IT Administration

6K

Solutions

58

Articles & Videos

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.

Share tech news, updates, or what's on your mind.

Sign up to Post

We take a look at some of the most common obstacles that IT teams run into as they work relentlessly to keep all the alarms and sirens from going off at once.
0
Salesforce Made Easy to Use
Salesforce Made Easy to Use

On-screen guidance at the moment of need enables you & your employees to focus on the core, you can now boost your adoption rates swiftly and simply with one easy tool.

Have a HP Elite 8300 2 Hard drives one is the OS and one the data. when turning on the computer it does find a disk to boot. but by entering to the boot menu [F9] / select OS drive, it boots

Window 10

Please help
0
I see in the logs the following error for lot of different workstations joined the domain

The session setup from the computer xxxxxxx$ failed to authenticate. The name(s) of the account(s) referenced in the security database is xxxxxx$.  The following error occurred:
Access is denied.

NETLOGON event ID 5722

Server 2008

Please help
0
GettyImages-531851572.jpgIf you're heading to Vegas next week for Cisco Live, we'd love to hear all about your experience as an attendee. Interested in writing an article recapping your week at the conference? Contact us at ewooddell@experts-exchange.com.
2
I am using Spiceworks for my helpdesk.  I would like to customize ticket notifications after I close a ticket.  I can't find the steps to do that.

I am running Spiceworks locally.

Thank you.
0
Let’s face it: one of the reasons your organization chose a SaaS solution (whether Microsoft Dynamics 365, Netsuite or SAP) is that it is subscription-based. The upkeep is done. Or so you think.
0
Drew Frey writes articles on cyber security and ransomware protection.  Follow him if you're interested in seeing new articles in those topics.

https://www.experts-exchange.com/members/Drew-Frey.html
5
 

Expert Comment

by:Michael Bodine
SP INFOTECH was also part of a scam...they had people calling up with foreign voices and the company name would change..as they answered the phone.. certaintly unpredictable crap.
1
 
LVL 16

Author Comment

by:Kyle Santos
Source?
0
Popular third-party chat platforms like Slack, Discord, and Telegram are just a few of the many new productivity applications that are being hijacked by cybercriminals to create command-and-control (C&C) communications infrastructures for their malware campaigns.
0
SBS 2011 in production with multiple Event ID 7011 and the server seems to be sluggish, When I attempt to restart it stuck in:
Please wait for the System Event Notification Service until I hard booted it this weekend. the event IDs 7011 started to crawl back up this morning and the server is slower than normal responding.  
A timeout (90000 milliseconds) was reached while waiting for a transaction response from the nsi service, netprofm service, fdPHost service, and multiple others.
Also:The following fatal alert was received: 48. Event 36887 Schannel.

 in the application event viewer
Volume Shadow Service (VSS) enent ID 11 and 8193



I'm not sure if Schannel and VSS Error are effecting the symptoms I am experiencing.

Thanks,
joe

Updated info: the server is Dell 2950 configured with 32 GB memory and it is all consumed by the end of the day.
0
People,

I've got the existing Exchange Server 2013 Standard SP1 that is running as MBX&CAS role in one AD site called Default-First-Site-Name.
I want to decommission it so that I can run the both MBX & CAS on new Win2012 R2 VM so I can configure DAG on the other AD site called Head-Office1.

Existing:
AD Site Default-First-Site-Name
PRODMAIL14-VM [Mailbox & Client Access Server] - Windows Server 2008 R2 existing legacy.
PRODMAIL15-VM [Mailbox server only] - Windows Server 2012 R2 newly built for DAG.

AD Site Head-Office1
PRODMAIL20-VM [Mailbox & Client Access Server] - Windows Server 2012 R2 existing newly built for DAG.

Proposed:
AD Site Default-First-Site-Name
PRODMAIL14-VM [Decommissioned]
PRODMAIL15-VM [Mailbox & Client Access Server] - Windows Server 2012 R2 setup for DAG with Head Office.

AD Site Head-Office1
PRODMAIL20-VM [Mailbox & Client Access Server] - Windows Server 2012 R2 existing newly built for DAG with PRODMAIL15-VM.

How to do that safely without causing email flow issue during the production business hours ?
What're the steps in installing CAS so that it does not cause any email flow during the business hours on PRODMAIL15-VM ?
If I install the windows update now during the business hours on PRODMAIL15-VM is there any impact or problem when I reboot it ?

Thanks, in advance.
0
Transaction Monitoring Vs. Real User Monitoring
LVL 1
Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Every once in awhile one of our computers seems to lose connectivity displaying  the following msg The trust relationship between this workstation and the primary domain failed.

What I to for a temperate fix I disconnect the network cable and log in (as it can't check in with the server for authentication) I remove it from the domain. login with local user and rejoin it to the domain.

How can I prevent this from happening?

Server 2008
0
Multi-threading long-running processes can have a significant increase in overall performance and drastically decrease over time it takes for a process to complete. Unfortunately, not all applications support native multi-threading, some by design and some by the implementation.
0
If you are IT support and need to work after hours to resolve customer issues then here are a few tips on how to handle after hours support
0
Postmortem reporting allow us to examine mistakes in a way that focuses on the situational aspects of a failure’s mechanism and the decision-making process of individuals proximate to the failure. Read our guide on how to handle IT post-mortem reporting.
0
I need  help getting specific computer attributes and move them  to separate OUs . example 10 machines has cn null value and I want to move them to separate OUs  
basic ly get-computer property filter cn
0
How can I Reset forgotten local administrator user password in window 2008
0
I am missing the understanding what google apps sync tool helps using outlook with gmail. since outlook without this tool syncs with gmail.
Please advice
0
Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to thoroughly revise their security concepts.
9
 
LVL 55

Author Comment

by:McKnife
Comment Utility
Andrew, thanks for the feedback. I am aware that this article is mainly raising question while not answering many.
Maybe it's rather a starting point for discussions than sharing solutions.

You ask "So what's the solution? Shutting it all down..." which is the same that I ask in the article and I answer with "no" immediately afterwards.
You write "it's not quite fair to point blame on IT administrator's shoulders ...These guys more often than not work with tied hands" - that's exactly what I am saying. If the admin is not comfortable making his concerns heard, then he is not employed at the right place and should not fear to be replaced but leave on his own.

Before you start discussing - let's wait for other comments.
0
 
LVL 55

Author Comment

by:McKnife
Comment Utility
Some news that might be of interest for Americans: https://www.upguard.com/breaches/the-rnc-files
In short: US politicians payed for analysing voter opinions on US election-critical topics. Voter data (1,1 TB!) of 198 million Americans was uploaded to an amazon server but the access rights were incorrectly set - it was open to the public and the data was not encrypted. It leaked.
See what I am talking about?
0
I have a hyper-v machine the folder is large and I want to make it smaller.
The is have a partition of 126GB which is more then half empty. and it have a partition that is uneducated. I thought if I to remove this uneducated partition the folder size will get smaller.
Please advice
0
Guide to Performance: Optimization & Monitoring
Guide to Performance: Optimization & Monitoring

Nowadays, monitoring is a mixture of tools, systems, and codes—making it a very complex process. And with this complexity, comes variables for failure. Get DZone’s new Guide to Performance to learn how to proactively find these variables and solve them before a disruption occurs.

I hope this isn't an incorrect use of this forum but I am looking for guidance for something to use as a program, template or idea to keep track of client network specifications, user data and passwords, firewall settings, etc.
Is there a template or program other MSPs are using or is there any type of industry standard?
0
0
When a email account in configured in outlook as POP if two devices want to pick up the mail (from gmail server) only one will get it since on the gmail server its flagged as downloaded once the other device will not download it again.

Is there a way to set that more then one device should get all email from the same account without changing to IMAP?

The reason not to use IMAP since one user drags in to her folders in the account in question email from other accounts and with IMAP everything gets pushed back up the the gmail server and full up the limit of space in this email account.

Will the following be a solution, enable IMAP on the gmail server, and on the outlook side on the device files get dragged in the the account in question set up as POP so it will not push up to the gmail server and changes made in outlook, and the other devices set as IMAP?
Or if on the server IMAP is enabled it does matter how its set in outlook.
an other concern once the device that is set as IMAP will download the email it will get flagged as download the device set as POP will not get the emails?
0
5
I am using gmail and outlook 2010 as a client.

I IMAP was enabled and I disabled it.

Outlook gave me a msg that IMAP is disabled on the server I should enable it.

I removed this email from the list and re created the account as POP and pointed it to the existing outlook file. outlook now could pick up mail, but still get the msg IMAP is disabled on the server I should enable it..

But in outlook when I point on the inbox of this address I get a msg Cannot display the folder. Microsoft Outlook cannot access the specified folder location. The information store could not be opened. also when I click on properties I get a msg cannot display folder properties the folder may have been deleted or the server where the folder is stored may have been deleted.
0
Have a PC that did not start and beeped 6 times (HP) so I removed the graphic card. I tried a different card but gave the same result (6 beeps).

I ran HP system diagnostic everything passed.

I get an error when trying to run windows update (code 80072F8F)

In device manager everything seem to up to date (no yellow flag)

I want to update this PC which is currently running window 8 to windows 10.

Can I do the install as is, or first get to the bottom of the issue?
0

IT Administration

6K

Solutions

58

Articles & Videos

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.