subject: alternate browser for Treo 700wx

Anyone know how to install an alternate browser on this phone?  It's
running WM5.  I've tried installing Opera, following their directions,
and it downloads a file, but never installs it.

 

Joe Heaton

AISA

Employment Training Panel

1100 J Street, 4th Floor

Sacramento, CA  95814

(916) 327-5276

[EMAIL PROTECTED]

 

 

 

 

The information contained in this E-Mail and any subsequent 
correspondence is private and is intended solely for the intended 
recipient(s).  The information in this communication may be 
confidential and/or legally privileged.  Nothing in this e-mail is 
intended to conclude a contract on behalf of QinetiQ or make QinetiQ 
subject to any other legally binding commitments, unless the e-mail 
contains an express statement to the contrary or incorporates a formal
Purchase Order.

For those other than the recipient any disclosure, copying, 
distribution, or any action taken or omitted to be taken in reliance 
on such information is prohibited and may be unlawful.

Emails and other electronic communication with QinetiQ may be 
monitored and recorded for business purposes including security, audit 
and archival purposes.  Any response to this email indicates consent 
to this.

Telephone calls to QinetiQ may be monitored or recorded for quality 
control, security and other business purposes.

QinetiQ Limited
Registered in England  Wales: Company Number:3796233
Registered office: 85 Buckingham Gate, London SW1E 6PD, United Kingdom
Trading address: Cody Technology Park, Cody Building, Ively Road,
Farnborough, Hampshire, GU14 0LX, United Kingdom 
http://www.qinetiq.com/home/notices/legal.html

 

 

 


 

 


The QinetiQ e-mail privacy policy and company information is detailed elsewhere 
in the body of this email.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Help with sizing a Windows 2003 Print Server

2008-10-21 Thread Steven M. Caesare
Thirded.

 

-sc

 

From: Ziots, Edward [mailto:[EMAIL PROTECTED] 
Sent: Monday, October 20, 2008 10:01 AM
To: NT System Admin Issues
Subject: RE: Help with sizing a Windows 2003 Print Server

 

Same here, we use VM for the print servers and nobody is complaining. NO
need to have print servers on physical hardware when you got VM's

Z

 

Edward E. Ziots

Network Engineer

Lifespan Organization

MCSE,MCSA,MCP,Security+,Network+,CCA

Phone: 401-639-3505



From: RM [mailto:[EMAIL PROTECTED] 
Sent: Monday, October 20, 2008 9:54 AM
To: NT System Admin Issues
Subject: Re: Help with sizing a Windows 2003 Print Server

 

I don't know of a formula, but I can tell you that our print server is
handling about 150 printers and 1600 users on 1GB of RAM and 1 CPU.  No
joke.  It's a VM, and nobody's complaining about print performance.
Total commit charge is about 600MB right now; There's little sign that
more RAM is needed.

RM

  

On Mon, 20 Oct 2008 10:44:53 +1100, McBride, Ryan
[EMAIL PROTECTED] said:

Hey Guys,

 

Just wondering if anyone knows of a formula that can be used
when sizing a print server. I'm looking at approx 200 Printers and
1200-1500 End users. All in the one physical site. Mainly interested in
Ram sizing. CPU  Disk space will not be an issue.

 

Thanks in advance

 

Ryan McBride
Senior Systems Engineer
D3S Enterprise Services

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

R: Help with sizing a Windows 2003 Print Server

2008-10-21 Thread HELP_PC
I think that even if VM physical hardware is used for the spool. So may also 
depend on how fast printers collect that spool
 
GuidoElia
HELPPC
 

  _  

Da: Steven M. Caesare [mailto:[EMAIL PROTECTED] 
Inviato: martedì 21 ottobre 2008 18.09
A: NT System Admin Issues
Oggetto: RE: Help with sizing a Windows 2003 Print Server



Thirded.

 

-sc

 

From: Ziots, Edward [mailto:[EMAIL PROTECTED] 
Sent: Monday, October 20, 2008 10:01 AM
To: NT System Admin Issues
Subject: RE: Help with sizing a Windows 2003 Print Server

 

Same here, we use VM for the print servers and nobody is complaining. NO need 
to have print servers on physical hardware when you got VM's

Z

 

Edward E. Ziots

Network Engineer

Lifespan Organization

MCSE,MCSA,MCP,Security+,Network+,CCA

Phone: 401-639-3505

  _  

From: RM [mailto:[EMAIL PROTECTED] 
Sent: Monday, October 20, 2008 9:54 AM
To: NT System Admin Issues
Subject: Re: Help with sizing a Windows 2003 Print Server

 

I don't know of a formula, but I can tell you that our print server is handling 
about 150 printers and 1600 users on 1GB of RAM and 1 CPU.  No joke.  It's a 
VM, and nobody's complaining about print performance.  Total commit charge is 
about 600MB right now; There's little sign that more RAM is needed.

RM

  

On Mon, 20 Oct 2008 10:44:53 +1100, McBride, Ryan [EMAIL PROTECTED] said:

Hey Guys,

 

Just wondering if anyone knows of a formula that can be used when sizing a 
print server. I'm looking at approx 200 Printers and 1200-1500 End users. All 
in the one physical site. Mainly interested in Ram sizing. CPU  Disk space 
will not be an issue.

 

Thanks in advance

 

Ryan McBride
Senior Systems Engineer
D3S Enterprise Services

 

 

 

 

 

 


 


 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

DNS Reverse lookup question

2008-10-21 Thread Webb, Brian (Corp)
Here is the situation:
1 IP range has servers from 2 different domains 
 
DNS servers (AD integrated) for each domain have entries for the servers
in that domain
 
If I do a reverse lookup from a machine that is pointed to the right
DNS server it works, otherwise I get a non-existent domain.  Hw do you
solve this?  Do you manually put in PTR records for all the servers in
the opposite domain?
 
Example:
Server1.corp.local is at 10.1.1.10
 
Server2.division.local is at 10.1.1.20
 
Client1.corp.local is at 10.100.100.100 with DNS server pointed to
DNSserver.corp.local
Client2.division.local is at 10.200.200.200 with DNS server pointed to
DNSserver.division.local
 
nslookup from client1 for 10.1.1.10 returns Server1
nslookup from client1 for 10.1.1.20 returns non-existent domain
 
nslookup from Client2 for 10.1.1.10 returns non-existent domain
nslookup from Client2 for 10.1.1.20 returns Server2
 
nslookup by name (forward lookup) works everywhere.
 
Brian Webb - MCSE
TDS Corporate IS, Windows Server Platform Team
Senior Systems Administrator

When stuck on a problem as often can be, try to remember G.B.T.T.D. (Go
Back To The Definition). - Dave Seybold

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: alternate browser for Treo 700wx

2008-10-21 Thread Sam Cayze
It must not recognize your phone's browser string.  
 
PS - take a look at this browser for WinMob.  It does Flash, Ajax, etc.
Think: Youtube, Google Maps, etc.
 
 
http://www.engadget.com/2008/01/28/skyfire-browser-for-windows-mobile-is
-game-changing-does-flash/
 
http://www.skyfire.com/product
 
 
 
 



From: Joe Heaton [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 10:43 AM
To: NT System Admin Issues
Subject: RE: alternate browser for Treo 700wx



Running the process through the current browser on the phone downloaded
a .jad file.  Downloading the mobile browser on my desktop downloaded a
cab file.  If I copy the cab file to the phone, I should be able to run
it from there?

 

Joe Heaton

Employment Training Panel

 

From: Ames Matthew B [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 7:46 AM
To: NT System Admin Issues
Subject: RE: alternate browser for Treo 700wx

 

If it downloads a .cab file, just clicking on it should launch the setup
process.

 

Cheers,

Matt

 



From: Joe Heaton [mailto:[EMAIL PROTECTED] 
Sent: 21 October 2008 15:36
To: NT System Admin Issues
Subject: alternate browser for Treo 700wx

Anyone know how to install an alternate browser on this phone?  It's
running WM5.  I've tried installing Opera, following their directions,
and it downloads a file, but never installs it.

 

Joe Heaton

AISA

Employment Training Panel

1100 J Street, 4th Floor

Sacramento, CA  95814

(916) 327-5276

[EMAIL PROTECTED]

 

 

 

 

The information contained in this E-Mail and any subsequent 
correspondence is private and is intended solely for the intended 
recipient(s).  The information in this communication may be 
confidential and/or legally privileged.  Nothing in this e-mail is 
intended to conclude a contract on behalf of QinetiQ or make QinetiQ 
subject to any other legally binding commitments, unless the e-mail 
contains an express statement to the contrary or incorporates a formal
Purchase Order.

For those other than the recipient any disclosure, copying, 
distribution, or any action taken or omitted to be taken in reliance 
on such information is prohibited and may be unlawful.

Emails and other electronic communication with QinetiQ may be 
monitored and recorded for business purposes including security, audit 
and archival purposes.  Any response to this email indicates consent 
to this.

Telephone calls to QinetiQ may be monitored or recorded for quality 
control, security and other business purposes.

QinetiQ Limited
Registered in England  Wales: Company Number:3796233
Registered office: 85 Buckingham Gate, London SW1E 6PD, United Kingdom
Trading address: Cody Technology Park, Cody Building, Ively Road,
Farnborough, Hampshire, GU14 0LX, United Kingdom 
http://www.qinetiq.com/home/notices/legal.html

 

 

 


 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: DNS Reverse lookup question

2008-10-21 Thread Michael B. Smith
You can use a stub domain or a forwarding domain.

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

Link with me at: http://www.linkedin.com/in/theessentialexchange

 

From: Webb, Brian (Corp) [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 12:47 PM
To: NT System Admin Issues
Subject: DNS Reverse lookup question

 

Here is the situation:

1 IP range has servers from 2 different domains 

 

DNS servers (AD integrated) for each domain have entries for the servers in
that domain

 

If I do a reverse lookup from a machine that is pointed to the right DNS
server it works, otherwise I get a non-existent domain.  Hw do you solve
this?  Do you manually put in PTR records for all the servers in the
opposite domain?

 

Example:

Server1.corp.local is at 10.1.1.10

 

Server2.division.local is at 10.1.1.20

 

Client1.corp.local is at 10.100.100.100 with DNS server pointed to
DNSserver.corp.local

Client2.division.local is at 10.200.200.200 with DNS server pointed to
DNSserver.division.local

 

nslookup from client1 for 10.1.1.10 returns Server1

nslookup from client1 for 10.1.1.20 returns non-existent domain

 

nslookup from Client2 for 10.1.1.10 returns non-existent domain

nslookup from Client2 for 10.1.1.20 returns Server2

 

nslookup by name (forward lookup) works everywhere.

 

Brian Webb - MCSE
TDS Corporate IS, Windows Server Platform Team
Senior Systems Administrator

When stuck on a problem as often can be, try to remember G.B.T.T.D. (Go
Back To The Definition). - Dave Seybold

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: alternate browser for Treo 700wx

2008-10-21 Thread Micheal Espinola Jr
As a Skyfire user - I don't like it.  Browsing a page takes too long.
Its potentially useful to have installed if you have the need to see
the web page as it would look in a regular browser - but on a mobile
device, we just don't have the consistent network speeds to make it a
viable alternative to mobilized content.

Yep, even over a very good connection with HSDPA its pushing its luck.
And how consistently do you get that?

Is it my phone (an ATT Tilt, running WM6.1) ?  Maybe.  I wouldnt
discount anything at this point.


On Tue, Oct 21, 2008 at 12:47 PM, Sam Cayze [EMAIL PROTECTED] wrote:
 It must not recognize your phone's browser string.

 PS - take a look at this browser for WinMob.  It does Flash, Ajax, etc.
 Think: Youtube, Google Maps, etc.


 http://www.engadget.com/2008/01/28/skyfire-browser-for-windows-mobile-is-game-changing-does-flash/

 http://www.skyfire.com/product




 
 From: Joe Heaton [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, October 21, 2008 10:43 AM
 To: NT System Admin Issues
 Subject: RE: alternate browser for Treo 700wx

 Running the process through the current browser on the phone downloaded a
 .jad file.  Downloading the mobile browser on my desktop downloaded a cab
 file.  If I copy the cab file to the phone, I should be able to run it from
 there?



 Joe Heaton

 Employment Training Panel



 From: Ames Matthew B [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, October 21, 2008 7:46 AM
 To: NT System Admin Issues
 Subject: RE: alternate browser for Treo 700wx



 If it downloads a .cab file, just clicking on it should launch the setup
 process.



 Cheers,

 Matt



 

 From: Joe Heaton [mailto:[EMAIL PROTECTED]
 Sent: 21 October 2008 15:36
 To: NT System Admin Issues
 Subject: alternate browser for Treo 700wx

 Anyone know how to install an alternate browser on this phone?  It's running
 WM5.  I've tried installing Opera, following their directions, and it
 downloads a file, but never installs it.



 Joe Heaton

 AISA

 Employment Training Panel

 1100 J Street, 4th Floor

 Sacramento, CA  95814

 (916) 327-5276

 [EMAIL PROTECTED]









 The information contained in this E-Mail and any subsequent
 correspondence is private and is intended solely for the intended
 recipient(s).  The information in this communication may be
 confidential and/or legally privileged.  Nothing in this e-mail is
 intended to conclude a contract on behalf of QinetiQ or make QinetiQ
 subject to any other legally binding commitments, unless the e-mail
 contains an express statement to the contrary or incorporates a formal
 Purchase Order.

 For those other than the recipient any disclosure, copying,
 distribution, or any action taken or omitted to be taken in reliance
 on such information is prohibited and may be unlawful.

 Emails and other electronic communication with QinetiQ may be
 monitored and recorded for business purposes including security, audit
 and archival purposes.  Any response to this email indicates consent
 to this.

 Telephone calls to QinetiQ may be monitored or recorded for quality
 control, security and other business purposes.

 QinetiQ Limited
 Registered in England  Wales: Company Number:3796233
 Registered office: 85 Buckingham Gate, London SW1E 6PD, United Kingdom
 Trading address: Cody Technology Park, Cody Building, Ively Road,
 Farnborough, Hampshire, GU14 0LX, United Kingdom
 http://www.qinetiq.com/home/notices/legal.html


















-- 
ME2

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: alternate browser for Treo 700wx

2008-10-21 Thread Sam Cayze
Good to know.  I actually just heard about it 4 days ago...  I tried it
out, looks promising.  But I will agree, it takes too long to navigate
my 2 or 3 favorite pages that I actually view on my mobile.  I just
figured I need to learn the program more.

I think I will keep it installed though to access those flash pages from
time to time though.

I have a Treo 800w, it's lightning fast on that.  YouTube never even had
to buffer.



-Original Message-
From: Micheal Espinola Jr [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 12:02 PM
To: NT System Admin Issues
Subject: Re: alternate browser for Treo 700wx

As a Skyfire user - I don't like it.  Browsing a page takes too long.
Its potentially useful to have installed if you have the need to see the
web page as it would look in a regular browser - but on a mobile device,
we just don't have the consistent network speeds to make it a viable
alternative to mobilized content.

Yep, even over a very good connection with HSDPA its pushing its luck.
And how consistently do you get that?

Is it my phone (an ATT Tilt, running WM6.1) ?  Maybe.  I wouldnt
discount anything at this point.


On Tue, Oct 21, 2008 at 12:47 PM, Sam Cayze [EMAIL PROTECTED]
wrote:
 It must not recognize your phone's browser string.

 PS - take a look at this browser for WinMob.  It does Flash, Ajax,
etc.
 Think: Youtube, Google Maps, etc.


 http://www.engadget.com/2008/01/28/skyfire-browser-for-windows-mobile-
 is-game-changing-does-flash/

 http://www.skyfire.com/product




 
 From: Joe Heaton [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, October 21, 2008 10:43 AM
 To: NT System Admin Issues
 Subject: RE: alternate browser for Treo 700wx

 Running the process through the current browser on the phone 
 downloaded a .jad file.  Downloading the mobile browser on my desktop 
 downloaded a cab file.  If I copy the cab file to the phone, I should 
 be able to run it from there?



 Joe Heaton

 Employment Training Panel



 From: Ames Matthew B [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, October 21, 2008 7:46 AM
 To: NT System Admin Issues
 Subject: RE: alternate browser for Treo 700wx



 If it downloads a .cab file, just clicking on it should launch the 
 setup process.



 Cheers,

 Matt



 

 From: Joe Heaton [mailto:[EMAIL PROTECTED]
 Sent: 21 October 2008 15:36
 To: NT System Admin Issues
 Subject: alternate browser for Treo 700wx

 Anyone know how to install an alternate browser on this phone?  It's 
 running WM5.  I've tried installing Opera, following their directions,

 and it downloads a file, but never installs it.



 Joe Heaton

 AISA

 Employment Training Panel

 1100 J Street, 4th Floor

 Sacramento, CA  95814

 (916) 327-5276

 [EMAIL PROTECTED]









 The information contained in this E-Mail and any subsequent 
 correspondence is private and is intended solely for the intended 
 recipient(s).  The information in this communication may be 
 confidential and/or legally privileged.  Nothing in this e-mail is 
 intended to conclude a contract on behalf of QinetiQ or make QinetiQ 
 subject to any other legally binding commitments, unless the e-mail 
 contains an express statement to the contrary or incorporates a formal

 Purchase Order.

 For those other than the recipient any disclosure, copying, 
 distribution, or any action taken or omitted to be taken in reliance 
 on such information is prohibited and may be unlawful.

 Emails and other electronic communication with QinetiQ may be 
 monitored and recorded for business purposes including security, audit

 and archival purposes.  Any response to this email indicates consent 
 to this.

 Telephone calls to QinetiQ may be monitored or recorded for quality 
 control, security and other business purposes.

 QinetiQ Limited
 Registered in England  Wales: Company Number:3796233 Registered 
 office: 85 Buckingham Gate, London SW1E 6PD, United Kingdom Trading 
 address: Cody Technology Park, Cody Building, Ively Road, Farnborough,

 Hampshire, GU14 0LX, United Kingdom 
 http://www.qinetiq.com/home/notices/legal.html


















--
ME2

~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


Re: alternate browser for Treo 700wx

2008-10-21 Thread Micheal Espinola Jr
Ditto and ditto.  I otherwise think its got a lot of potential.

On Tue, Oct 21, 2008 at 1:13 PM, Sam Cayze [EMAIL PROTECTED] wrote:
 Good to know.  I actually just heard about it 4 days ago...  I tried it
 out, looks promising.  But I will agree, it takes too long to navigate
 my 2 or 3 favorite pages that I actually view on my mobile.  I just
 figured I need to learn the program more.

 I think I will keep it installed though to access those flash pages from
 time to time though.

 I have a Treo 800w, it's lightning fast on that.  YouTube never even had
 to buffer.



 -Original Message-
 From: Micheal Espinola Jr [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, October 21, 2008 12:02 PM
 To: NT System Admin Issues
 Subject: Re: alternate browser for Treo 700wx

 As a Skyfire user - I don't like it.  Browsing a page takes too long.
 Its potentially useful to have installed if you have the need to see the
 web page as it would look in a regular browser - but on a mobile device,
 we just don't have the consistent network speeds to make it a viable
 alternative to mobilized content.

 Yep, even over a very good connection with HSDPA its pushing its luck.
 And how consistently do you get that?

 Is it my phone (an ATT Tilt, running WM6.1) ?  Maybe.  I wouldnt
 discount anything at this point.


 On Tue, Oct 21, 2008 at 12:47 PM, Sam Cayze [EMAIL PROTECTED]
 wrote:
 It must not recognize your phone's browser string.

 PS - take a look at this browser for WinMob.  It does Flash, Ajax,
 etc.
 Think: Youtube, Google Maps, etc.


 http://www.engadget.com/2008/01/28/skyfire-browser-for-windows-mobile-
 is-game-changing-does-flash/

 http://www.skyfire.com/product




 
 From: Joe Heaton [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, October 21, 2008 10:43 AM
 To: NT System Admin Issues
 Subject: RE: alternate browser for Treo 700wx

 Running the process through the current browser on the phone
 downloaded a .jad file.  Downloading the mobile browser on my desktop
 downloaded a cab file.  If I copy the cab file to the phone, I should
 be able to run it from there?



 Joe Heaton

 Employment Training Panel



 From: Ames Matthew B [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, October 21, 2008 7:46 AM
 To: NT System Admin Issues
 Subject: RE: alternate browser for Treo 700wx



 If it downloads a .cab file, just clicking on it should launch the
 setup process.



 Cheers,

 Matt



 

 From: Joe Heaton [mailto:[EMAIL PROTECTED]
 Sent: 21 October 2008 15:36
 To: NT System Admin Issues
 Subject: alternate browser for Treo 700wx

 Anyone know how to install an alternate browser on this phone?  It's
 running WM5.  I've tried installing Opera, following their directions,

 and it downloads a file, but never installs it.



 Joe Heaton

 AISA

 Employment Training Panel

 1100 J Street, 4th Floor

 Sacramento, CA  95814

 (916) 327-5276

 [EMAIL PROTECTED]









 The information contained in this E-Mail and any subsequent
 correspondence is private and is intended solely for the intended
 recipient(s).  The information in this communication may be
 confidential and/or legally privileged.  Nothing in this e-mail is
 intended to conclude a contract on behalf of QinetiQ or make QinetiQ
 subject to any other legally binding commitments, unless the e-mail
 contains an express statement to the contrary or incorporates a formal

 Purchase Order.

 For those other than the recipient any disclosure, copying,
 distribution, or any action taken or omitted to be taken in reliance
 on such information is prohibited and may be unlawful.

 Emails and other electronic communication with QinetiQ may be
 monitored and recorded for business purposes including security, audit

 and archival purposes.  Any response to this email indicates consent
 to this.

 Telephone calls to QinetiQ may be monitored or recorded for quality
 control, security and other business purposes.

 QinetiQ Limited
 Registered in England  Wales: Company Number:3796233 Registered
 office: 85 Buckingham Gate, London SW1E 6PD, United Kingdom Trading
 address: Cody Technology Park, Cody Building, Ively Road, Farnborough,

 Hampshire, GU14 0LX, United Kingdom
 http://www.qinetiq.com/home/notices/legal.html


















 --
 ME2

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
 http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
 ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~





-- 
ME2

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: DNS Reverse lookup question

2008-10-21 Thread Webb, Brian (Corp)
The problem is the subnet already exists in both domains...
 
-Brian

 



From: Michael B. Smith [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 11:49 AM
To: NT System Admin Issues
Subject: RE: DNS Reverse lookup question



You can use a stub domain or a forwarding domain.

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

Link with me at: http://www.linkedin.com/in/theessentialexchange

 

From: Webb, Brian (Corp) [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 12:47 PM
To: NT System Admin Issues
Subject: DNS Reverse lookup question

 

Here is the situation:

1 IP range has servers from 2 different domains 

 

DNS servers (AD integrated) for each domain have entries for the servers
in that domain

 

If I do a reverse lookup from a machine that is pointed to the right
DNS server it works, otherwise I get a non-existent domain.  Hw do you
solve this?  Do you manually put in PTR records for all the servers in
the opposite domain?

 

Example:

Server1.corp.local is at 10.1.1.10

 

Server2.division.local is at 10.1.1.20

 

Client1.corp.local is at 10.100.100.100 with DNS server pointed to
DNSserver.corp.local

Client2.division.local is at 10.200.200.200 with DNS server pointed to
DNSserver.division.local

 

nslookup from client1 for 10.1.1.10 returns Server1

nslookup from client1 for 10.1.1.20 returns non-existent domain

 

nslookup from Client2 for 10.1.1.10 returns non-existent domain

nslookup from Client2 for 10.1.1.20 returns Server2

 

nslookup by name (forward lookup) works everywhere.

 

Brian Webb - MCSE
TDS Corporate IS, Windows Server Platform Team
Senior Systems Administrator

When stuck on a problem as often can be, try to remember G.B.T.T.D. (Go
Back To The Definition). - Dave Seybold

 

 

 

 


 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: WSUS Updates

2008-10-21 Thread Miller Bonnie L .
Hit regedit on the client and confirm all policies are applying as expected-

HKLM\SOFTWARE\Policies\Microsoft\Windows\Windowsupdate

If everything under that looks right, you might reset the local update cache.

net stop wuauserv
Delete everything under %systemroot%\softwaredistribution
Net start wuauserv

Then run Wuauclt /detectnow to force a detection cycle.



From: Joseph L. Casale [mailto:[EMAIL PROTECTED]
Sent: Friday, October 17, 2008 9:12 AM
To: NT System Admin Issues
Subject: RE: WSUS Updates

Yea, the updates apply to the group in question. They are set to Install

Thanks!
jlc

From: Eric Wittersheim [mailto:[EMAIL PROTECTED]
Sent: Friday, October 17, 2008 10:03 AM
To: NT System Admin Issues
Subject: Re: WSUS Updates

Jlc,

Check the group membership of the computer in question.  The computer will show 
that the updates are needed even if the updates are not approved for the group 
the computer is in.

Eric
On Fri, Oct 17, 2008 at 10:57 AM, Joseph L. Casale [EMAIL 
PROTECTED]mailto:[EMAIL PROTECTED] wrote:

Bonnie,
So in the windowsupdate.log I see:

Found 0 updates and 41 categories in search; evaluated appl. rules of 553 out 
of 797 deployed entities

But the report in the WSUS server shows it needs 6?

Any ideas?
Thanks!
jlc



From: Miller Bonnie L. [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: Thursday, October 16, 2008 12:59 PM
To: NT System Admin Issues
Subject: RE: WSUS Updates



The only setting I see that I have different, and might cause what you are 
seeing, is the:



No auto-restart with logged on users for scheduled automatic updates 
installations Enabled





Ours is set to disabled.  If a user has logged on when the re-scheduled 
installation starts, setting it to enabled will prevent the automatic reboot.  
If that doesn't quite sound like what you are seeing, start digging in logs.  
Some things you might check:



Run gpresult on a machine you think should have updates and confirm the policy 
is applying correctly according to AD.

Client machine event logs

WSUS Server event logs

WSUS server IIS logs (check for client connections)

Clients' Windowsupdate.log files

Reports on those updates in WSUS console



-Bonnie



From: Joseph L. Casale [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: Thursday, October 16, 2008 10:08 AM
To: NT System Admin Issues
Subject: RE: WSUS Updates



Sorry for the delay, just wanted to see what happens after a small tweak.

Everything is missing ~6 office updates that are set to install and some recent 
OS updates?

Here is what I have:



Allow Automatic Updates immediate installation Enabled

Allow non-administrators to receive update notifications Enabled

Allow signed content from intranet Microsoft update service location Enabled

Automatic Updates detection Frequency Enabled

Check For updates at the Following

interval (hours): 6

Configure Automatic Updates Enabled

Configure automatic updating: 4 - Auto download and schedule 
the install

The following settings are only required and applicable if 4 is 
selected.

Scheduled install day: 0 - Every day

Scheduled install time: 11:00

Do not adjust default option to 'Install Updates and Shut Down' in Shut Down 
Windows dialog box Disabled

Do not display 'Install Updates and Shut Down' option in Shut Down Windows 
dialog box Disabled

Enable client-side targeting Enabled

Target group name For this computer Desktops

Enable recommended updates via Automatic Updates Enabled

Enabling Windows Update Power Management to automatically wake up the system to 
install scheduled updates Enabled

No auto-restart with logged on users for scheduled automatic updates 
installations Enabled

Reschedule Automatic Updates scheduled installations Enabled

Wait after system

startup (minutes): 1

Specify intranet Microsoft update service location Enabled

Set the intranet update service for detecting updates: 
http://server.domain.com:8530

Set the intranet statistics server: 
http://server.domain.com:8530





Thanks!
jlc



From: Miller Bonnie L. [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: Wednesday, October 15, 2008 12:32 PM
To: NT System Admin Issues
Subject: RE: WSUS Updates



Non-admin notification shouldn't affect delayed update installation.  In fact, 
we like to keep that disabled as I've found that if a non-admin can see the 
notification, they can also hide the updates by unchecking the boxes next to 
them.



Can you list out which options you've set in the policy?  I *think* what you 
said is that you have Reschedule automatic updates... enabled, with a wait 
time of 1.  This works in conjunction with configure automatic updates 
enabled set to 4, with a scheduled installation time.

If that is all set correctly, confirm that the workstations are getting the 
policy applied 

Any SCOM users?

2008-10-21 Thread David Lum
I have a Q about it can we write a custom .Net application and have its log 
file monitored by SCOM? If so, what kind of format does the log need to be in?

David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: WSUS Updates

2008-10-21 Thread Joseph L. Casale
I was hoping you would let me pretend this thread never existed :)
I found the issue, the WSUS service was stopped :)

The only notice to this was accidentally hitting the homepage on the MMC snapin 
and seeing the warning!

Sigh... Thanks for everything!

jlc

From: Miller Bonnie L. [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 11:32 AM
To: NT System Admin Issues
Subject: RE: WSUS Updates

Hit regedit on the client and confirm all policies are applying as expected-

HKLM\SOFTWARE\Policies\Microsoft\Windows\Windowsupdate

If everything under that looks right, you might reset the local update cache.

net stop wuauserv
Delete everything under %systemroot%\softwaredistribution
Net start wuauserv

Then run Wuauclt /detectnow to force a detection cycle.



From: Joseph L. Casale [mailto:[EMAIL PROTECTED]
Sent: Friday, October 17, 2008 9:12 AM
To: NT System Admin Issues
Subject: RE: WSUS Updates

Yea, the updates apply to the group in question. They are set to Install

Thanks!
jlc

From: Eric Wittersheim [mailto:[EMAIL PROTECTED]
Sent: Friday, October 17, 2008 10:03 AM
To: NT System Admin Issues
Subject: Re: WSUS Updates

Jlc,

Check the group membership of the computer in question.  The computer will show 
that the updates are needed even if the updates are not approved for the group 
the computer is in.

Eric
On Fri, Oct 17, 2008 at 10:57 AM, Joseph L. Casale [EMAIL 
PROTECTED]mailto:[EMAIL PROTECTED] wrote:

Bonnie,
So in the windowsupdate.log I see:

Found 0 updates and 41 categories in search; evaluated appl. rules of 553 out 
of 797 deployed entities

But the report in the WSUS server shows it needs 6?

Any ideas?
Thanks!
jlc



From: Miller Bonnie L. [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: Thursday, October 16, 2008 12:59 PM
To: NT System Admin Issues
Subject: RE: WSUS Updates



The only setting I see that I have different, and might cause what you are 
seeing, is the:



No auto-restart with logged on users for scheduled automatic updates 
installations Enabled





Ours is set to disabled.  If a user has logged on when the re-scheduled 
installation starts, setting it to enabled will prevent the automatic reboot.  
If that doesn't quite sound like what you are seeing, start digging in logs.  
Some things you might check:



Run gpresult on a machine you think should have updates and confirm the policy 
is applying correctly according to AD.

Client machine event logs

WSUS Server event logs

WSUS server IIS logs (check for client connections)

Clients' Windowsupdate.log files

Reports on those updates in WSUS console



-Bonnie



From: Joseph L. Casale [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: Thursday, October 16, 2008 10:08 AM
To: NT System Admin Issues
Subject: RE: WSUS Updates



Sorry for the delay, just wanted to see what happens after a small tweak.

Everything is missing ~6 office updates that are set to install and some recent 
OS updates?

Here is what I have:



Allow Automatic Updates immediate installation Enabled

Allow non-administrators to receive update notifications Enabled

Allow signed content from intranet Microsoft update service location Enabled

Automatic Updates detection Frequency Enabled

Check For updates at the Following

interval (hours): 6

Configure Automatic Updates Enabled

Configure automatic updating: 4 - Auto download and schedule 
the install

The following settings are only required and applicable if 4 is 
selected.

Scheduled install day: 0 - Every day

Scheduled install time: 11:00

Do not adjust default option to 'Install Updates and Shut Down' in Shut Down 
Windows dialog box Disabled

Do not display 'Install Updates and Shut Down' option in Shut Down Windows 
dialog box Disabled

Enable client-side targeting Enabled

Target group name For this computer Desktops

Enable recommended updates via Automatic Updates Enabled

Enabling Windows Update Power Management to automatically wake up the system to 
install scheduled updates Enabled

No auto-restart with logged on users for scheduled automatic updates 
installations Enabled

Reschedule Automatic Updates scheduled installations Enabled

Wait after system

startup (minutes): 1

Specify intranet Microsoft update service location Enabled

Set the intranet update service for detecting updates: 
http://server.domain.com:8530

Set the intranet statistics server: 
http://server.domain.com:8530





Thanks!
jlc



From: Miller Bonnie L. [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: Wednesday, October 15, 2008 12:32 PM
To: NT System Admin Issues
Subject: RE: WSUS Updates



Non-admin notification shouldn't affect delayed update installation.  In fact, 
we like to keep that disabled as I've found that if a non-admin can see the 
notification, they can also hide the updates by unchecking the 

RE: Enumerate GUIDs for all comps in an OU

2008-10-21 Thread Joseph L. Casale
Hey Michael,
Am I missing something here? I thought machine's deployed via WDS/RIS used the 
GUID as reported by the wkst?
During the post I can see them and they are very different from the guid's 
enumerated by adfind. I have not blacklisted any guids yet, and none of them 
correspond to the mac address that I can visual see which would be a result. 
The deployments were CD based, not image based.

Any ideas?

Thanks!
jlc

From: Michael B. Smith [mailto:[EMAIL PROTECTED]
Sent: Wednesday, October 15, 2008 4:32 PM
To: NT System Admin Issues
Subject: RE: Enumerate GUIDs for all comps in an OU

Adfind -default -b ou=ouname -f name=* objectGuid

?

If you actually want vbscript for it, I can hunt it down. But it's a LOT more 
lines.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange

From: Joseph L. Casale [mailto:[EMAIL PROTECTED]
Sent: Wednesday, October 15, 2008 6:23 PM
To: NT System Admin Issues
Subject: Enumerate GUIDs for all comps in an OU

Anyone know a query I can do through vb for this?

Thanks!
jlc











~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Stopping users emailing out internal docs

2008-10-21 Thread Oliver Marshall
Hi chaps,

 

We've had a case this week of a client who found out a user, who is in
the process of being let go, had emailed out to their personal gmail
account a copy of all the internal documents, logos, process diagrams,
etc. The user is now undergoing disciplinary action and facing possible
legal action. 

 

However, while it's almost impossible to prevent a user from emailing a
document out if they really want to, companies are obliged to have a
policy in place requiring them not to doing so, and here in the UK that
policy has to be seen to be implemented and enforced if it is to be
referred to in any action. 

 

We've suggested a proper compliance level archival service in order to
allow for emails to be restored even when users delete emails from their
machines (and their recoverable deleted items in this case). Elsewhere
we have used similar services to also report on certain file types, file
names and sizes of files being sent, and use them to bounce emails under
certain conditions. Bouncing certain emails, while a very limited
short-stick, does allow for the policy to be seen to be in place if
people are as silly as to send out documents with certain names etc
(like Accounts2008.xls etc). 

 

What do other companies do to help either prevent people sending docs
out, or to cover themselves legally should they have to take action
against a user for doing so, or to highlight when a user is doing so?

 

Olly

 

--

G2 Support

Network Support : Online Backups : Server Management

 

Email:  [EMAIL PROTECTED]
mailto:[EMAIL PROTECTED] 

Web:http://www.g2support.com http://www.g2support.com/ 

 

 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Stopping users emailing out internal docs

2008-10-21 Thread Eric Woodford
At a former employer, they had attachments delayed with suspicious titles
for a number of hours (especially anything dealing with their pending
merger)This allowed the admins to review the quarantined email before it was
sent.

This was done on the Anti-spam solution..

On Tue, Oct 21, 2008 at 11:00 AM, Oliver Marshall 
[EMAIL PROTECTED] wrote:

  Hi chaps,



 We've had a case this week of a client who found out a user, who is in the
 process of being let go, had emailed out to their personal gmail account a
 copy of all the internal documents, logos, process diagrams, etc. The user
 is now undergoing disciplinary action and facing possible legal action.



 However, while it's almost impossible to prevent a user from emailing a
 document out if they really want to, companies are obliged to have a policy
 in place requiring them not to doing so, and here in the UK that policy has
 to be seen to be implemented and enforced if it is to be referred to in any
 action.



 We've suggested a proper compliance level archival service in order to
 allow for emails to be restored even when users delete emails from their
 machines (and their recoverable deleted items in this case). Elsewhere we
 have used similar services to also report on certain file types, file names
 and sizes of files being sent, and use them to bounce emails under certain
 conditions. Bouncing certain emails, while a very limited short-stick, does
 allow for the policy to be seen to be in place if people are as silly as to
 send out documents with certain names etc (like Accounts2008.xls etc).



 What do other companies do to help either prevent people sending docs out,
 or to cover themselves legally should they have to take action against a
 user for doing so, or to highlight when a user is doing so?



 Olly



 --

 G2 Support

 Network Support : Online Backups : Server Management



 Email:  [EMAIL PROTECTED]

 Web:http://www.g2support.com













~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Stopping users emailing out internal docs

2008-10-21 Thread David Lum
I seem to think InfoPath or Groove or some other MS tool can do this kind of 
job - you can select an e-mail and effectively make it unforwardable, it was 
pretty slick...now if I could only remember what product it was...
David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764
From: Oliver Marshall [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 11:00 AM
To: NT System Admin Issues
Subject: Stopping users emailing out internal docs

Hi chaps,

We've had a case this week of a client who found out a user, who is in the 
process of being let go, had emailed out to their personal gmail account a copy 
of all the internal documents, logos, process diagrams, etc. The user is now 
undergoing disciplinary action and facing possible legal action.

However, while it's almost impossible to prevent a user from emailing a 
document out if they really want to, companies are obliged to have a policy in 
place requiring them not to doing so, and here in the UK that policy has to be 
seen to be implemented and enforced if it is to be referred to in any action.

We've suggested a proper compliance level archival service in order to allow 
for emails to be restored even when users delete emails from their machines 
(and their recoverable deleted items in this case). Elsewhere we have used 
similar services to also report on certain file types, file names and sizes of 
files being sent, and use them to bounce emails under certain conditions. 
Bouncing certain emails, while a very limited short-stick, does allow for the 
policy to be seen to be in place if people are as silly as to send out 
documents with certain names etc (like Accounts2008.xls etc).

What do other companies do to help either prevent people sending docs out, or 
to cover themselves legally should they have to take action against a user for 
doing so, or to highlight when a user is doing so?

Olly

--
G2 Support
Network Support : Online Backups : Server Management

Email:  [EMAIL PROTECTED]mailto:[EMAIL PROTECTED]
Web:http://www.g2support.comhttp://www.g2support.com/









~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Assign a password to all Blackberry devices?

2008-10-21 Thread David Mazzaccaro

Does anyone know if it is possible to assign a single password to all
Blackberry devices on a BES (Blackberry Enterprise Server)?

I would like to force all devices to have the same password and have all
devices lock after 1 hour of inactivity.



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Stopping users emailing out internal docs

2008-10-21 Thread Oliver Marshall
Remember remember.

 

From: David Lum [mailto:[EMAIL PROTECTED] 
Sent: 21 October 2008 19:43
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

 

I seem to think InfoPath or Groove or some other MS tool can do this
kind of job - you can select an e-mail and effectively make it
unforwardable, it was pretty slick...now if I could only remember what
product it was...

David Lum // SYSTEMS ENGINEER 
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764

From: Oliver Marshall [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 11:00 AM
To: NT System Admin Issues
Subject: Stopping users emailing out internal docs

 

Hi chaps,

 

We've had a case this week of a client who found out a user, who is in
the process of being let go, had emailed out to their personal gmail
account a copy of all the internal documents, logos, process diagrams,
etc. The user is now undergoing disciplinary action and facing possible
legal action. 

 

However, while it's almost impossible to prevent a user from emailing a
document out if they really want to, companies are obliged to have a
policy in place requiring them not to doing so, and here in the UK that
policy has to be seen to be implemented and enforced if it is to be
referred to in any action. 

 

We've suggested a proper compliance level archival service in order to
allow for emails to be restored even when users delete emails from their
machines (and their recoverable deleted items in this case). Elsewhere
we have used similar services to also report on certain file types, file
names and sizes of files being sent, and use them to bounce emails under
certain conditions. Bouncing certain emails, while a very limited
short-stick, does allow for the policy to be seen to be in place if
people are as silly as to send out documents with certain names etc
(like Accounts2008.xls etc). 

 

What do other companies do to help either prevent people sending docs
out, or to cover themselves legally should they have to take action
against a user for doing so, or to highlight when a user is doing so?

 

Olly

 

--

G2 Support

Network Support : Online Backups : Server Management

 

Email:  [EMAIL PROTECTED]

Web:http://www.g2support.com http://www.g2support.com/ 

 

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Stopping users emailing out internal docs

2008-10-21 Thread Kennedy, Jim
Microsoft's Rights Management can do much of what you seek. Although it isn't 
perfect and can be beat it should get you to be able to say you tried really 
hard to the lawyers.


From: Oliver Marshall [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 2:59 PM
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

Remember remember.

From: David Lum [mailto:[EMAIL PROTECTED]
Sent: 21 October 2008 19:43
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

I seem to think InfoPath or Groove or some other MS tool can do this kind of 
job - you can select an e-mail and effectively make it unforwardable, it was 
pretty slick...now if I could only remember what product it was...
David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764
From: Oliver Marshall [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 11:00 AM
To: NT System Admin Issues
Subject: Stopping users emailing out internal docs

Hi chaps,

We've had a case this week of a client who found out a user, who is in the 
process of being let go, had emailed out to their personal gmail account a copy 
of all the internal documents, logos, process diagrams, etc. The user is now 
undergoing disciplinary action and facing possible legal action.

However, while it's almost impossible to prevent a user from emailing a 
document out if they really want to, companies are obliged to have a policy in 
place requiring them not to doing so, and here in the UK that policy has to be 
seen to be implemented and enforced if it is to be referred to in any action.

We've suggested a proper compliance level archival service in order to allow 
for emails to be restored even when users delete emails from their machines 
(and their recoverable deleted items in this case). Elsewhere we have used 
similar services to also report on certain file types, file names and sizes of 
files being sent, and use them to bounce emails under certain conditions. 
Bouncing certain emails, while a very limited short-stick, does allow for the 
policy to be seen to be in place if people are as silly as to send out 
documents with certain names etc (like Accounts2008.xls etc).

What do other companies do to help either prevent people sending docs out, or 
to cover themselves legally should they have to take action against a user for 
doing so, or to highlight when a user is doing so?

Olly

--
G2 Support
Network Support : Online Backups : Server Management

Email:  [EMAIL PROTECTED]mailto:[EMAIL PROTECTED]
Web:http://www.g2support.comhttp://www.g2support.com/



















~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Stopping users emailing out internal docs

2008-10-21 Thread Art DeKneef
Windows Rights Management I believe is what you are looking for.

 

From: Oliver Marshall [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 11:59 AM
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

 

Remember remember.

 

From: David Lum [mailto:[EMAIL PROTECTED] 
Sent: 21 October 2008 19:43
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

 

I seem to think InfoPath or Groove or some other MS tool can do this kind of
job - you can select an e-mail and effectively make it unforwardable, it
was pretty slick.now if I could only remember what product it was.

David Lum // SYSTEMS ENGINEER 
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764

From: Oliver Marshall [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 11:00 AM
To: NT System Admin Issues
Subject: Stopping users emailing out internal docs

 

Hi chaps,

 

We've had a case this week of a client who found out a user, who is in the
process of being let go, had emailed out to their personal gmail account a
copy of all the internal documents, logos, process diagrams, etc. The user
is now undergoing disciplinary action and facing possible legal action. 

 

However, while it's almost impossible to prevent a user from emailing a
document out if they really want to, companies are obliged to have a policy
in place requiring them not to doing so, and here in the UK that policy has
to be seen to be implemented and enforced if it is to be referred to in any
action. 

 

We've suggested a proper compliance level archival service in order to allow
for emails to be restored even when users delete emails from their machines
(and their recoverable deleted items in this case). Elsewhere we have used
similar services to also report on certain file types, file names and sizes
of files being sent, and use them to bounce emails under certain conditions.
Bouncing certain emails, while a very limited short-stick, does allow for
the policy to be seen to be in place if people are as silly as to send out
documents with certain names etc (like Accounts2008.xls etc). 

 

What do other companies do to help either prevent people sending docs out,
or to cover themselves legally should they have to take action against a
user for doing so, or to highlight when a user is doing so?

 

Olly

 

--

G2 Support

Network Support : Online Backups : Server Management

 

Email:  [EMAIL PROTECTED]

Web:http://www.g2support.com http://www.g2support.com/ 

 

 

 

 

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Any SCOM users?

2008-10-21 Thread Michael B. Smith
Standard windows log file.

 

OpsMgr doesn't actually care about the format of the text or data, it checks
the source and eventid.

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

Link with me at: http://www.linkedin.com/in/theessentialexchange

 

From: David Lum [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 1:42 PM
To: NT System Admin Issues
Subject: Any SCOM users?

 

I have a Q about it ..can we write a custom .Net application and have its
log file monitored by SCOM? If so, what kind of format does the log need to
be in?

 

David Lum // SYSTEMS ENGINEER 
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Assign a password to all Blackberry devices?

2008-10-21 Thread David Mazzaccaro
Guess not
Hello, 

Your Service Request has been logged and the following course of action
has been provided in response to your inquiry. If you have any questions
concerning this request, please reply to this email within the next
three (3) business days.

Details:
The customer wants to know if they can set a standard password for
everyone.

Resolution:
Informed the customer that each user will need to create their own
unique password.

Regards,

BlackBerry Customer Support
1-877-255-2377 (North America Toll Free)
0808 100 7466 (Toll Free UK Only)
+44 1753 558400 (Outside UK)
1-519-888-6181 (Worldwide)
[EMAIL PROTECTED]

 




From: David Mazzaccaro [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 2:53 PM
To: NT System Admin Issues
Subject: Assign a password to all Blackberry devices?




Does anyone know if it is possible to assign a single password to all
Blackberry devices on a BES (Blackberry Enterprise Server)?

I would like to force all devices to have the same password and have all
devices lock after 1 hour of inactivity. 



 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: WSUS Updates

2008-10-21 Thread Miller Bonnie L .
LOL-no, I and I was feeling bad that I had missed catching up on mail 
yesterday.  Glad to hear it was something easy though =)

From: Joseph L. Casale [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 10:44 AM
To: NT System Admin Issues
Subject: RE: WSUS Updates

I was hoping you would let me pretend this thread never existed :)
I found the issue, the WSUS service was stopped :)

The only notice to this was accidentally hitting the homepage on the MMC snapin 
and seeing the warning!

Sigh... Thanks for everything!

jlc

From: Miller Bonnie L. [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 11:32 AM
To: NT System Admin Issues
Subject: RE: WSUS Updates

Hit regedit on the client and confirm all policies are applying as expected-

HKLM\SOFTWARE\Policies\Microsoft\Windows\Windowsupdate

If everything under that looks right, you might reset the local update cache.

net stop wuauserv
Delete everything under %systemroot%\softwaredistribution
Net start wuauserv

Then run Wuauclt /detectnow to force a detection cycle.



From: Joseph L. Casale [mailto:[EMAIL PROTECTED]
Sent: Friday, October 17, 2008 9:12 AM
To: NT System Admin Issues
Subject: RE: WSUS Updates

Yea, the updates apply to the group in question. They are set to Install

Thanks!
jlc

From: Eric Wittersheim [mailto:[EMAIL PROTECTED]
Sent: Friday, October 17, 2008 10:03 AM
To: NT System Admin Issues
Subject: Re: WSUS Updates

Jlc,

Check the group membership of the computer in question.  The computer will show 
that the updates are needed even if the updates are not approved for the group 
the computer is in.

Eric
On Fri, Oct 17, 2008 at 10:57 AM, Joseph L. Casale [EMAIL 
PROTECTED]mailto:[EMAIL PROTECTED] wrote:

Bonnie,
So in the windowsupdate.log I see:

Found 0 updates and 41 categories in search; evaluated appl. rules of 553 out 
of 797 deployed entities

But the report in the WSUS server shows it needs 6?

Any ideas?
Thanks!
jlc



From: Miller Bonnie L. [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: Thursday, October 16, 2008 12:59 PM
To: NT System Admin Issues
Subject: RE: WSUS Updates



The only setting I see that I have different, and might cause what you are 
seeing, is the:



No auto-restart with logged on users for scheduled automatic updates 
installations Enabled





Ours is set to disabled.  If a user has logged on when the re-scheduled 
installation starts, setting it to enabled will prevent the automatic reboot.  
If that doesn't quite sound like what you are seeing, start digging in logs.  
Some things you might check:



Run gpresult on a machine you think should have updates and confirm the policy 
is applying correctly according to AD.

Client machine event logs

WSUS Server event logs

WSUS server IIS logs (check for client connections)

Clients' Windowsupdate.log files

Reports on those updates in WSUS console



-Bonnie



From: Joseph L. Casale [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: Thursday, October 16, 2008 10:08 AM
To: NT System Admin Issues
Subject: RE: WSUS Updates



Sorry for the delay, just wanted to see what happens after a small tweak.

Everything is missing ~6 office updates that are set to install and some recent 
OS updates?

Here is what I have:



Allow Automatic Updates immediate installation Enabled

Allow non-administrators to receive update notifications Enabled

Allow signed content from intranet Microsoft update service location Enabled

Automatic Updates detection Frequency Enabled

Check For updates at the Following

interval (hours): 6

Configure Automatic Updates Enabled

Configure automatic updating: 4 - Auto download and schedule 
the install

The following settings are only required and applicable if 4 is 
selected.

Scheduled install day: 0 - Every day

Scheduled install time: 11:00

Do not adjust default option to 'Install Updates and Shut Down' in Shut Down 
Windows dialog box Disabled

Do not display 'Install Updates and Shut Down' option in Shut Down Windows 
dialog box Disabled

Enable client-side targeting Enabled

Target group name For this computer Desktops

Enable recommended updates via Automatic Updates Enabled

Enabling Windows Update Power Management to automatically wake up the system to 
install scheduled updates Enabled

No auto-restart with logged on users for scheduled automatic updates 
installations Enabled

Reschedule Automatic Updates scheduled installations Enabled

Wait after system

startup (minutes): 1

Specify intranet Microsoft update service location Enabled

Set the intranet update service for detecting updates: 
http://server.domain.com:8530

Set the intranet statistics server: 
http://server.domain.com:8530





Thanks!
jlc



From: Miller Bonnie L. [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: Wednesday, October 15, 2008 12:32 PM
To: 

RE: Stopping users emailing out internal docs

2008-10-21 Thread Oliver Marshall
And thats still part of Office Server isn't it ?

 

From: Kennedy, Jim [mailto:[EMAIL PROTECTED] 
Sent: 21 October 2008 20:15
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

 

Microsoft's Rights Management can do much of what you seek. Although it
isn't perfect and can be beat it should get you to be able to say you
tried really hard to the lawyers.

 

 

From: Oliver Marshall [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 2:59 PM
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

 

Remember remember.

 

From: David Lum [mailto:[EMAIL PROTECTED] 
Sent: 21 October 2008 19:43
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

 

I seem to think InfoPath or Groove or some other MS tool can do this
kind of job - you can select an e-mail and effectively make it
unforwardable, it was pretty slick...now if I could only remember what
product it was...

David Lum // SYSTEMS ENGINEER 
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764

From: Oliver Marshall [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 11:00 AM
To: NT System Admin Issues
Subject: Stopping users emailing out internal docs

 

Hi chaps,

 

We've had a case this week of a client who found out a user, who is in
the process of being let go, had emailed out to their personal gmail
account a copy of all the internal documents, logos, process diagrams,
etc. The user is now undergoing disciplinary action and facing possible
legal action. 

 

However, while it's almost impossible to prevent a user from emailing a
document out if they really want to, companies are obliged to have a
policy in place requiring them not to doing so, and here in the UK that
policy has to be seen to be implemented and enforced if it is to be
referred to in any action. 

 

We've suggested a proper compliance level archival service in order to
allow for emails to be restored even when users delete emails from their
machines (and their recoverable deleted items in this case). Elsewhere
we have used similar services to also report on certain file types, file
names and sizes of files being sent, and use them to bounce emails under
certain conditions. Bouncing certain emails, while a very limited
short-stick, does allow for the policy to be seen to be in place if
people are as silly as to send out documents with certain names etc
(like Accounts2008.xls etc). 

 

What do other companies do to help either prevent people sending docs
out, or to cover themselves legally should they have to take action
against a user for doing so, or to highlight when a user is doing so?

 

Olly

 

--

G2 Support

Network Support : Online Backups : Server Management

 

Email:  [EMAIL PROTECTED]

Web:http://www.g2support.com http://www.g2support.com/ 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: alternate browser for Treo 700wx

2008-10-21 Thread Tim Vander Kooi
I use Skyfire on my Tilt almost every weekend to keep up with sports scores and 
I like it for that. If you go to lots of different pages it can be a huge 
hassle. Then again it is only Beta 1 so far, I'm hoping it will improve. It is 
nice having both IE and Skyfire to choose from on the same device though. Opera 
is great, but they cost is prohibitive in a corporate environment.
TVK

-Original Message-
From: Micheal Espinola Jr [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 12:26 PM
To: NT System Admin Issues
Subject: Re: alternate browser for Treo 700wx

Ditto and ditto.  I otherwise think its got a lot of potential.

On Tue, Oct 21, 2008 at 1:13 PM, Sam Cayze [EMAIL PROTECTED] wrote:
 Good to know.  I actually just heard about it 4 days ago...  I tried it
 out, looks promising.  But I will agree, it takes too long to navigate
 my 2 or 3 favorite pages that I actually view on my mobile.  I just
 figured I need to learn the program more.

 I think I will keep it installed though to access those flash pages from
 time to time though.

 I have a Treo 800w, it's lightning fast on that.  YouTube never even had
 to buffer.



 -Original Message-
 From: Micheal Espinola Jr [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, October 21, 2008 12:02 PM
 To: NT System Admin Issues
 Subject: Re: alternate browser for Treo 700wx

 As a Skyfire user - I don't like it.  Browsing a page takes too long.
 Its potentially useful to have installed if you have the need to see the
 web page as it would look in a regular browser - but on a mobile device,
 we just don't have the consistent network speeds to make it a viable
 alternative to mobilized content.

 Yep, even over a very good connection with HSDPA its pushing its luck.
 And how consistently do you get that?

 Is it my phone (an ATT Tilt, running WM6.1) ?  Maybe.  I wouldnt
 discount anything at this point.


 On Tue, Oct 21, 2008 at 12:47 PM, Sam Cayze [EMAIL PROTECTED]
 wrote:
 It must not recognize your phone's browser string.

 PS - take a look at this browser for WinMob.  It does Flash, Ajax,
 etc.
 Think: Youtube, Google Maps, etc.


 http://www.engadget.com/2008/01/28/skyfire-browser-for-windows-mobile-
 is-game-changing-does-flash/

 http://www.skyfire.com/product




 
 From: Joe Heaton [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, October 21, 2008 10:43 AM
 To: NT System Admin Issues
 Subject: RE: alternate browser for Treo 700wx

 Running the process through the current browser on the phone
 downloaded a .jad file.  Downloading the mobile browser on my desktop
 downloaded a cab file.  If I copy the cab file to the phone, I should
 be able to run it from there?



 Joe Heaton

 Employment Training Panel



 From: Ames Matthew B [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, October 21, 2008 7:46 AM
 To: NT System Admin Issues
 Subject: RE: alternate browser for Treo 700wx



 If it downloads a .cab file, just clicking on it should launch the
 setup process.



 Cheers,

 Matt



 

 From: Joe Heaton [mailto:[EMAIL PROTECTED]
 Sent: 21 October 2008 15:36
 To: NT System Admin Issues
 Subject: alternate browser for Treo 700wx

 Anyone know how to install an alternate browser on this phone?  It's
 running WM5.  I've tried installing Opera, following their directions,

 and it downloads a file, but never installs it.



 Joe Heaton

 AISA

 Employment Training Panel

 1100 J Street, 4th Floor

 Sacramento, CA  95814

 (916) 327-5276

 [EMAIL PROTECTED]









 The information contained in this E-Mail and any subsequent
 correspondence is private and is intended solely for the intended
 recipient(s).  The information in this communication may be
 confidential and/or legally privileged.  Nothing in this e-mail is
 intended to conclude a contract on behalf of QinetiQ or make QinetiQ
 subject to any other legally binding commitments, unless the e-mail
 contains an express statement to the contrary or incorporates a formal

 Purchase Order.

 For those other than the recipient any disclosure, copying,
 distribution, or any action taken or omitted to be taken in reliance
 on such information is prohibited and may be unlawful.

 Emails and other electronic communication with QinetiQ may be
 monitored and recorded for business purposes including security, audit

 and archival purposes.  Any response to this email indicates consent
 to this.

 Telephone calls to QinetiQ may be monitored or recorded for quality
 control, security and other business purposes.

 QinetiQ Limited
 Registered in England  Wales: Company Number:3796233 Registered
 office: 85 Buckingham Gate, London SW1E 6PD, United Kingdom Trading
 address: Cody Technology Park, Cody Building, Ively Road, Farnborough,

 Hampshire, GU14 0LX, United Kingdom
 http://www.qinetiq.com/home/notices/legal.html


















 --
 ME2

 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
 

Export Global Address List?

2008-10-21 Thread Eric Brouwer
Good afternoon everyone,

 

We are migrating from an Exchange 5.5 server (yes, it's still running) to a
hosted IMAP solution.  Is there any way to export the GAL to populate
contacts for all employees in their new contact folders?  Does that make
sense?  Is this possible?

 

Thanks,


Eric


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Stopping users emailing out internal docs

2008-10-21 Thread David Lum
Good job guys, Information Rights Management, that's it...
http://office.microsoft.com/en-us/help/HA101029181033.aspx

Dave

From: Oliver Marshall [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 12:19 PM
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

And thats still part of Office Server isn't it ?

From: Kennedy, Jim [mailto:[EMAIL PROTECTED]
Sent: 21 October 2008 20:15
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

Microsoft's Rights Management can do much of what you seek. Although it isn't 
perfect and can be beat it should get you to be able to say you tried really 
hard to the lawyers.


From: Oliver Marshall [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 2:59 PM
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

Remember remember.

From: David Lum [mailto:[EMAIL PROTECTED]
Sent: 21 October 2008 19:43
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

I seem to think InfoPath or Groove or some other MS tool can do this kind of 
job - you can select an e-mail and effectively make it unforwardable, it was 
pretty slick...now if I could only remember what product it was...
David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764
From: Oliver Marshall [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 11:00 AM
To: NT System Admin Issues
Subject: Stopping users emailing out internal docs

Hi chaps,

We've had a case this week of a client who found out a user, who is in the 
process of being let go, had emailed out to their personal gmail account a copy 
of all the internal documents, logos, process diagrams, etc. The user is now 
undergoing disciplinary action and facing possible legal action.

However, while it's almost impossible to prevent a user from emailing a 
document out if they really want to, companies are obliged to have a policy in 
place requiring them not to doing so, and here in the UK that policy has to be 
seen to be implemented and enforced if it is to be referred to in any action.

We've suggested a proper compliance level archival service in order to allow 
for emails to be restored even when users delete emails from their machines 
(and their recoverable deleted items in this case). Elsewhere we have used 
similar services to also report on certain file types, file names and sizes of 
files being sent, and use them to bounce emails under certain conditions. 
Bouncing certain emails, while a very limited short-stick, does allow for the 
policy to be seen to be in place if people are as silly as to send out 
documents with certain names etc (like Accounts2008.xls etc).

What do other companies do to help either prevent people sending docs out, or 
to cover themselves legally should they have to take action against a user for 
doing so, or to highlight when a user is doing so?

Olly

--
G2 Support
Network Support : Online Backups : Server Management

Email:  [EMAIL PROTECTED]mailto:[EMAIL PROTECTED]
Web:http://www.g2support.comhttp://www.g2support.com/





























~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Assign a password to all Blackberry devices?

2008-10-21 Thread Steve Ens
David, Do you know how to create a password policy for the BES? You can then
set the requirement for the password, but don't think you can set the
password on each device.

On Tue, Oct 21, 2008 at 2:35 PM, David Mazzaccaro 
[EMAIL PROTECTED] wrote:

  Guess not

 Hello,

 Your Service Request has been logged and the following course of action has
 been provided in response to your inquiry. If you have any questions
 concerning this request, please reply to this email within the next three
 (3) business days.

 Details:
 The customer wants to know if they can set a standard password for
 everyone.

 Resolution:
 Informed the customer that each user will need to create their own unique
 password.

 Regards,

 BlackBerry Customer Support
 1-877-255-2377 (North America Toll Free)
 0808 100 7466 (Toll Free UK Only)
 +44 1753 558400 (Outside UK)
 1-519-888-6181 (Worldwide)
 [EMAIL PROTECTED]



  --
 *From:* David Mazzaccaro [mailto:[EMAIL PROTECTED]
 *Sent:* Tuesday, October 21, 2008 2:53 PM
 *To:* NT System Admin Issues
 *Subject:* Assign a password to all Blackberry devices?


 Does anyone know if it is possible to assign a single password to all
 Blackberry devices on a BES (Blackberry Enterprise Server)?

 I would like to force all devices to have the same password and have all
 devices lock after 1 hour of inactivity.













~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Export Global Address List?

2008-10-21 Thread Eric Brouwer
Ok, I figured out how to export the GAL entries I want.

 

Now I need to find a way to make a shared copy of all these contacts
available to everyone.  We're using a mixed bag of Outlook and Apple Mail
clients.  Any way to create global address book outside of Exchange to be
used by multiple clients?


Thanks again!

 

  _  

From: Eric Brouwer [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 4:08 PM
To: NT System Admin Issues
Subject: Export Global Address List?

 

Good afternoon everyone,

 

We are migrating from an Exchange 5.5 server (yes, it's still running) to a
hosted IMAP solution.  Is there any way to export the GAL to populate
contacts for all employees in their new contact folders?  Does that make
sense?  Is this possible?

 

Thanks,


Eric

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: AD GPO to lock screen

2008-10-21 Thread Phil Thompson
Make sure you leave the default GPO alone and create a new one putting the 
users group in the new one. Messing with the default is a slippery slope..


Phil
From: Tom Miller [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 4:11 PM
To: NT System Admin Issues
Subject: AD GPO to lock screen

Hi Folks,

I am looking for the GPO setting to lock the computer so as the user is 
required to press control-alt-delete to unlock the screen.  I see the GPO 
settings under User | Policies | Admin Templates | Control Panel | Display | 
Screen saver timeout, but this doesn't look like what I'm looking for.



Tom Miller
Engineer, Information Technology
Hampton-Newport News Community Services Board
757-788-0528


Confidentiality Notice: This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message.






~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Assign a password to all Blackberry devices?

2008-10-21 Thread David Mazzaccaro
Yes.  I also understand that you cannot prohibit the users from changing
the password on the device.
:(
 



From: Steve Ens [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 4:15 PM
To: NT System Admin Issues
Subject: Re: Assign a password to all Blackberry devices?


David, Do you know how to create a password policy for the BES? You can
then set the requirement for the password, but don't think you can set
the password on each device.


On Tue, Oct 21, 2008 at 2:35 PM, David Mazzaccaro
[EMAIL PROTECTED] wrote:


Guess not
Hello, 

Your Service Request has been logged and the following course of
action has been provided in response to your inquiry. If you have any
questions concerning this request, please reply to this email within the
next three (3) business days.

Details:
The customer wants to know if they can set a standard password
for everyone.

Resolution:
Informed the customer that each user will need to create their
own unique password.

Regards,

BlackBerry Customer Support
1-877-255-2377 (North America Toll Free)
0808 100 7466 (Toll Free UK Only)
+44 1753 558400 (Outside UK)
1-519-888-6181 (Worldwide)
[EMAIL PROTECTED]

 




From: David Mazzaccaro [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 2:53 PM
To: NT System Admin Issues
Subject: Assign a password to all Blackberry devices?




Does anyone know if it is possible to assign a single password
to all Blackberry devices on a BES (Blackberry Enterprise Server)?

I would like to force all devices to have the same password and
have all devices lock after 1 hour of inactivity. 



 



 




 



 


 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Assign a password to all Blackberry devices?

2008-10-21 Thread Steve Ens
Alas, but you can wipe the device if you can't get the password..

On Tue, Oct 21, 2008 at 3:18 PM, David Mazzaccaro 
[EMAIL PROTECTED] wrote:

  Yes.  I also understand that you cannot prohibit the users from changing
 the password on the device.
 :(


  --
 *From:* Steve Ens [mailto:[EMAIL PROTECTED]
 *Sent:* Tuesday, October 21, 2008 4:15 PM
 *To:* NT System Admin Issues
 *Subject:* Re: Assign a password to all Blackberry devices?

 David, Do you know how to create a password policy for the BES? You can
 then set the requirement for the password, but don't think you can set the
 password on each device.

 On Tue, Oct 21, 2008 at 2:35 PM, David Mazzaccaro 
 [EMAIL PROTECTED] wrote:

  Guess not

 Hello,

 Your Service Request has been logged and the following course of action
 has been provided in response to your inquiry. If you have any questions
 concerning this request, please reply to this email within the next three
 (3) business days.

 Details:
 The customer wants to know if they can set a standard password for
 everyone.

 Resolution:
 Informed the customer that each user will need to create their own unique
 password.

 Regards,

 BlackBerry Customer Support
 1-877-255-2377 (North America Toll Free)
 0808 100 7466 (Toll Free UK Only)
 +44 1753 558400 (Outside UK)
 1-519-888-6181 (Worldwide)
 [EMAIL PROTECTED]



  --
 *From:* David Mazzaccaro [mailto:[EMAIL PROTECTED]
 *Sent:* Tuesday, October 21, 2008 2:53 PM
 *To:* NT System Admin Issues
 *Subject:* Assign a password to all Blackberry devices?


 Does anyone know if it is possible to assign a single password to all
 Blackberry devices on a BES (Blackberry Enterprise Server)?

 I would like to force all devices to have the same password and have all
 devices lock after 1 hour of inactivity.























~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Stopping users emailing out internal docs

2008-10-21 Thread NTSysAdmin
Would that stop them dragging  dropping onto a usb stick?

S

From: David Lum [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 5:11 PM
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

Good job guys, Information Rights Management, that's it...
http://office.microsoft.com/en-us/help/HA101029181033.aspx

Dave

From: Oliver Marshall [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 12:19 PM
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

And thats still part of Office Server isn't it ?

From: Kennedy, Jim [mailto:[EMAIL PROTECTED]
Sent: 21 October 2008 20:15
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

Microsoft's Rights Management can do much of what you seek. Although it isn't 
perfect and can be beat it should get you to be able to say you tried really 
hard to the lawyers.


From: Oliver Marshall [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 2:59 PM
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

Remember remember.

From: David Lum [mailto:[EMAIL PROTECTED]
Sent: 21 October 2008 19:43
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

I seem to think InfoPath or Groove or some other MS tool can do this kind of 
job - you can select an e-mail and effectively make it unforwardable, it was 
pretty slick...now if I could only remember what product it was...
David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764
From: Oliver Marshall [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 11:00 AM
To: NT System Admin Issues
Subject: Stopping users emailing out internal docs

Hi chaps,

We've had a case this week of a client who found out a user, who is in the 
process of being let go, had emailed out to their personal gmail account a copy 
of all the internal documents, logos, process diagrams, etc. The user is now 
undergoing disciplinary action and facing possible legal action.

However, while it's almost impossible to prevent a user from emailing a 
document out if they really want to, companies are obliged to have a policy in 
place requiring them not to doing so, and here in the UK that policy has to be 
seen to be implemented and enforced if it is to be referred to in any action.

We've suggested a proper compliance level archival service in order to allow 
for emails to be restored even when users delete emails from their machines 
(and their recoverable deleted items in this case). Elsewhere we have used 
similar services to also report on certain file types, file names and sizes of 
files being sent, and use them to bounce emails under certain conditions. 
Bouncing certain emails, while a very limited short-stick, does allow for the 
policy to be seen to be in place if people are as silly as to send out 
documents with certain names etc (like Accounts2008.xls etc).

What do other companies do to help either prevent people sending docs out, or 
to cover themselves legally should they have to take action against a user for 
doing so, or to highlight when a user is doing so?

Olly

--
G2 Support
Network Support : Online Backups : Server Management

Email:  [EMAIL PROTECTED]mailto:[EMAIL PROTECTED]
Web:http://www.g2support.comhttp://www.g2support.com/


































~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Stopping users emailing out internal docs

2008-10-21 Thread NTSysAdmin
Only with Office 2007 though.

S

From: David Lum [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 5:11 PM
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

Good job guys, Information Rights Management, that's it...
http://office.microsoft.com/en-us/help/HA101029181033.aspx

Dave

From: Oliver Marshall [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 12:19 PM
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

And thats still part of Office Server isn't it ?

From: Kennedy, Jim [mailto:[EMAIL PROTECTED]
Sent: 21 October 2008 20:15
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

Microsoft's Rights Management can do much of what you seek. Although it isn't 
perfect and can be beat it should get you to be able to say you tried really 
hard to the lawyers.


From: Oliver Marshall [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 2:59 PM
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

Remember remember.

From: David Lum [mailto:[EMAIL PROTECTED]
Sent: 21 October 2008 19:43
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs

I seem to think InfoPath or Groove or some other MS tool can do this kind of 
job - you can select an e-mail and effectively make it unforwardable, it was 
pretty slick...now if I could only remember what product it was...
David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764
From: Oliver Marshall [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 11:00 AM
To: NT System Admin Issues
Subject: Stopping users emailing out internal docs

Hi chaps,

We've had a case this week of a client who found out a user, who is in the 
process of being let go, had emailed out to their personal gmail account a copy 
of all the internal documents, logos, process diagrams, etc. The user is now 
undergoing disciplinary action and facing possible legal action.

However, while it's almost impossible to prevent a user from emailing a 
document out if they really want to, companies are obliged to have a policy in 
place requiring them not to doing so, and here in the UK that policy has to be 
seen to be implemented and enforced if it is to be referred to in any action.

We've suggested a proper compliance level archival service in order to allow 
for emails to be restored even when users delete emails from their machines 
(and their recoverable deleted items in this case). Elsewhere we have used 
similar services to also report on certain file types, file names and sizes of 
files being sent, and use them to bounce emails under certain conditions. 
Bouncing certain emails, while a very limited short-stick, does allow for the 
policy to be seen to be in place if people are as silly as to send out 
documents with certain names etc (like Accounts2008.xls etc).

What do other companies do to help either prevent people sending docs out, or 
to cover themselves legally should they have to take action against a user for 
doing so, or to highlight when a user is doing so?

Olly

--
G2 Support
Network Support : Online Backups : Server Management

Email:  [EMAIL PROTECTED]mailto:[EMAIL PROTECTED]
Web:http://www.g2support.comhttp://www.g2support.com/


































~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: Stopping users emailing out internal docs

2008-10-21 Thread Micheal Espinola Jr
Absolutely not.

On Tue, Oct 21, 2008 at 4:28 PM, NTSysAdmin [EMAIL PROTECTED] wrote:
 Would that stop them dragging  dropping onto a usb stick?



 S



 From: David Lum [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, October 21, 2008 5:11 PM
 To: NT System Admin Issues
 Subject: RE: Stopping users emailing out internal docs



 Good job guys, Information Rights Management, that's it…

 http://office.microsoft.com/en-us/help/HA101029181033.aspx



 Dave



 From: Oliver Marshall [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, October 21, 2008 12:19 PM
 To: NT System Admin Issues
 Subject: RE: Stopping users emailing out internal docs



 And thats still part of Office Server isn't it ?



 From: Kennedy, Jim [mailto:[EMAIL PROTECTED]
 Sent: 21 October 2008 20:15
 To: NT System Admin Issues
 Subject: RE: Stopping users emailing out internal docs



 Microsoft's Rights Management can do much of what you seek. Although it
 isn't perfect and can be beat it should get you to be able to say you tried
 really hard to the lawyers.





 From: Oliver Marshall [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, October 21, 2008 2:59 PM
 To: NT System Admin Issues
 Subject: RE: Stopping users emailing out internal docs



 Remember remember.



 From: David Lum [mailto:[EMAIL PROTECTED]
 Sent: 21 October 2008 19:43
 To: NT System Admin Issues
 Subject: RE: Stopping users emailing out internal docs



 I seem to think InfoPath or Groove or some other MS tool can do this kind of
 job – you can select an e-mail and effectively make it unforwardable, it
 was pretty slick…now if I could only remember what product it was…

 David Lum // SYSTEMS ENGINEER
 NORTHWEST EVALUATION ASSOCIATION
 (Desk) 971.222.1025 // (Cell) 503.267.9764

 From: Oliver Marshall [mailto:[EMAIL PROTECTED]
 Sent: Tuesday, October 21, 2008 11:00 AM
 To: NT System Admin Issues
 Subject: Stopping users emailing out internal docs



 Hi chaps,



 We've had a case this week of a client who found out a user, who is in the
 process of being let go, had emailed out to their personal gmail account a
 copy of all the internal documents, logos, process diagrams, etc. The user
 is now undergoing disciplinary action and facing possible legal action.



 However, while it's almost impossible to prevent a user from emailing a
 document out if they really want to, companies are obliged to have a policy
 in place requiring them not to doing so, and here in the UK that policy has
 to be seen to be implemented and enforced if it is to be referred to in any
 action.



 We've suggested a proper compliance level archival service in order to allow
 for emails to be restored even when users delete emails from their machines
 (and their recoverable deleted items in this case). Elsewhere we have used
 similar services to also report on certain file types, file names and sizes
 of files being sent, and use them to bounce emails under certain conditions.
 Bouncing certain emails, while a very limited short-stick, does allow for
 the policy to be seen to be in place if people are as silly as to send out
 documents with certain names etc (like Accounts2008.xls etc).



 What do other companies do to help either prevent people sending docs out,
 or to cover themselves legally should they have to take action against a
 user for doing so, or to highlight when a user is doing so?



 Olly



 --

 G2 Support

 Network Support : Online Backups : Server Management



 Email:  [EMAIL PROTECTED]

 Web:http://www.g2support.com


















































-- 
ME2

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


Re: Stopping users emailing out internal docs

2008-10-21 Thread Sherry Abercrombie
Policies to prevent the unauthorized use of usb ports.  There's good
software that will do this, and will apply even on machines (laptops) that
are off the network.

On Tue, Oct 21, 2008 at 3:28 PM, NTSysAdmin [EMAIL PROTECTED] wrote:

  Would that stop them dragging  dropping onto a usb stick?



 S



 *From:* David Lum [mailto:[EMAIL PROTECTED]
 *Sent:* Tuesday, October 21, 2008 5:11 PM

 *To:* NT System Admin Issues
 *Subject:* RE: Stopping users emailing out internal docs



 Good job guys, Information Rights Management, that's it…

 http://office.microsoft.com/en-us/help/HA101029181033.aspx



 Dave



 *From:* Oliver Marshall [mailto:[EMAIL PROTECTED]
 *Sent:* Tuesday, October 21, 2008 12:19 PM
 *To:* NT System Admin Issues
 *Subject:* RE: Stopping users emailing out internal docs



 And thats still part of Office Server isn't it ?



 *From:* Kennedy, Jim [mailto:[EMAIL PROTECTED]
 *Sent:* 21 October 2008 20:15
 *To:* NT System Admin Issues
 *Subject:* RE: Stopping users emailing out internal docs



 Microsoft's Rights Management can do much of what you seek. Although it
 isn't perfect and can be beat it should get you to be able to say you tried
 really hard to the lawyers.





 *From:* Oliver Marshall [mailto:[EMAIL PROTECTED]
 *Sent:* Tuesday, October 21, 2008 2:59 PM
 *To:* NT System Admin Issues
 *Subject:* RE: Stopping users emailing out internal docs



 Remember remember.



 *From:* David Lum [mailto:[EMAIL PROTECTED]
 *Sent:* 21 October 2008 19:43
 *To:* NT System Admin Issues
 *Subject:* RE: Stopping users emailing out internal docs



 I seem to think InfoPath or Groove or some other MS tool can do this kind
 of job – you can select an e-mail and effectively make it unforwardable,
 it was pretty slick…now if I could only remember what product it was…

 *David Lum** **// *SYSTEMS ENGINEER
 NORTHWEST EVALUATION ASSOCIATION
 (Desk) 971.222.1025 *// *(Cell) 503.267.9764

 *From:* Oliver Marshall [mailto:[EMAIL PROTECTED]
 *Sent:* Tuesday, October 21, 2008 11:00 AM
 *To:* NT System Admin Issues
 *Subject:* Stopping users emailing out internal docs



 Hi chaps,



 We've had a case this week of a client who found out a user, who is in the
 process of being let go, had emailed out to their personal gmail account a
 copy of all the internal documents, logos, process diagrams, etc. The user
 is now undergoing disciplinary action and facing possible legal action.



 However, while it's almost impossible to prevent a user from emailing a
 document out if they really want to, companies are obliged to have a policy
 in place requiring them not to doing so, and here in the UK that policy has
 to be seen to be implemented and enforced if it is to be referred to in any
 action.



 We've suggested a proper compliance level archival service in order to
 allow for emails to be restored even when users delete emails from their
 machines (and their recoverable deleted items in this case). Elsewhere we
 have used similar services to also report on certain file types, file names
 and sizes of files being sent, and use them to bounce emails under certain
 conditions. Bouncing certain emails, while a very limited short-stick, does
 allow for the policy to be seen to be in place if people are as silly as to
 send out documents with certain names etc (like Accounts2008.xls etc).



 What do other companies do to help either prevent people sending docs out,
 or to cover themselves legally should they have to take action against a
 user for doing so, or to highlight when a user is doing so?



 Olly



 --

 G2 Support

 Network Support : Online Backups : Server Management



 Email:  [EMAIL PROTECTED]

 Web:http://www.g2support.com



















































-- 
Sherry Abercrombie

Any sufficiently advanced technology is indistinguishable from magic.
Arthur C. Clarke

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

AD GPO to lock screen

2008-10-21 Thread Tom Miller
Hi Folks,
 
I am looking for the GPO setting to lock the computer so as the user is 
required to press control-alt-delete to unlock the screen.  I see the GPO 
settings under User | Policies | Admin Templates | Control Panel | Display | 
Screen saver timeout, but this doesn't look like what I'm looking for.
 
 
 
Tom Miller
Engineer, Information Technology
Hampton-Newport News Community Services Board
757-788-0528 

Confidentiality Notice:  This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information.  Any unauthorized review, use, disclosure, or 
distribution is prohibited.  If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Stopping users emailing out internal docs

2008-10-21 Thread NTSysAdmin
It also doesn't protect the cloning of hard drives, which, funnily enough, 
happened to one of my clients on Monday.

Security guard saw some disk activity going on, hit the keyboard and voila, 
Ghost was in action.CFO's pc, the bugger had installed an extra hdd.

S

From: Sherry Abercrombie [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 5:34 PM
To: NT System Admin Issues
Subject: Re: Stopping users emailing out internal docs

Policies to prevent the unauthorized use of usb ports.  There's good software 
that will do this, and will apply even on machines (laptops) that are off the 
network.
On Tue, Oct 21, 2008 at 3:28 PM, NTSysAdmin [EMAIL PROTECTED]mailto:[EMAIL 
PROTECTED] wrote:

Would that stop them dragging  dropping onto a usb stick?



S



From: David Lum [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: Tuesday, October 21, 2008 5:11 PM

To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs



Good job guys, Information Rights Management, that's it...

http://office.microsoft.com/en-us/help/HA101029181033.aspx



Dave



From: Oliver Marshall [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: Tuesday, October 21, 2008 12:19 PM
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs



And thats still part of Office Server isn't it ?



From: Kennedy, Jim [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: 21 October 2008 20:15
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs



Microsoft's Rights Management can do much of what you seek. Although it isn't 
perfect and can be beat it should get you to be able to say you tried really 
hard to the lawyers.





From: Oliver Marshall [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: Tuesday, October 21, 2008 2:59 PM
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs



Remember remember.



From: David Lum [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: 21 October 2008 19:43
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs



I seem to think InfoPath or Groove or some other MS tool can do this kind of 
job - you can select an e-mail and effectively make it unforwardable, it was 
pretty slick...now if I could only remember what product it was...

David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764

From: Oliver Marshall [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: Tuesday, October 21, 2008 11:00 AM
To: NT System Admin Issues
Subject: Stopping users emailing out internal docs



Hi chaps,



We've had a case this week of a client who found out a user, who is in the 
process of being let go, had emailed out to their personal gmail account a copy 
of all the internal documents, logos, process diagrams, etc. The user is now 
undergoing disciplinary action and facing possible legal action.



However, while it's almost impossible to prevent a user from emailing a 
document out if they really want to, companies are obliged to have a policy in 
place requiring them not to doing so, and here in the UK that policy has to be 
seen to be implemented and enforced if it is to be referred to in any action.



We've suggested a proper compliance level archival service in order to allow 
for emails to be restored even when users delete emails from their machines 
(and their recoverable deleted items in this case). Elsewhere we have used 
similar services to also report on certain file types, file names and sizes of 
files being sent, and use them to bounce emails under certain conditions. 
Bouncing certain emails, while a very limited short-stick, does allow for the 
policy to be seen to be in place if people are as silly as to send out 
documents with certain names etc (like Accounts2008.xls etc).



What do other companies do to help either prevent people sending docs out, or 
to cover themselves legally should they have to take action against a user for 
doing so, or to highlight when a user is doing so?



Olly



--

G2 Support

Network Support : Online Backups : Server Management



Email:  [EMAIL PROTECTED]mailto:[EMAIL PROTECTED]

Web:http://www.g2support.comhttp://www.g2support.com/


















































--
Sherry Abercrombie

Any sufficiently advanced technology is indistinguishable from magic.
Arthur C. Clarke





~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: AD GPO to lock screen

2008-10-21 Thread James Winzenz
You would actually need to specify the following settings, if you want
to a) ensure that a screensaver is specified and b) that it is password
protected, forcing the user to unlock their workstation when resuming
from the screensaver.  All options are under the following:

 

User Configuration | Administrative Templates | Control Panel | Display

 

Screen Saver (enabled turns on screensavers, prevents users from
changing)

Screen Saver executable name (requires you to specify a standard
screensaver that is going to be on all desktops)

Password protect the screen saver (to force the user to press
Ctr+Alt+Del and unlock their workstation)

Screen Saver timeout (how long to wait before the screensaver turns on
and therefore locks the workstation)

 

You can get away with not specifying #2, but if a user does not have a
screensaver specified and you turn on the other settings, no screensaver
will be selected.  The best option is to do all of these, but this will
kill any users' special screensavers (prolly a good thing, come to mind
. . .)

 

Thanks,

 

James Winzenz

Infrastructure Systems Engineer II - Security

Pulte Homes Information Services

 



From: Tom Miller [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 1:11 PM
To: NT System Admin Issues
Subject: AD GPO to lock screen

 

Hi Folks,

 

I am looking for the GPO setting to lock the computer so as the user is
required to press control-alt-delete to unlock the screen.  I see the
GPO settings under User | Policies | Admin Templates | Control Panel |
Display | Screen saver timeout, but this doesn't look like what I'm
looking for.

 

 

 

Tom Miller
Engineer, Information Technology
Hampton-Newport News Community Services Board
757-788-0528 

 

Confidentiality Notice: This e-mail message, including attachments, is
for the sole use of the intended recipient(s) and may contain
confidential and privileged information. Any unauthorized review, use,
disclosure, or distribution is prohibited. If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message. 

CONFIDENTIALITY NOTICE:  This email may contain confidential and privileged 
material for the sole use of the intended recipient(s).  Any review, use, 
distribution or disclosure by others is strictly prohibited.  If you have 
received this communication in error, please notify the sender immediately by 
email and delete the message and any file attachments from your computer.  
Thank you.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: AD GPO to lock screen

2008-10-21 Thread Christopher J. Bosak
Off the top of my head, that should be in security settings, not display.

 

Christopher J. Bosak

Vector Company

c. 847.603.4673

[EMAIL PROTECTED]

 

You need to install an RTFM Interface, due to an LBNC issue.

- B.O.F.H. (Merged 2 into 1) - Me

 

From: Tom Miller [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 15:11 hrs
To: NT System Admin Issues
Subject: AD GPO to lock screen

 

Hi Folks,

 

I am looking for the GPO setting to lock the computer so as the user is
required to press control-alt-delete to unlock the screen.  I see the GPO
settings under User | Policies | Admin Templates | Control Panel | Display |
Screen saver timeout, but this doesn't look like what I'm looking for.

 

 

 

Tom Miller
Engineer, Information Technology
Hampton-Newport News Community Services Board
757-788-0528 

 

Confidentiality Notice: This e-mail message, including attachments, is for
the sole use of the intended recipient(s) and may contain confidential and
privileged information. Any unauthorized review, use, disclosure, or
distribution is prohibited. If you are not the intended recipient, please
contact the sender by reply e-mail and destroy all copies of the original
message. 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: AD GPO to lock screen

2008-10-21 Thread Tom Miller
Thanks.  That what I was thinking.  We currently used a forced screen
saver so this change will be of no consequence to my user community.

 James Winzenz [EMAIL PROTECTED] 10/21/2008 4:48 PM 

You would actually need to specify the following settings, if you want
to a) ensure that a screensaver is specified and b) that it is password
protected, forcing the user to unlock their workstation when resuming
from the screensaver.  All options are under the following:
 
User Configuration | Administrative Templates | Control Panel |
Display
 
Screen Saver (enabled turns on screensavers, prevents users from
changing)
Screen Saver executable name (requires you to specify a standard
screensaver that is going to be on all desktops)
Password protect the screen saver (to force the user to press
Ctr+Alt+Del and unlock their workstation)
Screen Saver timeout (how long to wait before the screensaver turns on
and therefore locks the workstation)
 
You can get away with not specifying #2, but if a user does not have a
screensaver specified and you turn on the other settings, no screensaver
will be selected.  The best option is to do all of these, but this will
kill any users’ special screensavers (prolly a good thing, come to mind
. . .)
 
Thanks,
 
James Winzenz
Infrastructure Systems Engineer II - Security
Pulte Homes Information Services

 


From:Tom Miller [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 1:11 PM
To: NT System Admin Issues
Subject: AD GPO to lock screen

 

Hi Folks,

 

I am looking for the GPO setting to lock the computer so as the user is
required to press control-alt-delete to unlock the screen.  I see the
GPO settings under User | Policies | Admin Templates | Control Panel |
Display | Screen saver timeout, but this doesn't look like what I'm
looking for.

 

 

 

Tom Miller
Engineer, Information Technology
Hampton-Newport News Community Services Board
757-788-0528 

 
Confidentiality Notice: This e-mail message, including attachments, is
for the sole use of the intended recipient(s) and may contain
confidential and privileged information. Any unauthorized review, use,
disclosure, or distribution is prohibited. If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message.
 
  

CONFIDENTIALITY NOTICE:  This email may contain confidential and
privileged material for the sole use of the intended recipient(s).  Any
review, use, distribution or disclosure by others is strictly
prohibited.  If you have received this communication in error, please
notify the sender immediately by email and delete the message and any
file attachments from your computer.  Thank you.


 
 

Confidentiality Notice:  This e-mail message, including attachments, is
for the sole use of the intended recipient(s) and may contain
confidential and privileged information.  Any unauthorized review, use,
disclosure, or distribution is prohibited.  If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: AD GPO to lock screen

2008-10-21 Thread Christopher Boggs
Savvy users (with admin rights) will come to realize all they have to do
to change the screensaver is replace whatever file you specify in the
GPO with whatever file they want..  :-)



From: Tom Miller [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 3:54 PM
To: NT System Admin Issues
Subject: RE: AD GPO to lock screen

 

Thanks.  That what I was thinking.  We currently used a forced screen
saver so this change will be of no consequence to my user community.

 James Winzenz [EMAIL PROTECTED] 10/21/2008 4:48 PM 

You would actually need to specify the following settings, if you want
to a) ensure that a screensaver is specified and b) that it is password
protected, forcing the user to unlock their workstation when resuming
from the screensaver.  All options are under the following:

 

User Configuration | Administrative Templates | Control Panel | Display

 

Screen Saver (enabled turns on screensavers, prevents users from
changing)

Screen Saver executable name (requires you to specify a standard
screensaver that is going to be on all desktops)

Password protect the screen saver (to force the user to press
Ctr+Alt+Del and unlock their workstation)

Screen Saver timeout (how long to wait before the screensaver turns on
and therefore locks the workstation)

 

You can get away with not specifying #2, but if a user does not have a
screensaver specified and you turn on the other settings, no screensaver
will be selected.  The best option is to do all of these, but this will
kill any users' special screensavers (prolly a good thing, come to mind
. . .)

 

Thanks,

 

James Winzenz

Infrastructure Systems Engineer II - Security

Pulte Homes Information Services

 



From: Tom Miller [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 1:11 PM
To: NT System Admin Issues
Subject: AD GPO to lock screen

 

Hi Folks,

 

I am looking for the GPO setting to lock the computer so as the user is
required to press control-alt-delete to unlock the screen.  I see the
GPO settings under User | Policies | Admin Templates | Control Panel |
Display | Screen saver timeout, but this doesn't look like what I'm
looking for.

 

 

 

Tom Miller
Engineer, Information Technology
Hampton-Newport News Community Services Board
757-788-0528 

 

Confidentiality Notice: This e-mail message, including attachments, is
for the sole use of the intended recipient(s) and may contain
confidential and privileged information. Any unauthorized review, use,
disclosure, or distribution is prohibited. If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message. 

 

 

 


CONFIDENTIALITY NOTICE:  This email may contain confidential and
privileged material for the sole use of the intended recipient(s).  Any
review, use, distribution or disclosure by others is strictly
prohibited.  If you have received this communication in error, please
notify the sender immediately by email and delete the message and any
file attachments from your computer.  Thank you.

 

 

 

 

Confidentiality Notice: This e-mail message, including attachments, is
for the sole use of the intended recipient(s) and may contain
confidential and privileged information. Any unauthorized review, use,
disclosure, or distribution is prohibited. If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message. 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: AD GPO to lock screen

2008-10-21 Thread James Winzenz
You could also push out the .scr file via a startup or login script - just pop 
it in the netlogon share.  There are all sorts of things you can do, but this 
starts straying into the realm of behavioral problems that would then need to 
be solved by disciplinary action.  'Course, this is also another argument for 
not allowing users to have admin rights.

From Ed Crowley:  There are seldom good technological solutions to behavioral 
problems.

James Winzenz
Infrastructure Systems Engineer II - Security
Pulte Homes Information Services


From: Christopher Boggs [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 2:06 PM
To: NT System Admin Issues
Subject: RE: AD GPO to lock screen

Savvy users (with admin rights) will come to realize all they have to do to 
change the screensaver is replace whatever file you specify in the GPO with 
whatever file they want..  ☺

From: Tom Miller [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 3:54 PM
To: NT System Admin Issues
Subject: RE: AD GPO to lock screen

Thanks.  That what I was thinking.  We currently used a forced screen saver so 
this change will be of no consequence to my user community.

 James Winzenz [EMAIL PROTECTED] 10/21/2008 4:48 PM 
You would actually need to specify the following settings, if you want to a) 
ensure that a screensaver is specified and b) that it is password protected, 
forcing the user to unlock their workstation when resuming from the 
screensaver.  All options are under the following:
 
User Configuration | Administrative Templates | Control Panel | Display
 
Screen Saver (enabled turns on screensavers, prevents users from changing)
Screen Saver executable name (requires you to specify a standard screensaver 
that is going to be on all desktops)
Password protect the screen saver (to force the user to press Ctr+Alt+Del and 
unlock their workstation)
Screen Saver timeout (how long to wait before the screensaver turns on and 
therefore locks the workstation)
 
You can get away with not specifying #2, but if a user does not have a 
screensaver specified and you turn on the other settings, no screensaver will 
be selected.  The best option is to do all of these, but this will kill any 
users’ special screensavers (prolly a good thing, come to mind . . .)
 
Thanks,
 
James Winzenz
Infrastructure Systems Engineer II - Security
Pulte Homes Information Services
 

From: Tom Miller [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 1:11 PM
To: NT System Admin Issues
Subject: AD GPO to lock screen
 
Hi Folks,
 
I am looking for the GPO setting to lock the computer so as the user is 
required to press control-alt-delete to unlock the screen.  I see the GPO 
settings under User | Policies | Admin Templates | Control Panel | Display | 
Screen saver timeout, but this doesn't look like what I'm looking for.
 
 
 
Tom Miller
Engineer, Information Technology
Hampton-Newport News Community Services Board
757-788-0528 
 
Confidentiality Notice: This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message. 
 
 
 

CONFIDENTIALITY NOTICE:  This email may contain confidential and privileged 
material for the sole use of the intended recipient(s).  Any review, use, 
distribution or disclosure by others is strictly prohibited.  If you have 
received this communication in error, please notify the sender immediately by 
email and delete the message and any file attachments from your computer.  
Thank you.

 
 

Confidentiality Notice: This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message. 

CONFIDENTIALITY NOTICE:  This email may contain confidential and privileged 
material for the sole use of the intended recipient(s).  Any review, use, 
distribution or disclosure by others is strictly prohibited.  If you have 
received this communication in error, please notify the sender immediately by 
email and delete the message and any file attachments from your computer.  
Thank you.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: AD GPO to lock screen

2008-10-21 Thread Christopher Boggs
True.  I was just playing devil's advocate...  


-Original Message-
From: James Winzenz [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 4:20 PM
To: NT System Admin Issues
Subject: RE: AD GPO to lock screen

You could also push out the .scr file via a startup or login script - just pop 
it in the netlogon share.  There are all sorts of things you can do, but this 
starts straying into the realm of behavioral problems that would then need to 
be solved by disciplinary action.  'Course, this is also another argument for 
not allowing users to have admin rights.

From Ed Crowley:  There are seldom good technological solutions to behavioral 
problems.

James Winzenz
Infrastructure Systems Engineer II - Security
Pulte Homes Information Services


From: Christopher Boggs [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 2:06 PM
To: NT System Admin Issues
Subject: RE: AD GPO to lock screen

Savvy users (with admin rights) will come to realize all they have to do to 
change the screensaver is replace whatever file you specify in the GPO with 
whatever file they want..  ☺

From: Tom Miller [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 3:54 PM
To: NT System Admin Issues
Subject: RE: AD GPO to lock screen

Thanks.  That what I was thinking.  We currently used a forced screen saver so 
this change will be of no consequence to my user community.

 James Winzenz [EMAIL PROTECTED] 10/21/2008 4:48 PM 
You would actually need to specify the following settings, if you want to a) 
ensure that a screensaver is specified and b) that it is password protected, 
forcing the user to unlock their workstation when resuming from the 
screensaver.  All options are under the following:
 
User Configuration | Administrative Templates | Control Panel | Display
 
Screen Saver (enabled turns on screensavers, prevents users from changing)
Screen Saver executable name (requires you to specify a standard screensaver 
that is going to be on all desktops)
Password protect the screen saver (to force the user to press Ctr+Alt+Del and 
unlock their workstation)
Screen Saver timeout (how long to wait before the screensaver turns on and 
therefore locks the workstation)
 
You can get away with not specifying #2, but if a user does not have a 
screensaver specified and you turn on the other settings, no screensaver will 
be selected.  The best option is to do all of these, but this will kill any 
users’ special screensavers (prolly a good thing, come to mind . . .)
 
Thanks,
 
James Winzenz
Infrastructure Systems Engineer II - Security
Pulte Homes Information Services
 

From: Tom Miller [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 1:11 PM
To: NT System Admin Issues
Subject: AD GPO to lock screen
 
Hi Folks,
 
I am looking for the GPO setting to lock the computer so as the user is 
required to press control-alt-delete to unlock the screen.  I see the GPO 
settings under User | Policies | Admin Templates | Control Panel | Display | 
Screen saver timeout, but this doesn't look like what I'm looking for.
 
 
 
Tom Miller
Engineer, Information Technology
Hampton-Newport News Community Services Board
757-788-0528 
 
Confidentiality Notice: This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message. 
 
 
 

CONFIDENTIALITY NOTICE:  This email may contain confidential and privileged 
material for the sole use of the intended recipient(s).  Any review, use, 
distribution or disclosure by others is strictly prohibited.  If you have 
received this communication in error, please notify the sender immediately by 
email and delete the message and any file attachments from your computer.  
Thank you.

 
 

Confidentiality Notice: This e-mail message, including attachments, is for the 
sole use of the intended recipient(s) and may contain confidential and 
privileged information. Any unauthorized review, use, disclosure, or 
distribution is prohibited. If you are not the intended recipient, please 
contact the sender by reply e-mail and destroy all copies of the original 
message. 

CONFIDENTIALITY NOTICE:  This email may contain confidential and privileged 
material for the sole use of the intended recipient(s).  Any review, use, 
distribution or disclosure by others is strictly prohibited.  If you have 
received this communication in error, please notify the sender immediately by 
email and delete the message and any file attachments from your computer.  
Thank you.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

~ 

RE: Any SCOM users?

2008-10-21 Thread Malcolm Reitz
You can also monitor text log files. IIRC, each space-separated value is
a param.

 

http://blogs.technet.com/timhe/archive/2007/09/11/howto-create-a-generic
-text-log-alert-in-scom-2007-or-sce.aspx 

 

Malcolm 

From: Michael B. Smith [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, 21 October, 2008 14:23
To: NT System Admin Issues
Subject: RE: Any SCOM users?

 

Standard windows log file.

 

OpsMgr doesn't actually care about the format of the text or data, it
checks the source and eventid.

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

Link with me at: http://www.linkedin.com/in/theessentialexchange

 

From: David Lum [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 1:42 PM
To: NT System Admin Issues
Subject: Any SCOM users?

 

I have a Q about it can we write a custom .Net application and have
its log file monitored by SCOM? If so, what kind of format does the log
need to be in?

 

David Lum // SYSTEMS ENGINEER 
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764

 

 

 

 

 

 

 

This e-mail, including any attached files, may contain confidential and 
privileged information for the sole use of the intended recipient.  Any review, 
use, distribution, or disclosure by others is strictly prohibited.  If you are 
not the intended recipient (or authorized to receive information for the 
intended recipient), please contact the sender by reply e-mail and delete all 
copies of this message.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: DNS Reverse lookup question

2008-10-21 Thread Michael B. Smith
Either take the pain now, or take it later.

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

Link with me at: http://www.linkedin.com/in/theessentialexchange

 

From: Webb, Brian (Corp) [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 1:31 PM
To: NT System Admin Issues
Subject: RE: DNS Reverse lookup question

 

The problem is the subnet already exists in both domains...

 

-Brian

 

 

  _  

From: Michael B. Smith [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 11:49 AM
To: NT System Admin Issues
Subject: RE: DNS Reverse lookup question

You can use a stub domain or a forwarding domain.

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

Link with me at: http://www.linkedin.com/in/theessentialexchange

 

From: Webb, Brian (Corp) [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 12:47 PM
To: NT System Admin Issues
Subject: DNS Reverse lookup question

 

Here is the situation:

1 IP range has servers from 2 different domains 

 

DNS servers (AD integrated) for each domain have entries for the servers in
that domain

 

If I do a reverse lookup from a machine that is pointed to the right DNS
server it works, otherwise I get a non-existent domain.  Hw do you solve
this?  Do you manually put in PTR records for all the servers in the
opposite domain?

 

Example:

Server1.corp.local is at 10.1.1.10

 

Server2.division.local is at 10.1.1.20

 

Client1.corp.local is at 10.100.100.100 with DNS server pointed to
DNSserver.corp.local

Client2.division.local is at 10.200.200.200 with DNS server pointed to
DNSserver.division.local

 

nslookup from client1 for 10.1.1.10 returns Server1

nslookup from client1 for 10.1.1.20 returns non-existent domain

 

nslookup from Client2 for 10.1.1.10 returns non-existent domain

nslookup from Client2 for 10.1.1.20 returns Server2

 

nslookup by name (forward lookup) works everywhere.

 

Brian Webb - MCSE
TDS Corporate IS, Windows Server Platform Team
Senior Systems Administrator

When stuck on a problem as often can be, try to remember G.B.T.T.D. (Go
Back To The Definition). - Dave Seybold

 

 

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

Re: DNS Reverse lookup question

2008-10-21 Thread wjh
Do you mean that the two domains share a network, or that the two 
networks use the same IP addressing?


Webb, Brian (Corp) wrote:
@font-face { font-family: Cambria Math; } @font-face { font-family: 
Calibri; } @font-face { font-family: Tahoma; } @font-face { 
font-family: Consolas; } @font-face { font-family: Kristen ITC; } 
@page Section1 {size: 8.5in 11.0in; margin: 1.0in 1.0in 1.0in 1.0in; } 
P.MsoNormal { FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: 
Times New Roman,serif } LI.MsoNormal { FONT-SIZE: 12pt; MARGIN: 
0in 0in 0pt; FONT-FAMILY: Times New Roman,serif } DIV.MsoNormal { 
FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: Times New 
Roman,serif } A:link { COLOR: blue; TEXT-DECORATION: underline; 
mso-style-priority: 99 } SPAN.MsoHyperlink { COLOR: blue; 
TEXT-DECORATION: underline; mso-style-priority: 99 } A:visited { 
COLOR: purple; TEXT-DECORATION: underline; mso-style-priority: 99 } 
SPAN.MsoHyperlinkFollowed { COLOR: purple; TEXT-DECORATION: underline; 
mso-style-priority: 99 } P { FONT-SIZE: 12pt; MARGIN-LEFT: 0in; 
MARGIN-RIGHT: 0in; FONT-FAMILY: Times New Roman,serif; 
mso-style-priority: 99; mso-margin-top-alt: auto; 
mso-margin-bottom-alt: auto } PRE { FONT-SIZE: 10pt; MARGIN: 0in 0in 
0pt; FONT-FAMILY: Courier New; mso-style-priority: 99; 
mso-style-link: HTML Preformatted Char } SPAN.HTMLPreformattedChar { 
FONT-FAMILY: Consolas; mso-style-priority: 99; mso-style-link: HTML 
Preformatted; mso-style-name: HTML Preformatted Char } 
SPAN.EmailStyle20 { COLOR: #1f497d; FONT-FAMILY: 
Calibri,sans-serif; mso-style-type: personal-reply } 
.MsoChpDefault { FONT-SIZE: 10pt; mso-style-type: export-only } 
DIV.Section1 { page: Section1 }

The problem is the subnet already exists in both domains...
-Brian


*From:* Michael B. Smith [mailto:[EMAIL PROTECTED]
*Sent:* Tuesday, October 21, 2008 11:49 AM
*To:* NT System Admin Issues
*Subject:* RE: DNS Reverse lookup question

You can use a stub domain or a forwarding domain.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

Link with me at: http://www.linkedin.com/in/theessentialexchange

*From:* Webb, Brian (Corp) [mailto:[EMAIL PROTECTED]
*Sent:* Tuesday, October 21, 2008 12:47 PM
*To:* NT System Admin Issues
*Subject:* DNS Reverse lookup question

Here is the situation:

1 IP range has servers from 2 different domains

DNS servers (AD integrated) for each domain have entries for the 
servers in that domain


If I do a reverse lookup from a machine that is pointed to the right 
DNS server it works, otherwise I get a non-existent domain.  Hw do you 
solve this?  Do you manually put in PTR records for all the servers in 
the opposite domain?


Example:

Server1.corp.local is at 10.1.1.10

Server2.division.local is at 10.1.1.20

Client1.corp.local is at 10.100.100.100 with DNS server pointed to 
DNSserver.corp.local


Client2.division.local is at 10.200.200.200 with DNS server pointed to 
DNSserver.division.local


nslookup from client1 for 10.1.1.10 returns Server1

nslookup from client1 for 10.1.1.20 returns non-existent domain

nslookup from Client2 for 10.1.1.10 returns non-existent domain

nslookup from Client2 for 10.1.1.20 returns Server2

nslookup by name (forward lookup) works everywhere.

Brian Webb - MCSE
TDS Corporate IS, Windows Server Platform Team
Senior Systems Administrator

When stuck on a problem as often can be, try to remember G.B.T.T.D. 
(Go Back To The Definition). - Dave Seybold


 

 

 



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Enumerate GUIDs for all comps in an OU

2008-10-21 Thread Michael B. Smith
The SMBIOS GUID used by WDS is tied to the motherboard, not to the AD
object. Sorry, I didn't know that that was what you were looking for.

 

You get that from WMI (for compliant motherboards). For example:

 

PS C:\Users\Michael gwmi win32_computersystemproduct | fl uuid

 

uuid : 61383066-3835-3962-6635-001B384EE42B

 

PS C:\Users\Michael

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

Link with me at: http://www.linkedin.com/in/theessentialexchange

 

From: Joseph L. Casale [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 1:57 PM
To: NT System Admin Issues
Subject: RE: Enumerate GUIDs for all comps in an OU

 

Hey Michael,

Am I missing something here? I thought machine's deployed via WDS/RIS used
the GUID as reported by the wkst?
During the post I can see them and they are very different from the guid's
enumerated by adfind. I have not blacklisted any guids yet, and none of them
correspond to the mac address that I can visual see which would be a result.
The deployments were CD based, not image based.

 

Any ideas?

 

Thanks!
jlc

 

From: Michael B. Smith [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, October 15, 2008 4:32 PM
To: NT System Admin Issues
Subject: RE: Enumerate GUIDs for all comps in an OU

 

Adfind -default -b ou=ouname -f name=* objectGuid

 

?

 

If you actually want vbscript for it, I can hunt it down. But it's a LOT
more lines.

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

Link with me at: http://www.linkedin.com/in/theessentialexchange

 

From: Joseph L. Casale [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, October 15, 2008 6:23 PM
To: NT System Admin Issues
Subject: Enumerate GUIDs for all comps in an OU

 

Anyone know a query I can do through vb for this?

 

Thanks!
jlc

 

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Enumerate GUIDs for all comps in an OU

2008-10-21 Thread Joseph L. Casale
So when a cheap mobo has a dupe guid with another, which guid in AD does RIS 
say A GUID for this computer already exists in Active Directory...?
Any idea?
Thanks!
jlc

From: Michael B. Smith [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 4:28 PM
To: NT System Admin Issues
Subject: RE: Enumerate GUIDs for all comps in an OU

The SMBIOS GUID used by WDS is tied to the motherboard, not to the AD object. 
Sorry, I didn't know that that was what you were looking for.

You get that from WMI (for compliant motherboards). For example:

PS C:\Users\Michael gwmi win32_computersystemproduct | fl uuid

uuid : 61383066-3835-3962-6635-001B384EE42B

PS C:\Users\Michael

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange

From: Joseph L. Casale [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 1:57 PM
To: NT System Admin Issues
Subject: RE: Enumerate GUIDs for all comps in an OU

Hey Michael,
Am I missing something here? I thought machine's deployed via WDS/RIS used the 
GUID as reported by the wkst?
During the post I can see them and they are very different from the guid's 
enumerated by adfind. I have not blacklisted any guids yet, and none of them 
correspond to the mac address that I can visual see which would be a result. 
The deployments were CD based, not image based.

Any ideas?

Thanks!
jlc

From: Michael B. Smith [mailto:[EMAIL PROTECTED]
Sent: Wednesday, October 15, 2008 4:32 PM
To: NT System Admin Issues
Subject: RE: Enumerate GUIDs for all comps in an OU

Adfind -default -b ou=ouname -f name=* objectGuid

?

If you actually want vbscript for it, I can hunt it down. But it's a LOT more 
lines.

Regards,

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP
My blog: http://TheEssentialExchange.com/blogs/michael
Link with me at: http://www.linkedin.com/in/theessentialexchange

From: Joseph L. Casale [mailto:[EMAIL PROTECTED]
Sent: Wednesday, October 15, 2008 6:23 PM
To: NT System Admin Issues
Subject: Enumerate GUIDs for all comps in an OU

Anyone know a query I can do through vb for this?

Thanks!
jlc





















~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: Enumerate GUIDs for all comps in an OU

2008-10-21 Thread Michael B. Smith
The SMBIOS GUID. Which is properly a CIM UUID (and that's what SCCM calls
it).

 

RIS/WDS doesn't care about the objectGUID. That's a crappy error message.

 

It's pretty easy to scan through AD using vbscript or PS and retrieve all
the UUIDs with WMI.

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

Link with me at: http://www.linkedin.com/in/theessentialexchange

 

From: Joseph L. Casale [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 6:38 PM
To: NT System Admin Issues
Subject: RE: Enumerate GUIDs for all comps in an OU

 

So when a cheap mobo has a dupe guid with another, which guid in AD does RIS
say A GUID for this computer already exists in Active Directory.?
Any idea?

Thanks!
jlc

 

From: Michael B. Smith [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 4:28 PM
To: NT System Admin Issues
Subject: RE: Enumerate GUIDs for all comps in an OU

 

The SMBIOS GUID used by WDS is tied to the motherboard, not to the AD
object. Sorry, I didn't know that that was what you were looking for.

 

You get that from WMI (for compliant motherboards). For example:

 

PS C:\Users\Michael gwmi win32_computersystemproduct | fl uuid

 

uuid : 61383066-3835-3962-6635-001B384EE42B

 

PS C:\Users\Michael

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

Link with me at: http://www.linkedin.com/in/theessentialexchange

 

From: Joseph L. Casale [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 1:57 PM
To: NT System Admin Issues
Subject: RE: Enumerate GUIDs for all comps in an OU

 

Hey Michael,

Am I missing something here? I thought machine's deployed via WDS/RIS used
the GUID as reported by the wkst?
During the post I can see them and they are very different from the guid's
enumerated by adfind. I have not blacklisted any guids yet, and none of them
correspond to the mac address that I can visual see which would be a result.
The deployments were CD based, not image based.

 

Any ideas?

 

Thanks!
jlc

 

From: Michael B. Smith [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, October 15, 2008 4:32 PM
To: NT System Admin Issues
Subject: RE: Enumerate GUIDs for all comps in an OU

 

Adfind -default -b ou=ouname -f name=* objectGuid

 

?

 

If you actually want vbscript for it, I can hunt it down. But it's a LOT
more lines.

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

Link with me at: http://www.linkedin.com/in/theessentialexchange

 

From: Joseph L. Casale [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, October 15, 2008 6:23 PM
To: NT System Admin Issues
Subject: Enumerate GUIDs for all comps in an OU

 

Anyone know a query I can do through vb for this?

 

Thanks!
jlc

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: DNS Reverse lookup question

2008-10-21 Thread Troy Meyer
Wouldn't a secondary zone on each DNS server for the opposing domain make this 
work?

You may need to specify the IP of each destination DNS server on each host DNS 
server (see zone transfers), but you should be golden with that.


-troy


-Original Message-
From: Webb, Brian (Corp) [mailto:[EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 9:47 AM
To: NT System Admin Issues
Subject: DNS Reverse lookup question

Here is the situation:
1 IP range has servers from 2 different domains

DNS servers (AD integrated) for each domain have entries for the servers in 
that domain

If I do a reverse lookup from a machine that is pointed to the right DNS 
server it works, otherwise I get a non-existent domain.  Hw do you solve this?  
Do you manually put in PTR records for all the servers in the opposite domain?

Example:
Server1.corp.local is at 10.1.1.10

Server2.division.local is at 10.1.1.20

Client1.corp.local is at 10.100.100.100 with DNS server pointed to 
DNSserver.corp.local
Client2.division.local is at 10.200.200.200 with DNS server pointed to 
DNSserver.division.local

nslookup from client1 for 10.1.1.10 returns Server1
nslookup from client1 for 10.1.1.20 returns non-existent domain

nslookup from Client2 for 10.1.1.10 returns non-existent domain
nslookup from Client2 for 10.1.1.20 returns Server2

nslookup by name (forward lookup) works everywhere.

Brian Webb - MCSE
TDS Corporate IS, Windows Server Platform Team
Senior Systems Administrator

When stuck on a problem as often can be, try to remember G.B.T.T.D. (Go Back 
To The Definition). - Dave Seybold









~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Stopping users emailing out internal docs

2008-10-21 Thread Kennedy, Jim

It also won't stop printing it and faxing it or putting the paper in their 
pocket. Or alt print screen and emailing the jpg. Or a hundred other ways 
we could all dream up.

The OP needs to make enough effort to satisfy the law in his country so that a 
good faith effort can be shown from what I read in his original post.  If this 
gets him there only the lawyers can say.


From: Sherry Abercrombie [EMAIL PROTECTED]
Sent: Tuesday, October 21, 2008 4:33 PM
To: NT System Admin Issues
Subject: Re: Stopping users emailing out internal docs

Policies to prevent the unauthorized use of usb ports.  There's good software 
that will do this, and will apply even on machines (laptops) that are off the 
network.

On Tue, Oct 21, 2008 at 3:28 PM, NTSysAdmin [EMAIL PROTECTED]mailto:[EMAIL 
PROTECTED] wrote:

Would that stop them dragging  dropping onto a usb stick?



S



From: David Lum [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: Tuesday, October 21, 2008 5:11 PM

To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs



Good job guys, Information Rights Management, that's it…

http://office.microsoft.com/en-us/help/HA101029181033.aspx



Dave



From: Oliver Marshall [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: Tuesday, October 21, 2008 12:19 PM
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs



And thats still part of Office Server isn't it ?



From: Kennedy, Jim [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: 21 October 2008 20:15
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs



Microsoft's Rights Management can do much of what you seek. Although it isn't 
perfect and can be beat it should get you to be able to say you tried really 
hard to the lawyers.





From: Oliver Marshall [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: Tuesday, October 21, 2008 2:59 PM
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs



Remember remember.



From: David Lum [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: 21 October 2008 19:43
To: NT System Admin Issues
Subject: RE: Stopping users emailing out internal docs



I seem to think InfoPath or Groove or some other MS tool can do this kind of 
job – you can select an e-mail and effectively make it unforwardable, it was 
pretty slick…now if I could only remember what product it was…

David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764

From: Oliver Marshall [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
Sent: Tuesday, October 21, 2008 11:00 AM
To: NT System Admin Issues
Subject: Stopping users emailing out internal docs



Hi chaps,



We've had a case this week of a client who found out a user, who is in the 
process of being let go, had emailed out to their personal gmail account a copy 
of all the internal documents, logos, process diagrams, etc. The user is now 
undergoing disciplinary action and facing possible legal action.



However, while it's almost impossible to prevent a user from emailing a 
document out if they really want to, companies are obliged to have a policy in 
place requiring them not to doing so, and here in the UK that policy has to be 
seen to be implemented and enforced if it is to be referred to in any action.



We've suggested a proper compliance level archival service in order to allow 
for emails to be restored even when users delete emails from their machines 
(and their recoverable deleted items in this case). Elsewhere we have used 
similar services to also report on certain file types, file names and sizes of 
files being sent, and use them to bounce emails under certain conditions. 
Bouncing certain emails, while a very limited short-stick, does allow for the 
policy to be seen to be in place if people are as silly as to send out 
documents with certain names etc (like Accounts2008.xls etc).



What do other companies do to help either prevent people sending docs out, or 
to cover themselves legally should they have to take action against a user for 
doing so, or to highlight when a user is doing so?



Olly



--

G2 Support

Network Support : Online Backups : Server Management



Email:  [EMAIL PROTECTED]mailto:[EMAIL PROTECTED]

Web:http://www.g2support.comhttp://www.g2support.com/


















































--
Sherry Abercrombie

Any sufficiently advanced technology is indistinguishable from magic.
Arthur C. Clarke






~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~


RE: Stopping users emailing out internal docs

2008-10-21 Thread Ken Schaefer
Windows Rights Management can stop people printing things.

Copying stuff to USB keys is pointless - the documents are encrypted. If you 
don't have access to the RM server, you can't decrypt the document. Same with 
forwarding the document somewhere else.

You can stop Alt+Print Screen as well.

You can't stop *analogue* attacks (which is why it's called Digital rights 
management). If someone brings in a camera and takes a photo of the screen, 
then there's not much you can do about that. But analogue attacks are much 
slower to execute than digital attacks.

Cheers
Ken

 -Original Message-
 From: Kennedy, Jim [mailto:[EMAIL PROTECTED]
 Sent: Wednesday, 22 October 2008 11:16 AM
 To: NT System Admin Issues
 Subject: RE: Stopping users emailing out internal docs


 It also won't stop printing it and faxing it or putting the paper in their
 pocket. Or alt print screen and emailing the jpg. Or a hundred other ways
 we could all dream up.

 The OP needs to make enough effort to satisfy the law in his country so that a
 good faith effort can be shown from what I read in his original post.  If this
 gets him there only the lawyers can say.

 
 From: Sherry Abercrombie [EMAIL PROTECTED]
 Sent: Tuesday, October 21, 2008 4:33 PM
 To: NT System Admin Issues
 Subject: Re: Stopping users emailing out internal docs

 Policies to prevent the unauthorized use of usb ports.  There's good software
 that will do this, and will apply even on machines (laptops) that are off the
 network.

 On Tue, Oct 21, 2008 at 3:28 PM, NTSysAdmin
 [EMAIL PROTECTED]mailto:[EMAIL PROTECTED] wrote:

 Would that stop them dragging  dropping onto a usb stick?



 S



 From: David Lum [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
 Sent: Tuesday, October 21, 2008 5:11 PM

 To: NT System Admin Issues
 Subject: RE: Stopping users emailing out internal docs



 Good job guys, Information Rights Management, that's it...

 http://office.microsoft.com/en-us/help/HA101029181033.aspx



 Dave



 From: Oliver Marshall
 [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
 Sent: Tuesday, October 21, 2008 12:19 PM
 To: NT System Admin Issues
 Subject: RE: Stopping users emailing out internal docs



 And thats still part of Office Server isn't it ?



 From: Kennedy, Jim
 [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
 Sent: 21 October 2008 20:15
 To: NT System Admin Issues
 Subject: RE: Stopping users emailing out internal docs



 Microsoft's Rights Management can do much of what you seek. Although it isn't
 perfect and can be beat it should get you to be able to say you tried really
 hard to the lawyers.





 From: Oliver Marshall
 [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
 Sent: Tuesday, October 21, 2008 2:59 PM
 To: NT System Admin Issues
 Subject: RE: Stopping users emailing out internal docs



 Remember remember.



 From: David Lum [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
 Sent: 21 October 2008 19:43
 To: NT System Admin Issues
 Subject: RE: Stopping users emailing out internal docs



 I seem to think InfoPath or Groove or some other MS tool can do this kind of
 job - you can select an e-mail and effectively make it unforwardable, it was
 pretty slick...now if I could only remember what product it was...

 David Lum // SYSTEMS ENGINEER
 NORTHWEST EVALUATION ASSOCIATION
 (Desk) 971.222.1025 // (Cell) 503.267.9764

 From: Oliver Marshall
 [mailto:[EMAIL PROTECTED]mailto:[EMAIL PROTECTED]]
 Sent: Tuesday, October 21, 2008 11:00 AM
 To: NT System Admin Issues
 Subject: Stopping users emailing out internal docs



 Hi chaps,



 We've had a case this week of a client who found out a user, who is in the
 process of being let go, had emailed out to their personal gmail account a
 copy of all the internal documents, logos, process diagrams, etc. The user is
 now undergoing disciplinary action and facing possible legal action.



 However, while it's almost impossible to prevent a user from emailing a
 document out if they really want to, companies are obliged to have a policy in
 place requiring them not to doing so, and here in the UK that policy has to be
 seen to be implemented and enforced if it is to be referred to in any action.



 We've suggested a proper compliance level archival service in order to allow
 for emails to be restored even when users delete emails from their machines
 (and their recoverable deleted items in this case). Elsewhere we have used
 similar services to also report on certain file types, file names and sizes of
 files being sent, and use them to bounce emails under certain conditions.
 Bouncing certain emails, while a very limited short-stick, does allow for the
 policy to be seen to be in place if people are as silly as to send out
 documents with certain names etc (like Accounts2008.xls etc).



 What do other companies do to help either prevent people sending docs out, or
 to cover themselves legally should they have to take action against 

RE: Any SCOM users?

2008-10-21 Thread Michael B. Smith
My bad. I have event logs on the brain. Of course you are correct.

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

Link with me at: http://www.linkedin.com/in/theessentialexchange

 

From: Ken Schaefer [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 7:19 PM
To: NT System Admin Issues
Subject: RE: Any SCOM users?

 

MOM used to have a bunch of providers for standard log file formats (like w3
and NCSA). I'm assuming that SCOM, at the very least, can query w3 log file
format (since that is what IIS uses)

 

Cheers

Ken

 

From: Michael B. Smith [mailto:[EMAIL PROTECTED] 
Sent: Wednesday, 22 October 2008 6:23 AM
To: NT System Admin Issues
Subject: RE: Any SCOM users?

 

Standard windows log file.

 

OpsMgr doesn't actually care about the format of the text or data, it checks
the source and eventid.

 

Regards,

 

Michael B. Smith, MCITP:SA,EMA/MCSE/Exchange MVP

My blog: http://TheEssentialExchange.com/blogs/michael

Link with me at: http://www.linkedin.com/in/theessentialexchange

 

From: David Lum [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 1:42 PM
To: NT System Admin Issues
Subject: Any SCOM users?

 

I have a Q about it ..can we write a custom .Net application and have its
log file monitored by SCOM? If so, what kind of format does the log need to
be in?

 

David Lum // SYSTEMS ENGINEER 
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764

 

 

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

ANYONE HAVING bitSPYDER.NET ACCOUNT

2008-10-21 Thread Manpreet Chaniana
Hello Everyone.

 

Just if anyone has bitspyder.net or biteme.org accounts, if possible send me
invites for it as I heard they have excellent stuff for IT professionals.

Please send the invite to this email account [EMAIL PROTECTED]

 

 

Help is highly appreciated.

 

Manni


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

RE: ANYONE HAVING bitSPYDER.NET ACCOUNT

2008-10-21 Thread Sam Cayze
Taking a guess here...
http://www.bugmenot.com/view/biteme.org
http://www.bugmenot.com/view/biteme.org 



From: Manpreet Chaniana [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, October 21, 2008 8:46 PM
To: NT System Admin Issues
Subject: ANYONE HAVING bitSPYDER.NET ACCOUNT



Hello Everyone.

 

Just if anyone has bitspyder.net or biteme.org accounts, if possible
send me invites for it as I heard they have excellent stuff for IT
professionals.

Please send the invite to this email account [EMAIL PROTECTED]

 

 

Help is highly appreciated.

 

Manni


 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~

OT: Power Management has a mind of its own

2008-10-21 Thread Gary Whitten
All

Perhaps my Google-fu is weak, and if so, I will accept shame willingly at
this point but my home laptop is driving me up the wall.  Windows XP SP3,
Dell Latitude D531 that's reasonably healthy.  It's in a docking station
with two monitors attached.

This only started happening about a week ago, came home, found the system in
Standby mode.  Power settings were somehow flipped to something that has
Standby, even if plugged in.  This is not what I want.  I have some power
settings for HDD and Standby on battery, but when plugged in, my settings
are about 15 mins/Always On/Always on.

At least 5 times in this 1 week period, I come to the desk to find the
system in standby.  I check the power settings and they've been altered away
from my settings had been.  I've even had my custom settings deleted.

Has ANYONE run into this either at home or in your corporate environment
Any suggestions on where to look?  I've done registry scans with Ace
Utilities, done virus scans and did a number of searches for articles and
posts on this and am at my wits end.  I don't want to spend time I don't
have to rebuild the thing.

Thanks in advance,

Gary


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/  ~