IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.

Share tech news, updates, or what's on your mind.

Sign up to Post

I do not have access to the SCCM server ... only the Windows 7 clients. How to fix software center "Waiting to install"? This is a common problem on many clients, but not all.
I have tried:
foreach($i in gwmi -Namespace root/ccm/policy/machine/actualconfig -Class ccm_softwaredistribution -Filter "ADV_AdvertisementID='CS123456'"){$i.delete()}

Open in new window

This only seems to address the applications that were waiting, not the updates.
0
ON-DEMAND: 10 Easy Ways to Lose a Password
LVL 1
ON-DEMAND: 10 Easy Ways to Lose a Password

Learn about the methods that hackers use to lift real, working credentials from even the most security-savvy employees in this on-demand webinar. We cover the importance of multi-factor authentication and how these solutions can better protect your business!

Please provide me with guides on using System Center Configuration Manager 2016 (SCCM)  to deploy software such as Chrome, Acrobat Reader, & 7-Zip to clients.
0
trying to reach to the companyname.com, using ping companyname.com

This domain is hosted by goddady.com

it was hosted my email myname@companyname.com
now I can send but cannot receive any more.  bouncing back..
Cannot resolve using nslookup either.
email hosted outlook.office365.com

The error is "Domain unavailable"
The domain is not expired (it expires in 2019)
however non-pingable and cannot resolve..
What could be an issue?  Please help troubleshoot..
0
Linux admin supporting Macs.  I have a good Linux helpdesk candidate that will be require to support Macs in the future as well.  Would that be a huge knowledge curve for a good Linux admin to support Macs?  He claims almost 0% mac knowledge.
I know Linux guys very intuitive supporting Networking stuff (Cisco, etc.)  Not sure about Mac OS tho.
0
When taking on a new account, how do you transfer 365 from one MSP to another or do i need to migrate the accounts? Customer does not control the 365 account.
0
Dear Experts

installing SAP ERP on-premise or on cloud recommended, if we go for on-premise what would be best way for business continuity  and recovery, is it recommended interbranch for DR and recovery or cloud please suggest the best recommended.
0
Hi,

Anyone can advice still can't retrieve user software & inventory report even though the agent is pushed down with status of client is installed and activity client is active.

See attached screenshot.
noreport.jpg
0
Besides the obvious of value of keeping staff up to date and happy, the added value is one that is not as obvious.
2
Hello I have configured my PDC server as an NTP server to sync its time to NTP.org  zone servers and apply throw GPO but my clients in domain didn't sync their time with PDC when I run w32 time query status in client Pc it gives me error although I have give access of NTP.org  URL access to my PDC throw Sophps XG firewall please help
0
Anyone has any experience with these flat CAT6 cables?  Are they god enough for users' desks?  
https://www.amazon.com/Cat-Ethernet-Cable-Black-Pack/dp/B01IQWGKXE/ref=sr_1_5?ie=UTF8&qid=1529696113&sr=8-5&keywords=ethernet+cable+5ft+flat
0
Top Threats of Q1 & How to Defend Against Them
LVL 1
Top Threats of Q1 & How to Defend Against Them

WEBINAR: Join WatchGuard CTO and our Threat Research Team on Aug. 2nd to hear the findings from our Q1 Internet Security Report! Learn more about the top threats detected in the first quarter and how you can defend your business against them!

Looking for a small business IT consultant to fill in for me when I am away on vacation or attending seminars.  I have a small client base of 6 small businesses that may need attention while I am out of town.  I currently use Projent remote support for this need.  However, should there be a need for an onsite visit they do not have local availability since they are based in California and all my clients are located in Hampton Roads, Virginia.

Even though Projent support is great, the fact they cannot offer onsite support if needed to could a major issue.

I also tried working with another local IT consultant that is also a one man shop, and we scheduled all the days I would be gone so he could cover for me during my absence.  I then contacted him to remind him to cover for me since I was going to be out of the country, and he stated he could not help even though we discussed it prior and agreed on everything.  I even was going to cover for him as well.

Let's just say this experience was horrible.  I am trying to avoid that this year.

I also contacted other IT support companies within the area, they either would not be able to assist but were willing to take the client.  Another thing that concerns me is if the person or company decides to try and solicit  their services over mine therefore taking my client.  I do have a non compete clause that should minimize this sort of situation, but its not fool proof.  Any suggestions...
0
Hi Anyone,

My boss want me to define all the users (about 20,000 domain member) which member of group (about few 1000 groups) we've in our enterprise domain to come with a accurate user domain permission matrix.

What should I do as I'm very new to the enterprise domain network and not very good in writing script like using powershell or never work in the enterprise network before.

What is the best suggestion for me in order to complete within 1 days as my boss requirement.

Anyone can help.

Tks.

Lucky
Access-Matrix-v2.xlsx
0
I cant send email to one note

I have office 2010

I see all tabs in my one note , can create ne wpage manually but cant send

it gives error

one note cannot create page in new destination, it may have been deleted, password protected?
0
I am handling a Disaster Recovery project which involves contractors/service providers. Can you share with me the following document/template below which you have used before in recent projects?

1. Non-Disclosure Agreement (NDA); and
2. InfoSec Compliant Statement.

Thanks a lot for your help in advance.
0
Why has Adobe Send and Track stopped working in Outlook?
0
After being hit with Ransomware, restoring from backup, and reinstalling applications as needed, I can't get the Quickbooks Database Server services started or the Quickbooks Database Server Manager to run. When I browse for files and 'Start Scan", it attempts to start the services after browsing the files, finding Quickbooks files. It claims the folder in which the company files live isn't shared. I guess that's technically true, but the directory one level up IS shared, so it's possible to browse to it from a network share. Then it tells me it is attempting to resolve Networking issues, and tells me after that to resolve network issues and try again later (not the exact syntax, obviously).

I have tried installing just the bare server (what we had done in the past), installing the full version of Quickbooks (2016 for the moment), uninstalling, rebooting the server (2008 R2), reinstalling just the database server, using the Quickbooks clean boot utility, disabling ALL firewalls (Kaspersky and WIndows Firewall), I can't get the QBDbMgrN to start and stay started. I can't get the QuickbooksDB26 started. For some reason it claims to be a service that should be started manually. I don't recall that having been the case in the past.  Also,  I don't think the QuickbooksDB26 ever disappeared, even after a clean install (using the Clean Install tool), an uninstall, and/or a reboot.

Previous to the ransomware, the server had Quickbooks 2015 and 2017 database servers installed. …
0
Running Exchange 2010 with MS outlook 2010
 I have a share mailbox call  (sharemailbox1@domain.com) in my inbox has an auto forward all mails to my inbox.

what I need is a rule that will move (filter) the email that is auto forwarded to a specific subdirectory in my personnel inbox in  Outlook 2010

Screen shot attached.
this-message-was-autoforward.PNG
0
Dear Experts

Would like to understand why online ups is recommended for server what happens if offline ups is used, please help me to understand
0
Wanting to know about functionality and benefits/disadvantages of having multiple domains in one Office365 account.
I have a client that has several businesses, hence they have several domains. Currently only one business is using Office365 for email.
I'd like to know if there are benefits/disadvantages to having another or all domains in the same Microsoft Office365 Account.
These business do interact, but are somewhat separate, which complicates things like admin permissions.
Things that come to mind are things like, but not limited to seeing others in the GAL, calendar/contact sharing, user management, etc..
0
What were the top attacks of Q1 2018?
LVL 1
What were the top attacks of Q1 2018?

The Threat Lab team analyzes data from WatchGuard’s Firebox Feed, internal and partner threat intelligence, and a research honeynet, to provide insightful analysis about the top threats on the Internet. Check out our Q1 2018 report for smart, practical security advice today!

Dear Experts

We have mounted 2 nos of Dell Poweredge R730 with dual hot plug, redundant power supply (1+1) 750W and one L3 switch and one router to expect 4 hours power backup how much capacity UPS is required i,e 750W * 4 = 3000W and other network equipment's Router, L3 swtich auraba in total 3500W not sure if this how to calculate please suggest how much capacity of UPS required and for the backup of 4 hours and also how much capacity of power socket 15Amps or 20Amps for the power chords to connect.
please suggest
0
Trying to write an Exchange 2010 Transport Rule that will warn users if someone is attempting to impersonate a real AD/Exchange User.  IE, sender's EMail is liar@gmail.com but sets his text name to be John Smith, who is the president of the company.  So the inbound message is from John Smith <liar@gmail.com> when the correct sender would be John Smith <jsmith@real_domain_name.com>

I've created a Transport rule that checks:

- If inbound message is from a user that is outside the organization
- And sender's properties firstname is John
- And sender's propoerties match text pattern of lastname is Smith
- Then prepend message to EMail's Subject warning recipient

Had to add two conditions because if I put firstname and lastname in the sender's properties line, it made an OR statement instead of an AND statement

Note, can't just block liar@gmail.com, since the actual source address changes.

Not sure if this rule is working, or if GMail and other mailers always use what appear to be Active Directory fields of firstname and lastname.

Is there a better way to do this?

Thanks,

Nathan
0
Hello, I need your advice in which program can i accomplish the following either with C# or Python.
I am a Sys Admin working for a DevOps environment.

We have QA, UAT and PROD environments.
100% of the the time we need to help developers in Copying, Pasting  From / To, Starting a service, Stopping a service and Recycling an app pool in IIS.
But in PROD night, we are done around 8pm, 1hr approx which includes: Copying, Pasting  From / To, Starting a service, Stopping a service and Recycling an app pool in IIS then we have to wait, wait wait and wait if the developers find any issues in PROD and they need the Sys Admin help for Copying, Pasting  From / To, Starting a service, Stopping a service and Recycling an app pool in IIS.

It was my first time that I experienced that and I said: Damn, the whole Copying, Pasting  From / To, Starting a service, Stopping a service and Recycling an app pool in IIS can done programmatically and we do not need to wait till midnight or so if Developers need a SysAdmin, in other words i can try to develop an executable that can do the following:

Which environment are you working: QA, UAT, PROD
Servers are listed: 1, 2, 3, 4
Which windows service are you going to work ? (List of services)
Browse the source, Get the file,.
Need to stop the service (Yes/No)
Browse to the target ? Place
This server has the following App Pools (List of the App Pools)
Do they need to be recycle ?

Thoughts ? Thanks for your help
0
Hello experts. We use time clock plus v6 and our admin left us high and dry. In tcp we have various departments (department 1, 2, 3 and so on). What I can't seem to figure out is how to add a specific department to a specific code. In this case we have a code defined as "paid break". I want to add Department 8 to the "paid break" code. Can anyone assist?
0
Looking for a tool to monitor over a period of time (for a day or two) an application which I suspect uses a high % of the disk, on a windows pc, any recommendation?
0
How can I use RDP (MSTSC.EXE) to log on to server as if you are at the console? I am looking for a way to modify the .RDP so when I execute the remote desktop to a server, the login page is pulled up so i can type my credentials in or use a digipass (vasco) alternative. I also use HP RGS to get into servers and blades, but the version in my environment is buggy and needs to install a client ... but it does accomplish the type of login behavior I am looking for ... when it works. I know that the .rdp file can be modified with a text editor, but I have not had any luck with the settings I have.
0

IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.