IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.

Share tech news, updates, or what's on your mind.

Sign up to Post

TOSHIBA e-STUDIO5005AC print codes.  Anyone know where to configure print codes in the web admin interface?  We like to track employee print jobs through code association.
0
Angular Fundamentals
LVL 13
Angular Fundamentals

Learn the fundamentals of Angular 2, a JavaScript framework for developing dynamic single page applications.

We have an old laptop that has Windows 7 and some very specific software that our finance dept uses. We no longer have access to this software that was created by company that is no longer in business. Users typically remote into this machine to run this software that requires SOAP UI Utilities and Office 2003 to work. We would like to Clone this PC unto another similar PC so more than person can access this software and perform the same function. All that being said, can we close the hard drive of that laptop unto another laptop (Does it have to be the same make and model?) so we can have an exact duplicate of that system? I was thinking about using Clonezilla.
0
Say, My Android phone is backing up call log history to google drive. I can view the file under backups in Google Drive. How do I download this file and inspect it? I want to view the raw data.

Does Google keep older backups or each time over right them and if so is there a setting or way to keep a history of backup files?
0
Say, I have an android Black Berry Key one with Google Backups enabled. I'm after restoring a backup of my call logs from 5 months ago.
How do I go about this? tx Shaun
0
Hi,

I am restructuring my IT folder in my network and also tiding up access right. I thought you could advise me regarding "On how should I restructure my folders".

Can you please advice?


Best regards,
Mallony
0
Hello all,
I had double auth. using Microsoft authticator on my iPhone.
upon replacing my iPhone, I love my authenticator app, as I noticed I was supposed to enable icloud backup within the app settings itself.

anyways, I tried logging into Microsoft account, to notice I forgot my password, and I lost my authenticator app.
I can try guessing my password, but it would take the too many attempts.
I tried using the authentication with my alternate email address, but it wasn't enough, I had to use the app still as dual authentication.
I am unable to reach out to Microsoft for support.
although I still have access to my emails from outlook and ios mail.
any ideas?
0
I am working as an IT Specialist for a company. I do everything from IT Helpdesk, IT Network Engineer, IT Administrator, IT Technician, Website support, and IT Security. As far as I can recollect now I do anything else for the company related to IT and to Solve any issues.

I will renew my contract soon and I would like to change my Title from IT System Engineer and IT security. Now, I am not sure how I should ask for title. Maybe IT System Engineer/IT Security. (?)

Can you please advise?

Thanks,
Mallony
0
¿What is your opinion about this debate?¿What do you prefer like system administrator?

Best Regards,
David.
1
Dear Experts
We have software development resources 3 users we have asked them to do development on the development server once the changes are accepted then they can commit to the production server. we are using BitBucket repository for version control, have following doubts
Production server administrator privileges of the application is disabled but development server  administrator credentials are enabled so that they develop, in this case is it recommend project manager will be as admin for the Bitbucket and once the developer develops and testing is done and user is accepted from the development server then project manager will execute the commit changes so that production server is updated, please suggest the best practice
0
I am curious what technology trends are on Technology Officer's minds and what you think every company should be aware of right now.   What practices to you incorporate within your company to make sure your whole team is aware of these trends and making the right decisions?
1
Bootstrap 4: Exploring New Features
LVL 13
Bootstrap 4: Exploring New Features

Learn how to use and navigate the new features included in Bootstrap 4, the most popular HTML, CSS, and JavaScript framework for developing responsive, mobile-first websites.

Dear Experts
We have recently implemented veeam backup and replication solution, would like to set the best practice backup and retention policy for VM’s and files. Please suggest me to daily backups best way to rotate  and similarly weekly and monthly how many days retention to be set and rotate. please help me with best practice way to configure like first full backup and then daily incremental and weekly and monthy how to set please suggest the best backup policy and set the retention
0
Dear Experts

Can you please help with list of common security incidents , require this to prepare document for ISO 27001.thanks in advance.
0
Hello all.

I am going to be tasked with deploying about 70 new machines to one of our client.   I am trying to figure out the best and most efficient way to do this.   They will all be HP machines running Windows 10 Pro.   I plan to provision 1 unit with every piece of application software they run.   This includes their EMR software, Trend Worry Free Business AV, Office 2016, our Remote monitoring software as well.   My question is because or product keys will it be a problem?  We are using the HP Desktop Minis for now and will probably use them going forward unless they become unavailable for purchase.  I am guessing the product key is built within the registry of the bios to activate the software.  

My question is what would be a best practice to roll out all these units.   I was thinking putting it on the domain, installing all the apps, updates, etc.   When completed?  Should I run sysprep?  I have no idea if that's even a thing anymore.   Reason being is computer name.   I will need all the new units to have new names once they are on the network and want to ensure the product keys for windows 10 are all specified to that machine.   Trend Worry Free comes from the web portal so there is no license key, same for RMM and their cloud EMR software.   Office is volume license so I don't need different keys for that.  

Also what would be a recommendation for a free tool to image the machine upon deployment so I can just plugin 5 machines at a time and boot of USB to…
0
I created custom a MMC Taskpad for ADUC, and before saving, selected the options below
console-setting.png
but when I log as a user, I can right click on the saved mmc and select 'author', which gives me the ability to change things. I can't figure out why I can't lock the mmc.
1
Does anyone know of a company that provides a hotspot device that will work international? Any type of internet connection. Asia preferred.
0
I have been directed to deploy a group of chrome books (30 or more) by a certain date.  My knowledge is limited =)  My thought is to get a Google admin console (gsuite) to manage the chromebook devices only, not users.  Another unit in the company already manages google user accounts.  

If I do get a Google admin console, and just enroll chromebooks with it (not create user accounts), can I also:

1. push security and functionality updates to the devices?
2. manage a central repository of approved "google play" apps, or push apps onto the chromebooks from a console?
3. prevent any user that is logged in from changing settings, adding unapproved apps, or removing apps that I have installed?  

Thank you!!
0
Management wants to know what employees are doing if working remotely. I would like to track and store their activity while they are connected to our work server via remote access.

I need to track all user activity such as select, insert, update and delete and put it into a table in order to create a report.

The Database we use is Microsoft SQL Server 2012.
0
Hi Experts,
How can I get to see the latest file I downloaded?
When I sort by date modified, it displays all folders first and after that many files, not necessary in order...
Thanks
0
I got a request to see the analytics of the trouble tickets over the last year.  What would be the best reports to show this? Meeting at 1:00 central time!
Any help would be most appreciated!
0
OWASP: Forgery and Phishing
LVL 13
OWASP: Forgery and Phishing

Learn the techniques to avoid forgery and phishing attacks and the types of attacks an application or network may face.

As a result of an audit, it's been suggested that we disable Dropbox and Google Drive to prevent distribution of sensitive information as an "inside job".
Yet, there are obviously more alternatives/"threats"
https://startupstash.com/dropbox-alternatives/
I can't imagine blocking these services one-by-one.
And, in the case of Google Drive, I haven't figured out yet just *how* to block it - perhaps by removing some Google app's from workstations?
I guess one could block outgoing ftp transfers....

I can well imagine that this is an unrealistic objective - given the number of "threats".
But, rather than jumping to that conclusion, I'd value other perspectives.
1
Asset Tagging - picking your brain..

I want to implement simple asset tagging solution for our tech equipment (laptops and computers mostly). I found this company online where I can crate the labels, since we don't have any software or scanners it'll pretty much be just a company and some and number.

I'll then just update the inventory spreadsheet with the access tagging number for each equipment.

This will be the first i'm doing it, i'm using common sense in what I want to but i'd figure i'll ask the community to see if there's a more effective way of doing this. Honestly i don't think management will approve any software purchase in case you wonder..

thanks.
0
We are starting to roll out Maas360 through Verizon at our company.  I have everything setup correctly i think as per this youtube video:  https://www.youtube.com/watch?v=VQlm7gksshE&feature=youtu.be

The Apple DEP is working and my devices show up in the Maas360 Portal after registering them in the Apple Business Portal.  I have one security policy setup that should lock the phone down for public use.  I want to remove all app's but for a select few Apple ones and then add 3-4 apps from the App Store like Verizon Push to Talk and Google Maps.

I have a policy setup that locks the phone down and i see in settings that MaaS360 is installed and the restrictions are in place.  When i start the phone and activate it the Remote Management screen comes up and configures the device, allows me to set the passcode and AppleID and then releases to the home screen when it downloads the MaaS360 app.

One thing i have noticed off the bat is i don't have to put the passcode in during setup (It should be enforced) and if i do not the phone shows in the portal as not having a passcode but the MaaS360 is not enforcing it or requesting one to be setup.

The other more pressing issue is its not downloading the additional apps that i have specified in the policy and added to the app catalog.  It also does not download the app MaaS360 catalog app to allow me to manually install them and since the Apple App Store is restricted i have no way of adding the apps.  Has anyone seen this …
0
I am tried to make sure that the Financial company I work for (Asset Management and Risk Management) have all the current IT Security parameters to have the top IT Security measures in place.  Instead, of going around and ask another Asset Management companies I would like to find a place (website) where it would guide me to the best IT Security standards for my company. In particular, I would appreciate if this advice would apply to all current Asset Management companies in Switzerland, Zug city.

In a nutshell, I want to know what are the other Asset Mangement companies are doing in the area of IT Security for themselves.
0
Product: Microsoft InTune Company Portal
Scenario: User is unable to authenticate when with InTune when they enter their e-mail address and active directory password.
Note: Multi-factor authentication is being used when enrolled in Microsoft InTune.
Additional information: The user was enabled with Multi-factor authentication with their e-mail address and then their username.

Things to try next: Disable Wi-Fi and authenticate with InTune with a cellular network via a hotspot from another phone.
OS: Arnold device

Confirmation: I confirmed that the user can login to the web based version of Microsoft InTune.
Things to be tried next, authenticate with InTune on another device, let say another Android or an iOS device.
I was also thinking of looking up Microsoft InTune FAQ
Any more ideas?
0
I had used below command to perform windows activation:
cscript slmgr.vbs /skms "IP"
cscript slmgr.vbs /ato

And i got an prompt Windows activated

i still having prompt saying "you windows license is valid for 180 days"
But down there, it showed "Windows Activated"
wa1.PNG
wa2.PNG
0

IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.