RE: non-local admin revisited
Yeah, I wasn't too clear from David's post though if it hat was the intention or if it was to try and stop people throwing on whatever they want. I'd either go with UAC or have a local account on each machine and use it for Run As when needed - I've not played too much with restricted groups but AFAIK it overwrites the local admins group rather than appending it which I'd find a little (pardon the pun) restrictive. Paul From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: 20 July 2011 01:08 To: NT System Admin Issues Subject: Re: non-local admin revisited Reduce risks related to system infection... ASB http://about.me/Andrew.S.Baker Harnessing the Advantages of Technology for the SMB market... On Tue, Jul 19, 2011 at 4:15 PM, Paul Hutchings paul.hutchi...@mira.co.ukmailto:paul.hutchi...@mira.co.uk wrote: What's your reason for wanting to do it? From: David Lum [david@nwea.orgmailto:david@nwea.org] Sent: 19 July 2011 6:10 PM To: NT System Admin Issues Subject: non-local admin revisited How do you bigger org's handle IT staff (DBA's and the like) not being local admins on their systems? Invariably they are used to throwing on whatever they want and in some ways this helps the Help desk so they're not called to install stuff the user can install. As we move to Windows 7 my recommendation is to yank local admin perms at the same time (yes everyone is local admin on their XP systems currently), but I foresee pushback from Service Desk and IT folks... David Lum Systems Engineer // NWEATM Office 503.548.5229tel:503.548.5229 // Cell (voice/text) 503.267.9764tel:503.267.9764 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin -- MIRA Ltd Watling Street, Nuneaton, Warwickshire, CV10 0TU, England Registered in England and Wales No. 402570 VAT Registration GB 100 1464 84 The contents of this e-mail are confidential and are solely for the use of the intended recipient. If you receive this e-mail in error, please delete it and notify us either by e-mail, telephone or fax. You should not copy, forward or otherwise disclose the content of the e-mail as this is prohibited. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Re: non-local admin revisited
I run with a non-privileged account on my Win7 workstation and have an admin account that I supply to UAC whenever I need to run anything with higher-level privileges. This works great for me, I am happy that I can't be tricked into anything without seeing the prompt. It's a *little *annoying when I have to launch a Citrix Delivery Services Console, a custom MMC and a PowerShell window with Run as administrator every time I log in, but that's the trade-off for higher security. I also like the way Restricted Groups GPOs blat the whole group down rather than appending and we use this in addition to dual accounts and UAC. It certainly ensures the only people with local admin access to our workstations or servers are the accounts that we have deigned shall have it. On 20 July 2011 10:19, Paul Hutchings paul.hutchi...@mira.co.uk wrote: Yeah, I wasn’t too clear from David’s post though if it hat was the intention or if it was to try and stop people throwing on whatever they want. ** ** I’d either go with UAC or have a local account on each machine and use it for “Run As” when needed – I’ve not played too much with restricted groups but AFAIK it overwrites the local admins group rather than appending it which I’d find a little (pardon the pun) restrictive. ** ** Paul *From:* Andrew S. Baker [mailto:asbz...@gmail.com] *Sent:* 20 July 2011 01:08 *To:* NT System Admin Issues *Subject:* Re: non-local admin revisited ** ** Reduce risks related to system infection... *ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of Technology for the SMB market…* On Tue, Jul 19, 2011 at 4:15 PM, Paul Hutchings paul.hutchi...@mira.co.uk wrote: What's your reason for wanting to do it? -- *From:* David Lum [david@nwea.org] *Sent:* 19 July 2011 6:10 PM *To:* NT System Admin Issues *Subject:* non-local admin revisited How do you bigger org’s handle IT staff (DBA’s and the like) not being local admins on their systems? Invariably they are used to throwing on whatever they want and in some ways this helps the Help desk so they’re not called to install stuff the user can install. As we move to Windows 7 my recommendation is to yank local admin perms at the same time (yes everyone is local admin on their XP systems currently), but I foresee pushback from Service Desk and IT folks… *David Lum* Systems Engineer // NWEATM Office 503.548.5229 //* *Cell (voice/text) 503.267.9764 ** ** ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin -- *MIRA Ltd* Watling Street, Nuneaton, Warwickshire, CV10 0TU, England Registered in England and Wales No. 402570 VAT Registration GB 100 1464 84 The contents of this e-mail are confidential and are solely for the use of the intended recipient. If you receive this e-mail in error, please delete it and notify us either by e-mail, telephone or fax. You should not copy, forward or otherwise disclose the content of the e-mail as this is prohibited. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin -- On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into the machine wrong figures, will the right answers come out?' I am not able rightly to apprehend the kind of confusion of ideas that could provoke such a question. ** IMPORTANT INFORMATION/DISCLAIMER * This document should be read only by those persons to whom it is addressed. If you have received this message it was obviously addressed to you and therefore you can read it, even it we didn't mean to send it to you. However, if the contents of this email make no sense whatsoever then you probably were not the intended recipient, or, alternatively, you are a mindless cretin; either way, you should immediately kill yourself and destroy your computer (not necessarily in that order). Once you have taken this action, please contact us.. no, sorry, you can't use your computer, because you just destroyed it, and possibly also committed suicide afterwards, but I am starting to digress.. * * The originator of this email is not liable for the transmission of the information contained in this communication. Or are they? Either way it's a pretty dull legal query and frankly one I'm not going to dwell on. But should you have nothing better to do, please feel
Re: Security IT to employee ratio
You will be hard pressed to find such a document, given all the variables, nor is that a useful way to go about justifying the headcount that might be needed. Rather, put together a list of all the activities that are needed to successfully maintain the security posture in your specific environment. Allocate some estimation of the time needed for each function, then add it all up. (Also take the liberty of delegating some portions of it to other technology departments, as necessary). This will tell you what the level of staffing *should* be for your environment, and by adding work to other people's plates, you'll automatically get their support for additional headcount. :) Of course, expect management to disagree on some of the items in your list, AND in the time allocated -- especially if they can keep it the way it is by shaving a few numbers and whacking a few tasks. * * *ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of Technology for the SMB market… * On Wed, Jul 20, 2011 at 1:05 AM, David Lum david@nwea.org wrote: Is there a document anywhere that can give me an idea of something along the lines of a general recommended active IT security staff per employee ratio? By active IT security I mean in-the-trenches people doing the legwork to get the last 3-5% of systems (at 400+ systems nothing is ever 100% in perfectly automated sync) fully compliant and up-to-date, keep astride of the IDS detections and tracking down which are false positives and which are actual alerts, etc. It has occurred to me that with 450 employees that there should probably be more than one FTE handling everything from IDS to keeping patches and AV current on all systems, employee training, etc… Heck I bet I can use one FTE that does NOTHING but track down and mitigate the non-compliant systems for AV and patching alone. *David Lum* Systems Engineer // NWEATM Office 503.548.5229 //* *Mobile 503.267.9764 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Re: non-local admin revisited
Either way is easily faciliated depending upon one's requirements. * * *ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of Technology for the SMB market… * On Wed, Jul 20, 2011 at 12:07 AM, Ben Scott mailvor...@gmail.com wrote: On Tue, Jul 19, 2011 at 9:36 PM, Kennedy, Jim kennedy...@elyriaschools.org wrote: Hmmm, I like this. With UAC on there is validity to running as an admin all the time, IF you only have admin on your own machine. I'd still much rather be required to enter a password for privileged operations. Being one click away from system privilege is scary for a number of reasons. -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Windows 2008 Server Recovery
Looks like a recent patch or whatever corrupted the NOS on one of my Windows 2008 R2 servers. What's the tool du jour? I use the Windows 2008 ISO, select language, see my installed copy of Windows, but then it wants me to select an image, or drop to command prompt. I can rebuild it fine, but it is a XenApp server with several customized apps, annoying to recreate. I'd rather not bother with restore from de-dup system. Suggestions? Fault is 0xc00f - corrupt file somewhere. Thanks, Tom Confidentiality Notice: This e-mail message, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: Security IT to employee ratio
Thanks ASB, that's kind of what I was afraid of and as always you suggest good steps. Dave From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Wednesday, July 20, 2011 4:00 AM To: NT System Admin Issues Subject: Re: Security IT to employee ratio You will be hard pressed to find such a document, given all the variables, nor is that a useful way to go about justifying the headcount that might be needed. Rather, put together a list of all the activities that are needed to successfully maintain the security posture in your specific environment. Allocate some estimation of the time needed for each function, then add it all up. (Also take the liberty of delegating some portions of it to other technology departments, as necessary). This will tell you what the level of staffing *should* be for your environment, and by adding work to other people's plates, you'll automatically get their support for additional headcount. :) Of course, expect management to disagree on some of the items in your list, AND in the time allocated -- especially if they can keep it the way it is by shaving a few numbers and whacking a few tasks. ASB http://about.me/Andrew.S.Baker Harnessing the Advantages of Technology for the SMB market... On Wed, Jul 20, 2011 at 1:05 AM, David Lum david@nwea.orgmailto:david@nwea.org wrote: Is there a document anywhere that can give me an idea of something along the lines of a general recommended active IT security staff per employee ratio? By active IT security I mean in-the-trenches people doing the legwork to get the last 3-5% of systems (at 400+ systems nothing is ever 100% in perfectly automated sync) fully compliant and up-to-date, keep astride of the IDS detections and tracking down which are false positives and which are actual alerts, etc. It has occurred to me that with 450 employees that there should probably be more than one FTE handling everything from IDS to keeping patches and AV current on all systems, employee training, etc... Heck I bet I can use one FTE that does NOTHING but track down and mitigate the non-compliant systems for AV and patching alone. David Lum Systems Engineer // NWEATM Office 503.548.5229tel:503.548.5229 // Mobile 503.267.9764tel:503.267.9764 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: non-local admin revisited
1. Facilitates such minutiae as being able to maintain a more accurate software inventory which plays directly to software licensing compliance. 2. Prevents (or at least hinders) a user from making (read: inadvertently allowing) system-wide changes to their machine that creates problems difficult for Service Desk to repair. 3. Prevents them (or at least makes it more inconvenient, which is sometimes the same thing) from loading unauthorized applications. Dave From: Paul Hutchings [mailto:paul.hutchi...@mira.co.uk] Sent: Tuesday, July 19, 2011 1:15 PM To: NT System Admin Issues Subject: RE: non-local admin revisited What's your reason for wanting to do it? From: David Lum [david@nwea.org] Sent: 19 July 2011 6:10 PM To: NT System Admin Issues Subject: non-local admin revisited How do you bigger org's handle IT staff (DBA's and the like) not being local admins on their systems? Invariably they are used to throwing on whatever they want and in some ways this helps the Help desk so they're not called to install stuff the user can install. As we move to Windows 7 my recommendation is to yank local admin perms at the same time (yes everyone is local admin on their XP systems currently), but I foresee pushback from Service Desk and IT folks... David Lum Systems Engineer // NWEATM Office 503.548.5229 // Cell (voice/text) 503.267.9764 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin MIRA Ltd Watling Street, Nuneaton, Warwickshire, CV10 0TU, England Registered in England and Wales No. 402570 VAT Registration GB 100 1464 84 The contents of this e-mail are confidential and are solely for the use of the intended recipient. If you receive this e-mail in error, please delete it and notify us either by e-mail, telephone or fax. You should not copy, forward or otherwise disclose the content of the e-mail as this is prohibited. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: Windows 2008 Server Recovery
As long as your image matches the windows service pack, then choose an upgrade, instead of a repair. If you image doesn't match the windows service pack, then get one that does. Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Tom Miller [mailto:tmil...@hnncsb.org] Sent: Wednesday, July 20, 2011 8:55 AM To: NT System Admin Issues Subject: Windows 2008 Server Recovery Looks like a recent patch or whatever corrupted the NOS on one of my Windows 2008 R2 servers. What's the tool du jour? I use the Windows 2008 ISO, select language, see my installed copy of Windows, but then it wants me to select an image, or drop to command prompt. I can rebuild it fine, but it is a XenApp server with several customized apps, annoying to recreate. I'd rather not bother with restore from de-dup system. Suggestions? Fault is 0xc00f - corrupt file somewhere. Thanks, Tom Confidentiality Notice: This e-mail message, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: Security IT to employee ratio
I would also start to look at what the business requirements are. One FTE is going to cover 40 hours out of a 168 hour week (assuming no leave). Does someone need to monitor things (like your IDS/IPS) during non-business hours? In a much larger org, we have dedicated teams for AV, desktop patching, network patching, server patching (Windows and *nix), event monitoring/correlation, incident response and so on. This is all driven by either (a) SLAs/OLAs and (b) patching cycles. We work from those requirements to work out how many people we need, based on how quickly we need to turn things around. Cheers Ken From: David Lum [mailto:david@nwea.org] Sent: Wednesday, 20 July 2011 9:04 PM To: NT System Admin Issues Subject: RE: Security IT to employee ratio Thanks ASB, that's kind of what I was afraid of and as always you suggest good steps. Dave From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Wednesday, July 20, 2011 4:00 AM To: NT System Admin Issues Subject: Re: Security IT to employee ratio You will be hard pressed to find such a document, given all the variables, nor is that a useful way to go about justifying the headcount that might be needed. Rather, put together a list of all the activities that are needed to successfully maintain the security posture in your specific environment. Allocate some estimation of the time needed for each function, then add it all up. (Also take the liberty of delegating some portions of it to other technology departments, as necessary). This will tell you what the level of staffing *should* be for your environment, and by adding work to other people's plates, you'll automatically get their support for additional headcount. :) Of course, expect management to disagree on some of the items in your list, AND in the time allocated -- especially if they can keep it the way it is by shaving a few numbers and whacking a few tasks. ASB http://about.me/Andrew.S.Baker Harnessing the Advantages of Technology for the SMB market... On Wed, Jul 20, 2011 at 1:05 AM, David Lum david@nwea.orgmailto:david@nwea.org wrote: Is there a document anywhere that can give me an idea of something along the lines of a general recommended active IT security staff per employee ratio? By active IT security I mean in-the-trenches people doing the legwork to get the last 3-5% of systems (at 400+ systems nothing is ever 100% in perfectly automated sync) fully compliant and up-to-date, keep astride of the IDS detections and tracking down which are false positives and which are actual alerts, etc. It has occurred to me that with 450 employees that there should probably be more than one FTE handling everything from IDS to keeping patches and AV current on all systems, employee training, etc... Heck I bet I can use one FTE that does NOTHING but track down and mitigate the non-compliant systems for AV and patching alone. David Lum Systems Engineer // NWEATM Office 503.548.5229tel:503.548.5229 // Mobile 503.267.9764tel:503.267.9764 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: Windows 2008 Server Recovery
K, I'll give that a try. Thanks. Michael B. Smith mich...@smithcons.com 7/20/2011 9:12 AM As long as your image matches the windows service pack, then choose an upgrade, instead of a repair. If you image doesn’t match the windows service pack, then get one that does. Regards, Michael B. Smith Consultant and Exchange MVP http://TheEssentialExchange.com From: Tom Miller [mailto:tmil...@hnncsb.org] Sent: Wednesday, July 20, 2011 8:55 AM To: NT System Admin Issues Subject: Windows 2008 Server Recovery Looks like a recent patch or whatever corrupted the NOS on one of my Windows 2008 R2 servers. What's the tool du jour? I use the Windows 2008 ISO, select language, see my installed copy of Windows, but then it wants me to select an image, or drop to command prompt. I can rebuild it fine, but it is a XenApp server with several customized apps, annoying to recreate. I'd rather not bother with restore from de-dup system. Suggestions? Fault is 0xc00f - corrupt file somewhere. Thanks, Tom Confidentiality Notice: This e-mail message, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin Confidentiality Notice: This e-mail message, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure, or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: Security IT to employee ratio
I have to agree on Ken's Comments, again the business requirements are going to dictate in this case, there won't be any quick and dirty numbers. Z Edward E. Ziots CISSP, Network +, Security + Security Engineer Lifespan Organization Email:ezi...@lifespan.org Cell:401-639-3505 From: Ken Schaefer [mailto:k...@adopenstatic.com] Sent: Wednesday, July 20, 2011 9:19 AM To: NT System Admin Issues Subject: RE: Security IT to employee ratio I would also start to look at what the business requirements are. One FTE is going to cover 40 hours out of a 168 hour week (assuming no leave). Does someone need to monitor things (like your IDS/IPS) during non-business hours? In a much larger org, we have dedicated teams for AV, desktop patching, network patching, server patching (Windows and *nix), event monitoring/correlation, incident response and so on. This is all driven by either (a) SLAs/OLAs and (b) patching cycles. We work from those requirements to work out how many people we need, based on how quickly we need to turn things around. Cheers Ken From: David Lum [mailto:david@nwea.org] Sent: Wednesday, 20 July 2011 9:04 PM To: NT System Admin Issues Subject: RE: Security IT to employee ratio Thanks ASB, that's kind of what I was afraid of and as always you suggest good steps. Dave From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Wednesday, July 20, 2011 4:00 AM To: NT System Admin Issues Subject: Re: Security IT to employee ratio You will be hard pressed to find such a document, given all the variables, nor is that a useful way to go about justifying the headcount that might be needed. Rather, put together a list of all the activities that are needed to successfully maintain the security posture in your specific environment. Allocate some estimation of the time needed for each function, then add it all up. (Also take the liberty of delegating some portions of it to other technology departments, as necessary). This will tell you what the level of staffing *should* be for your environment, and by adding work to other people's plates, you'll automatically get their support for additional headcount. :) Of course, expect management to disagree on some of the items in your list, AND in the time allocated -- especially if they can keep it the way it is by shaving a few numbers and whacking a few tasks. ASB http://about.me/Andrew.S.Baker Harnessing the Advantages of Technology for the SMB market... On Wed, Jul 20, 2011 at 1:05 AM, David Lum david@nwea.org wrote: Is there a document anywhere that can give me an idea of something along the lines of a general recommended active IT security staff per employee ratio? By active IT security I mean in-the-trenches people doing the legwork to get the last 3-5% of systems (at 400+ systems nothing is ever 100% in perfectly automated sync) fully compliant and up-to-date, keep astride of the IDS detections and tracking down which are false positives and which are actual alerts, etc. It has occurred to me that with 450 employees that there should probably be more than one FTE handling everything from IDS to keeping patches and AV current on all systems, employee training, etc... Heck I bet I can use one FTE that does NOTHING but track down and mitigate the non-compliant systems for AV and patching alone. David Lum Systems Engineer // NWEATM Office 503.548.5229 // Mobile 503.267.9764 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadminimage001.jpg
RE: Thought on malware cleaning
Humm I sense POSTAL Epic Fail… Don’t go off the deep end Epsi, you can’t stop everything, and you can’t stop the users from going to bad sites or getting owned in some cases. We all know that technical controls don’t solve personal behavior issues. Z Edward E. Ziots CISSP, Network +, Security + Security Engineer Lifespan Organization Email:ezi...@lifespan.org Cell:401-639-3505 From: MMF [mailto:mmfree...@ameritech.net] Sent: Tuesday, July 19, 2011 5:48 PM To: NT System Admin Issues Subject: Re: Thought on malware cleaning Don’t hold back ( MMF From: Micheal Espinola Jr mailto:michealespin...@gmail.com Sent: Tuesday, July 19, 2011 3:15 PM To: NT System Admin Issues mailto:ntsysadmin@lyris.sunbelt-software.com Subject: Re: Thought on malware cleaning On that note, I'm going to go on my lunch break now. Here's what I'll do: I'm going to close my eyes and walk in the direction of my car. Screw anything I walk into, because logically there should be doors that automatically open in the direction I need to go. Screw how things currently exist, because I think I know how they should exist for me. Because I know better. Better than anyone else. All must bend to my will. And whatever people do now, they will change on the drop of a dime at my request. Because user [re]education is akin to waving a magic wand. What I say goes. The world will fall in-line. If I bang my face into a wall along the way - screw it. I'll just keep doing it until someone comes along and changes something to be how I want it. Sounds perfectly reasonable... -- Espi On Tue, Jul 19, 2011 at 1:01 PM, Micheal Espinola Jr michealespin...@gmail.com wrote: Well that's f'ing helpful. Good luck on educating the planet with a more logical course of action. Let us know how that works-out for you! -- Espi On Tue, Jul 19, 2011 at 12:44 PM, Ben Scott mailvor...@gmail.com wrote: On Tue, Jul 19, 2011 at 3:02 PM, Micheal Espinola Jr michealespin...@gmail.com wrote: While I agree with your sentiment whole-heartedly, I still wonder why antimalware software isnt performing the most basic of checks for common infection breadcrumbs. Hammer myopia. (When all you have is a hammer, everything starts to look like a nail.) -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin image003.pngimage004.jpg
RE: non-local admin revisited
My users aren't smart enough to use UAC properly. They'll click on anything if they think that is what they need to do to get to whatever they want to do. No matter how much you warn them, a dimmed UAC screen isn't going to inhibit their impulses. -Original Message- From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org] Sent: Tuesday, July 19, 2011 6:37 PM To: NT System Admin Issues Subject: RE: non-local admin revisited Hmmm, I like this. With UAC on there is validity to running as an admin all the time, IF you only have admin on your own machine. Less hassle for them with minimal risk. Very cool twist Andrew. From: Andrew S. Baker [asbz...@gmail.com] Sent: Tuesday, July 19, 2011 8:11 PM To: NT System Admin Issues Subject: Re: non-local admin revisited IT members have Win7 and have local admin access of their own machines, but with UAC enabled at the default level. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt- software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
file searching and copying
I'm attempting to search for particular words in a directory name (must use wildcards!), and, if found, copy the the directory tree while maintaining its structure to another directory. Are there any native tools (or reskit like robocopy) that can accomplish this somewhat easily? thanks, Jeff ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Re: non-local admin revisited
It is if they have to type some credentials in. If they have admin accounts and will type their password in after clicking on anything, then they clearly need to have their admin accounts removed. On 20 July 2011 16:59, Jim Dandy jda...@asmail.ucdavis.edu wrote: My users aren't smart enough to use UAC properly. They'll click on anything if they think that is what they need to do to get to whatever they want to do. No matter how much you warn them, a dimmed UAC screen isn't going to inhibit their impulses. -Original Message- From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org] Sent: Tuesday, July 19, 2011 6:37 PM To: NT System Admin Issues Subject: RE: non-local admin revisited Hmmm, I like this. With UAC on there is validity to running as an admin all the time, IF you only have admin on your own machine. Less hassle for them with minimal risk. Very cool twist Andrew. From: Andrew S. Baker [asbz...@gmail.com] Sent: Tuesday, July 19, 2011 8:11 PM To: NT System Admin Issues Subject: Re: non-local admin revisited IT members have Win7 and have local admin access of their own machines, but with UAC enabled at the default level. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt- software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin -- On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into the machine wrong figures, will the right answers come out?' I am not able rightly to apprehend the kind of confusion of ideas that could provoke such a question. ** IMPORTANT INFORMATION/DISCLAIMER * This document should be read only by those persons to whom it is addressed. If you have received this message it was obviously addressed to you and therefore you can read it, even it we didn't mean to send it to you. However, if the contents of this email make no sense whatsoever then you probably were not the intended recipient, or, alternatively, you are a mindless cretin; either way, you should immediately kill yourself and destroy your computer (not necessarily in that order). Once you have taken this action, please contact us.. no, sorry, you can't use your computer, because you just destroyed it, and possibly also committed suicide afterwards, but I am starting to digress.. * * The originator of this email is not liable for the transmission of the information contained in this communication. Or are they? Either way it's a pretty dull legal query and frankly one I'm not going to dwell on. But should you have nothing better to do, please feel free to ruminate on it, and please pass on any concrete conclusions should you find them. However, if you pass them on via email, be sure to include a disclaimer regarding liability for transmission. * * In the event that the originator did not send this email to you, then please return it to us and attach a scanned-in picture of your mother's brother's wife wearing nothing but a kangaroo suit, and we will immediately refund you exactly half of what you paid for the can of Whiskas you bought when you went to Pets** ** At Home yesterday. * * We take no responsibility for non-receipt of this email because we are running Exchange 5.5 and everyone knows how glitchy that can be. In the event that you do get this message then please note that we take no responsibility for that either. Nor will we accept any liability, tacit or implied, for any damage you may or may not incur as a result of receiving, or not, as the case may be, from time to time, notwithstanding all liabilities implied or otherwise, ummm, hell, where was I...umm, no matter what happens, it is NOT, and NEVER WILL BE, OUR FAULT! * * The comments and opinions expressed herein are my own and NOT those of my employer, who, if he knew I was sending emails and surfing the seamier side of the Internet, would cut off my manhood and feed it to me for afternoon tea. * ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Re: non-local admin revisited
Come now, you're familiar with people, aren't you? On Wed, Jul 20, 2011 at 12:02 PM, James Rankin kz2...@googlemail.comwrote: It is if they have to type some credentials in. If they have admin accounts and will type their password in after clicking on anything, then they clearly need to have their admin accounts removed. On 20 July 2011 16:59, Jim Dandy jda...@asmail.ucdavis.edu wrote: My users aren't smart enough to use UAC properly. They'll click on anything if they think that is what they need to do to get to whatever they want to do. No matter how much you warn them, a dimmed UAC screen isn't going to inhibit their impulses. -Original Message- From: Kennedy, Jim [mailto:kennedy...@elyriaschools.org] Sent: Tuesday, July 19, 2011 6:37 PM To: NT System Admin Issues Subject: RE: non-local admin revisited Hmmm, I like this. With UAC on there is validity to running as an admin all the time, IF you only have admin on your own machine. Less hassle for them with minimal risk. Very cool twist Andrew. From: Andrew S. Baker [asbz...@gmail.com] Sent: Tuesday, July 19, 2011 8:11 PM To: NT System Admin Issues Subject: Re: non-local admin revisited IT members have Win7 and have local admin access of their own machines, but with UAC enabled at the default level. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt- software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin -- On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into the machine wrong figures, will the right answers come out?' I am not able rightly to apprehend the kind of confusion of ideas that could provoke such a question. ** IMPORTANT INFORMATION/DISCLAIMER * This document should be read only by those persons to whom it is addressed. If you have received this message it was obviously addressed to you and therefore you can read it, even it we didn't mean to send it to you. However, if the contents of this email make no sense whatsoever then you probably were not the intended recipient, or, alternatively, you are a mindless cretin; either way, you should immediately kill yourself and destroy your computer (not necessarily in that order). Once you have taken this action, please contact us.. no, sorry, you can't use your computer, because you just destroyed it, and possibly also committed suicide afterwards, but I am starting to digress.. * * The originator of this email is not liable for the transmission of the information contained in this communication. Or are they? Either way it's a pretty dull legal query and frankly one I'm not going to dwell on. But should you have nothing better to do, please feel free to ruminate on it, and please pass on any concrete conclusions should you find them. However, if you pass them on via email, be sure to include a disclaimer regarding liability for transmission. * * In the event that the originator did not send this email to you, then please return it to us and attach a scanned-in picture of your mother's brother's wife wearing nothing but a kangaroo suit, and we will immediately refund you exactly half of what you paid for the can of Whiskas you bought when you went to Pets** ** At Home yesterday. * * We take no responsibility for non-receipt of this email because we are running Exchange 5.5 and everyone knows how glitchy that can be. In the event that you do get this message then please note that we take no responsibility for that either. Nor will we accept any liability, tacit or implied, for any damage you may or may not incur as a result of receiving, or not, as the case may be, from time to time, notwithstanding all liabilities implied or otherwise, ummm, hell, where was I...umm, no matter what happens, it is NOT, and NEVER WILL BE, OUR FAULT! * * The comments and opinions expressed herein are my own and NOT those of my employer, who, if he knew I was sending emails and surfing the seamier side of the Internet, would cut off my manhood and feed it to me for afternoon tea. * ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe
RE: file searching and copying
Powershell! What's an example of your need? From: Jeff Bunting [mailto:bunting.j...@gmail.com] Sent: Wednesday, July 20, 2011 10:01 AM To: NT System Admin Issues Subject: file searching and copying I'm attempting to search for particular words in a directory name (must use wildcards!), and, if found, copy the the directory tree while maintaining its structure to another directory. Are there any native tools (or reskit like robocopy) that can accomplish this somewhat easily? thanks, Jeff ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: file searching and copying
For /f tokens=* %i in ('dir *WORDS_TO_SEARCH* /s/a/b/ad') do robocopy /mir %i DESTINATION_PATH This will search a folder tree for directorys. Change the dir command to eliminate the /s if you only want to search the root. From: Jeff Bunting [mailto:bunting.j...@gmail.com] Sent: Wednesday, July 20, 2011 11:01 AM To: NT System Admin Issues Subject: file searching and copying I'm attempting to search for particular words in a directory name (must use wildcards!), and, if found, copy the the directory tree while maintaining its structure to another directory. Are there any native tools (or reskit like robocopy) that can accomplish this somewhat easily? thanks, Jeff ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: non-local admin revisited
and if that fails, then simply remove the users hands :) From: James Rankin [mailto:kz2...@googlemail.com] Sent: 20 July 2011 17:02 To: NT System Admin Issues Subject: Re: non-local admin revisited It is if they have to type some credentials in. If they have admin accounts and will type their password in after clicking on anything, then they clearly need to have their admin accounts removed. On 20 July 2011 16:59, Jim Dandy jda...@asmail.ucdavis.edumailto:jda...@asmail.ucdavis.edu wrote: My users aren't smart enough to use UAC properly. They'll click on anything if they think that is what they need to do to get to whatever they want to do. No matter how much you warn them, a dimmed UAC screen isn't going to inhibit their impulses. -Original Message- From: Kennedy, Jim [mailto:kennedy...@elyriaschools.orgmailto:kennedy...@elyriaschools.org] Sent: Tuesday, July 19, 2011 6:37 PM To: NT System Admin Issues Subject: RE: non-local admin revisited Hmmm, I like this. With UAC on there is validity to running as an admin all the time, IF you only have admin on your own machine. Less hassle for them with minimal risk. Very cool twist Andrew. From: Andrew S. Baker [asbz...@gmail.commailto:asbz...@gmail.com] Sent: Tuesday, July 19, 2011 8:11 PM To: NT System Admin Issues Subject: Re: non-local admin revisited IT members have Win7 and have local admin access of their own machines, but with UAC enabled at the default level. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt- software.com/read/my_forums/http://software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin -- On two occasions...I have been asked, 'Pray, Mr Babbage, if you put into the machine wrong figures, will the right answers come out?' I am not able rightly to apprehend the kind of confusion of ideas that could provoke such a question. * IMPORTANT INFORMATION/DISCLAIMER * This document should be read only by those persons to whom it is addressed. If you have received this message it was obviously addressed to you and therefore you can read it, even it we didn't mean to send it to you. However, if the contents of this email make no sense whatsoever then you probably were not the intended recipient, or, alternatively, you are a mindless cretin; either way, you should immediately kill yourself and destroy your computer (not necessarily in that order). Once you have taken this action, please contact us.. no, sorry, you can't use your computer, because you just destroyed it, and possibly also committed suicide afterwards, but I am starting to digress.. The originator of this email is not liable for the transmission of the information contained in this communication. Or are they? Either way it's a pretty dull legal query and frankly one I'm not going to dwell on. But should you have nothing better to do, please feel free to ruminate on it, and please pass on any concrete conclusions should you find them. However, if you pass them on via email, be sure to include a disclaimer regarding liability for transmission. In the event that the originator did not send this email to you, then please return it to us and attach a scanned-in picture of your mother's brother's wife wearing nothing but a kangaroo suit, and we will immediately refund you exactly half of what you paid for the can of Whiskas you bought when you went to Pets At Home yesterday. We take no responsibility for non-receipt of this email because we are running Exchange 5.5 and everyone knows how glitchy that can be. In the event that you do get this message then please note that we take no responsibility for that either. Nor will we accept any liability, tacit or implied, for any damage you may or may not incur as a result of receiving, or not, as the case may be, from time to time, notwithstanding all liabilities implied or otherwise, ummm, hell, where was I...umm, no matter what happens, it is NOT, and NEVER WILL BE, OUR FAULT! The comments and opinions expressed herein are my own and NOT those of my employer, who, if he knew I was sending emails and surfing the seamier side of the Internet, would cut off my manhood and feed it to me for afternoon tea. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~
Re: file searching and copying
You're going to have to script that, certainly. You could use robocopy or xcopy or do the whole thing in powershell, but no native tool provides the logic you want without some form of scripting. For instance, assuming that you were going to start in the C:\TEMP folder, and search for something: @echo off SETLOCAL ENABLEDELAYEDEXPANSION for /f tokens=* %%v in ('dir /ad /b /s C:\Temp\*.*' ^| FIND /I something) do ( SET @DIR=%~fpv ECHO Copying !@DIR! XCOPY !@DIR! D:\SomeDestination /S /E /R /Y ) * * *ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of Technology for the SMB market… * On Wed, Jul 20, 2011 at 12:00 PM, Jeff Bunting bunting.j...@gmail.comwrote: I'm attempting to search for particular words in a directory name (must use wildcards!), and, if found, copy the the directory tree while maintaining its structure to another directory. Are there any native tools (or reskit like robocopy) that can accomplish this somewhat easily? thanks, Jeff ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Re: file searching and copying
Good one, Scott. Jeff, remember to add a % to each variable if used in a batch file, vs the command line. * * *ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of Technology for the SMB market… * On Wed, Jul 20, 2011 at 12:13 PM, Crawford, Scott crawfo...@evangel.eduwrote: For /f “tokens=*” %i in (‘dir *WORDS_TO_SEARCH* /s/a/b/ad’) do robocopy /mir “%i” DESTINATION_PATH ** ** This will search a folder tree for directorys. Change the dir command to eliminate the /s if you only want to search the root. ** ** *From:* Jeff Bunting [mailto:bunting.j...@gmail.com] *Sent:* Wednesday, July 20, 2011 11:01 AM *To:* NT System Admin Issues *Subject:* file searching and copying ** ** I'm attempting to search for particular words in a directory name (must use wildcards!), and, if found, copy the the directory tree while maintaining its structure to another directory. Are there any native tools (or reskit like robocopy) that can accomplish this somewhat easily? thanks, Jeff ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: file searching and copying
Thx I'd also note that the /mir switch may not be exactly the option you want with robocopy, but that will copy the whole folder tree, deleting files at the destination if they're not at the source. From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Wednesday, July 20, 2011 11:23 AM To: NT System Admin Issues Subject: Re: file searching and copying Good one, Scott. Jeff, remember to add a % to each variable if used in a batch file, vs the command line. ASB http://about.me/Andrew.S.Baker Harnessing the Advantages of Technology for the SMB market... On Wed, Jul 20, 2011 at 12:13 PM, Crawford, Scott crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote: For /f tokens=* %i in ('dir *WORDS_TO_SEARCH* /s/a/b/ad') do robocopy /mir %i DESTINATION_PATH This will search a folder tree for directorys. Change the dir command to eliminate the /s if you only want to search the root. From: Jeff Bunting [mailto:bunting.j...@gmail.commailto:bunting.j...@gmail.com] Sent: Wednesday, July 20, 2011 11:01 AM To: NT System Admin Issues Subject: file searching and copying I'm attempting to search for particular words in a directory name (must use wildcards!), and, if found, copy the the directory tree while maintaining its structure to another directory. Are there any native tools (or reskit like robocopy) that can accomplish this somewhat easily? thanks, Jeff ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Re: non-local admin revisited
No, one of the two options that restricted groups offers replaces everything. You can also create a restricted group policy for your IT Staff Local Admin group and force said group to be a member of Administrators. -Anders On Tue, Jul 19, 2011 at 7:54 PM, Kennedy, Jim kennedy...@elyriaschools.orgwrote: Create a domain group called IT Local Admins and add the domain IT Admin accounts you create to it. Then add that group to the computers using restricted groups. Remember, restricted groups REPLACES everything in the local admin group when you apply that GPO. It does not add…it replaces.*** * ** ** *From:* David Lum [mailto:david@nwea.org] *Sent:* Tuesday, July 19, 2011 1:32 PM *To:* NT System Admin Issues *Subject:* RE: non-local admin revisited ** ** A local admin account? So 50 IT folks would have 50 different local admin accounts? Other than the deny log on locally what keeps them from creating an admin account while logged in as admin? ** ** Win 7 makes alternate credentials easy enough at least… ** ** Dave. ** ** *From:* Kennedy, Jim [mailto:kennedy...@elyriaschools.org] *Sent:* Tuesday, July 19, 2011 10:20 AM *To:* NT System Admin Issues *Subject:* RE: non-local admin revisited ** ** +1 ** ** *From:* Don Ely [mailto:don@gmail.com] *Sent:* Tuesday, July 19, 2011 1:19 PM *To:* NT System Admin Issues *Subject:* Re: non-local admin revisited ** ** Provide them with an admin account and show them how to use run-as... I also disable logon locally where I can get away with it so they don't cheat... On Tue, Jul 19, 2011 at 10:10 AM, David Lum david@nwea.org wrote:*** * How do you bigger org’s handle IT staff (DBA’s and the like) not being local admins on their systems? Invariably they are used to throwing on whatever they want and in some ways this helps the Help desk so they’re not called to install stuff the user can install. As we move to Windows 7 my recommendation is to yank local admin perms at the same time (yes everyone is local admin on their XP systems currently), but I foresee pushback from Service Desk and IT folks… *David Lum* Systems Engineer // NWEATM Office 503.548.5229 //* *Cell (voice/text) 503.267.9764 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ** ** ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Re: file searching and copying
Thanks all. Scott's suggestion is close and at least got me pointed in the right direction. Some of the paths are too long for DIR which throws a wrench in the works, so I'm going to have to rely on windows search for now. Powershell, unfortunately, currently isn't an option. Jeff On Wed, Jul 20, 2011 at 12:23 PM, Andrew S. Baker asbz...@gmail.com wrote: Good one, Scott. Jeff, remember to add a % to each variable if used in a batch file, vs the command line. * * *ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of Technology for the SMB market… * On Wed, Jul 20, 2011 at 12:13 PM, Crawford, Scott crawfo...@evangel.eduwrote: For /f “tokens=*” %i in (‘dir *WORDS_TO_SEARCH* /s/a/b/ad’) do robocopy /mir “%i” DESTINATION_PATH ** ** This will search a folder tree for directorys. Change the dir command to eliminate the /s if you only want to search the root. ** ** *From:* Jeff Bunting [mailto:bunting.j...@gmail.com] *Sent:* Wednesday, July 20, 2011 11:01 AM *To:* NT System Admin Issues *Subject:* file searching and copying ** ** I'm attempting to search for particular words in a directory name (must use wildcards!), and, if found, copy the the directory tree while maintaining its structure to another directory. Are there any native tools (or reskit like robocopy) that can accomplish this somewhat easily? thanks, Jeff ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Re: file searching and copying
yeah, I figured that one out pretty quickly. (right after a puzzled 'wh?' when there was only one file copied) :-) DIR wasn't giving me all of the files, so had to abandon it for now, but thanks for the idea. Jeff On Wed, Jul 20, 2011 at 1:28 PM, Crawford, Scott crawfo...@evangel.eduwrote: Thx ** ** I’d also note that the /mir switch may not be exactly the option you want with robocopy, but that will copy the whole folder tree, deleting files at the destination if they’re not at the source. ** ** *From:* Andrew S. Baker [mailto:asbz...@gmail.com] *Sent:* Wednesday, July 20, 2011 11:23 AM *To:* NT System Admin Issues *Subject:* Re: file searching and copying ** ** Good one, Scott. Jeff, remember to add a % to each variable if used in a batch file, vs the command line. *ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of Technology for the SMB market…* On Wed, Jul 20, 2011 at 12:13 PM, Crawford, Scott crawfo...@evangel.edu wrote: For /f “tokens=*” %i in (‘dir *WORDS_TO_SEARCH* /s/a/b/ad’) do robocopy /mir “%i” DESTINATION_PATH This will search a folder tree for directorys. Change the dir command to eliminate the /s if you only want to search the root. *From:* Jeff Bunting [mailto:bunting.j...@gmail.com] *Sent:* Wednesday, July 20, 2011 11:01 AM *To:* NT System Admin Issues *Subject:* file searching and copying I'm attempting to search for particular words in a directory name (must use wildcards!), and, if found, copy the the directory tree while maintaining its structure to another directory. Are there any native tools (or reskit like robocopy) that can accomplish this somewhat easily? thanks, Jeff ** ** ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Off-topic question -- POV Daughter Card
Anyone know what a Promise of Value daughter card is? I bought some used IBM Thinkcentre workstations and apparently the 30-pin connector on the motherboard is for the daughter card. Anyone know what all these daughter cards do and are they worth fussing with? ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: Off-topic question -- POV Daughter Card
http://www.ask.com/faqcentral/IBM_CARD.html#1 Promise of Value (POV) card, a 256-bit encrypted security chip daughtercard attached to the motherboard, which enables RFID antenna, C2 tamper switch, and Alert On LAN 2 support with a compatible network adapter. If an attempt is made to remove the POV card from the board and install it into another system, the cryptographic key material will be erased, rendering it unusable. This security feature is by design and prevents the cryptographic key migration from one system to another. Therefore, moving this security chip from one board to another is not a supported option. If an attempt is made to move the POV card from one system to another, it may hang on boot and display an error message referring to an invalid machine type and serial number. Jim Holmgren Director of Technology Infrastructure XLHealth Corporation The Warehouse at Camden Yards 351 West Camden Street, Suite 100 Baltimore, MD 21201 410.625.2200 (main) 443.524.8573 (direct) 443-506.2400 (cell) www.xlhealth.com -Original Message- From: John Aldrich [mailto:jaldr...@blueridgecarpet.com] Sent: Wednesday, July 20, 2011 3:15 PM To: NT System Admin Issues Subject: Off-topic question -- POV Daughter Card Anyone know what a Promise of Value daughter card is? I bought some used IBM Thinkcentre workstations and apparently the 30-pin connector on the motherboard is for the daughter card. Anyone know what all these daughter cards do and are they worth fussing with? ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and/or protected health information. Under the Federal Law (HIPAA), the intended recipient is obligated to keep this information secure and confidential. Any disclosure to third parties without authorization from the affiliate or as permitted by law is prohibited and punishable under Federal Law. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. NOTA DE CONFIDENCIALIDAD: Este facsímile, incluyendo lo adjunto, es para el uso exclusivo del destinatario(s) y puede contener información confidencial y/o información protegida de salud. En virtud de la Ley Federal (HIPAA), el destinatario tiene la obligación de mantener esta información segura y confidencial. Cualquier divulgación a terceros sin la autorización de los miembros de lo permitido por la ley está prohibido y penado en virtud de la Ley Federal. Si usted no es el destinatario, por favor, póngase en contacto con el remitente por teléfono y destruir todas las copias del mensaje original ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Re: Off-topic question -- POV Daughter Card
Jim, you didn't happen to use google or bing to check for an answer did you? On Wed, Jul 20, 2011 at 2:30 PM, Jim Holmgren jholmg...@xlhealth.comwrote: http://www.ask.com/faqcentral/IBM_CARD.html#1 Promise of Value (POV) card, a 256-bit encrypted security chip daughtercard attached to the motherboard, which enables RFID antenna, C2 tamper switch, and Alert On LAN 2 support with a compatible network adapter. If an attempt is made to remove the POV card from the board and install it into another system, the cryptographic key material will be erased, rendering it unusable. This security feature is by design and prevents the cryptographic key migration from one system to another. Therefore, moving this security chip from one board to another is not a supported option. If an attempt is made to move the POV card from one system to another, it may hang on boot and display an error message referring to an invalid machine type and serial number. Jim Holmgren Director of Technology Infrastructure XLHealth Corporation The Warehouse at Camden Yards 351 West Camden Street, Suite 100 Baltimore, MD 21201 410.625.2200 (main) 443.524.8573 (direct) 443-506.2400 (cell) www.xlhealth.com -Original Message- From: John Aldrich [mailto:jaldr...@blueridgecarpet.com] Sent: Wednesday, July 20, 2011 3:15 PM To: NT System Admin Issues Subject: Off-topic question -- POV Daughter Card Anyone know what a Promise of Value daughter card is? I bought some used IBM Thinkcentre workstations and apparently the 30-pin connector on the motherboard is for the daughter card. Anyone know what all these daughter cards do and are they worth fussing with? ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and/or protected health information. Under the Federal Law (HIPAA), the intended recipient is obligated to keep this information secure and confidential. Any disclosure to third parties without authorization from the affiliate or as permitted by law is prohibited and punishable under Federal Law. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. NOTA DE CONFIDENCIALIDAD: Este facsímile, incluyendo lo adjunto, es para el uso exclusivo del destinatario(s) y puede contener información confidencial y/o información protegida de salud. En virtud de la Ley Federal (HIPAA), el destinatario tiene la obligación de mantener esta información segura y confidencial. Cualquier divulgación a terceros sin la autorización de los miembros de lo permitido por la ley está prohibido y penado en virtud de la Ley Federal. Si usted no es el destinatario, por favor, póngase en contacto con el remitente por teléfono y destruir todas las copias del mensaje original ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: Off-topic question -- POV Daughter Card
Well...I found this cool thing online, for lack of a better term I will refer to it as an Engine that actually allows me to perform a search of the Interwebs. -Jim I got yer Google right here pal... Jim Holmgren Director of Technology Infrastructure XLHealth Corporation The Warehouse at Camden Yards 351 West Camden Street, Suite 100 Baltimore, MD 21201 410.625.2200 (main) 443.524.8573 (direct) 443-506.2400 (cell) www.xlhealth.com http://www.xlhealth.com/ From: Steve Ens [mailto:stevey...@gmail.com] Sent: Wednesday, July 20, 2011 3:34 PM To: NT System Admin Issues Subject: Re: Off-topic question -- POV Daughter Card Jim, you didn't happen to use google or bing to check for an answer did you? On Wed, Jul 20, 2011 at 2:30 PM, Jim Holmgren jholmg...@xlhealth.com wrote: http://www.ask.com/faqcentral/IBM_CARD.html#1 Promise of Value (POV) card, a 256-bit encrypted security chip daughtercard attached to the motherboard, which enables RFID antenna, C2 tamper switch, and Alert On LAN 2 support with a compatible network adapter. If an attempt is made to remove the POV card from the board and install it into another system, the cryptographic key material will be erased, rendering it unusable. This security feature is by design and prevents the cryptographic key migration from one system to another. Therefore, moving this security chip from one board to another is not a supported option. If an attempt is made to move the POV card from one system to another, it may hang on boot and display an error message referring to an invalid machine type and serial number. Jim Holmgren Director of Technology Infrastructure XLHealth Corporation The Warehouse at Camden Yards 351 West Camden Street, Suite 100 Baltimore, MD 21201 410.625.2200 (main) 443.524.8573 (direct) 443-506.2400 (cell) www.xlhealth.com -Original Message- From: John Aldrich [mailto:jaldr...@blueridgecarpet.com] Sent: Wednesday, July 20, 2011 3:15 PM To: NT System Admin Issues Subject: Off-topic question -- POV Daughter Card Anyone know what a Promise of Value daughter card is? I bought some used IBM Thinkcentre workstations and apparently the 30-pin connector on the motherboard is for the daughter card. Anyone know what all these daughter cards do and are they worth fussing with? CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and/or protected health information. Under the Federal Law (HIPAA), the intended recipient is obligated to keep this information secure and confidential. Any disclosure to third parties without authorization from the affiliate or as permitted by law is prohibited and punishable under Federal Law. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. NOTA DE CONFIDENCIALIDAD: Este facsímile, incluyendo lo adjunto, es para el uso exclusivo del destinatario(s) y puede contener información confidencial y/o información protegida de salud. En virtud de la Ley Federal (HIPAA), el destinatario tiene la obligación de mantener esta información segura y confidencial. Cualquier divulgación a terceros sin la autorización de los miembros de lo permitido por la ley está prohibido y penado en virtud de la Ley Federal. Si usted no es el destinatario, por favor, póngase en contacto con el remitente por teléfono y destruir todas las copias del mensaje original ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
IIS6:Execute permissions on \bin folder keep resetting
I'm having this exact problem on a W2K3 IIS 6 server: http://forums.asp.net/t/1073368.aspx/1 Anyone see this before? Chris Bodnar, MCSE, MCITP Technical Support III Distributed Systems Service Delivery - Intel Services Guardian Life Insurance Company of America Email: christopher_bod...@glic.com Phone: 610-807-6459 Fax: 610-807-6003 - This message, and any attachments to it, may contain information that is privileged, confidential, and exempt from disclosure under applicable law. If the reader of this message is not the intended recipient, you are notified that any use, dissemination, distribution, copying, or communication of this message is strictly prohibited. If you have received this message in error, please notify the sender immediately by return e-mail and delete the message and any attachments. Thank you. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: file searching and copying
So, you are searching a whole tree? Seems like you'd end up with duplicates if the search terms show up at one level and a sublevel. If you're just searching one level, you might try subst to shorten the paths. For instance, if your base is c:\long\path\to\root, you can run subst x: c:\long\path\to\root to trim a bunch off the length. From: Jeff Bunting [mailto:bunting.j...@gmail.com] Sent: Wednesday, July 20, 2011 1:25 PM To: NT System Admin Issues Subject: Re: file searching and copying Thanks all. Scott's suggestion is close and at least got me pointed in the right direction. Some of the paths are too long for DIR which throws a wrench in the works, so I'm going to have to rely on windows search for now. Powershell, unfortunately, currently isn't an option. Jeff On Wed, Jul 20, 2011 at 12:23 PM, Andrew S. Baker asbz...@gmail.commailto:asbz...@gmail.com wrote: Good one, Scott. Jeff, remember to add a % to each variable if used in a batch file, vs the command line. ASB http://about.me/Andrew.S.Baker Harnessing the Advantages of Technology for the SMB market... On Wed, Jul 20, 2011 at 12:13 PM, Crawford, Scott crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote: For /f tokens=* %i in ('dir *WORDS_TO_SEARCH* /s/a/b/ad') do robocopy /mir %i DESTINATION_PATH This will search a folder tree for directorys. Change the dir command to eliminate the /s if you only want to search the root. From: Jeff Bunting [mailto:bunting.j...@gmail.commailto:bunting.j...@gmail.com] Sent: Wednesday, July 20, 2011 11:01 AM To: NT System Admin Issues Subject: file searching and copying I'm attempting to search for particular words in a directory name (must use wildcards!), and, if found, copy the the directory tree while maintaining its structure to another directory. Are there any native tools (or reskit like robocopy) that can accomplish this somewhat easily? thanks, Jeff ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Re: Off-topic question -- POV Daughter Card
They have those now? Wow man, that is groovy! On Wed, Jul 20, 2011 at 2:39 PM, Jim Holmgren jholmg...@xlhealth.comwrote: Well…I found this cool thing online, for lack of a better term I will refer to it as an “Engine” that actually allows me to perform a “search” of the Interwebs. ** ** -Jim “I got yer Google right here pal…” ** ** Jim Holmgren Director of Technology Infrastructure XLHealth Corporation The Warehouse at Camden Yards 351 West Camden Street, Suite 100 Baltimore, MD 21201 410.625.2200 (main) 443.524.8573 (direct) 443-506.2400 (cell) www.xlhealth.com ** ** ** ** ** ** *From:* Steve Ens [mailto:stevey...@gmail.com] *Sent:* Wednesday, July 20, 2011 3:34 PM *To:* NT System Admin Issues *Subject:* Re: Off-topic question -- POV Daughter Card ** ** Jim, you didn't happen to use google or bing to check for an answer did you? On Wed, Jul 20, 2011 at 2:30 PM, Jim Holmgren jholmg...@xlhealth.com wrote: http://www.ask.com/faqcentral/IBM_CARD.html#1 Promise of Value (POV) card, a 256-bit encrypted security chip daughtercard attached to the motherboard, which enables RFID antenna, C2 tamper switch, and Alert On LAN 2 support with a compatible network adapter. If an attempt is made to remove the POV card from the board and install it into another system, the cryptographic key material will be erased, rendering it unusable. This security feature is by design and prevents the cryptographic key migration from one system to another. Therefore, moving this security chip from one board to another is not a supported option. If an attempt is made to move the POV card from one system to another, it may hang on boot and display an error message referring to an invalid machine type and serial number. Jim Holmgren Director of Technology Infrastructure XLHealth Corporation The Warehouse at Camden Yards 351 West Camden Street, Suite 100 Baltimore, MD 21201 410.625.2200 (main) 443.524.8573 (direct) 443-506.2400 (cell) www.xlhealth.com -Original Message- From: John Aldrich [mailto:jaldr...@blueridgecarpet.com] Sent: Wednesday, July 20, 2011 3:15 PM To: NT System Admin Issues Subject: Off-topic question -- POV Daughter Card Anyone know what a Promise of Value daughter card is? I bought some used IBM Thinkcentre workstations and apparently the 30-pin connector on the motherboard is for the daughter card. Anyone know what all these daughter cards do and are they worth fussing with? ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and/or protected health information. Under the Federal Law (HIPAA), the intended recipient is obligated to keep this information secure and confidential. Any disclosure to third parties without authorization from the affiliate or as permitted by law is prohibited and punishable under Federal Law. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. NOTA DE CONFIDENCIALIDAD: Este mensaje incluyendo cualquier anejo es para uso exclusivo del (los) destinatario (s) y puede incluir información confidencial y/o información de salud protegida. La Ley Federal (HIPAA) establece que el destinatario está obligado a mantener la información confidencial y sequra. HIPAA prohíbe y castiga cualquier divulgación a terceras personas sin autorización del afiliado o permitido por ley. Si usted no es el destinatario, redirija esta mensaje al remitente, y destruye cualquier copia existente del mensaje original. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Re: file searching and copying
How long are the paths? There are other ways to handle this, btw... Try the following snippet. It should handle long folders even if Windows complains about them @echo off SETLOCAL ENABLEDELAYEDEXPANSION SET @SOURCE=%SystemDrive% SET @DEST=D:\SomePlace SET @FIND=PrivacIE :Main for /f tokens=* %%v in ('dir /ad /b /s %@SOURCE%\*.* 2^NUL ^| FIND /I %@FIND%') do ( SET @DIR=%%~fpv ECHO. ECHO SOURCE: !@DIR! ECHO DEST: %@DEST%\%%~pv PUSHD !@DIR! echo XCOPY *.* %@DEST%%%~pv /S /E /R /Y ECHO. POPD ) :ExitBatch ENDLOCAL * * *ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of Technology for the SMB market… * On Wed, Jul 20, 2011 at 2:24 PM, Jeff Bunting bunting.j...@gmail.comwrote: Thanks all. Scott's suggestion is close and at least got me pointed in the right direction. Some of the paths are too long for DIR which throws a wrench in the works, so I'm going to have to rely on windows search for now. Powershell, unfortunately, currently isn't an option. Jeff On Wed, Jul 20, 2011 at 12:23 PM, Andrew S. Baker asbz...@gmail.comwrote: Good one, Scott. Jeff, remember to add a % to each variable if used in a batch file, vs the command line. * * *ASB* *http://about.me/Andrew.S.Baker* *Harnessing the Advantages of Technology for the SMB market… * On Wed, Jul 20, 2011 at 12:13 PM, Crawford, Scott crawfo...@evangel.eduwrote: For /f “tokens=*” %i in (‘dir *WORDS_TO_SEARCH* /s/a/b/ad’) do robocopy /mir “%i” DESTINATION_PATH ** ** This will search a folder tree for directorys. Change the dir command to eliminate the /s if you only want to search the root. ** ** *From:* Jeff Bunting [mailto:bunting.j...@gmail.com] *Sent:* Wednesday, July 20, 2011 11:01 AM *To:* NT System Admin Issues *Subject:* file searching and copying ** ** I'm attempting to search for particular words in a directory name (must use wildcards!), and, if found, copy the the directory tree while maintaining its structure to another directory. Are there any native tools (or reskit like robocopy) that can accomplish this somewhat easily? thanks, Jeff ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: Off-topic question -- POV Daughter Card
Imagine the possibilities... Shauna Hensala Subject: RE: Off-topic question -- POV Daughter Card Date: Wed, 20 Jul 2011 15:39:28 -0400 From: jholmg...@xlhealth.com To: ntsysadmin@lyris.sunbelt-software.com Well…I found this cool thing online, for lack of a better term I will refer to it as an “Engine” that actually allows me to perform a “search” of the Interwebs. -Jim“I got yer Google right here pal…” Jim HolmgrenDirector of Technology InfrastructureXLHealth CorporationThe Warehouse at Camden Yards351 West Camden Street, Suite 100Baltimore, MD 21201 410.625.2200 (main)443.524.8573 (direct)443-506.2400 (cell)www.xlhealth.com From: Steve Ens [mailto:stevey...@gmail.com] Sent: Wednesday, July 20, 2011 3:34 PM To: NT System Admin Issues Subject: Re: Off-topic question -- POV Daughter Card Jim, you didn't happen to use google or bing to check for an answer did you?On Wed, Jul 20, 2011 at 2:30 PM, Jim Holmgren jholmg...@xlhealth.com wrote:http://www.ask.com/faqcentral/IBM_CARD.html#1 Promise of Value (POV) card, a 256-bit encrypted security chip daughtercard attached to the motherboard, which enables RFID antenna, C2 tamper switch, and Alert On LAN 2 support with a compatible network adapter. If an attempt is made to remove the POV card from the board and install it into another system, the cryptographic key material will be erased, rendering it unusable. This security feature is by design and prevents the cryptographic key migration from one system to another. Therefore, moving this security chip from one board to another is not a supported option. If an attempt is made to move the POV card from one system to another, it may hang on boot and display an error message referring to an invalid machine type and serial number. Jim Holmgren Director of Technology Infrastructure XLHealth Corporation The Warehouse at Camden Yards 351 West Camden Street, Suite 100 Baltimore, MD 21201 410.625.2200 (main) 443.524.8573 (direct) 443-506.2400 (cell) www.xlhealth.com -Original Message- From: John Aldrich [mailto:jaldr...@blueridgecarpet.com] Sent: Wednesday, July 20, 2011 3:15 PM To: NT System Admin Issues Subject: Off-topic question -- POV Daughter Card Anyone know what a Promise of Value daughter card is? I bought some used IBM Thinkcentre workstations and apparently the 30-pin connector on the motherboard is for the daughter card. Anyone know what all these daughter cards do and are they worth fussing with? ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and/or protected health information. Under the Federal Law (HIPAA), the intended recipient is obligated to keep this information secure and confidential. Any disclosure to third parties without authorization from the affiliate or as permitted by law is prohibited and punishable under Federal Law. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. NOTA DE CONFIDENCIALIDAD: Este mensaje incluyendo cualquier anejo es para uso exclusivo del (los) destinatario (s) y puede incluir información confidencial y/o información de salud protegida. La Ley Federal (HIPAA) establece que el destinatario está obligado a mantener la información confidencial y sequra. HIPAA prohíbe y castiga cualquier divulgación a terceras personas sin autorización del afiliado o permitido por ley. Si usted no es el destinatario, redirija esta mensaje al remitente, y destruye cualquier copia existente del mensaje original. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Re: Off-topic question -- POV Daughter Card
Now imagine what happens to society when they become unavailable. On Wed, Jul 20, 2011 at 4:25 PM, Shauna Hensala she...@msn.com wrote: Imagine the possibilities... [image: Red rose]Shauna Hensala -- Subject: RE: Off-topic question -- POV Daughter Card Date: Wed, 20 Jul 2011 15:39:28 -0400 From: jholmg...@xlhealth.com To: ntsysadmin@lyris.sunbelt-software.com Well…I found this cool thing online, for lack of a better term I will refer to it as an “Engine” that actually allows me to perform a “search” of the Interwebs. -Jim “I got yer Google right here pal…” Jim Holmgren Director of Technology Infrastructure XLHealth Corporation The Warehouse at Camden Yards 351 West Camden Street, Suite 100 Baltimore, MD 21201 410.625.2200 (main) 443.524.8573 (direct) 443-506.2400 (cell) www.xlhealth.com *From:* Steve Ens [mailto:stevey...@gmail.com] *Sent:* Wednesday, July 20, 2011 3:34 PM *To:* NT System Admin Issues *Subject:* Re: Off-topic question -- POV Daughter Card Jim, you didn't happen to use google or bing to check for an answer did you? On Wed, Jul 20, 2011 at 2:30 PM, Jim Holmgren jholmg...@xlhealth.com wrote: http://www.ask.com/faqcentral/IBM_CARD.html#1 Promise of Value (POV) card, a 256-bit encrypted security chip daughtercard attached to the motherboard, which enables RFID antenna, C2 tamper switch, and Alert On LAN 2 support with a compatible network adapter. If an attempt is made to remove the POV card from the board and install it into another system, the cryptographic key material will be erased, rendering it unusable. This security feature is by design and prevents the cryptographic key migration from one system to another. Therefore, moving this security chip from one board to another is not a supported option. If an attempt is made to move the POV card from one system to another, it may hang on boot and display an error message referring to an invalid machine type and serial number. Jim Holmgren Director of Technology Infrastructure XLHealth Corporation The Warehouse at Camden Yards 351 West Camden Street, Suite 100 Baltimore, MD 21201 410.625.2200 (main) 443.524.8573 (direct) 443-506.2400 (cell) www.xlhealth.com -Original Message- From: John Aldrich [mailto:jaldr...@blueridgecarpet.com] Sent: Wednesday, July 20, 2011 3:15 PM To: NT System Admin Issues Subject: Off-topic question -- POV Daughter Card Anyone know what a Promise of Value daughter card is? I bought some used IBM Thinkcentre workstations and apparently the 30-pin connector on the motherboard is for the daughter card. Anyone know what all these daughter cards do and are they worth fussing with? ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and/or protected health information. Under the Federal Law (HIPAA), the intended recipient is obligated to keep this information secure and confidential. Any disclosure to third parties without authorization from the affiliate or as permitted by law is prohibited and punishable under Federal Law. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. NOTA DE CONFIDENCIALIDAD: Este mensaje incluyendo cualquier anejo es para uso exclusivo del (los) destinatario (s) y puede incluir información confidencial y/o información de salud protegida. La Ley Federal (HIPAA) establece que el destinatario está obligado a mantener la información confidencial y sequra. HIPAA prohíbe y castiga cualquier divulgación a terceras personas sin autorización del afiliado o permitido por ley. Si usted no es el destinatario, redirija esta mensaje al remitente, y destruye cualquier copia existente del mensaje original. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: Off-topic question -- POV Daughter Card
Overhead projectors From: Jonathan Link [mailto:jonathan.l...@gmail.com] Sent: Wednesday, July 20, 2011 3:27 PM To: NT System Admin Issues Subject: Re: Off-topic question -- POV Daughter Card Now imagine what happens to society when they become unavailable. On Wed, Jul 20, 2011 at 4:25 PM, Shauna Hensala she...@msn.commailto:she...@msn.com wrote: Imagine the possibilities... [Red rose]Shauna Hensala Subject: RE: Off-topic question -- POV Daughter Card Date: Wed, 20 Jul 2011 15:39:28 -0400 From: jholmg...@xlhealth.commailto:jholmg...@xlhealth.com To: ntsysadmin@lyris.sunbelt-software.commailto:ntsysadmin@lyris.sunbelt-software.com Well...I found this cool thing online, for lack of a better term I will refer to it as an Engine that actually allows me to perform a search of the Interwebs. -Jim I got yer Google right here pal... Jim Holmgren Director of Technology Infrastructure XLHealth Corporation The Warehouse at Camden Yards 351 West Camden Street, Suite 100 Baltimore, MD 21201 410.625.2200tel:410.625.2200 (main) 443.524.8573tel:443.524.8573 (direct) 443-506.2400tel:443-506.2400 (cell) www.xlhealth.comhttp://www.xlhealth.com/ From: Steve Ens [mailto:stevey...@gmail.commailto:stevey...@gmail.com] Sent: Wednesday, July 20, 2011 3:34 PM To: NT System Admin Issues Subject: Re: Off-topic question -- POV Daughter Card Jim, you didn't happen to use google or bing to check for an answer did you? On Wed, Jul 20, 2011 at 2:30 PM, Jim Holmgren jholmg...@xlhealth.commailto:jholmg...@xlhealth.com wrote: http://www.ask.com/faqcentral/IBM_CARD.html#1 Promise of Value (POV) card, a 256-bit encrypted security chip daughtercard attached to the motherboard, which enables RFID antenna, C2 tamper switch, and Alert On LAN 2 support with a compatible network adapter. If an attempt is made to remove the POV card from the board and install it into another system, the cryptographic key material will be erased, rendering it unusable. This security feature is by design and prevents the cryptographic key migration from one system to another. Therefore, moving this security chip from one board to another is not a supported option. If an attempt is made to move the POV card from one system to another, it may hang on boot and display an error message referring to an invalid machine type and serial number. Jim Holmgren Director of Technology Infrastructure XLHealth Corporation The Warehouse at Camden Yards 351 West Camden Street, Suite 100 Baltimore, MD 21201 410.625.2200 (main) 443.524.8573 (direct) 443-506.2400 (cell) www.xlhealth.comhttp://www.xlhealth.com -Original Message- From: John Aldrich [mailto:jaldr...@blueridgecarpet.commailto:jaldr...@blueridgecarpet.com] Sent: Wednesday, July 20, 2011 3:15 PM To: NT System Admin Issues Subject: Off-topic question -- POV Daughter Card Anyone know what a Promise of Value daughter card is? I bought some used IBM Thinkcentre workstations and apparently the 30-pin connector on the motherboard is for the daughter card. Anyone know what all these daughter cards do and are they worth fussing with? ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and/or protected health information. Under the Federal Law (HIPAA), the intended recipient is obligated to keep this information secure and confidential. Any disclosure to third parties without authorization from the affiliate or as permitted by law is prohibited and punishable under Federal Law. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. NOTA DE CONFIDENCIALIDAD: Este mensaje incluyendo cualquier anejo es para uso exclusivo del (los) destinatario (s) y puede incluir información confidencial y/o información de salud protegida. La Ley Federal (HIPAA) establece que el destinatario está obligado a mantener la información confidencial y sequra. HIPAA prohíbe y castiga cualquier divulgación a terceras personas sin autorización del afiliado o permitido por ley. Si usted no es el destinatario, redirija esta mensaje al remitente, y destruye cualquier copia existente del mensaje original. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body:
Re: Off-topic question -- POV Daughter Card
Interweb? Sounds Fasinating! What do they taste like? drod...@gmail.com Sent via Dell Streak 7 On Jul 20, 2011 4:05 PM, Steve Ens stevey...@gmail.com wrote: They have those now? Wow man, that is groovy! On Wed, Jul 20, 2011 at 2:39 PM, Jim Holmgren jholmg...@xlhealth.com wrote: Well…I found this cool thing online, for lack of a better term I will refer to it as an “Engine” that actually allows me to perform a “search” of the Interwebs. ** ** -Jim “I got yer Google right here pal…” ** ** Jim Holmgren Director of Technology Infrastructure XLHealth Corporation The Warehouse at Camden Yards 351 West Camden Street, Suite 100 Baltimore, MD 21201 410.625.2200 (main) 443.524.8573 (direct) 443-506.2400 (cell) www.xlhealth.com ** ** ** ** ** ** *From:* Steve Ens [mailto:stevey...@gmail.com] *Sent:* Wednesday, July 20, 2011 3:34 PM *To:* NT System Admin Issues *Subject:* Re: Off-topic question -- POV Daughter Card ** ** Jim, you didn't happen to use google or bing to check for an answer did you? On Wed, Jul 20, 2011 at 2:30 PM, Jim Holmgren jholmg...@xlhealth.com wrote: http://www.ask.com/faqcentral/IBM_CARD.html#1 Promise of Value (POV) card, a 256-bit encrypted security chip daughtercard attached to the motherboard, which enables RFID antenna, C2 tamper switch, and Alert On LAN 2 support with a compatible network adapter. If an attempt is made to remove the POV card from the board and install it into another system, the cryptographic key material will be erased, rendering it unusable. This security feature is by design and prevents the cryptographic key migration from one system to another. Therefore, moving this security chip from one board to another is not a supported option. If an attempt is made to move the POV card from one system to another, it may hang on boot and display an error message referring to an invalid machine type and serial number. Jim Holmgren Director of Technology Infrastructure XLHealth Corporation The Warehouse at Camden Yards 351 West Camden Street, Suite 100 Baltimore, MD 21201 410.625.2200 (main) 443.524.8573 (direct) 443-506.2400 (cell) www.xlhealth.com -Original Message- From: John Aldrich [mailto:jaldr...@blueridgecarpet.com] Sent: Wednesday, July 20, 2011 3:15 PM To: NT System Admin Issues Subject: Off-topic question -- POV Daughter Card Anyone know what a Promise of Value daughter card is? I bought some used IBM Thinkcentre workstations and apparently the 30-pin connector on the motherboard is for the daughter card. Anyone know what all these daughter cards do and are they worth fussing with? ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and/or protected health information. Under the Federal Law (HIPAA), the intended recipient is obligated to keep this information secure and confidential. Any disclosure to third parties without authorization from the affiliate or as permitted by law is prohibited and punishable under Federal Law. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. NOTA DE CONFIDENCIALIDAD: Este mensaje incluyendo cualquier anejo es para uso exclusivo del (los) destinatario (s) y puede incluir información confidencial y/o información de salud protegida. La Ley Federal (HIPAA) establece que el destinatario está obligado a mantener la información confidencial y sequra. HIPAA prohíbe y castiga cualquier divulgación a terceras personas sin autorización del afiliado o permitido por ley. Si usted no es el destinatario, redirija esta mensaje al remitente, y destruye cualquier copia existente del mensaje original. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: With ISA / TMG going away...
Is this happening for sure? Are they rolling TMG into UAG? I'd hate to see the whole product die. From: G.Waleed Kavalec [mailto:kava...@gmail.com] Sent: Wednesday, July 06, 2011 8:56 AM To: NT System Admin Issues Subject: With ISA / TMG going away... Or into no more upgrade status, what would this list recommend as the path forward for a small-to-medium sized shop? We still use ISA 2006 and had been looking at Threat Management Gateway. We have two sites, and do major service-bureau and specialized hosting kind of work. All Windows. Mostly 2008. -- G. Waleed Kavalec __ Remember when teachers, public employees, unions, npr, pbs, and planned parenthood crashed the stock market, took trillions in TARP money, spilled a crapload of oil in the Gulf of Mexico, wiped out half of our 401ks, gave themselves billions in bonuses, and payed no taxes? Yeah - me, neither. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Re: With ISA / TMG going away...
They are very vague on it, all that is certain is no upgrade path for TMG. On Wed, Jul 20, 2011 at 5:07 PM, Crawford, Scott crawfo...@evangel.eduwrote: Is this happening for sure? Are they rolling TMG into UAG? I’d hate to see the whole product die. ** ** *From:* G.Waleed Kavalec [mailto:kava...@gmail.com] *Sent:* Wednesday, July 06, 2011 8:56 AM *To:* NT System Admin Issues *Subject:* With ISA / TMG going away... ** ** Or into no more upgrade status, what would this list recommend as the path forward for a small-to-medium sized shop? ** ** We still use ISA 2006 and had been looking at Threat Management Gateway.** ** ** ** We have two sites, and do major service-bureau and specialized hosting kind of work. All Windows. Mostly 2008. -- G. Waleed Kavalec __ Remember when teachers, public employees, unions, npr, pbs, and planned parenthood crashed the stock market, took trillions in TARP money, spilled a crapload of oil in the Gulf of Mexico, wiped out half of our 401ks, gave themselves billions in bonuses, and payed no taxes? Yeah - me, neither.*** * ** ** ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin -- G. Waleed Kavalec __ Remember when teachers, public employees, unions, npr, pbs, and planned parenthood crashed the stock market, took trillions in TARP money, spilled a crapload of oil in the Gulf of Mexico, wiped out half of our 401ks, gave themselves billions in bonuses, and payed no taxes? Yeah - me, neither. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: With ISA / TMG going away...
Do you have an official link to that or just what someone heard an MS rep say? I've just not seen it officially stated anywhere. From: G.Waleed Kavalec [mailto:kava...@gmail.com] Sent: Wednesday, July 20, 2011 5:30 PM To: NT System Admin Issues Subject: Re: With ISA / TMG going away... They are very vague on it, all that is certain is no upgrade path for TMG. On Wed, Jul 20, 2011 at 5:07 PM, Crawford, Scott crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote: Is this happening for sure? Are they rolling TMG into UAG? I'd hate to see the whole product die. From: G.Waleed Kavalec [mailto:kava...@gmail.commailto:kava...@gmail.com] Sent: Wednesday, July 06, 2011 8:56 AM To: NT System Admin Issues Subject: With ISA / TMG going away... Or into no more upgrade status, what would this list recommend as the path forward for a small-to-medium sized shop? We still use ISA 2006 and had been looking at Threat Management Gateway. We have two sites, and do major service-bureau and specialized hosting kind of work. All Windows. Mostly 2008. -- G. Waleed Kavalec __ Remember when teachers, public employees, unions, npr, pbs, and planned parenthood crashed the stock market, took trillions in TARP money, spilled a crapload of oil in the Gulf of Mexico, wiped out half of our 401ks, gave themselves billions in bonuses, and payed no taxes? Yeah - me, neither. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin -- G. Waleed Kavalec __ Remember when teachers, public employees, unions, npr, pbs, and planned parenthood crashed the stock market, took trillions in TARP money, spilled a crapload of oil in the Gulf of Mexico, wiped out half of our 401ks, gave themselves billions in bonuses, and payed no taxes? Yeah - me, neither. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Re: Dell Lock Code Resource
I always just search online, e.g.: http://www.google.com/search?q=dell+post+codes It doesnt surprise me that Dell has taken a position to keep details like this. They are getting more and more uptight about what they consider free support. -- Espi On Wed, Jul 20, 2011 at 2:21 PM, Mike Gill lis...@canbyfoursquare.comwrote: Does anyone have a resource for the LED Lock codes on Dell’s laptops? For example, when a laptop doesn’t start up and you get the num and caps lock LED’s flashing but the scroll lock LED is solid. Dell says they don’t publish this, and I have found on older document on their website that shows the codes, and one resource online, I would like an up to date resource that includes Latitude’s, Inspiron’s and Vostro’s rather than calling Dell up every time. For example: ** ** http://www.bay-wolf.com/portpostcodes.htm ** ** FYI, this info isn’t provided in the manual’s online either. ** ** -- Mike Gill ** ** ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: file searching and copying
Nice to see pushd and popd making an appearance :) Few nits and questions, just to make sure I'm not missing something: 1. The echo in front of xcopy shouldn't be there. I'm sure it's just there for troubleshooting and left as an oversight. The /s /e is redundant, right? 2. I'm not very practiced with the enhanced ~ substitution, but couldn't the SET @DIR=%%~fpv line omit the p? 3. I think the ECHO DEST: %@DEST%\%%~pv line has an extra \ 4. I think the xcopy's destination parameter (%@DEST%%%~pv) needs to be %@DEST%%%~pnv. Without it, the files get copied into the corresponding parent on the destination. 5. Is there any way to get the parentheses code blocks work from the command line or do they need to be inside of a .bat? I've tried stringing the commands together with , but met with limited success. Possible drawback to this method: The destination path will contain the full path of the source. For instance, if the source root is C:\a\b\c and it contains a folder called Search_Term, and we wan't the destination to be D:\, when we run the script, the destination will contain D:\a\b\c\Search_Term, which may not be the goal. In the end, I don't think this is getting any better results the my original line. The 2NUL is just hiding the failures. Thanks for the script though, it was fun to digest :) From: Andrew S. Baker [mailto:asbz...@gmail.com] Sent: Wednesday, July 20, 2011 3:06 PM To: NT System Admin Issues Subject: Re: file searching and copying How long are the paths? There are other ways to handle this, btw... Try the following snippet. It should handle long folders even if Windows complains about them @echo off SETLOCAL ENABLEDELAYEDEXPANSION SET @SOURCE=%SystemDrive% SET @DEST=D:\SomePlace SET @FIND=PrivacIE :Main for /f tokens=* %%v in ('dir /ad /b /s %@SOURCE%\*.*mailto:%25@SOURCE%25\*.* 2^NUL ^| FIND /I %@FIND%') do ( SET @DIR=%%~fpv ECHO. ECHO SOURCE: !@DIR! ECHO DEST: %@DEST%\%%~pv PUSHD !@DIR! echo XCOPY *.* %@DEST%%%~pv /S /E /R /Y ECHO. POPD ) :ExitBatch ENDLOCAL ASB http://about.me/Andrew.S.Baker Harnessing the Advantages of Technology for the SMB market... On Wed, Jul 20, 2011 at 2:24 PM, Jeff Bunting bunting.j...@gmail.commailto:bunting.j...@gmail.com wrote: Thanks all. Scott's suggestion is close and at least got me pointed in the right direction. Some of the paths are too long for DIR which throws a wrench in the works, so I'm going to have to rely on windows search for now. Powershell, unfortunately, currently isn't an option. Jeff On Wed, Jul 20, 2011 at 12:23 PM, Andrew S. Baker asbz...@gmail.commailto:asbz...@gmail.com wrote: Good one, Scott. Jeff, remember to add a % to each variable if used in a batch file, vs the command line. ASB http://about.me/Andrew.S.Baker Harnessing the Advantages of Technology for the SMB market... On Wed, Jul 20, 2011 at 12:13 PM, Crawford, Scott crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote: For /f tokens=* %i in ('dir *WORDS_TO_SEARCH* /s/a/b/ad') do robocopy /mir %i DESTINATION_PATH This will search a folder tree for directorys. Change the dir command to eliminate the /s if you only want to search the root. From: Jeff Bunting [mailto:bunting.j...@gmail.commailto:bunting.j...@gmail.com] Sent: Wednesday, July 20, 2011 11:01 AM To: NT System Admin Issues Subject: file searching and copying I'm attempting to search for particular words in a directory name (must use wildcards!), and, if found, copy the the directory tree while maintaining its structure to another directory. Are there any native tools (or reskit like robocopy) that can accomplish this somewhat easily? thanks, Jeff ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.commailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage
RE: Off-topic question -- POV Daughter Card
Chicken. From: Daniel Rodriguez [mailto:drod...@gmail.com] Sent: Wednesday, July 20, 2011 4:33 PM To: NT System Admin Issues Subject: Re: Off-topic question -- POV Daughter Card Interweb? Sounds Fasinating! What do they taste like? drod...@gmail.com Sent via Dell Streak 7 CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and/or protected health information. Under the Federal Law (HIPAA), the intended recipient is obligated to keep this information secure and confidential. Any disclosure to third parties without authorization from the affiliate or as permitted by law is prohibited and punishable under Federal Law. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. NOTA DE CONFIDENCIALIDAD: Este facs�mile, incluyendo lo adjunto, es para el uso exclusivo del destinatario(s) y puede contener informaci�n confidencial y/o informaci�n protegida de salud. En virtud de la Ley Federal (HIPAA), el destinatario tiene la obligaci�n de mantener esta informaci�n segura y confidencial. Cualquier divulgaci�n a terceros sin la autorizaci�n de los miembros de lo permitido por la ley est� prohibido y penado en virtud de la Ley Federal. Si usted no es el destinatario, por favor, p�ngase en contacto con el remitente por tel�fono y destruir todas las copias del mensaje original ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: file searching and copying
Ok, my last post on this todayI think :) for /f tokens=* %i in ('dir * WORDS_TO_SEARCH * /s/ad/b') do robocopy /mir %i DESTINATION_PATH\%~pni Adding the %~pni will prevent every copy from overwriting the previous. This will recreate your entire tree at the destination similar to Andrew's script below which may or may not be what you want. You can change it to \%~ni so that each source directory gets copied to the root of the destination, but any duplicates will overwrite each other so /mir may not be the best option. As far as paths that are too long, robocopy will handle paths up to 32,000 characters, but the dir command is the limiting factor here. In any case, you should be able to see the paths that don't get copied and do those manually, but the others should work. From: Crawford, Scott [mailto:crawfo...@evangel.edu] Sent: Wednesday, July 20, 2011 6:50 PM To: NT System Admin Issues Subject: RE: file searching and copying Nice to see pushd and popd making an appearance :) Few nits and questions, just to make sure I'm not missing something: 1. The echo in front of xcopy shouldn't be there. I'm sure it's just there for troubleshooting and left as an oversight. The /s /e is redundant, right? 2. I'm not very practiced with the enhanced ~ substitution, but couldn't the SET @DIR=%%~fpv line omit the p? 3. I think the ECHO DEST: %@DEST%\%%~pv line has an extra \ 4. I think the xcopy's destination parameter (%@DEST%%%~pv) needs to be %@DEST%%%~pnv. Without it, the files get copied into the corresponding parent on the destination. 5. Is there any way to get the parentheses code blocks work from the command line or do they need to be inside of a .bat? I've tried stringing the commands together with , but met with limited success. Possible drawback to this method: The destination path will contain the full path of the source. For instance, if the source root is C:\a\b\c and it contains a folder called Search_Term, and we wan't the destination to be D:\, when we run the script, the destination will contain D:\a\b\c\Search_Term, which may not be the goal. In the end, I don't think this is getting any better results the my original line. The 2NUL is just hiding the failures. Thanks for the script though, it was fun to digest :) From: Andrew S. Baker [mailto:asbz...@gmail.com]mailto:[mailto:asbz...@gmail.com] Sent: Wednesday, July 20, 2011 3:06 PM To: NT System Admin Issues Subject: Re: file searching and copying How long are the paths? There are other ways to handle this, btw... Try the following snippet. It should handle long folders even if Windows complains about them @echo off SETLOCAL ENABLEDELAYEDEXPANSION SET @SOURCE=%SystemDrive% SET @DEST=D:\SomePlace SET @FIND=PrivacIE :Main for /f tokens=* %%v in ('dir /ad /b /s %@SOURCE%\*.*mailto:%25@SOURCE%25\*.* 2^NUL ^| FIND /I %@FIND%') do ( SET @DIR=%%~fpv ECHO. ECHO SOURCE: !@DIR! ECHO DEST: %@DEST%\%%~pv PUSHD !@DIR! echo XCOPY *.* %@DEST%%%~pv /S /E /R /Y ECHO. POPD ) :ExitBatch ENDLOCAL ASB http://about.me/Andrew.S.Baker Harnessing the Advantages of Technology for the SMB market... On Wed, Jul 20, 2011 at 2:24 PM, Jeff Bunting bunting.j...@gmail.commailto:bunting.j...@gmail.com wrote: Thanks all. Scott's suggestion is close and at least got me pointed in the right direction. Some of the paths are too long for DIR which throws a wrench in the works, so I'm going to have to rely on windows search for now. Powershell, unfortunately, currently isn't an option. Jeff On Wed, Jul 20, 2011 at 12:23 PM, Andrew S. Baker asbz...@gmail.commailto:asbz...@gmail.com wrote: Good one, Scott. Jeff, remember to add a % to each variable if used in a batch file, vs the command line. ASB http://about.me/Andrew.S.Baker Harnessing the Advantages of Technology for the SMB market... On Wed, Jul 20, 2011 at 12:13 PM, Crawford, Scott crawfo...@evangel.edumailto:crawfo...@evangel.edu wrote: For /f tokens=* %i in ('dir *WORDS_TO_SEARCH* /s/a/b/ad') do robocopy /mir %i DESTINATION_PATH This will search a folder tree for directorys. Change the dir command to eliminate the /s if you only want to search the root. From: Jeff Bunting [mailto:bunting.j...@gmail.commailto:bunting.j...@gmail.com] Sent: Wednesday, July 20, 2011 11:01 AM To: NT System Admin Issues Subject: file searching and copying I'm attempting to search for particular words in a directory name (must use wildcards!), and, if found, copy the the directory tree while maintaining its structure to another directory. Are there any native tools (or reskit like robocopy) that can accomplish this somewhat easily? thanks, Jeff ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to
Re: Thought on malware cleaning
Wait I thought a clue-x-four with a nail on the user side daily would help mitigate those issues if not put a stop to them? Jon On Wed, Jul 20, 2011 at 11:01 AM, Ziots, Edward ezi...@lifespan.org wrote: Humm I sense POSTAL Epic Fail… ** ** Don’t go off the deep end Epsi, you can’t stop everything, and you can’t stop the users from going to bad sites or getting owned in some cases. We all know that technical controls don’t solve personal behavior issues. *** * ** ** Z ** ** Edward E. Ziots CISSP, Network +, Security + Security Engineer Lifespan Organization Email:ezi...@lifespan.org Cell:401-639-3505 [image: CISSP_logo] *From:* MMF [mailto:mmfree...@ameritech.net] *Sent:* Tuesday, July 19, 2011 5:48 PM *To:* NT System Admin Issues *Subject:* Re: Thought on malware cleaning ** ** Don’t hold back ([image: Smile] MMF *From:* Micheal Espinola Jr michealespin...@gmail.com *Sent:* Tuesday, July 19, 2011 3:15 PM *To:* NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com *Subject:* Re: Thought on malware cleaning On that note, I'm going to go on my lunch break now. Here's what I'll do: I'm going to close my eyes and walk in the direction of my car. Screw anything I walk into, because logically there should be doors that automatically open in the direction I need to go. Screw how things currently exist, because I think I know how they should exist for me. Because I know better. Better than anyone else. All must bend to my will. And whatever people do now, they will change on the drop of a dime at my request. Because user [re]education is akin to waving a magic wand. What I say goes. The world will fall in-line. If I bang my face into a wall along the way - screw it. I'll just keep doing it until someone comes along and changes something to be how I want it. Sounds perfectly reasonable... -- Espi On Tue, Jul 19, 2011 at 1:01 PM, Micheal Espinola Jr michealespin...@gmail.com wrote: Well that's f'ing helpful. Good luck on educating the planet with a more logical course of action. Let us know how that works-out for you! -- Espi On Tue, Jul 19, 2011 at 12:44 PM, Ben Scott mailvor...@gmail.com wrote:* *** On Tue, Jul 19, 2011 at 3:02 PM, Micheal Espinola Jr michealespin...@gmail.com wrote: While I agree with your sentiment whole-heartedly, I still wonder why antimalware software isnt performing the most basic of checks for common infection breadcrumbs. Hammer myopia. (When all you have is a hammer, everything starts to look like a nail.) -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ** ** ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ** ** ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadminimage003.pngimage004.jpg
Re: non-local admin revisited
I am with Ben on this. $Dayjob$ has it like Andrew has it. Jon On Wed, Jul 20, 2011 at 12:07 AM, Ben Scott mailvor...@gmail.com wrote: On Tue, Jul 19, 2011 at 9:36 PM, Kennedy, Jim kennedy...@elyriaschools.org wrote: Hmmm, I like this. With UAC on there is validity to running as an admin all the time, IF you only have admin on your own machine. I'd still much rather be required to enter a password for privileged operations. Being one click away from system privilege is scary for a number of reasons. -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Re: non-local admin revisited
On Wed, Jul 20, 2011 at 7:02 AM, Andrew S. Baker asbz...@gmail.com wrote: I'd still much rather be required to enter a password for privileged operations. Being one click away from system privilege is scary for a number of reasons. Either way is easily faciliated depending upon one's requirements. Absolutely. I was just stating my preference. This being the Internet, everyone is entitled to my opinion. ;-) -- Ben ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
RE: Dell Lock Code Resource
As do I. The results of your search indicate the site I listed. The other sites are other people asking the same question or are for beep codes and desktops. It surprises me that this information isn't public. They provide documentation for all their computers to allow users to disassemble them down to the components without voiding the warranty. Why not this? Who knows. Seems to be it would be a few less support phone calls at least. -- Mike From: Micheal Espinola Jr [mailto:michealespin...@gmail.com] Sent: Wednesday, July 20, 2011 3:37 PM To: NT System Admin Issues Subject: Re: Dell Lock Code Resource I always just search online, e.g.: http://www.google.com/search?q=dell+post+codes It doesnt surprise me that Dell has taken a position to keep details like this. They are getting more and more uptight about what they consider free support. -- Espi On Wed, Jul 20, 2011 at 2:21 PM, Mike Gill lis...@canbyfoursquare.com wrote: Does anyone have a resource for the LED Lock codes on Dell's laptops? For example, when a laptop doesn't start up and you get the num and caps lock LED's flashing but the scroll lock LED is solid. Dell says they don't publish this, and I have found on older document on their website that shows the codes, and one resource online, I would like an up to date resource that includes Latitude's, Inspiron's and Vostro's rather than calling Dell up every time. For example: http://www.bay-wolf.com/portpostcodes.htm FYI, this info isn't provided in the manual's online either. -- Mike Gill ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
Re: Off-topic question -- POV Daughter Card
Wait a second. So how does this engine of search work? You just type a subject into a search field and these interwebs attempt to provide relevant information? That sounds very helpful if you are someone who needs to know things that you might not inherently know. I bet this thing takes off. Can I buy stock in this engine? Bill Jim Holmgren wrote: Well…I found this cool thing online, for lack of a better term I will refer to it as an “Engine” that actually allows me to perform a “search” of the Interwebs. -Jim “I got yer Google right here pal…” Jim Holmgren Director of Technology Infrastructure XLHealth Corporation The Warehouse at Camden Yards 351 West Camden Street, Suite 100 Baltimore, MD 21201 410.625.2200 (main) 443.524.8573 (direct) 443-506.2400 (cell) www.xlhealth.com http://www.xlhealth.com/ *From:* Steve Ens [mailto:stevey...@gmail.com] *Sent:* Wednesday, July 20, 2011 3:34 PM *To:* NT System Admin Issues *Subject:* Re: Off-topic question -- POV Daughter Card Jim, you didn't happen to use google or bing to check for an answer did you? On Wed, Jul 20, 2011 at 2:30 PM, Jim Holmgren jholmg...@xlhealth.com mailto:jholmg...@xlhealth.com wrote: http://www.ask.com/faqcentral/IBM_CARD.html#1 Promise of Value (POV) card, a 256-bit encrypted security chip daughtercard attached to the motherboard, which enables RFID antenna, C2 tamper switch, and Alert On LAN 2 support with a compatible network adapter. If an attempt is made to remove the POV card from the board and install it into another system, the cryptographic key material will be erased, rendering it unusable. This security feature is by design and prevents the cryptographic key migration from one system to another. Therefore, moving this security chip from one board to another is not a supported option. If an attempt is made to move the POV card from one system to another, it may hang on boot and display an error message referring to an invalid machine type and serial number. Jim Holmgren Director of Technology Infrastructure XLHealth Corporation The Warehouse at Camden Yards 351 West Camden Street, Suite 100 Baltimore, MD 21201 410.625.2200 tel:410.625.2200 (main) 443.524.8573 tel:443.524.8573 (direct) 443-506.2400 tel:443-506.2400 (cell) www.xlhealth.com http://www.xlhealth.com -Original Message- From: John Aldrich [mailto:jaldr...@blueridgecarpet.com mailto:jaldr...@blueridgecarpet.com] Sent: Wednesday, July 20, 2011 3:15 PM To: NT System Admin Issues Subject: Off-topic question -- POV Daughter Card Anyone know what a Promise of Value daughter card is? I bought some used IBM Thinkcentre workstations and apparently the 30-pin connector on the motherboard is for the daughter card. Anyone know what all these daughter cards do and are they worth fussing with? ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com mailto:listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin CONFIDENTIALITY NOTICE: This email, including attachments, is for the sole use of the intended recipient(s) and may contain confidential and/or protected health information. Under the Federal Law (HIPAA), the intended recipient is obligated to keep this information secure and confidential. Any disclosure to third parties without authorization from the affiliate or as permitted by law is prohibited and punishable under Federal Law. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. NOTA DE CONFIDENCIALIDAD: Este mensaje incluyendo cualquier anejo es para uso exclusivo del (los) destinatario (s) y puede incluir información confidencial y/o información de salud protegida. La Ley Federal (HIPAA) establece que el destinatario está obligado a mantener la información confidencial y sequra. HIPAA prohíbe y castiga cualquier divulgación a terceras personas sin autorización del afiliado o permitido por ley. Si usted no es el destinatario, redirija esta mensaje al remitente, y destruye cualquier copia existente del mensaje original. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin