IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.

Share tech news, updates, or what's on your mind.

Sign up to Post

What concerns in a work environment are there with letting users add a network switch to their desk that is connected to the rest of the company network? For example to add ports for a persona printer issues from company, instead of dropping another network drop?
Does adding a switch like that typically introduce security concerns?
0
Exploring SharePoint 2016
LVL 12
Exploring SharePoint 2016

Explore SharePoint 2016, the web-based, collaborative platform that integrates with Microsoft Office to provide intranets, secure document management, and collaboration so you can develop your online and offline capabilities.

How do everyone handling old user accounts in Active Directory?    Do you disable it and move to another OU?  Delete? Other options?
0
Since when the Active Directory doesn't accept same display names?  I have the 2nd jenny jones and it doesn't want to take it.  Unless I will do something else (2nd jenny) or whatever.

I remember I was supporting university with 3000 users and it wasn't an issue.   Is it recent in 2016 AD?
0
Hello,
I would like to know with O365 if there is a way to check which policies or rules or reports have been assigned or are dependant on a specific global admin username, in that case  I would like to delete that user.

Thanks
0
Hello,

Looking for help in searching for email via PS based on specific criteria and/or range.

Date range from to to
recipient : address known
subject: wild card use to match "*fishing*" or "*water team*"

Get-messagetrackinglog -ResultSize Unlimited -Start "12-16-2018 7:00:00AM" -End "12-18-2018 10:30AM"  -recipients:jdoe@domain.com | where{$_MessageSubject -like "*fishing*"| select-object Timestamp,sourcecontext,source,eventID,MessageSubject,Sender,{$_.Recipients} | format-table  

Above doesn't work for just one subject wildcard, while I haven't even gotten to include the 'or' other criteria yet.

Some assistance on syntax would be truly be appreciated.  Note on premise 2010 Exchange. Thank you.
0
Experts, I need your help.

Our support team relies on remote assistance (msra.exe) for end user support. There is a bug in windows 10 v1803 and 1809 that affects this component and I am trying to make Microsoft aware of it. I have used the feedback app already half a year ago, but Microsoft has not done anything about it.

I created a Technet thread and I ask you to upvote that thread to let Microsoft know that several people care.
I case you think "why should I care?": msra.exe is a free and built-in way for easy end-user assistance, it is a must-know for admins in my opinion.
My thread holds steps to reproduce the problem and anyone should be able to confirm it within less than 5 minutes.

Points for anyone who reproduces this and upvotes that thread: https://social.technet.microsoft.com/Forums/ie/en-US/c1f4acda-e579-49bb-92af-22d73f9204ca/remote-assistance-msraexe-will-need-45-seconds-to-connect-from-win10-1809-or-1803?forum=win10itprogeneral
0
Dear Experts

We have to send sms to international customers, the content will have the rating on product OR the service for example 1 for excellent and 10 for poor.
2. The feedback from the customer to be replied to be for the same SMS number which being used to deliver it to them (please note: we will not provide the separate number for the reply instead the feedback to be for the same SMS no which it delivered).
3. Feedback/reply sms from the customer should not be charged to them.
4.  We would like to have detailed reports and the journey of each customer with respect to the feedback /trend analysis for example month 1 poor is his/her feedback and later after few months based on services 5 later the feedback is excellent, we would like to measure this.
We are located in india, please let us know if above is possible and refer few good sms such service providers please, thanks in advance.
0
I have a GPO that I have created that is meant to install an application using an .msi file. In the GPO I have configured the Software Installation that is using the DC as the source. It has been moved up the link list, and is enforced and Link Enabled. As of this time, it is only assigned to my user for testing purposes. But when I log in to a computer, it does not install the specified software.

Any help is greatly appreciated.
0
Hello, we are create internal documentation, and recording the screen of how to setup say a firewall would be helpful. Is there a free software that does taht we can use to store for configurations?
0
There service provider (unfortunately) is GoDaddy (Cpanel). He says that a lot of his emails don't get to the recipient. He gets no bounce messages. He says the recipients have checked their junk mail folder. How do you trace a problem like this?
1
Angular Fundamentals
LVL 12
Angular Fundamentals

Learn the fundamentals of Angular 2, a JavaScript framework for developing dynamic single page applications.

Is there an ISO standard (eg: ISO27001) or  Terms of Reference
that recommends the best practice for IT Security & CISO
reporting structure.

https://www.securityroundtable.org/whats-the-best-reporting-structure-for-the-ciso/
Above link gives various suggestions but will need something authoritative like
ISO standard or Terms of Reference to support
0
It seems like legal departments have been getting more and more picky about EULA agreements.
Vendors are reluctant to change their boiler plate. The IT people are getting ulcers waiting for
the EULA to be agreed to and signed off. Two questions:

Is there a reason legal departments seem to be becoming more persnickety about EULA terms
for enterprise software?

Has anyone on EE found a way to more efficiently work with their legal department and vendors?
0
Need better solution for backing up data to a network drive.  Powershell or batch script is ok, just the logging is less than desired.  Needs to be able to run on Windows server OS and handle large amounts of data (2 TB - 8 TB).  

FreeFileSync and SyncToy were great applications that worked well for this simple purpose.  Make a folder pair and configure the kind of sync between the folders.  I am fine doing in a script, just do enjoy the ease of use there.
0
NTFS File Permissions
An article explaining how to give user/group ability to create, edit, rename & delete files, but not create folders.
2
error "you are not authorized to do message tracking"
I added myself to local domain admins group in directory, but still got the same error.

is that something do check in mtstore.nsf ??
0
I am trying to create a GPO to deploy the remote desktop connection shortcut(mstsc.exe) on all users desktops on the domain.

This is what I have:
I went into system32 and made a copy of the mstsc.exe file.
I then pasted the mstsc.exe into a share that I have on my C drive on the domain controller.
The permissions all the way through the share are everyone and domain users.
I'm starting the GPO at the root of my domain it is configured as a user policy
I am running gpudate on the DC & the client workstation.

I have included screenshots of the configuration.

I have never done this before, can someone assist me with this configuration. I will provide any additional information you may need.
Thank you.




0
Linux. I need to set up a script that I can run via cron in the middle of every night to copy / back up specific folders into another directory. I want all folders, files and permissions and attributes copied. The goal is to have a 24 hour old copy that I can restore in case a user screws up their files. Example:

/usr/home/thisuser/web_master would be copied / backed up to /usr/home/mainuser
/usr/home/thisotheruser/web_master would be copied / backed up to /usr/home/mainuser
/usr/home/andanotheruser/web_master would be copied / backed up to /usr/home/mainuser

Each night, the copy / back up would overwrite the one from 24 hours ago.

How do I set this script up, and what type of file extension should the script be?
0
I'd like to come up with some clever tagline or rhyme for having our users reboot on Thursday.  After we push security updates to endpoints, I want the users to reboot, so I'd like a clever tagline.  For example, if I wanted my users to drink more water, I could say something like, "It's Thirsty Thursday, please make sure you drink plenty of water today!"  Or if I wanted my users to attend a meeting on Tuesday, "It's Technology Tuesday, please come to our technology meeting today!"

Can someone come up with a clever idea because "Reboot Thursday" or "Restart Thursday" just doesn't have a good ring to it!
0
Buying a new Mac Mini to replace an old Pro tower. Would like to keep the os (Mac and boot camp) on the internal SSD and have the user directories on a Thunderbolt drive. I know the importance of keeping a admin account on the SSD to troubleshoot, but would like to preconfigure the user accounts to exist this way before reestoring files from the Pro. When I have tried this in the past, drive numbers seem to change causing all sorts of hell.

If this is not doable, would prefer to put some of the users bigger subdirectories (photos and videos) on the thunderbolt or a NAS device.

Any how to or best practices would be greatly appreciated.
0
OWASP: Threats Fundamentals
LVL 12
OWASP: Threats Fundamentals

Learn the top ten threats that are present in modern web-application development and how to protect your business from them.

We are restructuring the ownership of documents with new staff/teams being formed.

We currently have IT Applications teams (who run IT Quality Management & still running it), IT Security Governance
(new team), IT Infra Ops.

In general practice (or commonly adopted out there), which team or person owns the 4 documents below:
1. IT Application Delivery Framework :  applications PM, IT Security governance, IT Quality Managemt, or ?
2. Vendor & Contract Management Framework : applications team, IT Security governance, IT Procurement or ?
     (a mix of IT applications, infra, security vendors but most of the vendors are applications vendors)
3. Project Management Methodology : applications PM, IT Quality Management, IT Security governance or ?
4. DR Plan : We don't have a DR team;  so hv to choose betw IT Ops, applications team, IT Security governance or ?

Any authoritative references (eg: NIST, big four consulting firms papers) will be helpful.
0
HOW to migrate AD Objects through, Microsoft Active Directory Migration Tool (ADMT)
0
enable message disclaimers in Domino server side and change the desclaimer message.

I don't want to use client policy for message desclaimer..
0
what exactly is the difference between lotus notes/domino database move vs user move to another server
when should be it be used.
my agenda is to move a user from from 1 serverA to serverB so I can accumulate space on serverA.

and when deleting got a message
after a user move when trying to approve for mail file deletion,
 Both the signer and the author of this request must have Delete Document privileges in the Domino Directory.
I am a member of "local domain admins" in domino directory and this "local domain admins" group has delete document privileges on names.nsf
0
I cannot run updates on server 2012 R2 - It says windows updates cannot check for updates, because some settings on this PC are controlled by your system administrator.
0
Quick question.  What level is the ISO 27001 Lead Auditor certification considered.  Beginner,  Intermediate or Advanced?
0

IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.