I have created a simple logon script to map some network drives. I called the script startup.bat and placed it in the \winnt\sysvol\%domain%\scripts directory. (Where %domain% is the name of the company)
I then went into AD users and computers, opened the profile of a user and put \\server\sysvol\%domain%\scripts\startup.bat into the logon script box.
Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg).
If you're looking for how to monitor bandwidth using netflow or packet s…