IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hello, I need your advice in which program can i accomplish the following either with C# or Python.
I am a Sys Admin working for a DevOps environment.

We have QA, UAT and PROD environments.
100% of the the time we need to help developers in Copying, Pasting  From / To, Starting a service, Stopping a service and Recycling an app pool in IIS.
But in PROD night, we are done around 8pm, 1hr approx which includes: Copying, Pasting  From / To, Starting a service, Stopping a service and Recycling an app pool in IIS then we have to wait, wait wait and wait if the developers find any issues in PROD and they need the Sys Admin help for Copying, Pasting  From / To, Starting a service, Stopping a service and Recycling an app pool in IIS.

It was my first time that I experienced that and I said: Damn, the whole Copying, Pasting  From / To, Starting a service, Stopping a service and Recycling an app pool in IIS can done programmatically and we do not need to wait till midnight or so if Developers need a SysAdmin, in other words i can try to develop an executable that can do the following:

Which environment are you working: QA, UAT, PROD
Servers are listed: 1, 2, 3, 4
Which windows service are you going to work ? (List of services)
Browse the source, Get the file,.
Need to stop the service (Yes/No)
Browse to the target ? Place
This server has the following App Pools (List of the App Pools)
Do they need to be recycle ?

Thoughts ? Thanks for your help
0
How do you know if your security is working?
LVL 1
How do you know if your security is working?

Protecting your business doesn’t have to mean sifting through endless alerts and notifications. With WatchGuard Total Security Suite, you can feel confident that your business is secure, meaning you can get back to the things that have been sitting on your to-do list.

Looking for a tool to monitor over a period of time (for a day or two) an application which I suspect uses a high % of the disk, on a windows pc, any recommendation?
0
Hi All,

I hope you can all help. Those with a foundation of security would be especially welcome; however opinions always offer some weight, even if from a non IT background.

I have a question regarding IT Security and Non Repudiation.

I have been in a work environment recently where I have performed the following on a whole.

1. When first starting everyone in the company was using one general admin account with "all power" permissions to administer the network.
I implemented a policy to make sure individual admin accounts where created for each IT Person; for accounting purposes.
All 3 personalized admin accounts setup have equal and full administrator permissions on the domain network.

2. When starting all passwords, including admin accounts etc.. where stored in an excel spreadsheet.
I moved this to an encrypted lastpass database; that was moved to a central platform later on for on the road IT staff.
Everyone was given access to the centrally system; however due to myself being occupied with a specific client; left management to another internal IT staff member.

3. The client which I did the above for has kept passwords of all its staff in an excel sheet; which I have advised against; however my reasoning has been ignored for control and I guess what might be a lack of trust of our IT company.


I have recently complained to my Directors(no managers, small company) about illegal activities that were taking place; such as providing unathorised …
0
We use five 9 for our main call center and we want to expand to another state but we just want to hire someone or company that take the inbound call and out bound call using five 9

Do u know any call call can do this?
0
I'm looking to implement  Password Manager Pro from https://www.manageengine.com in my company.

I want to know if you have any experience, advice or maybe any other option that you can recommend.

Nestor Rodriguez

IT Analyst.
0
Hi,

We are experiencing the following error when attempting to sysprep and capture a machine whilst using the windows deployment tool. I can see in the logs that this seems to be an error with Miracast, I have attempted to copy the Miracast file from the Apprepository in windows.old to the new location, removing the package and adding it but this has not helped, and when i rerun the sysprep/capture i get exactly the same error.

Would anybody have a suggestion on the next step I should take? I've also attached the log file showing the error.
Capture.PNG
setupact.log
0
When I open Dell OpenManage Server Administrator, it is correctly showing the inventory of the server, except for the physical and virtual disks on the machine. Instead, it is showing me the physical and virtual disks and RAID-5 array on a DIFFERENT machine. I have tried opening OMSA with localhost, the IP of this machine and its name, I have checked that NSlookup is only reporting the IP of this machine. Is there some way to force it to check the inventory again? I have uninstalled and reinstalled twice now.
0
I have a 2 VMS on Esxi using Veeam to backup on local NAS.
I would like to have replication onto 3 USB Drives for offsite purposes.
how would i accomplish the Backup Copy job using the rotated media, please advise.
0
How & where do i find a good cofounder? How to understand them and what legalities should be signed/?
0
We currently have MaaS360 and want to come away from that due to the limited functionality and lack of helpful features. We would require something that provides more control over the device. So that we can allow and restrict apps as necessary.

EDIT: We also push 3 apps currently and would require that feature as well. Something does a fairly good job at auditing the devices within the company.
0
Protect Your Employees from Wi-Fi Threats
LVL 1
Protect Your Employees from Wi-Fi Threats

As Wi-Fi growth and popularity continues to climb, not everyone understands the risks that come with connecting to public Wi-Fi or even offering Wi-Fi to employees, visitors and guests. Download the resource kit to make sure your safe wherever business takes you!

hello,
i.ve scom 2016 and need to specify some service that i need to show using the visio to make dashboard. so if i need to check health of the DNS service in my 3 domains how can i do that and shall i choose. also if  i need to check the status of my DHCP subnets can i do that?
i'm using visio 2013 and the scom addin installed but it's for system centre 2012 does it make any effect?
also if i need to just click on the service from the visio should it gives me the status of this object only?
thanks
0
Right now, we use asset management for tracking of client assets like you normally would- When it was purchased, lease, buy, basic information in our CRM, due to replace, etc.  While that has been working for us fine, the problem is some of our larger clients are wanting some help in the IT asset check out/in process for THEIR employees.  I can't give access to our existing system because they would be able to see other client information.  (I can lock it down so they don't have actual access, but it still exposes our client list).  

What I want is something that I can manage the assets for clients, give their HR department an account so they can do their own check in/out of phones, laptops, whatever, and cloud/internet based.   Anyone know of anything like that?  It woudl be nice to stay as part of CRM/ticketing, but not critical if separate.
0
I have been tasked to give a proposal for the subject matter.

Essentially, it is a project to set policy and procedure to document any change to IT infrastructure managed and to align business processes and objectives with changes for IT infrastructure.

Thanks for your help in advance.
0
Hi all,

We're wanting to build a comprehensive inventory and software catalogue.

We currently use Snipe-It to log purchases and check out software to assets, but we want to start recording free software and a bit more detail with it. So a version history, support expiry date, details of the license. The aim is to be able to help us better manage our software in terms of making sure it is kept up to date and patched across our entire network. It would be good if we can search for a PC and see all the software on it, or search a software name and see all the machines it's on.

Basically it's more than an Excel job. So does anyone have any experience with inventory software or database applications that might be suitable for this? We're looking at methods for auditing as well so welcome any suggestions!

Cheers,

Andy
0
Hi experts

i have been asked to provide a few examples of case use diagrams or statements for a number of IT support scenarios including;

Internal IT Services Delivered
Incidents and Change
Platforms managed
CMDB

im pretty new to this type of thing and have very little ITIL experience.

Are there any examples of the above i could use as a template or an online generation program to help with this?

Regards

Neil
0
Hi all,

I am looking into alternatives to LogMeIn central. This looks like a great package however the cost per endpoint makes it quite restrictive when trying to stay competitive.
The LogMeIn central package offers the pro active approach of patching servers and endpoints from the central interface ie we can see all of the endpoints and what updates are needed to be installed then schedule these updates for installation.
it also provides the ability to see which user a pc is on within an organisation. ideal for supporting hot desk users & the ability to monitor event logs and provide us with alerts should any services stop.

We have looked into Bomgar, Teamviewer, splashtop. Most of these offer the remote access functionality and some look to offer better remote reactive support inc mobile devices which would be great however it is the patching and monitoring service I also require.

any experience or recommendations?

Thanks in advance
1
dear sir,

i am working as IT manager in one manufacturing company and management told me that please create score card of your whole yearly activities.
so i would like to request for team what type of activities can add to our score card which is very helpful to improve our IT function.
0
Hi All,
I have a setup for deploying Images via WDS and it is working well - However - I need to have a separate task that images new Laptops but does NOT join the domain. I have done the task but cannot get it to not join the domain - please can you advise.
Many Thanks
B
0
Hi

Can anyone help me in step by step documents for creation of SFB 2015 DR setup. I have to FE Server in Production & 2 Edge Server in Production. I need to create a DR setup for the entire infrastructure.

Thanks

Avijit
0
WEBINAR: 10 Easy Ways to Lose a Password
LVL 1
WEBINAR: 10 Easy Ways to Lose a Password

Join us on June 27th at 8 am PDT to learn about the methods that hackers use to lift real, working credentials from even the most security-savvy employees. We'll cover the importance of multi-factor authentication and how these solutions can better protect your business!

I am using Spiceworks for my helpdesk.  I would like to customize ticket notifications after I close a ticket.  I can't find the steps to do that.

I am running Spiceworks locally.

Thank you.
0
Vlans Created on Cisco Sg300 Switch not working

I have created Multiple vlans on a Cisco SG 300 switch and wanted to terminate it on olt Interfaces

my topology is - Main Mikrotik Router --> Cisco Switch --> GEPON OLT Syrotech

1) main router Mikrotik... Eth-5(router) connected to Gi-1 (switch)

2) on switch i have created 8 vlans - which are 21 to 28

3) the switch port connected to router i have made it a Trunk  

4) Switch Port is connected to OLT's Uplink port and on both ports are trunk and Tagged with 21 to 28 vlans.

5) OLT's 8 fiber ports are access ports and a single Vlan is untagged on them.

means
OLT port 1 - Acess port vlan 21
OLT port 2 - Acess port vlan 22
OLT port 3 - Acess port vlan 23
OLT port 4 - Acess port vlan 24
OLT port 5 - Acess port vlan 25
OLT port 6 - Acess port vlan 26
OLT port 7 - Acess port vlan 27
OLT port 8 - Acess port vlan 28    

but i cannot acsess or ping my router from olt access ports.
am i doing anything wrong ??
0
ADFS portal was working without any problems ,and today suddenly didn´t answer when i try to ping or connect externally.Internal works if i ping the adfs.domain. DNS external setting is correct.  .If i use internally https://adfs.mycompany.com/adfs/ls/idpinitiatedsignon.htm i can log.If i change with ip doesn´t work! .all ports are ok configured,firewall ok configured,no proxy.Please help !
0
After several months of not using two of my WUS servers. Now when I open them I get Error: Connection Error


This is the error:


The WSUS administration console was unable to connect to the WSUS Server via the remote API.

Verify that the Update Services service, IIS and SQL are running on the server. If the problem persists, try restarting IIS, SQL, and the Update Services Service.

The WSUS administration console has encountered an unexpected error. This may be a transient error; try restarting the administration console. If this error persists,

Try removing the persisted preferences for the console by deleting the wsus file under %appdata%\Microsoft\MMC\.


System.IO.IOException -- The handshake failed due to an unexpected packet format.

Source
System

Stack Trace:
   at System.Net.Security.SslState.StartReadFrame(Byte[] buffer, Int32 readBytes, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.StartReceiveBlob(Byte[] buffer, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.StartSendBlob(Byte[] incoming, Int32 count, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.ForceAuthentication(Boolean receiveFirst, Byte[] buffer, AsyncProtocolRequest asyncRequest)
   at System.Net.Security.SslState.ProcessAuthentication(LazyAsyncResult lazyResult)
   at System.Threading.ExecutionContext.RunInternal(ExecutionContext executionContext, ContextCallback callback, Object state, Boolean …
0
how can I write a perfect code to create a intelligence system in Nureal programming
0
we are in the process of standardizing  the company IT device policy and  need some help from the HR and IT personal on the sample policy and the business process . our current practice is HOD and CIO will decides on the device requirements . for an example desktop vs laptop decision taken by the department head and the CIO . sometime we have to come a cross issues due to the   laptop mobility issues .

I hope these policies has to implement from the HR ? or IT department ?  please share some sample policies for me to have look in advance my meeting with HR
0

IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.