Re: Print *accounting*
http://www.papercut.com/ On 5/3/2010 11:48 AM, John Aldrich wrote: In light of a similar thread going on here, I thought I'd post a related question. Can anyone suggest any software to help with network print accounting? We currently print primarily through our Win2k3 print server (at least for our MFP devices) and I'd like to help spread the pain of the maintenance fees over the various departments who use the MFP devices by keeping track of who prints how much. John-AldrichTile-Tools ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Alternatives to Exchange
I would take a hard look at the Kerio product. -Original Message- From: Brian Desmond [mailto:br...@briandesmond.com] Sent: Tuesday, May 04, 2010 1:50 AM To: NT System Admin Issues Subject: RE: Alternatives to Exchange I've been to a number of customers that have significantly sized Zimbra deployments and they seem to all be pretty happy. My one observation is that the company seems to change hands quite a bit which would bother me as a manager if I were making this decision. What's the impetus for moving in-house? Have you looked at something like BPOS or Google Apps which offers the calendaring integration? Thanks, Brian Desmond br...@briandesmond.com c - 312.731.3132 -Original Message- From: Kurt Buff [mailto:kurt.b...@gmail.com] Sent: Monday, May 03, 2010 11:50 PM To: NT System Admin Issues Subject: Re: Alternatives to Exchange I know that a major medical research facility in Seattle just started implementing Zimbra - my wife works there. She's liking it for the integration of calendars and tasks with email, though she misses the ability in Thunderbird to make up templates for standard emails. OTOH, this is a very new implementation, and they're having a brown bag presentation this week to explain more about how to use it, so she might well find out that templates can be set up. Kurt On Mon, May 3, 2010 at 21:11, Angus Scott-Fleming angu...@geoapps.com wrote: All Have a client who's looking to move from hosted-POP3 to an in-house groupware server with calendaring and email, and I'm looking for alternatives to Exchange primarily because of cost. I've heard Good Things about both Kerio Mail Server (now Kerio Connect) and mDaemon from Alt-N. I know at least one list member is running on Kerio because the Kerio Connect string is in his mail headers. Does anyone here have any experience with either of these two mail servers? How about Zimbra? -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Print *accounting*
We have one customer that uses PCounter. http://www.andtechnologies.com/ I dont know much else about it, but it seems to work pretty good. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Symantec Acquires PGP
+1 -Original Message- From: Angus Scott-Fleming [mailto:angu...@geoapps.com] Sent: Tuesday, May 04, 2010 12:12 AM To: NT System Admin Issues Subject: Re: Symantec Acquires PGP On 3 May 2010 at 9:23, David W. McSpadden wrote: Pretty Good Protection To Probably Great POS I think you meant Phormerly Great ... ;-) -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Exchange server recommentations
Michael, I just wanted to say “excellent” article in this months issue of Windows IT pro magazine. I am going to send that to my Exchange Admin and review it again before we do our Win2k8R2/Exchange 2010 Migration in a few months. Kudos, Z Edward Ziots CISSP,MCSA,MCP+I,Security +,Network +,CCA Network Engineer Lifespan Organization 401-639-3505 ezi...@lifespan.org From: Michael B. Smith [mailto:mich...@smithcons.com] Sent: Monday, May 03, 2010 11:02 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations You can deploy Exchange 2010 a couple of different ways. The traditional way, with RAID, assumes you will continue to execute regular backups. Since Exchange 2010’s I/O requirements is 90% LESS THAN that of Exchange 2003, it’s arguable whether you need to separate log and database files. For disk recommendations, download the mailbox calculator (you can find links at msexchangeteam.com). The non-traditional way assumes that you replicate your data to a backup server and then to a lagged backup server. So you have just as many COPIES of the data, just in different formats that enhance recoverability. You can easily put 900 users on a single server with all roles; especially if concurrency is very low. Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Tom Miller [mailto:tmil...@hnncsb.org] Sent: Monday, May 03, 2010 10:56 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations Sorry, I knew I forgot something: currently t1 to each location from HQ. Will be increased 3x once we move to Metro Ethernet. Total mailboxes: 900, 20% have little if any activity Also, does MS still recommend separate RAID configurations for the logs files and database files (at least for HQ servers)? Tom Michael B. Smith mich...@smithcons.com 5/3/2010 10:49 AM What’s the total number of mailboxes and what kind of connectivity is available to the field sites? Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Tom Miller [mailto:tmil...@hnncsb.org] Sent: Monday, May 03, 2010 10:44 AM To: NT System Admin Issues Subject: Exchange server recommentations Hi Folks, I currently run a non-Exchange shop. There is talk of moving to Exchange. Fine by me, whatever works... It's been a while since I worked with Exchange last (Exchange 2000). Anyone care to provide some general hardware recommendations for the following: field sites, 10-40 staff per location. HQ site, about 600 staff. I currently split the staff accounts onto two servers. Currently each field site has it's own server, but I might go with XenApp for Outlook, then I wouldn't have to purchase new hardware, since those servers are mostly 32-bit. Our current mail system hardly uses any memory but I'm sure Exchange would use more. Tom Confidentiality Notice: This e-mail message, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. Confidentiality Notice: This e-mail message, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Print Server suggestions (thanks)
I can't begin to thank everyone enough for this discussion. You have clearly pointed me in the right direction and saved me a ton of research time. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Print *accounting*
We used pcounter, but moved away from print accounting. We're an accounting firm and made the decision that it was more efficient for us to allocate all printing to overhead, and indirectly bill it through our rates than it was to allocate directly to the client. On Tue, May 4, 2010 at 7:05 AM, Chris Hamby tellys...@gmail.com wrote: We have one customer that uses PCounter. http://www.andtechnologies.com/ I dont know much else about it, but it seems to work pretty good. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Yahoo / IM Virus New??
Hey all; So of my users are reporting getting a link to a PHP page in the Yahoo Chats from Known contacts, once clicked (of course they did) it scans through their IM contacts and sends the exact link to all of them. Just a heads up, don't know if it's new or not but 1st time I've seen it. In case anyone gets it, ours is like this foto http bflmages com / images php add dot's and stuff of course Cheers! Carlos Garcia-Moran _ This e-mail, including attachments, contains information that is confidential and may be protected by attorney/client or other privileges. This e-mail, including attachments, constitutes non-public information intended to be conveyed only to the designated recipient(s). If you are not an intended recipient, you are hereby notified that any unauthorized use, dissemination, distribution or reproduction of this e-mail, including attachments, is strictly prohibited and may be unlawful. If you have received this e-mail in error, please notify me by e-mail reply and delete the original message and any attachments from your system. _ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Alternatives to Exchange
We've been using Mdaemon for 10+ years now. Although for the past 4 or so only as a secondary spam/virus gateway in front of Exchange. They have some pretty impressive features now like BB syncing, etc. Haven't paid much attention to the details since we aren't using it as anything but a gateway. -Original Message- From: Angus Scott-Fleming [mailto:angu...@geoapps.com] Sent: Monday, May 03, 2010 11:12 PM To: NT System Admin Issues Subject: Alternatives to Exchange All Have a client who's looking to move from hosted-POP3 to an in-house groupware server with calendaring and email, and I'm looking for alternatives to Exchange primarily because of cost. I've heard Good Things about both Kerio Mail Server (now Kerio Connect) and mDaemon from Alt-N. I know at least one list member is running on Kerio because the Kerio Connect string is in his mail headers. Does anyone here have any experience with either of these two mail servers? How about Zimbra? -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Recycler Files
Is there a way to view the contents within a Recycler file in XP? _ Cameron Cooper Network Administrator | CompTIA A+ Certified Aurico Reports, Inc Phone: 847-890-4021 | Fax: 847-255-1896 ccoo...@aurico.com mailto:ccoo...@aurico.com | www.aurico.com ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Yahoo / IM Virus New??
Woot! NOD32 5080 and above is blocking the Worm :0 , We are Saved, Well until someone else clicks on another one From: Angus Scott-Fleming [mailto:angu...@geoapps.com] Sent: Tuesday, May 04, 2010 9:42 AM To: NT System Admin Issues Subject: Re: Yahoo / IM Virus New?? So of my users are reporting getting a link to a PHP page in the Yahoo Chats from Known contacts, once clicked (of course they did) it scans through their IM contacts and sends the exact link to all of them. Just a heads up, don't know if it's new or not but 1st time I've seen it. In case anyone gets it, ours is like this foto http bflmages com / images php add dot's and stuff of course In the news right now: Yahoo! Messenger Users Infected By New Worm, Form An IRC Botnet | CyberInsecure.com http://cyberinsecure.com/yahoo-messenger-users-infected-by-new-worm-form -an-irc-botnet/ A new worm is quickly spreading on Yahoo! Messenger (YM) via Web links to fake images. Users who fall victim to this threat have an IRC botnet client installed on their computers. According to security researchers from Vietnam-based antivirus vendor Bkis, who analyzed the new worm, it spreads though YM spam. The malware sends out malicious links of the form http://[rogue_domain_name]/image.php to the entire contact list of any user logged into YM on an infected computer. -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-895-3270 Security Blog: http://geoapps.com/ _ This e-mail, including attachments, contains information that is confidential and may be protected by attorney/client or other privileges. This e-mail, including attachments, constitutes non-public information intended to be conveyed only to the designated recipient(s). If you are not an intended recipient, you are hereby notified that any unauthorized use, dissemination, distribution or reproduction of this e-mail, including attachments, is strictly prohibited and may be unlawful. If you have received this e-mail in error, please notify me by e-mail reply and delete the original message and any attachments from your system. _ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Problem with RAID 5 Array
I've got a Dell PowerVault RAID 5 enclosure that had a hard drive conk out over the weekend. No biggie, I figured-there are multiple hotspares available. The system grabbed one and rebuilt the array, but fussed that there was a consistency problem. I ran a second, manual consistency check on Monday, though, and it came up clean. Peachy. But Monday night, my backup of the PV failed; Symantec reported that four files were inaccessible. Today I tried to access those four files, and sure enough I can't do anything with them. Can't delete them. Can't copy them. Can't rename them. Nothing. I get Error 0x80070079: The semaphore timeout period has expired. I ran chkdsk in read-only mode, and got this: The type of the file system is NTFS. Volume label is PowerVault. WARNING! F parameter not specified. Running CHKDSK in read-only mode. CHKDSK is verifying files (stage 1 of 3)... File record segment 575200 is corrupt.0 file records processed) 2953600 file records processed. File verification completed. 832 large file records processed. Errors found. CHKDSK cannot continue in read-only mode. So, what gives? The array reports everything is fine. But obviously, something is funky. I can restore the four corrupt files from a backup-that's no problem. But not if I can't first delete the bad versions. John Hornbuckle MIS Department Taylor County School District www.taylor.k12.fl.us NOTICE: Florida has a broad public records law. Most written communications to or from this entity are public records that will be disclosed to the public and the media upon request. E-mail communications may be subject to public disclosure. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Yahoo / IM Virus New??
Hopefully Vipre blocks it as well. J John-AldrichTile-Tools From: Garcia-Moran, Carlos [mailto:cgarciamo...@spragueenergy.com] Sent: Tuesday, May 04, 2010 10:14 AM To: NT System Admin Issues Subject: RE: Yahoo / IM Virus New?? Woot! NOD32 5080 and above is blocking the Worm :0 , We are Saved, Well until someone else clicks on another one From: Angus Scott-Fleming [mailto:angu...@geoapps.com] Sent: Tuesday, May 04, 2010 9:42 AM To: NT System Admin Issues Subject: Re: Yahoo / IM Virus New?? So of my users are reporting getting a link to a PHP page in the Yahoo Chats from Known contacts, once clicked (of course they did) it scans through their IM contacts and sends the exact link to all of them. Just a heads up, don't know if it's new or not but 1st time I've seen it. In case anyone gets it, ours is like this foto http bflmages com / images php add dot's and stuff of course In the news right now: Yahoo! Messenger Users Infected By New Worm, Form An IRC Botnet | CyberInsecure.com http://cyberinsecure.com/yahoo-messenger-users-infected-by-new-worm-form-an- irc-botnet/ A new worm is quickly spreading on Yahoo! Messenger (YM) via Web links to fake images. Users who fall victim to this threat have an IRC botnet client installed on their computers. According to security researchers from Vietnam-based antivirus vendor Bkis, who analyzed the new worm, it spreads though YM spam. The malware sends out malicious links of the form http://[rogue_domain_name]/image.php to the entire contact list of any user logged into YM on an infected computer. -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-895-3270 Security Blog: http://geoapps.com/ _ This e-mail, including attachments, contains information that is confidential and may be protected by attorney/client or other privileges. This e-mail, including attachments, constitutes non-public information intended to be conveyed only to the designated recipient(s). If you are not an intended recipient, you are hereby notified that any unauthorized use, dissemination, distribution or reproduction of this e-mail, including attachments, is strictly prohibited and may be unlawful. If you have received this e-mail in error, please notify me by e-mail reply and delete the original message and any attachments from your system. _ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
RE: Exchange server recommentations
Thanks! Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Ziots, Edward [mailto:ezi...@lifespan.org] Sent: Tuesday, May 04, 2010 8:17 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations Michael, I just wanted to say “excellent” article in this months issue of Windows IT pro magazine. I am going to send that to my Exchange Admin and review it again before we do our Win2k8R2/Exchange 2010 Migration in a few months. Kudos, Z Edward Ziots CISSP,MCSA,MCP+I,Security +,Network +,CCA Network Engineer Lifespan Organization 401-639-3505 ezi...@lifespan.orgmailto:ezi...@lifespan.org From: Michael B. Smith [mailto:mich...@smithcons.com] Sent: Monday, May 03, 2010 11:02 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations You can deploy Exchange 2010 a couple of different ways. The traditional way, with RAID, assumes you will continue to execute regular backups. Since Exchange 2010’s I/O requirements is 90% LESS THAN that of Exchange 2003, it’s arguable whether you need to separate log and database files. For disk recommendations, download the mailbox calculator (you can find links at msexchangeteam.com). The non-traditional way assumes that you replicate your data to a backup server and then to a lagged backup server. So you have just as many COPIES of the data, just in different formats that enhance recoverability. You can easily put 900 users on a single server with all roles; especially if concurrency is very low. Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Tom Miller [mailto:tmil...@hnncsb.org] Sent: Monday, May 03, 2010 10:56 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations Sorry, I knew I forgot something: currently t1 to each location from HQ. Will be increased 3x once we move to Metro Ethernet. Total mailboxes: 900, 20% have little if any activity Also, does MS still recommend separate RAID configurations for the logs files and database files (at least for HQ servers)? Tom Michael B. Smith mich...@smithcons.commailto:mich...@smithcons.com 5/3/2010 10:49 AM What’s the total number of mailboxes and what kind of connectivity is available to the field sites? Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Tom Miller [mailto:tmil...@hnncsb.org] Sent: Monday, May 03, 2010 10:44 AM To: NT System Admin Issues Subject: Exchange server recommentations Hi Folks, I currently run a non-Exchange shop. There is talk of moving to Exchange. Fine by me, whatever works... It's been a while since I worked with Exchange last (Exchange 2000). Anyone care to provide some general hardware recommendations for the following: field sites, 10-40 staff per location. HQ site, about 600 staff. I currently split the staff accounts onto two servers. Currently each field site has it's own server, but I might go with XenApp for Outlook, then I wouldn't have to purchase new hardware, since those servers are mostly 32-bit. Our current mail system hardly uses any memory but I'm sure Exchange would use more. Tom Confidentiality Notice: This e-mail message, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. Confidentiality Notice: This e-mail message, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Exchange server recommentations
Z when did that come out? I haven’t seen it yet. From: Michael B. Smith [mailto:mich...@smithcons.com] Sent: Tuesday, May 04, 2010 8:43 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations Thanks! Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Ziots, Edward [mailto:ezi...@lifespan.org] Sent: Tuesday, May 04, 2010 8:17 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations Michael, I just wanted to say “excellent” article in this months issue of Windows IT pro magazine. I am going to send that to my Exchange Admin and review it again before we do our Win2k8R2/Exchange 2010 Migration in a few months. Kudos, Z Edward Ziots CISSP,MCSA,MCP+I,Security +,Network +,CCA Network Engineer Lifespan Organization 401-639-3505 ezi...@lifespan.org From: Michael B. Smith [mailto:mich...@smithcons.com] Sent: Monday, May 03, 2010 11:02 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations You can deploy Exchange 2010 a couple of different ways. The traditional way, with RAID, assumes you will continue to execute regular backups. Since Exchange 2010’s I/O requirements is 90% LESS THAN that of Exchange 2003, it’s arguable whether you need to separate log and database files. For disk recommendations, download the mailbox calculator (you can find links at msexchangeteam.com). The non-traditional way assumes that you replicate your data to a backup server and then to a lagged backup server. So you have just as many COPIES of the data, just in different formats that enhance recoverability. You can easily put 900 users on a single server with all roles; especially if concurrency is very low. Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Tom Miller [mailto:tmil...@hnncsb.org] Sent: Monday, May 03, 2010 10:56 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations Sorry, I knew I forgot something: currently t1 to each location from HQ. Will be increased 3x once we move to Metro Ethernet. Total mailboxes: 900, 20% have little if any activity Also, does MS still recommend separate RAID configurations for the logs files and database files (at least for HQ servers)? Tom Michael B. Smith mich...@smithcons.com 5/3/2010 10:49 AM What’s the total number of mailboxes and what kind of connectivity is available to the field sites? Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Tom Miller [mailto:tmil...@hnncsb.org] Sent: Monday, May 03, 2010 10:44 AM To: NT System Admin Issues Subject: Exchange server recommentations Hi Folks, I currently run a non-Exchange shop. There is talk of moving to Exchange. Fine by me, whatever works... It's been a while since I worked with Exchange last (Exchange 2000). Anyone care to provide some general hardware recommendations for the following: field sites, 10-40 staff per location. HQ site, about 600 staff. I currently split the staff accounts onto two servers. Currently each field site has it's own server, but I might go with XenApp for Outlook, then I wouldn't have to purchase new hardware, since those servers are mostly 32-bit. Our current mail system hardly uses any memory but I'm sure Exchange would use more. Tom Confidentiality Notice: This e-mail message, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. Confidentiality Notice: This e-mail message, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. This message contains confidential information and is intended only for the intended recipient(s). If you are not the named recipient you should not read, distribute or copy this e-mail. Please notify the sender immediately via e-mail if you have received this e-mail by mistake; then, delete this e-mail from your system. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Exchange server recommentations
Shipped last Thursday. Should be in your mailbox yesterday/today. If you have an online subscription, it’s also available there. Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Eldridge, Dave [mailto:d...@parkviewmc.com] Sent: Tuesday, May 04, 2010 10:54 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations Z when did that come out? I haven’t seen it yet. From: Michael B. Smith [mailto:mich...@smithcons.com] Sent: Tuesday, May 04, 2010 8:43 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations Thanks! Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Ziots, Edward [mailto:ezi...@lifespan.org] Sent: Tuesday, May 04, 2010 8:17 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations Michael, I just wanted to say “excellent” article in this months issue of Windows IT pro magazine. I am going to send that to my Exchange Admin and review it again before we do our Win2k8R2/Exchange 2010 Migration in a few months. Kudos, Z Edward Ziots CISSP,MCSA,MCP+I,Security +,Network +,CCA Network Engineer Lifespan Organization 401-639-3505 ezi...@lifespan.orgmailto:ezi...@lifespan.org From: Michael B. Smith [mailto:mich...@smithcons.com] Sent: Monday, May 03, 2010 11:02 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations You can deploy Exchange 2010 a couple of different ways. The traditional way, with RAID, assumes you will continue to execute regular backups. Since Exchange 2010’s I/O requirements is 90% LESS THAN that of Exchange 2003, it’s arguable whether you need to separate log and database files. For disk recommendations, download the mailbox calculator (you can find links at msexchangeteam.com). The non-traditional way assumes that you replicate your data to a backup server and then to a lagged backup server. So you have just as many COPIES of the data, just in different formats that enhance recoverability. You can easily put 900 users on a single server with all roles; especially if concurrency is very low. Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Tom Miller [mailto:tmil...@hnncsb.org] Sent: Monday, May 03, 2010 10:56 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations Sorry, I knew I forgot something: currently t1 to each location from HQ. Will be increased 3x once we move to Metro Ethernet. Total mailboxes: 900, 20% have little if any activity Also, does MS still recommend separate RAID configurations for the logs files and database files (at least for HQ servers)? Tom Michael B. Smith mich...@smithcons.commailto:mich...@smithcons.com 5/3/2010 10:49 AM What’s the total number of mailboxes and what kind of connectivity is available to the field sites? Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Tom Miller [mailto:tmil...@hnncsb.org] Sent: Monday, May 03, 2010 10:44 AM To: NT System Admin Issues Subject: Exchange server recommentations Hi Folks, I currently run a non-Exchange shop. There is talk of moving to Exchange. Fine by me, whatever works... It's been a while since I worked with Exchange last (Exchange 2000). Anyone care to provide some general hardware recommendations for the following: field sites, 10-40 staff per location. HQ site, about 600 staff. I currently split the staff accounts onto two servers. Currently each field site has it's own server, but I might go with XenApp for Outlook, then I wouldn't have to purchase new hardware, since those servers are mostly 32-bit. Our current mail system hardly uses any memory but I'm sure Exchange would use more. Tom Confidentiality Notice: This e-mail message, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. Confidentiality Notice: This e-mail message, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. This e-mail contains the thoughts and opinions of the sender and does not represent official Parkview Medical Center policy. This communication is intended only for the recipient(s) named above, may be confidential and/or legally privileged: and, must be treated as such in accordance with state and federal laws. If you are not the intended recipient, you are hereby notified that any use of this communication, or any of its
Re: Alternatives to Exchange
On 4 May 2010 at 8:34, N Parr wrote: We've been using Mdaemon for 10+ years now. Although for the past 4 or so only as a secondary spam/virus gateway in front of Exchange. They have some pretty impressive features now like BB syncing, etc. Haven't paid much attention to the details since we aren't using it as anything but a gateway. How is their calendar functionality for non-Outlook calendars like Mozilla Sunbird? -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Problem with RAID 5 Array
On Tue, May 4, 2010 at 10:26 AM, John Hornbuckle john.hornbuc...@taylor.k12.fl.us wrote: So, what gives? The array reports everything is fine. But obviously, something is funky. I can restore the four corrupt files from a backup—that’s no problem. But not if I can’t first delete the bad versions. I'd call Dell tech support. It's free and sometimes even helpful. Not knowing more, my guess would be that one of the other disks has some bad blocks. Scenario: Most filesystems have a lot of files which are never or rarely read. Plus RAID 5 provides redundancy -- the controller may normally read the primary set of on-disk blocks and ignore the redundant blocks. End result, you've got blocks allocated on disk, but which are never read. Then a disk fails. Now the controller has to read *every* block of *all* the other disks, in order to rebuild the failed member. Boom. That's when you discoverer that one of the other disks has had bad blocks for years. Unfortunately, the only way to recovery from this scenario is to restore from good backups. For this reason, good controllers have a patrol read feature (or background scrub, etc.), where they regularly read all blocks from all disks, to discover bad blocks as soon as they happen. -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Exchange/Outlook - Calendar Question
Is there any way to have say 11 people in a department sync their Outlook calendars to one Public Calendar they can all access? Let me know if you need more details. I appreciate the help! Bob ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Exchange server recommentations
Windows IT Pro May 2010 Magazine, Instadoc ID 104657. Actually in this months Magazine there is 3 articles focused on Exchange 2010, looking at different parts namely, design, Implementation/Migration. Z Edward Ziots CISSP,MCSA,MCP+I,Security +,Network +,CCA Network Engineer Lifespan Organization 401-639-3505 ezi...@lifespan.org From: Eldridge, Dave [mailto:d...@parkviewmc.com] Sent: Tuesday, May 04, 2010 10:54 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations Z when did that come out? I haven’t seen it yet. From: Michael B. Smith [mailto:mich...@smithcons.com] Sent: Tuesday, May 04, 2010 8:43 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations Thanks! Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Ziots, Edward [mailto:ezi...@lifespan.org] Sent: Tuesday, May 04, 2010 8:17 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations Michael, I just wanted to say “excellent” article in this months issue of Windows IT pro magazine. I am going to send that to my Exchange Admin and review it again before we do our Win2k8R2/Exchange 2010 Migration in a few months. Kudos, Z Edward Ziots CISSP,MCSA,MCP+I,Security +,Network +,CCA Network Engineer Lifespan Organization 401-639-3505 ezi...@lifespan.org From: Michael B. Smith [mailto:mich...@smithcons.com] Sent: Monday, May 03, 2010 11:02 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations You can deploy Exchange 2010 a couple of different ways. The traditional way, with RAID, assumes you will continue to execute regular backups. Since Exchange 2010’s I/O requirements is 90% LESS THAN that of Exchange 2003, it’s arguable whether you need to separate log and database files. For disk recommendations, download the mailbox calculator (you can find links at msexchangeteam.com). The non-traditional way assumes that you replicate your data to a backup server and then to a lagged backup server. So you have just as many COPIES of the data, just in different formats that enhance recoverability. You can easily put 900 users on a single server with all roles; especially if concurrency is very low. Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Tom Miller [mailto:tmil...@hnncsb.org] Sent: Monday, May 03, 2010 10:56 AM To: NT System Admin Issues Subject: RE: Exchange server recommentations Sorry, I knew I forgot something: currently t1 to each location from HQ. Will be increased 3x once we move to Metro Ethernet. Total mailboxes: 900, 20% have little if any activity Also, does MS still recommend separate RAID configurations for the logs files and database files (at least for HQ servers)? Tom Michael B. Smith mich...@smithcons.com 5/3/2010 10:49 AM What’s the total number of mailboxes and what kind of connectivity is available to the field sites? Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Tom Miller [mailto:tmil...@hnncsb.org] Sent: Monday, May 03, 2010 10:44 AM To: NT System Admin Issues Subject: Exchange server recommentations Hi Folks, I currently run a non-Exchange shop. There is talk of moving to Exchange. Fine by me, whatever works... It's been a while since I worked with Exchange last (Exchange 2000). Anyone care to provide some general hardware recommendations for the following: field sites, 10-40 staff per location. HQ site, about 600 staff. I currently split the staff accounts onto two servers. Currently each field site has it's own server, but I might go with XenApp for Outlook, then I wouldn't have to purchase new hardware, since those servers are mostly 32-bit. Our current mail system hardly uses any memory but I'm sure Exchange would use more. Tom Confidentiality Notice: This e-mail message, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. Confidentiality Notice: This e-mail message, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. This e-mail contains the thoughts and opinions of the sender and does not represent official Parkview Medical Center policy. This communication is intended only for the recipient(s) named above, may be confidential and/or
RE: Exchange/Outlook - Calendar Question
Not natively within Exchange, you'll have to go 3rd party. I've only done this with Add2Exchange. http://www.diditbetter.com/Add2Exchange.aspx Shook From: Chyka, Robert [mailto:bch...@medaille.edu] Sent: Tuesday, May 04, 2010 11:14 AM To: NT System Admin Issues Subject: Exchange/Outlook - Calendar Question Is there any way to have say 11 people in a department sync their Outlook calendars to one Public Calendar they can all access? Let me know if you need more details. I appreciate the help! Bob ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Exchange/Outlook - Calendar Question
They could always setup an address attached to this public calendar and send it an invite. Don Guyer Systems Engineer - Information Services Prudential, Fox Roach/Trident Group 431 W. Lancaster Avenue Devon, PA 19333 Direct: (610) 993-3299 Fax: (610) 650-5306 don.gu...@prufoxroach.com mailto:don.gu...@prufoxroach.com From: Chyka, Robert [mailto:bch...@medaille.edu] Sent: Tuesday, May 04, 2010 11:14 AM To: NT System Admin Issues Subject: Exchange/Outlook - Calendar Question Is there any way to have say 11 people in a department sync their Outlook calendars to one Public Calendar they can all access? Let me know if you need more details. I appreciate the help! Bob ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Exchange/Outlook - Calendar Question
Thanks Shook. I will definitely check it out. -BC From: Andy Shook [mailto:andy.sh...@peak10.com] Sent: Tuesday, May 04, 2010 11:19 AM To: NT System Admin Issues Subject: RE: Exchange/Outlook - Calendar Question Not natively within Exchange, you'll have to go 3rd party. I've only done this with Add2Exchange. http://www.diditbetter.com/Add2Exchange.aspx Shook From: Chyka, Robert [mailto:bch...@medaille.edu] Sent: Tuesday, May 04, 2010 11:14 AM To: NT System Admin Issues Subject: Exchange/Outlook - Calendar Question Is there any way to have say 11 people in a department sync their Outlook calendars to one Public Calendar they can all access? Let me know if you need more details. I appreciate the help! Bob ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Problem with RAID 5 Array
Yeah, I opened a case with Dell support before sending this message. Haven't been blown away. The technician is Googling the error--not exactly the kind of expertise I was expecting. -Original Message- From: Ben Scott [mailto:mailvor...@gmail.com] Sent: Tuesday, May 04, 2010 11:16 AM To: NT System Admin Issues Subject: Re: Problem with RAID 5 Array On Tue, May 4, 2010 at 10:26 AM, John Hornbuckle john.hornbuc...@taylor.k12.fl.us wrote: So, what gives? The array reports everything is fine. But obviously, something is funky. I can restore the four corrupt files from a backup-that's no problem. But not if I can't first delete the bad versions. I'd call Dell tech support. It's free and sometimes even helpful. Not knowing more, my guess would be that one of the other disks has some bad blocks. Scenario: Most filesystems have a lot of files which are never or rarely read. Plus RAID 5 provides redundancy -- the controller may normally read the primary set of on-disk blocks and ignore the redundant blocks. End result, you've got blocks allocated on disk, but which are never read. Then a disk fails. Now the controller has to read *every* block of *all* the other disks, in order to rebuild the failed member. Boom. That's when you discoverer that one of the other disks has had bad blocks for years. Unfortunately, the only way to recovery from this scenario is to restore from good backups. For this reason, good controllers have a patrol read feature (or background scrub, etc.), where they regularly read all blocks from all disks, to discover bad blocks as soon as they happen. -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ NOTICE: Florida has a broad public records law. Most written communications to or from this entity are public records that will be disclosed to the public and the media upon request. E-mail communications may be subject to public disclosure. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Recycler Files
On 4 May 2010 at 8:49, Cameron Cooper wrote: Is there a way to view the contents within a Recycler file in XP? I have browsed the RECYCLER folders using Total Commander from http://www.ghisler.com/. You have to set it to view Hidden/System Files which is in the Display option. You will have cryptic file names within the recycled folders. What are you trying to do? Angus -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Hotel room router with wifi and gigabit E-net
On the other list it would've been a different story :) Regards Tony Patton Desktop Operations Cavan Ext 8078 Direct Dial 049 435 2878 email: tony.pat...@quinn-insurance.com From: Don Guyer don.gu...@prufoxroach.com To: NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com Date: 30/04/2010 19:34 Subject: RE: Hotel room router with wifi and gigabit E-net ?My boss travels a lot and sometimes carries several toys with her.? Dang, no one picked up on this yet?! You guys (and gals) are slipping! J Don Guyer Systems Engineer - Information Services Prudential, Fox Roach/Trident Group 431 W. Lancaster Avenue Devon, PA 19333 Direct: (610) 993-3299 Fax: (610) 650-5306 don.gu...@prufoxroach.com From: Jon B. Lewis [mailto:j...@myriadds.com] Sent: Wednesday, April 28, 2010 11:40 AM To: NT System Admin Issues Subject: RE: Hotel room router with wifi and gigabit E-net You might try a home router flashed with DD-WRT or Tomato. I know you can get one to do 1, 2, and 3. I have no idea on 4 and you could do 5 with an adapter couldn?t you? From: Leif Wahlberg [mailto:lef...@gmail.com] Sent: Wednesday, April 28, 2010 8:49 AM To: NT System Admin Issues Subject: RE: Hotel room router with wifi and gigabit E-net Hi Greg, Yes, you are right. PPTP client is the only VPN that will work thru a hotel router in this case. Her computer can do that without problems, but she wants to share the VPN with her other toys, that?s why I am looking for a router with PPTP VPN client functionality. She tried a Linksys Wi-Fi access thing that could let her use a hotel Wi-Fi in her room, but that is not the solution here. She wants to use the copper cable in the room and give access to her IPhone and iPad and also let the iPad get to the corporate network via the VPN handled by the router/Wi-Fi thing. Bulky is NOT a problem. The company pays for excess baggage. And Yes, she wants FAST transfer between wired laptops in her room. Sigh!! Leif From: greg.swe...@actsconsulting.net [ mailto:greg.swe...@actsconsulting.net] Sent: Wednesday, April 28, 2010 9:34 PM To: NT System Admin Issues Subject: RE: Hotel room router with wifi and gigabit E-net Leif, The VPN is the only real issue. That?s mainly an issue with the type of network at the hotel. Some require you to get a static IP and then call a helpdesk, others its never a problem, most require some type of authentication before getting out to the internet.. Also if you put in a commercial device its most likely going to pull a NATTED IP address from the hotel and then you boss will grab another Natted IP from your device, so you will be doing double natting. This alone could cause you some VPN issue, especially IPSEC. Best bet is to get a portable WIFI AP that?s not a router and will just give you wifi in the room if hardwire is the only thing available. http://www.dlink.com/products/?pid=346 I use this in AP mode when I need to. Most hotels I stay at have wifi in the rooms so its not a problem and rarely do I have VPN issues, never RDP issues. Its not N wireless, but I am sure there are some out there. However N is going to be quite bulky with all the antennas. This doesn?t have a USB connection for storage. As to Gigabit, there is no point as you wont benefit unless you are transferring data between devices hardline in your room. Greg From: Leif Wahlberg [mailto:lef...@gmail.com] Sent: Wednesday, April 28, 2010 9:22 AM To: NT System Admin Issues Subject: Hotel room router with wifi and gigabit E-net My boss travels a lot and sometimes carries several toys with her. She has expressed a wish to have the following added to her travel kit: Hotel room router with the following capabilities: 1. Gigabit wired Ethernet 2. Wi-Fi, preferably multi type, including N 3. PPTP client capabilities. (Important) 4. USB storage connection 5. 110-220 V power supply I don?t mind buying her a consumer type device as long as it fulfills her requirements. Just an explanation for the PPTP client requirement. She wants the router to open a VPN to our corporate network and that connection should be available to all the toys she connects to this router. I can set up a filtered PPTP host in our firewall, so that is not a problem. Any suggestions? Leif Wahlberg Admin by default (Excessive sig deleted) This e-mail is intended only for the addressee named above. The contents should not be copied nor disclosed to any other person. Any views or opinions expressed are solely those of the sender and do not necessarily represent those of QUINN-Insurance Limited (Under Administration), unless otherwise specifically stated . As internet communications are not secure, QUINN-Insurance Limited (Under Administration) is not responsible for the contents of this message nor responsible for any change made to this message after it was sent by the original
RE: Yahoo / IM Virus New??
http://www.darkreading.com/insiderthreat/security/attacks/showArticle.jhtml?articleID=224700541 More information on this latest IM threat. Here is the write-up accordingly: http://www.symantec.com/security_response/writeup.jsp?docid=2010-050209-1610-99tabid=2 Typical nastiest on the Trojan downloader, Would recommend that you block the domains listed in the article writeup and drop all traffic outbound to them on port 2345 TCP tagged as IRC traffic. It doesn’t look like these domains are fast-flux: Non-authoritative answer: Name:e2doo.org Address: 123.176.40.3 Non-authoritative answer: Name:sls.e2doo.net Address: 216.246.31.107 Country of Origin: USA OrgName:Server Central Network OrgID: SCN-18 Address:209 W. Jackson Blvd. Address:Suite 700 City: Chicago StateProv: IL PostalCode: 60606 Country:US ReferralServer: rwhois://rwhois.servercentral.net:4321 NetRange: 216.246.0.0 - 216.246.127.255 CIDR: 216.246.0.0/17 NetName:SCN-5 NetHandle: NET-216-246-0-0-1 Parent: NET-216-0-0-0-0 NetType:Direct Allocation NameServer: NS1.SCSERVERS.COM NameServer: NS2.SCSERVERS.COM Comment: RegDate:2006-01-17 Updated:2006-09-11 RTechHandle: JL1890-ARIN RTechName: Server Central, Jordan RTechPhone: +1-312-829- RTechEmail: supp...@servercentral.net OrgAbuseHandle: ABUSE1669-ARIN OrgAbuseName: Abuse Department OrgAbusePhone: +1-312-829- OrgAbuseEmail: ab...@servercentral.net OrgNOCHandle: NETWO1779-ARIN OrgNOCName: Network Operations OrgNOCPhone: +1-312-829- OrgNOCEmail: supp...@servercentral.net OrgTechHandle: NETWO1779-ARIN OrgTechName: Network Operations OrgTechPhone: +1-312-829- OrgTechEmail: supp...@servercentral.net # ARIN WHOIS database, last updated 2010-05-03 20:00 # Enter ? for additional hints on searching ARIN's WHOIS database. # # ARIN WHOIS data and services are subject to the Terms of Use # available at https://www.arin.net/whois_tou.html And India: for e2doo.org person: Technical Admin Beam Cable System nic-hdl: TB103-AP e-mail: te...@beamtele.com address: Beam Telecom Pvt Ltd address: 8-2-610/A, Road No - 10 Banjara Hills, Hyderabad country: IN phone:+914066272727 changed: te...@beamtelecom.com 20091020 mnt-by: MAINT-NEW source: APNIC EZ Edward Ziots CISSP,MCSA,MCP+I,Security +,Network +,CCA Network Engineer Lifespan Organization 401-639-3505 ezi...@lifespan.org From: John Aldrich [mailto:jaldr...@blueridgecarpet.com] Sent: Tuesday, May 04, 2010 10:31 AM To: NT System Admin Issues Subject: RE: Yahoo / IM Virus New?? Hopefully Vipre blocks it as well. ☺ From: Garcia-Moran, Carlos [mailto:cgarciamo...@spragueenergy.com] Sent: Tuesday, May 04, 2010 10:14 AM To: NT System Admin Issues Subject: RE: Yahoo / IM Virus New?? Woot! NOD32 5080 and above is blocking the Worm :0 , We are Saved, Well until someone else clicks on another one From: Angus Scott-Fleming [mailto:angu...@geoapps.com] Sent: Tuesday, May 04, 2010 9:42 AM To: NT System Admin Issues Subject: Re: Yahoo / IM Virus New?? So of my users are reporting getting a link to a PHP page in the Yahoo Chats from Known contacts, once clicked (of course they did) it scans through their IM contacts and sends the exact link to all of them. Just a heads up, don’t know if it’s new or not but 1st time I’ve seen it. In case anyone gets it, ours is like this “foto http bflmages com / images php” add dot’s and stuff of course In the news right now: Yahoo! Messenger Users Infected By New Worm, Form An IRC Botnet | CyberInsecure.com http://cyberinsecure.com/yahoo-messenger-users-infected-by-new-worm-form-an-irc-botnet/ A new worm is quickly spreading on Yahoo! Messenger (YM) via Web links to fake images. Users who fall victim to this threat have an IRC botnet client installed on their computers. According to security researchers from Vietnam-based antivirus vendor Bkis, who analyzed the new worm, it spreads though YM spam. The malware sends out malicious links of the form http://[rogue_domain_name]/image.php to the entire contact list of any user logged into YM on an infected computer. -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-895-3270 Security Blog: http://geoapps.com/ _ This e-mail, including attachments, contains information that is confidential and may be protected by attorney/client or other privileges. This e-mail, including attachments, constitutes non-public information intended to be conveyed only to the designated recipient(s). If you are not an intended recipient, you are hereby notified that any unauthorized use, dissemination, distribution or reproduction of this e-mail, including attachments, is strictly prohibited and may be unlawful. If you have received this e-mail in error, please notify me by e-mail reply and delete the original message and any
Any certification on removing malware??
Any certification on removing malware?? How about using and configuring and setup of antimalware software. -- Justin IT-TECH ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Any certification on removing malware??
I've know some folks who should receive certifications for GETTING malware... On Tue, May 4, 2010 at 11:40 AM, justino garcia jgarciaitl...@gmail.comwrote: Any certification on removing malware?? How about using and configuring and setup of antimalware software. -- Justin IT-TECH ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Internet / computer usage policies
Anyone here got a good internet computer usage policy they'd be willing to share? I just checked our company policy document and it says *nothing* about computers or internet usage. Nada, zero, zip about computers or internet. John-AldrichTile-Tools ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
Re: Internet / computer usage policies
http://www.sans.org/security-resources/policies/ http://www.sans.org/security-resources/policies/ -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 11:43 AM, John Aldrich jaldr...@blueridgecarpet.comwrote: Anyone here got a good internet computer usage policy they’d be willing to share? I just checked our company policy document and it says **nothing ** about computers or internet usage. Nada, zero, zip about computers or internet. [image: John-Aldrich][image: Tile-Tools] ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image002.jpgimage001.jpg
Re: Any certification on removing malware??
lol was that to mean as a joke, hahaha then I know some people personally who should be awared. On Tue, May 4, 2010 at 11:42 AM, Richard Stovall rich...@gmail.com wrote: I've know some folks who should receive certifications for GETTING malware... On Tue, May 4, 2010 at 11:40 AM, justino garcia jgarciaitl...@gmail.comwrote: Any certification on removing malware?? How about using and configuring and setup of antimalware software. -- Justin IT-TECH -- Justin IT-TECH ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Watchguard Firebox update today marking all email as a virus.
HI, did you have a recent firmware update. HI phill hope all get worked out soon. gopp On Mon, May 3, 2010 at 10:58 AM, Phillip Partipilo p...@psnet.com wrote: Is anybody else with a Firebox having all of your email getting quarantined? This is a brilliant start to a week. After one of the most miserable Sunfests, entertainment wise (and subsequent recovery from said event)... Phillip Partipilo Parametric Solutions Inc. Jupiter, Florida (561) 747-6107 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ -- Justin IT-TECH ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Encryption
First off, we are running a Windows 2003 Native Active Directory. There are no plans, or funds to move up to 2008. We have an upcoming project that will require a location on our file server that encrypts folders and documents stored there. This project could last only a year, or up to 5, all depends on its success. The files will be uploaded from Outside customers, either via VPN or SFTP. I am looking at EFS, True Crypt or PGP. Anyone have opinions on which to use and why? Thanks! ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Alternatives to Exchange
mDaemon from Alt-N We use that, it great and know it partialy owned by RIM. It web client world client, does the group ware, and you can buy per user, the outlook connector. BUt outlook connector fails to work for inboxes larger then 2 gigs. I have setup BIS intergration (since now they are subisdary of rim), but it does it job at push email, but fail to provide push contacts or cal even, unless you use a synch ml client on all your smart phone(so only push email via bb). I would of hopped since RIM took over, it would offer BES for alt-n. But we also use mDaemon from Alt-N, as a gateway /antivirus / antispam for exchange. I would like for mDaemon from Alt-N to offer more then one antispam and antivirus defention eningee, if VIper email security could be attached to it, it may help in the back end, but since our clients know have vipre at the end point (on thier workstations), it good look. I think mDaemon from Alt-N uses karspersky, and spamm assain, and the security plugin is extra, and you pay per user. It still nice and cheaper for most people then exchange (small bussiness). But you can also get them exchange, for cheap if you setup a small bussiness server. On Tue, May 4, 2010 at 11:10 AM, Angus Scott-Fleming angu...@geoapps.comwrote: On 4 May 2010 at 8:34, N Parr wrote: We've been using Mdaemon for 10+ years now. Although for the past 4 or so only as a secondary spam/virus gateway in front of Exchange. They have some pretty impressive features now like BB syncing, etc. Haven't paid much attention to the details since we aren't using it as anything but a gateway. How is their calendar functionality for non-Outlook calendars like Mozilla Sunbird? -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ -- Justin IT-TECH ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Alternatives to Exchange
We have been using Kerio for a few years here. We very much like the product. Kerio's biggest boast is their excellent web client. Using any modern browser, you get full (or nearly full) outlook functionality. This means any user anywhere can access their mail, calendars, contact lists, task lists, etc, etc. This also means that our support of our users is easier: We support the web client. We offer access using Kerio's other interfaces (Outlook, Thunderbird, Apple iMail.app, etc) but we make sure that the web interface is working. For those poor souls with no broadband or older non-supported browsers, the Kerio simplified client is excellent. It's very basic HTML, so it works with any browser (Opera on Wii? Sure. Internet Explorer 3? No problem.). This client has no calendar access, though... something they should implement. Installation and upgrades of Kerio couldn't be easier. A truly pain-free process on both Windows and Linux. Kerio has support for a lot of different clients, including blackberry, iPhone, and an Outlook Offline plugin. (See the forums on that one. I haven't tried it, but the forums do have users who have problems with it.) The documentation is well written, including information on how to setup each client to best use Kerio. The biggest flaw in Kerio's previous versions was that it was a single-server solution. This would limit your installation's size to the limits of a single server. Happily, they have addressed this in Kerio Connect 7. I have not tested their clustering, so I cannot comment on it's performance or functionality. I would recommend anyone who is looking for a mail suite to take a good look at Kerio. Zimbra... I haven't had the chance to look at Zimbra, except for screenshots. Looking at its interface, it looks a little busy. But the price is right, especially for the open source version. If we were re-evaluating mail suites again, Zimbra would be right up there. And it might win in a price/performance competition. (Ever shrinking budgets makes cost one of our most important factors in any implementations nowadays.) --Matt Ross Ephrata School District - Original Message - From: Angus Scott-Fleming [mailto:angu...@geoapps.com] To: NT System Admin Issues [mailto:ntsysad...@lyris.sunbelt-software.com] Sent: Mon, 03 May 2010 21:11:53 -0700 Subject: Alternatives to Exchange All Have a client who's looking to move from hosted-POP3 to an in-house groupware server with calendaring and email, and I'm looking for alternatives to Exchange primarily because of cost. I've heard Good Things about both Kerio Mail Server (now Kerio Connect) and mDaemon from Alt-N. I know at least one list member is running on Kerio because the Kerio Connect string is in his mail headers. Does anyone here have any experience with either of these two mail servers? How about Zimbra? -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Recycler Files
On 4 May 2010 at 8:33, Angus Scott-Fleming wrote: On 4 May 2010 at 8:49, Cameron Cooper wrote: Is there a way to view the contents within a Recycler file in XP? I have browsed the RECYCLER folders using Total Commander from http://www.ghisler.com/. You have to set it to view Hidden/System Files which is in the Display option. You will have cryptic file names within the recycled folders. What are you trying to do? FWIW: http://www.google.com/search?q=explore+recycle+bin Also, looks interesting, NO PERSONAL EXPERIENCE with it: Manage Windows Recycle Bin From Context Menu with BinManager - KezNews.com http://keznews.com/6604_Manage_Windows_Recycle_Bin_From_Context_Menu_with_BinManager HTH Angus -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Encryption
I think based on the flexibility of encryption Options and some of the items, you might want to look at the PGP Universal Suite of Products. I just hope that Symantec doesn't screw it up. Z Edward Ziots CISSP,MCSA,MCP+I,Security +,Network +,CCA Network Engineer Lifespan Organization 401-639-3505 ezi...@lifespan.org From: Chris Blair [mailto:chris_bl...@identisys.com] Sent: Tuesday, May 04, 2010 12:06 PM To: NT System Admin Issues Subject: Encryption First off, we are running a Windows 2003 Native Active Directory. There are no plans, or funds to move up to 2008. We have an upcoming project that will require a location on our file server that encrypts folders and documents stored there. This project could last only a year, or up to 5, all depends on its success. The files will be uploaded from Outside customers, either via VPN or SFTP. I am looking at EFS, True Crypt or PGP. Anyone have opinions on which to use and why? Thanks! ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Internet Policies
What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new IM Virus and got an email back from the CEO basically stating shouldn't that be a violation of company policy anyway? and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who's child is overseas in the military) who used IM on a semi-regular basis. For this reason, I'm working on coming up with a company policy. I've looked at the sample template from SANS as well as another one that someone sent me off-list. I'm planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J John-AldrichTile-Tools ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
Re: Internet Policies
It all depends if there is a business or productivity reason for it. We use IM in some of the departments for meetings, quick conversations, etc. But if it is used for wasting time, I would not allow it. On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.comwrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new “IM Virus” and got an email back from the CEO basically stating “shouldn’t that be a violation of company policy anyway?” and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who’s child is overseas in the military) who used IM on a semi-regular basis. For this reason, I’m working on coming up with a company policy. I’ve looked at the sample template from SANS as well as another one that someone sent me off-list. I’m planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J [image: John-Aldrich][image: Tile-Tools] ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image002.jpgimage001.jpg
Re: Encryption
Given budget and flexibility, I would say that TrueCrypt will give you some of the best options, especially since you'll have external parties adding files to the server. TrueCrypt is easy to setup, and has many options for configuration, and won't require a whole lot in the way of key management, or client installations. Rather than encrypt by file or folder, create an encrypted file-based volume and store the items there that need to be encrypted. PGP is good, but expensive, and I'd wait to see what Symantec was doing with them before investing in that direction. EFS is already paid for, and can be managed by group policy, but with external parties being involved, it will take more work to configure properly. -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 12:05 PM, Chris Blair chris_bl...@identisys.comwrote: First off, we are running a Windows 2003 Native Active Directory. There are no plans, or funds to move up to 2008. We have an upcoming project that will require a location on our file server that encrypts folders and documents stored there. This project could last only a year, or up to 5, all depends on its success. The files will be uploaded from Outside customers, either via VPN or SFTP. I am looking at EFS, True Crypt or PGP. Anyone have opinions on which to use and why? Thanks! ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Internet Policies
If the CEO is willing to sign off on a policy banning the use of social networking and IM then, there should be controls in place to enforce the policy, a policy without the associated controls and punishments ( Administrative, enacted by Management/HR) then the policy isn't worth the paper its written on. There should be a section for exception, due to the things that you just specified, but the exception have to be approved in writing by the CEO or CIO accordingly. ( I know marketing departments are using face book, twitter, Myspace and emerging social networking sites to get the brand name out or to communicate with new customer bases, along with those one-offs that a member of the military is using IM/Skype to talk with loved ones back in States. The SANS templates are pretty good shell its just the language will actually have to come from you. Just make sure its not extremely technical in nature, and embodies message you want to get across, and is signed by senior management. Also if you have controls to block the usage of the IM/Social Networking sites, a reference back to established policy for those users that break policy after its enacted serves as a nice deterrent to future violations and serves as security awareness training which always helps. Sincerely, EZ Edward Ziots CISSP,MCSA,MCP+I,Security +,Network +,CCA Network Engineer Lifespan Organization 401-639-3505 ezi...@lifespan.org From: John Aldrich [mailto:jaldr...@blueridgecarpet.com] Sent: Tuesday, May 04, 2010 12:39 PM To: NT System Admin Issues Subject: Internet Policies What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new IM Virus and got an email back from the CEO basically stating shouldn't that be a violation of company policy anyway? and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who's child is overseas in the military) who used IM on a semi-regular basis. For this reason, I'm working on coming up with a company policy. I've looked at the sample template from SANS as well as another one that someone sent me off-list. I'm planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
Windows 2008 R2 - GPO
Hello Everyone, I am currently trying to get my head around the new Windows 2008 GPO policies Mgmt. Here is the scenario: windows 2008 R2 ( All MS Updates applied ) 1. Configure Central Store and created the Policy Def folder in Sysvol. 2. Copied the entire folder of Policy definitions folder from a brand new Windows 7 stand alone computer to the new Sysvol location i.e. Policy Definitions 2. Verified the New GPO are based on Central Store. 3. Created a new Test GPO. 4. Applied various settings. 5. Run Settings report in GPMC 6. It allows me to enable disable various settings and I get this message at the bottom of the result ? Extra Registry Settingshide Display names for some settings cannot be found. You might be able to resolve this issue by updating the .ADM files used by Group Policy Management. Setting State SOFTWARE\Policies\Microsoft\Windows NT\CurrentVersion\NetworkList\Signatures\EveryNetwork\CategoryReadOnly 1 SOFTWARE\Policies\Microsoft\Windows NT\CurrentVersion\NetworkList\Signatures\EveryNetwork\IconReadOnly 1 SOFTWARE\Policies\Microsoft\Windows NT\CurrentVersion\NetworkList\Signatures\EveryNetwork\NameReadOnly 1 Can someone please shed some light on this why is it that I get this message ? I only have *.admx files stored int he central store. To be precise I had 148 files + one folder that folder i.e. en-US has another 148 adml files. :( I am confused that Win2k8 only required admx files so why is that error for .adm files ? cheers Rob ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Internet Policies
Why are you as the 'IT Manager' coming up with the companies policy? Shouldn't this be a business decision? In any case, technically here we have a NO EXTERNAL IM policy. The reality is that 'certain' senior management use it so no actual blocking occurs. At some point we will get the OCS edge servers with PIC setup and then begin blocking. The unofficial rule is do not be stupid. As for what your company should do? That depends on the tone and nature of your business culture. Is your culture regimented and controlled. Is it technically skilled and adept? I would strongly suggest a variation of the don't be stupid rule that allows your management flexibility and recognizes it's employees as trust worthy human beings with a modicum of control. Of course your corporate culture may be like ours and that rule would have no chance at all. :) Steven On Tue, May 4, 2010 at 9:38 AM, John Aldrich jaldr...@blueridgecarpet.comwrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new “IM Virus” and got an email back from the CEO basically stating “shouldn’t that be a violation of company policy anyway?” and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who’s child is overseas in the military) who used IM on a semi-regular basis. For this reason, I’m working on coming up with a company policy. I’ve looked at the sample template from SANS as well as another one that someone sent me off-list. I’m planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J [image: John-Aldrich][image: Tile-Tools] ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
RE: Internet Policies
Well, I think that management is going to want my input, and if I have a nice template, I will be shaping the discussion and making it something I can be comfortable enforcing. Unfortunately, from a technical standpoint, there's not a lot we can do to enforce a no IM and no social networking other than black-hole the domain names and any server names we can find for those services/sites. John-AldrichTile-Tools From: Steven Peck [mailto:sep...@gmail.com] Sent: Tuesday, May 04, 2010 1:09 PM To: NT System Admin Issues Subject: Re: Internet Policies Why are you as the 'IT Manager' coming up with the companies policy? Shouldn't this be a business decision? In any case, technically here we have a NO EXTERNAL IM policy. The reality is that 'certain' senior management use it so no actual blocking occurs. At some point we will get the OCS edge servers with PIC setup and then begin blocking. The unofficial rule is do not be stupid. As for what your company should do? That depends on the tone and nature of your business culture. Is your culture regimented and controlled. Is it technically skilled and adept? I would strongly suggest a variation of the don't be stupid rule that allows your management flexibility and recognizes it's employees as trust worthy human beings with a modicum of control. Of course your corporate culture may be like ours and that rule would have no chance at all. :) Steven On Tue, May 4, 2010 at 9:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new IM Virus and got an email back from the CEO basically stating shouldn't that be a violation of company policy anyway? and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who's child is overseas in the military) who used IM on a semi-regular basis. For this reason, I'm working on coming up with a company policy. I've looked at the sample template from SANS as well as another one that someone sent me off-list. I'm planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J John-AldrichTile-Tools ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
Sort of OT: SPAM - should I stick with GFI MailEssentials?
Hi everyone, We recently replaced our AV (McAfee) with Trend for both clients and Exchange 2007 (sorry Sunbelt - we came REALLY close to choosing VIPRE). We did not purchase the spam filtering option with Trend ScanMail, but are now considering it. We've been running GFI MailEssentials for years on a dedicated box. We're protecting between 400 and 500 mailboxes. The price for GFI continues to be attractive, so much so that hosted solutions don't seem to be worth the cost differential... The first logical option to me would be to move toward Trend, but I'm not so sure that adding spam filtering at the Exchange Server level is a good idea from a resource perspective. We were there at one point years ago, with GFI and ended up moving off to a dedicated box, because GFI was eating up too many resources (we were getting HAMMERED with spam - million a month, easily). Has anyone on this list moved away from GFI to something else? If so, what did you move to and what was your reasoning? I welcome any and all thoughts/suggestions/experiences. TIA, Jonathan L. Raper, A+, MCSA, MCSE Technology Coordinator Eagle Physicians Associates, PA jra...@eaglemds.comBLOCKED::mailto:%20jra...@eaglemds.com www.eaglemds.comBLOCKED::http://www.eaglemds.com/ Any medical information contained in this electronic message is CONFIDENTIAL and privileged. It is unlawful for unauthorized persons to view, copy, disclose, or disseminate CONFIDENTIAL information. This electronic message may contain information that is confidential and/or legally privileged. It is intended only for the use of the individual(s) and/or entity named as recipients in the message. If you are not an intended recipient of this message, please notify the sender immediately and delete this material from your computer. Do not deliver, distribute or copy this message, and do not disclose its contents or take any action in reliance on the information that it contains. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Internet Policies
Up until last month we blocked all the social networking sites. Now our firm is marketing on them. We are adjusting our policies for this. It will be on a user-by-user basis though. Devin On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.comwrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new “IM Virus” and got an email back from the CEO basically stating “shouldn’t that be a violation of company policy anyway?” and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who’s child is overseas in the military) who used IM on a semi-regular basis. For this reason, I’m working on coming up with a company policy. I’ve looked at the sample template from SANS as well as another one that someone sent me off-list. I’m planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J [image: John-Aldrich][image: Tile-Tools] ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image002.jpgimage001.jpg
Re: Internet Policies
Also we don't block anything. We have an AUP and a disclaimer at logon.. We do log all activity and that's explained up front. We hire professionals and they are supposed to act that way. This is an HR issue so IS just reports lists of visited websites upon request. On Tue, May 4, 2010 at 12:20 PM, Devin Meade devin.me...@gmail.com wrote: Up until last month we blocked all the social networking sites. Now our firm is marketing on them. We are adjusting our policies for this. It will be on a user-by-user basis though. Devin On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new “IM Virus” and got an email back from the CEO basically stating “shouldn’t that be a violation of company policy anyway?” and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who’s child is overseas in the military) who used IM on a semi-regular basis. For this reason, I’m working on coming up with a company policy. I’ve looked at the sample template from SANS as well as another one that someone sent me off-list. I’m planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J [image: John-Aldrich][image: Tile-Tools] ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
Microsoft Forefront question
How can you tell definition version on a workstation? Trying to figure out how to manage this stuff, and it's definitely not friendly. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Internet Policies
Well, as long as we're discussing IM, we don't allow it currently. But, I have trouble understanding how IM is better than either email or a meeting, or using a telephone to accomplish the very same thing as an IM. Can someone explain that to me. Oh, we've recently adopted social networking for our organization, but primarily for our membership. I'm having trouble understanding how social networking will help our members too! Murray From: Steve Ens [mailto:stevey...@gmail.com] Sent: Tuesday, May 04, 2010 11:42 AM To: NT System Admin Issues Subject: Re: Internet Policies It all depends if there is a business or productivity reason for it. We use IM in some of the departments for meetings, quick conversations, etc. But if it is used for wasting time, I would not allow it. On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new IM Virus and got an email back from the CEO basically stating shouldn't that be a violation of company policy anyway? and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who's child is overseas in the military) who used IM on a semi-regular basis. For this reason, I'm working on coming up with a company policy. I've looked at the sample template from SANS as well as another one that someone sent me off-list. I'm planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
RE: Sort of OT: SPAM - should I stick with GFI MailEssentials?
IHateSpam from the sponsor (they renamed it, I've forgotten the new name, but I've got it at several clients) works pretty well. So does Postini. So does websense. All price attractive. Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Raper, Jonathan - Eagle [mailto:jra...@eaglemds.com] Sent: Tuesday, May 04, 2010 1:20 PM To: NT System Admin Issues Subject: Sort of OT: SPAM - should I stick with GFI MailEssentials? Hi everyone, We recently replaced our AV (McAfee) with Trend for both clients and Exchange 2007 (sorry Sunbelt - we came REALLY close to choosing VIPRE). We did not purchase the spam filtering option with Trend ScanMail, but are now considering it. We've been running GFI MailEssentials for years on a dedicated box. We're protecting between 400 and 500 mailboxes. The price for GFI continues to be attractive, so much so that hosted solutions don't seem to be worth the cost differential... The first logical option to me would be to move toward Trend, but I'm not so sure that adding spam filtering at the Exchange Server level is a good idea from a resource perspective. We were there at one point years ago, with GFI and ended up moving off to a dedicated box, because GFI was eating up too many resources (we were getting HAMMERED with spam - million a month, easily). Has anyone on this list moved away from GFI to something else? If so, what did you move to and what was your reasoning? I welcome any and all thoughts/suggestions/experiences. TIA, Jonathan L. Raper, A+, MCSA, MCSE Technology Coordinator Eagle Physicians Associates, PA jra...@eaglemds.comBLOCKED::mailto:%20jra...@eaglemds.com www.eaglemds.comBLOCKED::http://www.eaglemds.com/ Any medical information contained in this electronic message is CONFIDENTIAL and privileged. It is unlawful for unauthorized persons to view, copy, disclose, or disseminate CONFIDENTIAL information. This electronic message may contain information that is confidential and/or legally privileged. It is intended only for the use of the individual(s) and/or entity named as recipients in the message. If you are not an intended recipient of this message, please notify the sender immediately and delete this material from your computer. Do not deliver, distribute or copy this message, and do not disclose its contents or take any action in reliance on the information that it contains. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Internet Policies
It's not at all strange for the IT Manager to be responsible for consolidating or initiating the acceptable use policy in an organization. No matter which party is responsible for putting it together, it cannot be done in a vacuum. So, either IT does it with input from HR and the business leaders, or HR does it with input from IT and the business leaders. The results should be the same either way. -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 1:08 PM, Steven Peck sep...@gmail.com wrote: Why are you as the 'IT Manager' coming up with the companies policy? Shouldn't this be a business decision? In any case, technically here we have a NO EXTERNAL IM policy. The reality is that 'certain' senior management use it so no actual blocking occurs. At some point we will get the OCS edge servers with PIC setup and then begin blocking. The unofficial rule is do not be stupid. As for what your company should do? That depends on the tone and nature of your business culture. Is your culture regimented and controlled. Is it technically skilled and adept? I would strongly suggest a variation of the don't be stupid rule that allows your management flexibility and recognizes it's employees as trust worthy human beings with a modicum of control. Of course your corporate culture may be like ours and that rule would have no chance at all. :) Steven On Tue, May 4, 2010 at 9:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new “IM Virus” and got an email back from the CEO basically stating “shouldn’t that be a violation of company policy anyway?” and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who’s child is overseas in the military) who used IM on a semi-regular basis. For this reason, I’m working on coming up with a company policy. I’ve looked at the sample template from SANS as well as another one that someone sent me off-list. I’m planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J [image: John-Aldrich][image: Tile-Tools] ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image002.jpgimage001.jpg
RE: Sort of OT: SPAM - should I stick with GFI MailEssentials?
iHateSpam became Ninja and is now VIPRE for Exchange. From: Michael B. Smith [mailto:mich...@smithcons.com] Sent: Tuesday, May 04, 2010 1:49 PM To: NT System Admin Issues Subject: RE: Sort of OT: SPAM - should I stick with GFI MailEssentials? IHateSpam from the sponsor (they renamed it, I've forgotten the new name, but I've got it at several clients) works pretty well. So does Postini. So does websense. All price attractive. Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Raper, Jonathan - Eagle [mailto:jra...@eaglemds.com] Sent: Tuesday, May 04, 2010 1:20 PM To: NT System Admin Issues Subject: Sort of OT: SPAM - should I stick with GFI MailEssentials? Hi everyone, We recently replaced our AV (McAfee) with Trend for both clients and Exchange 2007 (sorry Sunbelt - we came REALLY close to choosing VIPRE). We did not purchase the spam filtering option with Trend ScanMail, but are now considering it. We've been running GFI MailEssentials for years on a dedicated box. We're protecting between 400 and 500 mailboxes. The price for GFI continues to be attractive, so much so that hosted solutions don't seem to be worth the cost differential... The first logical option to me would be to move toward Trend, but I'm not so sure that adding spam filtering at the Exchange Server level is a good idea from a resource perspective. We were there at one point years ago, with GFI and ended up moving off to a dedicated box, because GFI was eating up too many resources (we were getting HAMMERED with spam - million a month, easily). Has anyone on this list moved away from GFI to something else? If so, what did you move to and what was your reasoning? I welcome any and all thoughts/suggestions/experiences. TIA, Jonathan L. Raper, A+, MCSA, MCSE Technology Coordinator Eagle Physicians Associates, PA jra...@eaglemds.comBLOCKED::mailto:%20jra...@eaglemds.com www.eaglemds.comBLOCKED::http://www.eaglemds.com/ Any medical information contained in this electronic message is CONFIDENTIAL and privileged. It is unlawful for unauthorized persons to view, copy, disclose, or disseminate CONFIDENTIAL information. This electronic message may contain information that is confidential and/or legally privileged. It is intended only for the use of the individual(s) and/or entity named as recipients in the message. If you are not an intended recipient of this message, please notify the sender immediately and delete this material from your computer. Do not deliver, distribute or copy this message, and do not disclose its contents or take any action in reliance on the information that it contains. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
SharePont 2010 discussion with Microsoft expert
Just a quick heads up. I am hosting a webcast on TechNet in 5 minutes with Bryan Porter from Microsoft on upgrading to SharePoint 2010. I know it is late notice but if you can attend it is your chance to ask questions directly to Microsoft about the product. Registration link is here: https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032448763Culture=en-US Tim ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Sort of OT: SPAM - should I stick with GFI MailEssentials?
On Tue, May 4, 2010 at 1:54 PM, Alex Eckelberry al...@sunbelt-software.com wrote: iHateSpam became Ninja and is now VIPRE for Exchange. Careful, keep renaming your products like that and Microsoft will get you for patent infringement. ;-) -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Compare two AD / Exchange accounts
Anyone know offhand of a tool / have a query line to compare two Active Directory accounts? Group and DL membership, assigned delegates/calendar permissions, etc... David Lum // SYSTEMS ENGINEER NORTHWEST EVALUATION ASSOCIATION (Desk) 971.222.1025 // (Cell) 503.267.9764 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Compare two AD / Exchange accounts
Right click, properties Shook From: David Lum [mailto:david@nwea.org] Sent: Tuesday, May 04, 2010 2:00 PM To: NT System Admin Issues Subject: Compare two AD / Exchange accounts Anyone know offhand of a tool / have a query line to compare two Active Directory accounts? Group and DL membership, assigned delegates/calendar permissions, etc... David Lum // SYSTEMS ENGINEER NORTHWEST EVALUATION ASSOCIATION (Desk) 971.222.1025 // (Cell) 503.267.9764 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Compare two AD / Exchange accounts
Doesn't exist. I'm getting ready to release a tool to deal with delegate reporting. For the AD stuff, use adfind or dsquery. Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: David Lum [mailto:david@nwea.org] Sent: Tuesday, May 04, 2010 2:00 PM To: NT System Admin Issues Subject: Compare two AD / Exchange accounts Anyone know offhand of a tool / have a query line to compare two Active Directory accounts? Group and DL membership, assigned delegates/calendar permissions, etc... David Lum // SYSTEMS ENGINEER NORTHWEST EVALUATION ASSOCIATION (Desk) 971.222.1025 // (Cell) 503.267.9764 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Internet Policies
How did you block them? Do you have an appliance or did you put in some sort of DNS entries? John-AldrichTile-Tools From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 1:21 PM To: NT System Admin Issues Subject: Re: Internet Policies Up until last month we blocked all the social networking sites. Now our firm is marketing on them. We are adjusting our policies for this. It will be on a user-by-user basis though. Devin On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new IM Virus and got an email back from the CEO basically stating shouldn't that be a violation of company policy anyway? and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who's child is overseas in the military) who used IM on a semi-regular basis. For this reason, I'm working on coming up with a company policy. I've looked at the sample template from SANS as well as another one that someone sent me off-list. I'm planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J John-AldrichTile-Tools ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
RE: Internet Policies -- Benefits of IM and Social Media
Agreed. As a department, we all use IM. I have coworkers in other physical locations that I interact with all day. No one answers their desk phones, because it's usually a vendor or sales call. J E-mail is great for communicating certain things that require a record, or are too long winded for IM, but IM is great for those hey can you look at server X? conversations. $.02 Don Guyer Systems Engineer - Information Services Prudential, Fox Roach/Trident Group 431 W. Lancaster Avenue Devon, PA 19333 Direct: (610) 993-3299 Fax: (610) 650-5306 don.gu...@prufoxroach.com mailto:don.gu...@prufoxroach.com From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Tuesday, May 04, 2010 2:02 PM To: NT System Admin Issues Subject: Re: Internet Policies -- Benefits of IM and Social Media IM is faster than email is faster than a meeting.Personally, I prefer email to IM, but I understand how and why people use it as a valid communications tool. It facilitates quick, informal exchanges that may not rise to the level of a full discussion. And both IM and email are easier to schedule than face-to-face meetings in many cases. Social networking is just a prevalent, but semi-closed network where you can interact with business partners, customers or prospective clients in a way where the recipient has some control over who reaches them and how they are reached, and the sender has access to some rich content without the fear of antispam interference. All of the above means of communications are useful to various organizations, even though abuse of them can waste time. But so can the abuse of any other communications vehicle, including meetings. -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 1:39 PM, Murray Freeman mfree...@alanet.org wrote: Well, as long as we're discussing IM, we don't allow it currently. But, I have trouble understanding how IM is better than either email or a meeting, or using a telephone to accomplish the very same thing as an IM. Can someone explain that to me. Oh, we've recently adopted social networking for our organization, but primarily for our membership. I'm having trouble understanding how social networking will help our members too! Murray From: Steve Ens [mailto:stevey...@gmail.com] Sent: Tuesday, May 04, 2010 11:42 AM To: NT System Admin Issues Subject: Re: Internet Policies It all depends if there is a business or productivity reason for it. We use IM in some of the departments for meetings, quick conversations, etc. But if it is used for wasting time, I would not allow it. On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new IM Virus and got an email back from the CEO basically stating shouldn't that be a violation of company policy anyway? and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who's child is overseas in the military) who used IM on a semi-regular basis. For this reason, I'm working on coming up with a company policy. I've looked at the sample template from SANS as well as another one that someone sent me off-list. I'm planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
Re: Sort of OT: SPAM - should I stick with GFI MailEssentials?
When not in the cloud, I generally prefer antispam appliances, rather than server-based software. I've used http://www.sendio.com in the past, as well as MailFrontier (now owned by SonicWall) -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 1:19 PM, Raper, Jonathan - Eagle jra...@eaglemds.com wrote: Hi everyone, We recently replaced our AV (McAfee) with Trend for both clients and Exchange 2007 (sorry Sunbelt – we came REALLY close to choosing VIPRE). We did not purchase the spam filtering option with Trend ScanMail, but are now considering it. We’ve been running GFI MailEssentials for years on a dedicated box. We’re protecting between 400 and 500 mailboxes. The price for GFI continues to be attractive, so much so that hosted solutions don’t seem to be worth the cost differential… The first logical option to me would be to move toward Trend, but I’m not so sure that adding spam filtering at the Exchange Server level is a good idea from a resource perspective. We were there at one point years ago, with GFI and ended up moving off to a dedicated box, because GFI was eating up too many resources (we were getting HAMMERED with spam – million a month, easily). Has anyone on this list moved away from GFI to something else? If so, what did you move to and what was your reasoning? I welcome any and all thoughts/suggestions/experiences. TIA, Jonathan L. Raper, A+, MCSA, MCSE Technology Coordinator Eagle Physicians Associates, PA* *jra...@eaglemds.com* *www.eaglemds.com -- Any medical information contained in this electronic message is CONFIDENTIAL and privileged. It is unlawful for unauthorized persons to view, copy, disclose, or disseminate CONFIDENTIAL information. This electronic message may contain information that is confidential and/or legally privileged. It is intended only for the use of the individual(s) and/or entity named as recipients in the message. If you are not an intended recipient of this message, please notify the sender immediately and delete this material from your computer. Do not deliver, distribute or copy this message, and do not disclose its contents or take any action in reliance on the information that it contains. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Internet Policies
They can be blocked via DNS, via Firewalls, via Web Filtering technologies. -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 2:11 PM, John Aldrich jaldr...@blueridgecarpet.comwrote: How did you block them? Do you have an appliance or did you put in some sort of DNS entries? [image: John-Aldrich][image: Tile-Tools] *From:* Devin Meade [mailto:devin.me...@gmail.com] *Sent:* Tuesday, May 04, 2010 1:21 PM *To:* NT System Admin Issues *Subject:* Re: Internet Policies Up until last month we blocked all the social networking sites. Now our firm is marketing on them. We are adjusting our policies for this. It will be on a user-by-user basis though. Devin On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new “IM Virus” and got an email back from the CEO basically stating “shouldn’t that be a violation of company policy anyway?” and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who’s child is overseas in the military) who used IM on a semi-regular basis. For this reason, I’m working on coming up with a company policy. I’ve looked at the sample template from SANS as well as another one that someone sent me off-list. I’m planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J [image: John-Aldrich][image: Tile-Tools] ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
RE: Internet Policies
I was aware of that, but I was wondering what Devin's company used. J Personally, I'd go for either DNS (if there was a blackhole or something easily implemented like that) or web filtering appliance. John-AldrichTile-Tools From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Tuesday, May 04, 2010 2:20 PM To: NT System Admin Issues Subject: Re: Internet Policies They can be blocked via DNS, via Firewalls, via Web Filtering technologies. -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 2:11 PM, John Aldrich jaldr...@blueridgecarpet.com wrote: How did you block them? Do you have an appliance or did you put in some sort of DNS entries? John-AldrichTile-Tools From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 1:21 PM To: NT System Admin Issues Subject: Re: Internet Policies Up until last month we blocked all the social networking sites. Now our firm is marketing on them. We are adjusting our policies for this. It will be on a user-by-user basis though. Devin On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new IM Virus and got an email back from the CEO basically stating shouldn't that be a violation of company policy anyway? and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who's child is overseas in the military) who used IM on a semi-regular basis. For this reason, I'm working on coming up with a company policy. I've looked at the sample template from SANS as well as another one that someone sent me off-list. I'm planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J John-AldrichTile-Tools ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
Re: Sort of OT: SPAM - should I stick with GFI MailEssentials?
I have 2 thoughts on the matter: a) I'm sure you're familiar with the saying devil you know vs the devil you don't. You know the GFI product works. Your other options are unknown quantities. b) Consider defense in depth. These days most anti-spam implementations also include anti-virus. If you use the same scanning engine on your desktop as well as the inbound mail path, and the mail antivirus misses some piece of malware... On 5/4/2010 12:19 PM, Raper, Jonathan - Eagle wrote: Hi everyone, We recently replaced our AV (McAfee) with Trend for both clients and Exchange 2007 (sorry Sunbelt – we came REALLY close to choosing VIPRE). We did not purchase the spam filtering option with Trend ScanMail, but are now considering it. We’ve been running GFI MailEssentials for years on a dedicated box. We’re protecting between 400 and 500 mailboxes. The price for GFI continues to be attractive, so much so that hosted solutions don’t seem to be worth the cost differential… The first logical option to me would be to move toward Trend, but I’m not so sure that adding spam filtering at the Exchange Server level is a good idea from a resource perspective. We were there at one point years ago, with GFI and ended up moving off to a dedicated box, because GFI was eating up too many resources (we were getting HAMMERED with spam – million a month, easily). Has anyone on this list moved away from GFI to something else? If so, what did you move to and what was your reasoning? I welcome any and all thoughts/suggestions/experiences. -- Phil Brutsche p...@optimumdata.com ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Sort of OT: SPAM - should I stick with GFI MailEssentials?
Very good points... -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 2:30 PM, Phil Brutsche p...@optimumdata.com wrote: I have 2 thoughts on the matter: a) I'm sure you're familiar with the saying devil you know vs the devil you don't. You know the GFI product works. Your other options are unknown quantities. b) Consider defense in depth. These days most anti-spam implementations also include anti-virus. If you use the same scanning engine on your desktop as well as the inbound mail path, and the mail antivirus misses some piece of malware... On 5/4/2010 12:19 PM, Raper, Jonathan - Eagle wrote: Hi everyone, We recently replaced our AV (McAfee) with Trend for both clients and Exchange 2007 (sorry Sunbelt – we came REALLY close to choosing VIPRE). We did not purchase the spam filtering option with Trend ScanMail, but are now considering it. We’ve been running GFI MailEssentials for years on a dedicated box. We’re protecting between 400 and 500 mailboxes. The price for GFI continues to be attractive, so much so that hosted solutions don’t seem to be worth the cost differential… The first logical option to me would be to move toward Trend, but I’m not so sure that adding spam filtering at the Exchange Server level is a good idea from a resource perspective. We were there at one point years ago, with GFI and ended up moving off to a dedicated box, because GFI was eating up too many resources (we were getting HAMMERED with spam – million a month, easily). Has anyone on this list moved away from GFI to something else? If so, what did you move to and what was your reasoning? I welcome any and all thoughts/suggestions/experiences. -- Phil Brutsche p...@optimumdata.com ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Internet Policies
I used a fake DNS entry for twitter.com and the others that I found in the ISA log. I made a new forward lookup zone for each one in our Active Dir integrated DNS system. I know it wont block sub-domains but it made the point. It has since been removed. I can use Trend micro officescan if we want to actively block though. Devin On Tue, May 4, 2010 at 1:22 PM, John Aldrich jaldr...@blueridgecarpet.comwrote: I was aware of that, but I was wondering what Devin’s company used. JPersonally, I’d go for either DNS (if there was a blackhole or something easily implemented like that) or web filtering appliance. [image: John-Aldrich][image: Tile-Tools] *From:* Andrew S. Baker [mailto:asbz...@gmail.com] *Sent:* Tuesday, May 04, 2010 2:20 PM *To:* NT System Admin Issues *Subject:* Re: Internet Policies They can be blocked via DNS, via Firewalls, via Web Filtering technologies. -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 2:11 PM, John Aldrich jaldr...@blueridgecarpet.com wrote: How did you block them? Do you have an appliance or did you put in some sort of DNS entries? [image: John-Aldrich][image: Tile-Tools] *From:* Devin Meade [mailto:devin.me...@gmail.com] *Sent:* Tuesday, May 04, 2010 1:21 PM *To:* NT System Admin Issues *Subject:* Re: Internet Policies Up until last month we blocked all the social networking sites. Now our firm is marketing on them. We are adjusting our policies for this. It will be on a user-by-user basis though. Devin On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new “IM Virus” and got an email back from the CEO basically stating “shouldn’t that be a violation of company policy anyway?” and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who’s child is overseas in the military) who used IM on a semi-regular basis. For this reason, I’m working on coming up with a company policy. I’ve looked at the sample template from SANS as well as another one that someone sent me off-list. I’m planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J [image: John-Aldrich][image: Tile-Tools] ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image002.jpgimage001.jpg
Re: Internet Policies
IM isn't just chat. Especially if you have OCS installed. There are tons of things that can be dispensed with a quick 2-3 line IM session that would require waiting and delays for other things. With IM you can see if a user if actually present and can be contacted now. It's faster then email for yes/no questions and is less disruptive then a phone call. If I see a user status as 'Busy' then I don't bug them, but if they are listed as 'Available' then I can ping them on quick short questions. During phone conferences having the ability to contact people not on the line, (outage, check with engineers working the issue) to then relay information to the call is invaluable. Our help desk uses it. Our help desk is scattered over 4 physical locations and if there is a major issue, then they can't call the other locations because everyone is on the phone. Late night troubleshooting sessions from home that don't need a call means my boss isn't calling for status, he just checks me on IM. My wife and kids do not get woken up. It is often easier to arrange lunch, etc through IM rather then email. In a tightly controlled messaging environment it means less clutter in the archives. Once people actually start using IM for business reasons it's seriously addictive and helps substantially but it's one of those 'you have to experience it to understand it' type of things. Out of all the enabled IM accounts we have 3/4 signed on during business hours which is a huge buy in for us. We do not mandate people use it, merely make it available as a service. Steven Peck On Tue, May 4, 2010 at 10:39 AM, Murray Freeman mfree...@alanet.org wrote: Well, as long as we're discussing IM, we don't allow it currently. But, I have trouble understanding how IM is better than either email or a meeting, or using a telephone to accomplish the very same thing as an IM. Can someone explain that to me. Oh, we've recently adopted social networking for our organization, but primarily for our membership. I'm having trouble understanding how social networking will help our members too! *Murray* -- *From:* Steve Ens [mailto:stevey...@gmail.com] *Sent:* Tuesday, May 04, 2010 11:42 AM *To:* NT System Admin Issues *Subject:* Re: Internet Policies It all depends if there is a business or productivity reason for it. We use IM in some of the departments for meetings, quick conversations, etc. But if it is used for wasting time, I would not allow it. On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new “IM Virus” and got an email back from the CEO basically stating “shouldn’t that be a violation of company policy anyway?” and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who’s child is overseas in the military) who used IM on a semi-regular basis. For this reason, I’m working on coming up with a company policy. I’ve looked at the sample template from SANS as well as another one that someone sent me off-list. I’m planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J [image: John-Aldrich][image: Tile-Tools] ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image002.jpgimage001.jpg
RE: Internet Policies
Ahh. We don't have an ISA server. I suppose I could enable logging on the ASA and check those logs and do similar things.Hmm. something to think about. John-AldrichTile-Tools From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 2:44 PM To: NT System Admin Issues Subject: Re: Internet Policies I used a fake DNS entry for twitter.com and the others that I found in the ISA log. I made a new forward lookup zone for each one in our Active Dir integrated DNS system. I know it wont block sub-domains but it made the point. It has since been removed. I can use Trend micro officescan if we want to actively block though. Devin On Tue, May 4, 2010 at 1:22 PM, John Aldrich jaldr...@blueridgecarpet.com wrote: I was aware of that, but I was wondering what Devin's company used. J Personally, I'd go for either DNS (if there was a blackhole or something easily implemented like that) or web filtering appliance. John-AldrichTile-Tools From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Tuesday, May 04, 2010 2:20 PM To: NT System Admin Issues Subject: Re: Internet Policies They can be blocked via DNS, via Firewalls, via Web Filtering technologies. -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 2:11 PM, John Aldrich jaldr...@blueridgecarpet.com wrote: How did you block them? Do you have an appliance or did you put in some sort of DNS entries? John-AldrichTile-Tools From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 1:21 PM To: NT System Admin Issues Subject: Re: Internet Policies Up until last month we blocked all the social networking sites. Now our firm is marketing on them. We are adjusting our policies for this. It will be on a user-by-user basis though. Devin On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new IM Virus and got an email back from the CEO basically stating shouldn't that be a violation of company policy anyway? and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who's child is overseas in the military) who used IM on a semi-regular basis. For this reason, I'm working on coming up with a company policy. I've looked at the sample template from SANS as well as another one that someone sent me off-list. I'm planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J John-AldrichTile-Tools ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
RE: Internet Policies
If you have ISA, you can also make a rule to deny access to the domain or URL. From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 2:44 PM To: NT System Admin Issues Subject: Re: Internet Policies I used a fake DNS entry for twitter.com and the others that I found in the ISA log. I made a new forward lookup zone for each one in our Active Dir integrated DNS system. I know it wont block sub-domains but it made the point. It has since been removed. I can use Trend micro officescan if we want to actively block though. Devin On Tue, May 4, 2010 at 1:22 PM, John Aldrich jaldr...@blueridgecarpet.com wrote: I was aware of that, but I was wondering what Devin's company used. J Personally, I'd go for either DNS (if there was a blackhole or something easily implemented like that) or web filtering appliance. From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Tuesday, May 04, 2010 2:20 PM To: NT System Admin Issues Subject: Re: Internet Policies They can be blocked via DNS, via Firewalls, via Web Filtering technologies. -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 2:11 PM, John Aldrich jaldr...@blueridgecarpet.com wrote: How did you block them? Do you have an appliance or did you put in some sort of DNS entries? From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 1:21 PM To: NT System Admin Issues Subject: Re: Internet Policies Up until last month we blocked all the social networking sites. Now our firm is marketing on them. We are adjusting our policies for this. It will be on a user-by-user basis though. Devin On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new IM Virus and got an email back from the CEO basically stating shouldn't that be a violation of company policy anyway? and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who's child is overseas in the military) who used IM on a semi-regular basis. For this reason, I'm working on coming up with a company policy. I've looked at the sample template from SANS as well as another one that someone sent me off-list. I'm planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
Re: Microsoft Forefront question
I seem to remember that if you call up the interface on the client it will tell you date and time of last update. If it does just compare the server and client. Otherwise look in the logs under application for when the last update was. Jon On Tue, May 4, 2010 at 1:36 PM, Joseph Heaton jhea...@dfg.ca.gov wrote: How can you tell definition version on a workstation? Trying to figure out how to manage this stuff, and it's definitely not friendly. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Encryption
Do you actually believe they will leave a good product alone? Go with something other than PGP unless you are not going to be updating it then it will be safe to use. Jon On Tue, May 4, 2010 at 12:32 PM, Ziots, Edward ezi...@lifespan.org wrote: I think based on the flexibility of encryption Options and some of the items, you might want to look at the PGP Universal Suite of Products. I just hope that Symantec doesn’t screw it up. Z Edward Ziots CISSP,MCSA,MCP+I,Security +,Network +,CCA Network Engineer Lifespan Organization 401-639-3505 ezi...@lifespan.org *From:* Chris Blair [mailto:chris_bl...@identisys.com] *Sent:* Tuesday, May 04, 2010 12:06 PM *To:* NT System Admin Issues *Subject:* Encryption First off, we are running a Windows 2003 Native Active Directory. There are no plans, or funds to move up to 2008. We have an upcoming project that will require a location on our file server that encrypts folders and documents stored there. This project could last only a year, or up to 5, all depends on its success. The files will be uploaded from Outside customers, either via VPN or SFTP. I am looking at EFS, True Crypt or PGP. Anyone have opinions on which to use and why? Thanks! ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Microsoft Forefront question
When you open the console on the workstation, click on the Home button and it is listed on the bottom as Antivirus definition Bob From: Jon Harris [mailto:jk.har...@gmail.com] Sent: Tuesday, May 04, 2010 2:49 PM To: NT System Admin Issues Subject: Re: Microsoft Forefront question I seem to remember that if you call up the interface on the client it will tell you date and time of last update. If it does just compare the server and client. Otherwise look in the logs under application for when the last update was. Jon On Tue, May 4, 2010 at 1:36 PM, Joseph Heaton jhea...@dfg.ca.gov wrote: How can you tell definition version on a workstation? Trying to figure out how to manage this stuff, and it's definitely not friendly. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Sort of OT: SPAM - should I stick with GFI MailEssentials?
I run both when the environment / client permits. If you can keep the bulk of it off your network all the better. I have one cluent with both a Barracuda AND Trend's anti-spam. The 'Cuda is upstream and catches 99% of the spam, Trend catches the occasional leaker but since it doesn't have much to look for it doesn't affect Exchange server load at all. Dave From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Tuesday, May 04, 2010 11:41 AM To: NT System Admin Issues Subject: Re: Sort of OT: SPAM - should I stick with GFI MailEssentials? Very good points... -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 2:30 PM, Phil Brutsche p...@optimumdata.commailto:p...@optimumdata.com wrote: I have 2 thoughts on the matter: a) I'm sure you're familiar with the saying devil you know vs the devil you don't. You know the GFI product works. Your other options are unknown quantities. b) Consider defense in depth. These days most anti-spam implementations also include anti-virus. If you use the same scanning engine on your desktop as well as the inbound mail path, and the mail antivirus misses some piece of malware... On 5/4/2010 12:19 PM, Raper, Jonathan - Eagle wrote: Hi everyone, We recently replaced our AV (McAfee) with Trend for both clients and Exchange 2007 (sorry Sunbelt - we came REALLY close to choosing VIPRE). We did not purchase the spam filtering option with Trend ScanMail, but are now considering it. We've been running GFI MailEssentials for years on a dedicated box. We're protecting between 400 and 500 mailboxes. The price for GFI continues to be attractive, so much so that hosted solutions don't seem to be worth the cost differential... The first logical option to me would be to move toward Trend, but I'm not so sure that adding spam filtering at the Exchange Server level is a good idea from a resource perspective. We were there at one point years ago, with GFI and ended up moving off to a dedicated box, because GFI was eating up too many resources (we were getting HAMMERED with spam - million a month, easily). Has anyone on this list moved away from GFI to something else? If so, what did you move to and what was your reasoning? I welcome any and all thoughts/suggestions/experiences. -- Phil Brutsche p...@optimumdata.commailto:p...@optimumdata.com ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Hotel room router with wifi and gigabit E-net
On 4 May 2010 at 16:36, tony patton wrote: On the other list it would've been a different story :) What other list? -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Internet Policies
On 4 May 2010 at 12:39, Murray Freeman wrote: Well, as long as we're discussing IM, we don't allow it currently. But, I have trouble understanding how IM is better than either email or a meeting, or using a telephone to accomplish the very same thing as an IM. Can someone explain that to me. Oh, we've recently adopted social networking for our organization, but primarily for our membership. I'm having trouble understanding how social networking will help our members too! IM is Instant whereas email isn't, but it can be ignored if you're on a critical phone call or busy doing something that requires thought, which a phone call can't. I use IM with my-son-the-university-tech-support-geek when I'm picking his brains while debugging a client situation that's more up his alley, very useful as I can get links from him and dump screenshots back to him instantly which email doesn't allow. Also, for a multi-building company I can see where an internal Jabber network could be very useful. Social networking is a different disallowed beast altogether IMHO, although I can see where LinkedIn might be useful in some businesses. -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Alternatives to Exchange
On 4 May 2010 at 9:16, Matthew W. Ross wrote: I would recommend anyone who is looking for a mail suite to take a good look at Kerio. Thanks for the feedback. WRT multi-server, do you know if it supports distributed subdomains (e.g. tucson.mydomain.com, denver.mydomain.com, etc.) with servers in different cities or just a local multi-server cluster? Haven't had the time yet to delve into this. Zimbra... I haven't had the chance to look at Zimbra, except for screenshots. Looking at its interface, it looks a little busy. But the price is right, especially for the open source version. If we were re-evaluating mail suites again, Zimbra would be right up there. And it might win in a price/performance competition. (Ever shrinking budgets makes cost one of our most important factors in any implementations nowadays.) From what I've managed to read quickly, the biggest issue with the free version of Zimbra is no connectors for iPhone, BB, and I think maybe even Outlook. This makes the free version a non-starter for my client's needs, since they have lots of roaming laptop users, some of whom will be using Outlook. And the paid-for versions ain't cheap. = Included Stuff Follows = Zimbra - Product Editions http://www.zimbra.com/products/product_editions.html ... External client compatibility: Outlook/MAPI sync MAPI-based Outlook synchronization with cached mode and offline support -- requires Zimbra Professional Apple iSync Two-way synchronization with Apple iSync enabling compatibility with Apple iCal, Address Book, and other applications in the Apple iSync framework -- requires Zimbra Professional Mobility: Zimbra Mobile Over-the-air push synchronization of mail, contacts, and calendar to Palm, Symbian, and Windows Mobile 5 devices with no additional server -- requires Zimbra Standard or Zimbra Professional Blackberry support Over-the-air synchronization of mail, contacts, and calendar to Blackberry devices -- requires Zimbra Standard or Zimbra Professional = Included Stuff Ends = -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Compare two AD / Exchange accounts
I'd probably just use adfind and kick each one to a text file (Joe has a switch to sort the attribute names alphabetically, you want this) and then windiff the two text files. This is what I usually do. Thanks, Brian Desmond br...@briandesmond.com c - 312.731.3132 From: David Lum [mailto:david@nwea.org] Sent: Tuesday, May 04, 2010 1:00 PM To: NT System Admin Issues Subject: Compare two AD / Exchange accounts Anyone know offhand of a tool / have a query line to compare two Active Directory accounts? Group and DL membership, assigned delegates/calendar permissions, etc... David Lum // SYSTEMS ENGINEER NORTHWEST EVALUATION ASSOCIATION (Desk) 971.222.1025 // (Cell) 503.267.9764 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Exchange/Outlook - Calendar Question
You can do this in Exchange but you will need to create and account and allow all the users that will post meetings/what not to add and/or delete. Major pain to maintain but it does work you will just have to trust the users will not use it for something they are not supposed to do like send emails under this account unless it is a meeting announcement. Jon On Tue, May 4, 2010 at 11:20 AM, Chyka, Robert bch...@medaille.edu wrote: Thanks Shook. I will definitely check it out. -BC *From:* Andy Shook [mailto:andy.sh...@peak10.com] *Sent:* Tuesday, May 04, 2010 11:19 AM *To:* NT System Admin Issues *Subject:* RE: Exchange/Outlook - Calendar Question Not natively within Exchange, you’ll have to go 3rd party. I’ve only done this with Add2Exchange. *http://www.diditbetter.com/Add2Exchange.aspx * Shook *From:* Chyka, Robert [mailto:bch...@medaille.edu] *Sent:* Tuesday, May 04, 2010 11:14 AM *To:* NT System Admin Issues *Subject:* Exchange/Outlook - Calendar Question Is there any way to have say 11 people in a department “sync” their Outlook calendars to one Public Calendar they can all access? Let me know if you need more details. I appreciate the help! Bob ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Exchange/Outlook - Calendar Question
It is also a security risk but that goes without saying. Jon On Tue, May 4, 2010 at 3:01 PM, Jon Harris jk.har...@gmail.com wrote: You can do this in Exchange but you will need to create and account and allow all the users that will post meetings/what not to add and/or delete. Major pain to maintain but it does work you will just have to trust the users will not use it for something they are not supposed to do like send emails under this account unless it is a meeting announcement. Jon On Tue, May 4, 2010 at 11:20 AM, Chyka, Robert bch...@medaille.eduwrote: Thanks Shook. I will definitely check it out. -BC *From:* Andy Shook [mailto:andy.sh...@peak10.com] *Sent:* Tuesday, May 04, 2010 11:19 AM *To:* NT System Admin Issues *Subject:* RE: Exchange/Outlook - Calendar Question Not natively within Exchange, you’ll have to go 3rd party. I’ve only done this with Add2Exchange. *http://www.diditbetter.com/Add2Exchange.aspx * Shook *From:* Chyka, Robert [mailto:bch...@medaille.edu] *Sent:* Tuesday, May 04, 2010 11:14 AM *To:* NT System Admin Issues *Subject:* Exchange/Outlook - Calendar Question Is there any way to have say 11 people in a department “sync” their Outlook calendars to one Public Calendar they can all access? Let me know if you need more details. I appreciate the help! Bob ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Internet Policies
We use web marshal. http://www.8e6security.com/webmarshal.asp Works pretty well and is pretty cheap.You can add antivirus and anit spyware scanning modules as well. There is also a fairly robust reporting engine for it. I had it enabled for 60 users and it was running on Windows Xp. I have since moved it to a Win2003 VM. /Chad Ahh… We don’t have an ISA server. I suppose I could enable logging on the ASA and check those logs and do similar things…Hmm… something to think about. From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 2:44 PMTo: NT System Admin IssuesSubject: Re: Internet Policies I used a "fake DNS" entry for twitter.com and the others that I found in the ISA log. I made a new forward lookup zone for each one in our Active Dir integrated DNS system. I know it wont block sub-domains but it made the point. It has since been removed. I can use Trend micro officescan if we want to actively block though.Devin On Tue, May 4, 2010 at 1:22 PM, John Aldrich jaldr...@blueridgecarpet.com wrote: I was aware of that, but I was wondering what Devin’s company used. J Personally, I’d go for either DNS (if there was a blackhole or something easily implemented like that) or web filtering appliance. From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Tuesday, May 04, 2010 2:20 PM To: NT System Admin IssuesSubject: Re: Internet Policies They can be blocked via DNS, via Firewalls, via Web Filtering technologies. -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 2:11 PM, John Aldrich jaldr...@blueridgecarpet.com wrote: How did you block them? Do you have an appliance or did you put in some sort of DNS entries? From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 1:21 PM To: NT System Admin IssuesSubject: Re: Internet Policies Up until last month we blocked all the social networking sites. Now our firm is marketing on them. We are adjusting our policies for this. It will be on a user-by-user basis though.Devin On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new “IM Virus” and got an email back from the CEO basically stating “shouldn’t that be a violation of company policy anyway?” and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who’s child is overseas in the military) who used IM on a semi-regular basis. For this reason, I’m working on coming up with a company policy. I’ve looked at the sample template from SANS as well as another one that someone sent me off-list. I’m planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J Think green. Please consider the environment before printing CONFIDENTIALITY NOTE: The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it. Thank you. *
RE: Internet Policies -- Benefits of IM and Social Media
It sounds like the telephone may become extinct, doesn't it! Our organization is small, all in one bldg on one floor, so it's very easy to just walk down to an office. When I get a help desk call, I always walk to the requestor's office. The young man who works with me uses Remote Assistance and the telephone. Here, an email is just as fast as an IM. Murray From: Don Guyer [mailto:don.gu...@prufoxroach.com] Sent: Tuesday, May 04, 2010 1:12 PM To: NT System Admin Issues Subject: RE: Internet Policies -- Benefits of IM and Social Media Agreed. As a department, we all use IM. I have coworkers in other physical locations that I interact with all day. No one answers their desk phones, because it's usually a vendor or sales call. J E-mail is great for communicating certain things that require a record, or are too long winded for IM, but IM is great for those hey can you look at server X? conversations. $.02 Don Guyer Systems Engineer - Information Services Prudential, Fox Roach/Trident Group 431 W. Lancaster Avenue Devon, PA 19333 Direct: (610) 993-3299 Fax: (610) 650-5306 don.gu...@prufoxroach.com mailto:don.gu...@prufoxroach.com From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Tuesday, May 04, 2010 2:02 PM To: NT System Admin Issues Subject: Re: Internet Policies -- Benefits of IM and Social Media IM is faster than email is faster than a meeting.Personally, I prefer email to IM, but I understand how and why people use it as a valid communications tool. It facilitates quick, informal exchanges that may not rise to the level of a full discussion. And both IM and email are easier to schedule than face-to-face meetings in many cases. Social networking is just a prevalent, but semi-closed network where you can interact with business partners, customers or prospective clients in a way where the recipient has some control over who reaches them and how they are reached, and the sender has access to some rich content without the fear of antispam interference. All of the above means of communications are useful to various organizations, even though abuse of them can waste time. But so can the abuse of any other communications vehicle, including meetings. -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 1:39 PM, Murray Freeman mfree...@alanet.org wrote: Well, as long as we're discussing IM, we don't allow it currently. But, I have trouble understanding how IM is better than either email or a meeting, or using a telephone to accomplish the very same thing as an IM. Can someone explain that to me. Oh, we've recently adopted social networking for our organization, but primarily for our membership. I'm having trouble understanding how social networking will help our members too! Murray From: Steve Ens [mailto:stevey...@gmail.com] Sent: Tuesday, May 04, 2010 11:42 AM To: NT System Admin Issues Subject: Re: Internet Policies It all depends if there is a business or productivity reason for it. We use IM in some of the departments for meetings, quick conversations, etc. But if it is used for wasting time, I would not allow it. On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new IM Virus and got an email back from the CEO basically stating shouldn't that be a violation of company policy anyway? and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who's child is overseas in the military) who used IM on a semi-regular basis. For this reason, I'm working on coming up with a company policy. I've looked at the sample template from SANS as well as another one that someone sent me off-list. I'm planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
Re: Internet Policies
When you are building the policy put everything you can in it to deal with as many issues as possible. Issues like who can and can not install software, what kind of monitoring is allowed on the clients or in the network traffic, get HR involved early on and make sure there is some real teeth in the policy and don't go with something that is easly to work around. Been there and gotten bitten more than one time. If you are one of the few that still allows users to be power users or admins now is the time to strip them if you can of this. Since the CEO/Owner is concerned work fast their attention span is not as long as a mill-second. Jon On Tue, May 4, 2010 at 2:53 PM, Angus Scott-Fleming angu...@geoapps.comwrote: On 4 May 2010 at 12:39, Murray Freeman wrote: Well, as long as we're discussing IM, we don't allow it currently. But, I have trouble understanding how IM is better than either email or a meeting, or using a telephone to accomplish the very same thing as an IM. Can someone explain that to me. Oh, we've recently adopted social networking for our organization, but primarily for our membership. I'm having trouble understanding how social networking will help our members too! IM is Instant whereas email isn't, but it can be ignored if you're on a critical phone call or busy doing something that requires thought, which a phone call can't. I use IM with my-son-the-university-tech-support-geek when I'm picking his brains while debugging a client situation that's more up his alley, very useful as I can get links from him and dump screenshots back to him instantly which email doesn't allow. Also, for a multi-building company I can see where an internal Jabber network could be very useful. Social networking is a different disallowed beast altogether IMHO, although I can see where LinkedIn might be useful in some businesses. -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Internet Policies
Yep the good old blackhole technique, most of the naughty domains are going to 127.0.0.1 which helps if the malware is programmed to go back to a specific domain name, but that doesn't help those malware that is using google or other public available sites, that might have been compromised to get back to its instruction set. Also there is the fast-flux domains which is usually tied with malware/botnets, that this approach has a good affect on. Again nothing is full proof but if you can reduce your risk and quickly, that is better than sitting there praying for forgiveness after you get owned. Z Edward Ziots CISSP,MCSA,MCP+I,Security +,Network +,CCA Network Engineer Lifespan Organization 401-639-3505 ezi...@lifespan.org From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 2:44 PM To: NT System Admin Issues Subject: Re: Internet Policies I used a fake DNS entry for twitter.com and the others that I found in the ISA log. I made a new forward lookup zone for each one in our Active Dir integrated DNS system. I know it wont block sub-domains but it made the point. It has since been removed. I can use Trend micro officescan if we want to actively block though. Devin On Tue, May 4, 2010 at 1:22 PM, John Aldrich jaldr...@blueridgecarpet.com wrote: I was aware of that, but I was wondering what Devin's company used. J Personally, I'd go for either DNS (if there was a blackhole or something easily implemented like that) or web filtering appliance. From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Tuesday, May 04, 2010 2:20 PM To: NT System Admin Issues Subject: Re: Internet Policies They can be blocked via DNS, via Firewalls, via Web Filtering technologies. -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 2:11 PM, John Aldrich jaldr...@blueridgecarpet.com wrote: How did you block them? Do you have an appliance or did you put in some sort of DNS entries? From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 1:21 PM To: NT System Admin Issues Subject: Re: Internet Policies Up until last month we blocked all the social networking sites. Now our firm is marketing on them. We are adjusting our policies for this. It will be on a user-by-user basis though. Devin On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new IM Virus and got an email back from the CEO basically stating shouldn't that be a violation of company policy anyway? and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who's child is overseas in the military) who used IM on a semi-regular basis. For this reason, I'm working on coming up with a company policy. I've looked at the sample template from SANS as well as another one that someone sent me off-list. I'm planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
Re: Internet Policies -- Benefits of IM and Social Media
One advantage of IM over phone conversations is proof of what is said in the conversation. Some times it is quite useful when you need to CYA. Jon On Tue, May 4, 2010 at 3:19 PM, Murray Freeman mfree...@alanet.org wrote: It sounds like the telephone may become extinct, doesn't it! Our organization is small, all in one bldg on one floor, so it's very easy to just walk down to an office. When I get a help desk call, I always walk to the requestor's office. The young man who works with me uses Remote Assistance and the telephone. Here, an email is just as fast as an IM. *Murray* -- *From:* Don Guyer [mailto:don.gu...@prufoxroach.com] *Sent:* Tuesday, May 04, 2010 1:12 PM *To:* NT System Admin Issues *Subject:* RE: Internet Policies -- Benefits of IM and Social Media Agreed. As a department, we all use IM. I have coworkers in other physical locations that I interact with all day. No one answers their desk phones, because it’s usually a vendor or sales call. J E-mail is great for communicating certain things that require a record, or are too long winded for IM, but IM is great for those “hey can you look at server X?” conversations. $.02 Don Guyer Systems Engineer - Information Services Prudential, Fox Roach/Trident Group 431 W. Lancaster Avenue Devon, PA 19333 Direct: (610) 993-3299 Fax: (610) 650-5306 don.gu...@prufoxroach.com *From:* Andrew S. Baker [mailto:asbz...@gmail.com] *Sent:* Tuesday, May 04, 2010 2:02 PM *To:* NT System Admin Issues *Subject:* Re: Internet Policies -- Benefits of IM and Social Media IM is faster than email is faster than a meeting.Personally, I prefer email to IM, but I understand how and why people use it as a valid communications tool. It facilitates quick, informal exchanges that may not rise to the level of a full discussion. And both IM and email are easier to schedule than face-to-face meetings in many cases. Social networking is just a prevalent, but semi-closed network where you can interact with business partners, customers or prospective clients in a way where the recipient has some control over who reaches them and how they are reached, and the sender has access to some rich content without the fear of antispam interference. All of the above means of communications are useful to various organizations, even though abuse of them can waste time. But so can the abuse of any other communications vehicle, including meetings. -ASB: http://XeeSM.com/AndrewBaker http://xeesm.com/AndrewBaker On Tue, May 4, 2010 at 1:39 PM, Murray Freeman mfree...@alanet.org wrote: Well, as long as we're discussing IM, we don't allow it currently. But, I have trouble understanding how IM is better than either email or a meeting, or using a telephone to accomplish the very same thing as an IM. Can someone explain that to me. Oh, we've recently adopted social networking for our organization, but primarily for our membership. I'm having trouble understanding how social networking will help our members too! *Murray* -- *From:* Steve Ens [mailto:stevey...@gmail.com] *Sent:* Tuesday, May 04, 2010 11:42 AM *To:* NT System Admin Issues *Subject:* Re: Internet Policies It all depends if there is a business or productivity reason for it. We use IM in some of the departments for meetings, quick conversations, etc. But if it is used for wasting time, I would not allow it. On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new “IM Virus” and got an email back from the CEO basically stating “shouldn’t that be a violation of company policy anyway?” and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who’s child is overseas in the military) who used IM on a semi-regular basis. For this reason, I’m working on coming up with a company policy. I’ve looked at the sample template from SANS as well as another one that someone sent me off-list. I’m planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J [image: John-Aldrich][image: Tile-Tools] ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image002.jpgimage001.jpg
RE: Internet Policies
Interesting. Might actually be something to look into, although I’d prefer an “appliance” so I don’t have to buy a server (we don’t have any Win2K8 servers…only 2003 R2) John-AldrichTile-Tools From: Chad Leeper [mailto:c...@capitalcityfruit.com] Sent: Tuesday, May 04, 2010 3:15 PM To: NT System Admin Issues Subject: RE: Internet Policies We use web marshal. http://www.8e6security.com/webmarshal.asp Works pretty well and is pretty cheap. You can add antivirus and anit spyware scanning modules as well. There is also a fairly robust reporting engine for it. I had it enabled for 60 users and it was running on Windows Xp. I have since moved it to a Win2003 VM. /Chad Ahh… We don’t have an ISA server. I suppose I could enable logging on the ASA and check those logs and do similar things…Hmm… something to think about. John-AldrichTile-Tools From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 2:44 PM To: NT System Admin Issues Subject: Re: Internet Policies I used a fake DNS entry for twitter.com http://twitter.com/ and the others that I found in the ISA log. I made a new forward lookup zone for each one in our Active Dir integrated DNS system. I know it wont block sub-domains but it made the point. It has since been removed. I can use Trend micro officescan if we want to actively block though. Devin On Tue, May 4, 2010 at 1:22 PM, John Aldrich jaldr...@blueridgecarpet.com wrote: I was aware of that, but I was wondering what Devin’s company used. J Personally, I’d go for either DNS (if there was a blackhole or something easily implemented like that) or web filtering appliance. John-AldrichTile-Tools From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Tuesday, May 04, 2010 2:20 PM To: NT System Admin Issues Subject: Re: Internet Policies They can be blocked via DNS, via Firewalls, via Web Filtering technologies. -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 2:11 PM, John Aldrich jaldr...@blueridgecarpet.com wrote: How did you block them? Do you have an appliance or did you put in some sort of DNS entries? John-AldrichTile-Tools From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 1:21 PM To: NT System Admin Issues Subject: Re: Internet Policies Up until last month we blocked all the social networking sites. Now our firm is marketing on them. We are adjusting our policies for this. It will be on a user-by-user basis though. Devin On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new “IM Virus” and got an email back from the CEO basically stating “shouldn’t that be a violation of company policy anyway?” and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who’s child is overseas in the military) who used IM on a semi-regular basis. For this reason, I’m working on coming up with a company policy. I’ve looked at the sample template from SANS as well as another one that someone sent me off-list. I’m planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J John-AldrichTile-Tools Think green. Please consider the environment before printing CONFIDENTIALITY NOTE: The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it. Thank you. * ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
RE: Internet Policies
We redirect ours to an internal webpage that lets the user know the site was blocked and then we can look thru the logs to see who has been trying to go where. ...Tim From: Ziots, Edward [mailto:ezi...@lifespan.org] Sent: Tuesday, May 04, 2010 12:22 PM To: NT System Admin Issues Subject: RE: Internet Policies Yep the good old blackhole technique, most of the naughty domains are going to 127.0.0.1 which helps if the malware is programmed to go back to a specific domain name, but that doesn't help those malware that is using google or other public available sites, that might have been compromised to get back to its instruction set. Also there is the fast-flux domains which is usually tied with malware/botnets, that this approach has a good affect on. Again nothing is full proof but if you can reduce your risk and quickly, that is better than sitting there praying for forgiveness after you get owned. Z Edward Ziots CISSP,MCSA,MCP+I,Security +,Network +,CCA Network Engineer Lifespan Organization 401-639-3505 ezi...@lifespan.org From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 2:44 PM To: NT System Admin Issues Subject: Re: Internet Policies I used a fake DNS entry for twitter.comhttp://twitter.com and the others that I found in the ISA log. I made a new forward lookup zone for each one in our Active Dir integrated DNS system. I know it wont block sub-domains but it made the point. It has since been removed. I can use Trend micro officescan if we want to actively block though. Devin On Tue, May 4, 2010 at 1:22 PM, John Aldrich jaldr...@blueridgecarpet.commailto:jaldr...@blueridgecarpet.com wrote: I was aware of that, but I was wondering what Devin's company used. :) Personally, I'd go for either DNS (if there was a blackhole or something easily implemented like that) or web filtering appliance. [cid:image001.jpg@01CAEB85.31F92630][cid:image002@01caeb85.31f92630] From: Andrew S. Baker [mailto:asbz...@gmail.commailto:asbz...@gmail.com] Sent: Tuesday, May 04, 2010 2:20 PM To: NT System Admin Issues Subject: Re: Internet Policies They can be blocked via DNS, via Firewalls, via Web Filtering technologies. -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 2:11 PM, John Aldrich jaldr...@blueridgecarpet.commailto:jaldr...@blueridgecarpet.com wrote: How did you block them? Do you have an appliance or did you put in some sort of DNS entries? [cid:image001.jpg@01CAEB85.31F92630][cid:image002@01caeb85.31f92630] From: Devin Meade [mailto:devin.me...@gmail.commailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 1:21 PM To: NT System Admin Issues Subject: Re: Internet Policies Up until last month we blocked all the social networking sites. Now our firm is marketing on them. We are adjusting our policies for this. It will be on a user-by-user basis though. Devin On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.commailto:jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new IM Virus and got an email back from the CEO basically stating shouldn't that be a violation of company policy anyway? and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who's child is overseas in the military) who used IM on a semi-regular basis. For this reason, I'm working on coming up with a company policy. I've looked at the sample template from SANS as well as another one that someone sent me off-list. I'm planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. :) [cid:image001.jpg@01CAEB85.31F92630][cid:image002@01caeb85.31f92630] ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~inline: image001.jpginline: image002.jpg
RE: Internet Policies
I've just got to disagree with one comment, ...less disruptive then a phone call... The person receiving a phone call, an IM or email, not to mention a tweet is ALWAYS distracted. One thing we've done is put a Do Not Disturb button on our phones, so you know if a person is busy and doesn't want to be disturbed. The phone doesn't ring, just goes directly into voice mail. Getting back to social networking, the real problem is the fact that there doesn't seem to be a way to block non-business tweets. It's just another distraction, like IM and email from friends and family. Murray From: Steven Peck [mailto:sep...@gmail.com] Sent: Tuesday, May 04, 2010 1:46 PM To: NT System Admin Issues Subject: Re: Internet Policies IM isn't just chat. Especially if you have OCS installed. There are tons of things that can be dispensed with a quick 2-3 line IM session that would require waiting and delays for other things. With IM you can see if a user if actually present and can be contacted now. It's faster then email for yes/no questions and is less disruptive then a phone call. If I see a user status as 'Busy' then I don't bug them, but if they are listed as 'Available' then I can ping them on quick short questions. During phone conferences having the ability to contact people not on the line, (outage, check with engineers working the issue) to then relay information to the call is invaluable. Our help desk uses it. Our help desk is scattered over 4 physical locations and if there is a major issue, then they can't call the other locations because everyone is on the phone. Late night troubleshooting sessions from home that don't need a call means my boss isn't calling for status, he just checks me on IM. My wife and kids do not get woken up. It is often easier to arrange lunch, etc through IM rather then email. In a tightly controlled messaging environment it means less clutter in the archives. Once people actually start using IM for business reasons it's seriously addictive and helps substantially but it's one of those 'you have to experience it to understand it' type of things. Out of all the enabled IM accounts we have 3/4 signed on during business hours which is a huge buy in for us. We do not mandate people use it, merely make it available as a service. Steven Peck On Tue, May 4, 2010 at 10:39 AM, Murray Freeman mfree...@alanet.org wrote: Well, as long as we're discussing IM, we don't allow it currently. But, I have trouble understanding how IM is better than either email or a meeting, or using a telephone to accomplish the very same thing as an IM. Can someone explain that to me. Oh, we've recently adopted social networking for our organization, but primarily for our membership. I'm having trouble understanding how social networking will help our members too! Murray From: Steve Ens [mailto:stevey...@gmail.com] Sent: Tuesday, May 04, 2010 11:42 AM To: NT System Admin Issues Subject: Re: Internet Policies It all depends if there is a business or productivity reason for it. We use IM in some of the departments for meetings, quick conversations, etc. But if it is used for wasting time, I would not allow it. On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new IM Virus and got an email back from the CEO basically stating shouldn't that be a violation of company policy anyway? and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who's child is overseas in the military) who used IM on a semi-regular basis. For this reason, I'm working on coming up with a company policy. I've looked at the sample template from SANS as well as another one that someone sent me off-list. I'm planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
Re: Sort of OT: SPAM - should I stick with GFI MailEssentials?
Phil makes a good point, specifically regarding defense in depth. If you're relying on the same engine/dats, it doesn't matter how many gateways or levels of software protection you have. We made the same mistake here when management decided a certain vendors total protection suite was a good idea and proceded to implement their respective software/gateways. It wasn't a big deal until we realized our hosted AV/Spam solution also relied on the same engine/dats. As a result, new gateways are on the way... - Sean On Tue, May 4, 2010 at 10:30 AM, Phil Brutsche p...@optimumdata.com wrote: I have 2 thoughts on the matter: a) I'm sure you're familiar with the saying devil you know vs the devil you don't. You know the GFI product works. Your other options are unknown quantities. b) Consider defense in depth. These days most anti-spam implementations also include anti-virus. If you use the same scanning engine on your desktop as well as the inbound mail path, and the mail antivirus misses some piece of malware... On 5/4/2010 12:19 PM, Raper, Jonathan - Eagle wrote: Hi everyone, We recently replaced our AV (McAfee) with Trend for both clients and Exchange 2007 (sorry Sunbelt – we came REALLY close to choosing VIPRE). We did not purchase the spam filtering option with Trend ScanMail, but are now considering it. We’ve been running GFI MailEssentials for years on a dedicated box. We’re protecting between 400 and 500 mailboxes. The price for GFI continues to be attractive, so much so that hosted solutions don’t seem to be worth the cost differential… The first logical option to me would be to move toward Trend, but I’m not so sure that adding spam filtering at the Exchange Server level is a good idea from a resource perspective. We were there at one point years ago, with GFI and ended up moving off to a dedicated box, because GFI was eating up too many resources (we were getting HAMMERED with spam – million a month, easily). Has anyone on this list moved away from GFI to something else? If so, what did you move to and what was your reasoning? I welcome any and all thoughts/suggestions/experiences. -- Phil Brutsche p...@optimumdata.com ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Internet Policies
Actually, Policies are broad reaching statements of what Senior Management views are on security, they are not all encompassing documents, nor do they have all the details of how the controls are to be applied, those are done in the process and procedures of the implementation of the controls ( Technical, Administrative, and Physical) to meet the letter of the policy. You have system specific polices to cover things like email use, internet use ( usually covered under acceptable use policy, or broke out to its own policy altogether). I tend to favor the approach of more individual/system specific policies that are linked back to the greater institution security policy but cover the required items to cover items facing the business. I do agree if HR isn't a partner with you from the beginning then you have less muscle in the policy but if Management doesn't support or enforce the policy, then the policy isn't worth the paper its written on, and trust me there are plenty of managers out there that don't enforce the policies they should be enforcing which sets a bad tone for their companies accordingly. Nobody comes out unscathed from policy writing or enforcement nor is it a pretty process, but it is necessary to maintain law and order within the organization, or things will run wild in a hurry and you will be looking at the wild wild west, with no recourse as compared to structure and organization accordingly. Z Edward Ziots CISSP,MCSA,MCP+I,Security +,Network +,CCA Network Engineer Lifespan Organization 401-639-3505 ezi...@lifespan.org From: Jon Harris [mailto:jk.har...@gmail.com] Sent: Tuesday, May 04, 2010 3:21 PM To: NT System Admin Issues Subject: Re: Internet Policies When you are building the policy put everything you can in it to deal with as many issues as possible. Issues like who can and can not install software, what kind of monitoring is allowed on the clients or in the network traffic, get HR involved early on and make sure there is some real teeth in the policy and don't go with something that is easly to work around. Been there and gotten bitten more than one time. If you are one of the few that still allows users to be power users or admins now is the time to strip them if you can of this. Since the CEO/Owner is concerned work fast their attention span is not as long as a mill-second. Jon On Tue, May 4, 2010 at 2:53 PM, Angus Scott-Fleming angu...@geoapps.com wrote: On 4 May 2010 at 12:39, Murray Freeman wrote: Well, as long as we're discussing IM, we don't allow it currently. But, I have trouble understanding how IM is better than either email or a meeting, or using a telephone to accomplish the very same thing as an IM. Can someone explain that to me. Oh, we've recently adopted social networking for our organization, but primarily for our membership. I'm having trouble understanding how social networking will help our members too! IM is Instant whereas email isn't, but it can be ignored if you're on a critical phone call or busy doing something that requires thought, which a phone call can't. I use IM with my-son-the-university-tech-support-geek when I'm picking his brains while debugging a client situation that's more up his alley, very useful as I can get links from him and dump screenshots back to him instantly which email doesn't allow. Also, for a multi-building company I can see where an internal Jabber network could be very useful. Social networking is a different disallowed beast altogether IMHO, although I can see where LinkedIn might be useful in some businesses. -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Internet Policies
Well, it's somewhat of a moot point now as HR came to me with a paper copy of a document they have all new employees sign (I never signed it, though. J) and I scanned and converted it via OCR and added a few tweaks, such as specifying that AIM, Yahoo and other instant messaging clients are not permitted and that social networking sites are only allowed for business uses and must be pre-authorized by management. I also outlawed bringing in data disks (including USB Thumb Drives) from outside for the purposes of combating viruses and other mal-ware. I've given a copy of the revised document to the CEO for his review along with a copy of the original. *shrug* out of my hands now unless/until he wants to make changes. J John-AldrichTile-Tools From: Ziots, Edward [mailto:ezi...@lifespan.org] Sent: Tuesday, May 04, 2010 3:31 PM To: NT System Admin Issues Subject: RE: Internet Policies Actually, Policies are broad reaching statements of what Senior Management views are on security, they are not all encompassing documents, nor do they have all the details of how the controls are to be applied, those are done in the process and procedures of the implementation of the controls ( Technical, Administrative, and Physical) to meet the letter of the policy. You have system specific polices to cover things like email use, internet use ( usually covered under acceptable use policy, or broke out to its own policy altogether). I tend to favor the approach of more individual/system specific policies that are linked back to the greater institution security policy but cover the required items to cover items facing the business. I do agree if HR isn't a partner with you from the beginning then you have less muscle in the policy but if Management doesn't support or enforce the policy, then the policy isn't worth the paper its written on, and trust me there are plenty of managers out there that don't enforce the policies they should be enforcing which sets a bad tone for their companies accordingly. Nobody comes out unscathed from policy writing or enforcement nor is it a pretty process, but it is necessary to maintain law and order within the organization, or things will run wild in a hurry and you will be looking at the wild wild west, with no recourse as compared to structure and organization accordingly. Z Edward Ziots CISSP,MCSA,MCP+I,Security +,Network +,CCA Network Engineer Lifespan Organization 401-639-3505 ezi...@lifespan.org From: Jon Harris [mailto:jk.har...@gmail.com] Sent: Tuesday, May 04, 2010 3:21 PM To: NT System Admin Issues Subject: Re: Internet Policies When you are building the policy put everything you can in it to deal with as many issues as possible. Issues like who can and can not install software, what kind of monitoring is allowed on the clients or in the network traffic, get HR involved early on and make sure there is some real teeth in the policy and don't go with something that is easly to work around. Been there and gotten bitten more than one time. If you are one of the few that still allows users to be power users or admins now is the time to strip them if you can of this. Since the CEO/Owner is concerned work fast their attention span is not as long as a mill-second. Jon On Tue, May 4, 2010 at 2:53 PM, Angus Scott-Fleming angu...@geoapps.com wrote: On 4 May 2010 at 12:39, Murray Freeman wrote: Well, as long as we're discussing IM, we don't allow it currently. But, I have trouble understanding how IM is better than either email or a meeting, or using a telephone to accomplish the very same thing as an IM. Can someone explain that to me. Oh, we've recently adopted social networking for our organization, but primarily for our membership. I'm having trouble understanding how social networking will help our members too! IM is Instant whereas email isn't, but it can be ignored if you're on a critical phone call or busy doing something that requires thought, which a phone call can't. I use IM with my-son-the-university-tech-support-geek when I'm picking his brains while debugging a client situation that's more up his alley, very useful as I can get links from him and dump screenshots back to him instantly which email doesn't allow. Also, for a multi-building company I can see where an internal Jabber network could be very useful. Social networking is a different disallowed beast altogether IMHO, although I can see where LinkedIn might be useful in some businesses. -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~image001.jpgimage002.jpg
RE: Internet Policies -- Benefits of IM and Social Media
Jon, I don't think that can constitute as Primary/Best evidence in a court of law, especially when electronic communications is usually considered Heresay, and therefore needs to be corroborated with other sources. Also: The evidence only shows a communication from the source communication to the destination computer, and doesn't accurately reflect the person or entity behind the communications ( Anyone can refute there Login ID was hacked, and it wasn't them that sent the communications) and I haven't seen many IM packages provide two factor authentication, that provide additional evidence that said user/entity is who they claim to be... Another item of interest with IM communications: Electronic Communications Privacy Act of 1986 ( Updated in 2000) http://en.wikipedia.org/wiki/Electronic_Communications_Privacy_Act Possibly monitoring or intercepting the communications, via IM without the authorization for a wiretap could constitute a violation of existing wiretap laws: IM conversions are internet conversations. Telephone tapping (or wire tapping/wiretapping in the USA http://en.wikipedia.org/wiki/USA ) is the monitoring of telephone http://en.wikipedia.org/wiki/Telephone and Internet http://en.wikipedia.org/wiki/Internet conversations by a third party, often by covert means. While workplace communications are in theory protected an employer must simply give notice or a supervisor must feel that the employee's actions are not in the company's interest to gain access to communiqué. This means that with minimal assumptions an employer can monitor communications within the company. (Reason why you want these things in policy, and the users to sign off on the policy, either acceptable use, or a system specific or issue specific policy) Plus its a lot easier for information disclosure on unregulated IM that goes outside the organization, which raises the risk of insider threat, which makes you really think, was that IM project a good idea anyways? Why are the bossess still allowing IM from 3rd parties to carry communications and possibly the company secrets right out the door over networks they don't own to endpoints around the world. Just food for thought, PS: Disclaimer, this does not constitute in any way shape or form legal advice, consult your company legal departments for further guidance on these and all legal matters... EZ Edward Ziots CISSP,MCSA,MCP+I,Security +,Network +,CCA Network Engineer Lifespan Organization 401-639-3505 ezi...@lifespan.org From: Jon Harris [mailto:jk.har...@gmail.com] Sent: Tuesday, May 04, 2010 3:23 PM To: NT System Admin Issues Subject: Re: Internet Policies -- Benefits of IM and Social Media One advantage of IM over phone conversations is proof of what is said in the conversation. Some times it is quite useful when you need to CYA. Jon On Tue, May 4, 2010 at 3:19 PM, Murray Freeman mfree...@alanet.org wrote: It sounds like the telephone may become extinct, doesn't it! Our organization is small, all in one bldg on one floor, so it's very easy to just walk down to an office. When I get a help desk call, I always walk to the requestor's office. The young man who works with me uses Remote Assistance and the telephone. Here, an email is just as fast as an IM. Murray From: Don Guyer [mailto:don.gu...@prufoxroach.com] Sent: Tuesday, May 04, 2010 1:12 PM To: NT System Admin Issues Subject: RE: Internet Policies -- Benefits of IM and Social Media Agreed. As a department, we all use IM. I have coworkers in other physical locations that I interact with all day. No one answers their desk phones, because it's usually a vendor or sales call. J E-mail is great for communicating certain things that require a record, or are too long winded for IM, but IM is great for those hey can you look at server X? conversations. $.02 Don Guyer Systems Engineer - Information Services Prudential, Fox Roach/Trident Group 431 W. Lancaster Avenue Devon, PA 19333 Direct: (610) 993-3299 Fax: (610) 650-5306 don.gu...@prufoxroach.com From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Tuesday, May 04, 2010 2:02 PM To: NT System Admin Issues Subject: Re: Internet Policies -- Benefits of IM and Social Media IM is faster than email is faster than a meeting.Personally, I prefer email to IM, but I understand how and why people use it as a valid communications tool. It facilitates quick, informal exchanges that may not rise to the level of a full discussion. And both IM and email are easier to schedule than face-to-face meetings in many cases. Social networking is just a prevalent, but semi-closed network where you can interact with business partners, customers or prospective clients in a way where the recipient has some control over who reaches them and how they are reached, and the sender has access to
RE: Compare two AD / Exchange accounts
Rock on, thanks everyone. Dave From: Brian Desmond [mailto:br...@briandesmond.com] Sent: Tuesday, May 04, 2010 12:00 PM To: NT System Admin Issues Subject: RE: Compare two AD / Exchange accounts I'd probably just use adfind and kick each one to a text file (Joe has a switch to sort the attribute names alphabetically, you want this) and then windiff the two text files. This is what I usually do. Thanks, Brian Desmond br...@briandesmond.com c - 312.731.3132 From: David Lum [mailto:david@nwea.org] Sent: Tuesday, May 04, 2010 1:00 PM To: NT System Admin Issues Subject: Compare two AD / Exchange accounts Anyone know offhand of a tool / have a query line to compare two Active Directory accounts? Group and DL membership, assigned delegates/calendar permissions, etc... David Lum // SYSTEMS ENGINEER NORTHWEST EVALUATION ASSOCIATION (Desk) 971.222.1025 // (Cell) 503.267.9764 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Internet Policies -- Benefits of IM and Social Media
Are you suggesting that IM is treated differently than email under the laws of evidence? Murray From: Ziots, Edward [mailto:ezi...@lifespan.org] Sent: Tuesday, May 04, 2010 2:48 PM To: NT System Admin Issues Subject: RE: Internet Policies -- Benefits of IM and Social Media Jon, I don't think that can constitute as Primary/Best evidence in a court of law, especially when electronic communications is usually considered Heresay, and therefore needs to be corroborated with other sources. Also: The evidence only shows a communication from the source communication to the destination computer, and doesn't accurately reflect the person or entity behind the communications ( Anyone can refute there Login ID was hacked, and it wasn't them that sent the communications) and I haven't seen many IM packages provide two factor authentication, that provide additional evidence that said user/entity is who they claim to be... Another item of interest with IM communications: Electronic Communications Privacy Act of 1986 ( Updated in 2000) http://en.wikipedia.org/wiki/Electronic_Communications_Privacy_Act Possibly monitoring or intercepting the communications, via IM without the authorization for a wiretap could constitute a violation of existing wiretap laws: IM conversions are internet conversations. Telephone tapping (or wire tapping/wiretapping in the USA http://en.wikipedia.org/wiki/USA ) is the monitoring of telephone http://en.wikipedia.org/wiki/Telephone and Internet http://en.wikipedia.org/wiki/Internet conversations by a third party, often by covert means. While workplace communications are in theory protected an employer must simply give notice or a supervisor must feel that the employee's actions are not in the company's interest to gain access to communiqué. This means that with minimal assumptions an employer can monitor communications within the company. (Reason why you want these things in policy, and the users to sign off on the policy, either acceptable use, or a system specific or issue specific policy) Plus its a lot easier for information disclosure on unregulated IM that goes outside the organization, which raises the risk of insider threat, which makes you really think, was that IM project a good idea anyways? Why are the bossess still allowing IM from 3rd parties to carry communications and possibly the company secrets right out the door over networks they don't own to endpoints around the world. Just food for thought, PS: Disclaimer, this does not constitute in any way shape or form legal advice, consult your company legal departments for further guidance on these and all legal matters... EZ Edward Ziots CISSP,MCSA,MCP+I,Security +,Network +,CCA Network Engineer Lifespan Organization 401-639-3505 ezi...@lifespan.org From: Jon Harris [mailto:jk.har...@gmail.com] Sent: Tuesday, May 04, 2010 3:23 PM To: NT System Admin Issues Subject: Re: Internet Policies -- Benefits of IM and Social Media One advantage of IM over phone conversations is proof of what is said in the conversation. Some times it is quite useful when you need to CYA. Jon On Tue, May 4, 2010 at 3:19 PM, Murray Freeman mfree...@alanet.org wrote: It sounds like the telephone may become extinct, doesn't it! Our organization is small, all in one bldg on one floor, so it's very easy to just walk down to an office. When I get a help desk call, I always walk to the requestor's office. The young man who works with me uses Remote Assistance and the telephone. Here, an email is just as fast as an IM. Murray From: Don Guyer [mailto:don.gu...@prufoxroach.com] Sent: Tuesday, May 04, 2010 1:12 PM To: NT System Admin Issues Subject: RE: Internet Policies -- Benefits of IM and Social Media Agreed. As a department, we all use IM. I have coworkers in other physical locations that I interact with all day. No one answers their desk phones, because it's usually a vendor or sales call. J E-mail is great for communicating certain things that require a record, or are too long winded for IM, but IM is great for those hey can you look at server X? conversations. $.02 Don Guyer Systems Engineer - Information Services Prudential, Fox Roach/Trident Group 431 W. Lancaster Avenue Devon, PA 19333 Direct: (610) 993-3299 Fax: (610) 650-5306 don.gu...@prufoxroach.com From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Tuesday, May 04, 2010 2:02 PM To: NT System Admin Issues Subject: Re: Internet Policies -- Benefits of IM and Social Media IM is faster than email is faster than a meeting.Personally, I prefer email to IM, but I understand how and why people use it as a valid communications tool. It facilitates quick, informal exchanges that may not rise to the level of a full discussion. And both IM and email are easier to
Re: Sort of OT: SPAM - should I stick with GFI MailEssentials?
I think you misunderstand - I'm not saying you shouldn't run some sort of mail gateway protection. I'm simply saying you shouldn't use the same product on your desktops *and* the mail gateway. On 5/4/2010 1:53 PM, David Lum wrote: I run both when the environment / client permits. If you can keep the bulk of it off your network all the better. I have one cluent with both a Barracuda AND Trend’s anti-spam. The ‘Cuda is upstream and catches 99% of the spam, Trend catches the occasional leaker but since it doesn’t have much to look for it doesn’t affect Exchange server load at all. -- Phil Brutsche p...@optimumdata.com ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Internet Policies
Webmarshal will run on an old PC, Win 2003, Win 2008. It also ties into ISA if need be. Interesting. Might actually be something to look into, although I’d prefer an “appliance” so I don’t have to buy a server (we don’t have any Win2K8 servers…only 2003 R2) From: Chad Leeper [mailto:c...@capitalcityfruit.com] Sent: Tuesday, May 04, 2010 3:15 PMTo: NT System Admin IssuesSubject: RE: Internet Policies We use web marshal. http://www.8e6security.com/webmarshal.asp Works pretty well and is pretty cheap.You can add antivirus and anit spyware scanning modules as well. There is also a fairly robust reporting engine for it. I had it enabled for 60 users and it was running on Windows Xp. I have since moved it to a Win2003 VM. /Chad Ahh… We don’t have an ISA server. I suppose I could enable logging on the ASA and check those logs and do similar things…Hmm… something to think about. From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 2:44 PMTo: NT System Admin IssuesSubject: Re: Internet Policies I used a "fake DNS" entry for twitter.com and the others that I found in the ISA log. I made a new forward lookup zone for each one in our Active Dir integrated DNS system. I know it wont block sub-domains but it made the point. It has since been removed. I can use Trend micro officescan if we want to actively block though.Devin On Tue, May 4, 2010 at 1:22 PM, John Aldrich jaldr...@blueridgecarpet.com wrote: I was aware of that, but I was wondering what Devin’s company used. J Personally, I’d go for either DNS (if there was a blackhole or something easily implemented like that) or web filtering appliance. From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Tuesday, May 04, 2010 2:20 PM To: NT System Admin IssuesSubject: Re: Internet Policies They can be blocked via DNS, via Firewalls, via Web Filtering technologies. -ASB: http://XeeSM.com/AndrewBaker On Tue, May 4, 2010 at 2:11 PM, John Aldrich jaldr...@blueridgecarpet.com wrote: How did you block them? Do you have an appliance or did you put in some sort of DNS entries? From: Devin Meade [mailto:devin.me...@gmail.com] Sent: Tuesday, May 04, 2010 1:21 PM To: NT System Admin IssuesSubject: Re: Internet Policies Up until last month we blocked all the social networking sites. Now our firm is marketing on them. We are adjusting our policies for this. It will be on a user-by-user basis though.Devin On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new “IM Virus” and got an email back from the CEO basically stating “shouldn’t that be a violation of company policy anyway?” and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who’s child is overseas in the military) who used IM on a semi-regular basis. For this reason, I’m working on coming up with a company policy. I’ve looked at the sample template from SANS as well as another one that someone sent me off-list. I’m planning on incorporating the best of everything I get, so if anyone has any suggested language regarding IM or social networking, please let me have it. J Think green. Please consider the environment before printing CONFIDENTIALITY NOTE: The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it. Thank you. * Think green. Please consider the environment before printing CONFIDENTIALITY NOTE: The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it. Thank you. *
Re: Sort of OT: SPAM - should I stick with GFI MailEssentials?
I think the difference is where you want to do your filtering. With significantly smaller environments than yours, I opted to move filtering to the cloud with Postini for two organizations and it was great. The threats and junk are removed before they hit your circuit - 90+% of incoming SMTP traffic never makes it to the network edge. Postini uses McAfee for threat management and their spam filters are very good. We operated with them set to max; a few false positives here but users can easily manage their own quarantines and sender lists. Sunbelt's VIPRE for Exchange also does an outstanding job, is a breeze to manage, very cost effective, and provides multiple scan engines but is filtering inside your network. In addition to spam and threat management, it also protects your info store, something Postini doesn't do. Die dulci fruere! Roger Wright ___ On Tue, May 4, 2010 at 1:19 PM, Raper, Jonathan - Eagle jra...@eaglemds.com wrote: Hi everyone, We recently replaced our AV (McAfee) with Trend for both clients and Exchange 2007 (sorry Sunbelt – we came REALLY close to choosing VIPRE). We did not purchase the spam filtering option with Trend ScanMail, but are now considering it. We’ve been running GFI MailEssentials for years on a dedicated box. We’re protecting between 400 and 500 mailboxes. The price for GFI continues to be attractive, so much so that hosted solutions don’t seem to be worth the cost differential… The first logical option to me would be to move toward Trend, but I’m not so sure that adding spam filtering at the Exchange Server level is a good idea from a resource perspective. We were there at one point years ago, with GFI and ended up moving off to a dedicated box, because GFI was eating up too many resources (we were getting HAMMERED with spam – million a month, easily). Has anyone on this list moved away from GFI to something else? If so, what did you move to and what was your reasoning? I welcome any and all thoughts/suggestions/experiences. TIA, Jonathan L. Raper, A+, MCSA, MCSE Technology Coordinator Eagle Physicians Associates, PA jra...@eaglemds.com www.eaglemds.com Any medical information contained in this electronic message is CONFIDENTIAL and privileged. It is unlawful for unauthorized persons to view, copy, disclose, or disseminate CONFIDENTIAL information. This electronic message may contain information that is confidential and/or legally privileged. It is intended only for the use of the individual(s) and/or entity named as recipients in the message. If you are not an intended recipient of this message, please notify the sender immediately and delete this material from your computer. Do not deliver, distribute or copy this message, and do not disclose its contents or take any action in reliance on the information that it contains. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Re: Internet Policies
It would depend on your company and corporate culture. If someone sends me an IM, it is in place of a phone call or email. So a 'distraction' will occur. In the case of IM, it's generally 30 seconds or less. Not unlike checking email technical lists from work instead of working. We used some documents from Microsoft and customized to our sites to establish courtesies when we introduced LCS. We use this for business. The latest stats average 30 messages a minute during the day. LCS 2005 had a 'do not disturb' setting but was fairly useless except as a visual indicator. Communicator 2007 has one that prevents interruptions except for people allowed to interrupt and I look forward to deploying it. Steven On Tue, May 4, 2010 at 12:28 PM, Murray Freeman mfree...@alanet.org wrote: I've just got to disagree with one comment, ...less disruptive then a phone call... The person receiving a phone call, an IM or email, not to mention a tweet is ALWAYS distracted. One thing we've done is put a Do Not Disturb button on our phones, so you know if a person is busy and doesn't want to be disturbed. The phone doesn't ring, just goes directly into voice mail. Getting back to social networking, the real problem is the fact that there doesn't seem to be a way to block non-business tweets. It's just another distraction, like IM and email from friends and family. *Murray* -- *From:* Steven Peck [mailto:sep...@gmail.com] *Sent:* Tuesday, May 04, 2010 1:46 PM *To:* NT System Admin Issues *Subject:* Re: Internet Policies IM isn't just chat. Especially if you have OCS installed. There are tons of things that can be dispensed with a quick 2-3 line IM session that would require waiting and delays for other things. With IM you can see if a user if actually present and can be contacted now. It's faster then email for yes/no questions and is less disruptive then a phone call. If I see a user status as 'Busy' then I don't bug them, but if they are listed as 'Available' then I can ping them on quick short questions. During phone conferences having the ability to contact people not on the line, (outage, check with engineers working the issue) to then relay information to the call is invaluable. Our help desk uses it. Our help desk is scattered over 4 physical locations and if there is a major issue, then they can't call the other locations because everyone is on the phone. Late night troubleshooting sessions from home that don't need a call means my boss isn't calling for status, he just checks me on IM. My wife and kids do not get woken up. It is often easier to arrange lunch, etc through IM rather then email. In a tightly controlled messaging environment it means less clutter in the archives. Once people actually start using IM for business reasons it's seriously addictive and helps substantially but it's one of those 'you have to experience it to understand it' type of things. Out of all the enabled IM accounts we have 3/4 signed on during business hours which is a huge buy in for us. We do not mandate people use it, merely make it available as a service. Steven Peck On Tue, May 4, 2010 at 10:39 AM, Murray Freeman mfree...@alanet.orgwrote: Well, as long as we're discussing IM, we don't allow it currently. But, I have trouble understanding how IM is better than either email or a meeting, or using a telephone to accomplish the very same thing as an IM. Can someone explain that to me. Oh, we've recently adopted social networking for our organization, but primarily for our membership. I'm having trouble understanding how social networking will help our members too! *Murray* -- *From:* Steve Ens [mailto:stevey...@gmail.com] *Sent:* Tuesday, May 04, 2010 11:42 AM *To:* NT System Admin Issues *Subject:* Re: Internet Policies It all depends if there is a business or productivity reason for it. We use IM in some of the departments for meetings, quick conversations, etc. But if it is used for wasting time, I would not allow it. On Tue, May 4, 2010 at 11:38 AM, John Aldrich jaldr...@blueridgecarpet.com wrote: What restrictions, if any, do your organizations place on things like IM or social networking sites? I sent out a warning to the office personnel this morning regarding the new “IM Virus” and got an email back from the CEO basically stating “shouldn’t that be a violation of company policy anyway?” and I had to tell him, I knew of no policies regarding that; and that in fact, my former supervisor was fully aware of at least one person (who’s child is overseas in the military) who used IM on a semi-regular basis. For this reason, I’m working on coming up with a company policy. I’ve looked at the sample template from SANS as well as another one that someone sent me off-list. I’m planning on incorporating the best of everything I get, so if anyone has any suggested
Re: Any certification on removing malware??
The only certification I know for removing malware is fdisk. On Tue, May 4, 2010 at 08:40, justino garcia jgarciaitl...@gmail.com wrote: Any certification on removing malware?? How about using and configuring and setup of antimalware software. -- Justin IT-TECH ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Citrix Best Practices for Satellite Connections was RE: www.Sunbelt-software.com down?
Just came across this while searching for some other Best practice documents. http://support.citrix.com/article/ctx118256 Deployment Best Practices for Citrix XenApp over Hughes Satellite Networks Carl Webster Citrix Technology Professional http://dabcc.com/Webster -Original Message- From: Steven M. Caesare [mailto:scaes...@caesare.com] Subject: RE: www.Sunbelt-software.com down? In Ken's defense, although we think of RT in terms of to the remote machine and back, it was not uncommon for the term within the satellite industry to mean up to the bird and back down. Particularly as early implementations were asymmetrical in that the head end would talk to the remote node via the sat, but the remote replies came back via analog modem. This you often spoke of each leg of the communication individually... But ya, I get what you mean. -sc -Original Message- From: Erik Goldoff [mailto:egold...@gmail.com] Subject: RE: www.Sunbelt-software.com down? With all due respect, why would I care about to the satellite and back, I do NOT ever communicate with the satellite. I do not know of ANY VSAT customer that communicates with the satellite that would define round trip as did you. My round trip is to the node I communicate with. I though that would be obvious within the context of the discussion ... ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
RE: Recycler Files
Trying to find files that a user (who was let go) might have deleted on their computer (email) altho, this would be more on the exchange server. _ Cameron Cooper Network Administrator | CompTIA A+ Certified Aurico Reports, Inc Phone: 847-890-4021 | Fax: 847-255-1896 ccoo...@aurico.com | www.aurico.com -Original Message- From: Angus Scott-Fleming [mailto:angu...@geoapps.com] Sent: Tuesday, May 04, 2010 10:34 AM To: NT System Admin Issues Subject: Re: Recycler Files On 4 May 2010 at 8:49, Cameron Cooper wrote: Is there a way to view the contents within a Recycler file in XP? I have browsed the RECYCLER folders using Total Commander from http://www.ghisler.com/. You have to set it to view Hidden/System Files which is in the Display option. You will have cryptic file names within the recycled folders. What are you trying to do? Angus -- Angus Scott-Fleming GeoApps, Tucson, Arizona 1-520-290-5038 Security Blog: http://geoapps.com/ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~