IT Administration





IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.

Share tech news, updates, or what's on your mind.

Sign up to Post

I tried earlier to get the needed information on this at:
I didn't quite get what I needed and had to press on.
I now have a couple of IT folks who are set up as Account Operators at least.
But this isn't adequate for them to get the Windows Firewall Rules set up on a new computer.
I've only been able to do that as a Domain Admin - which I don't want to do and don't want THEM to do.

What minimum Membership (or other settings or privileges) do I need to give them to be able to adjust the firewall (and other things in setting up a new workstation?).
OWASP: Avoiding Hacker Tricks
LVL 19
OWASP: Avoiding Hacker Tricks

Learn to build secure applications from the mindset of the hacker and avoid being exploited.

My company has recently carried out a purge of our Inventory Assets and have now restarted the process of auditing our PCs through GP which pushes out the Audit executable. Checks in Inventory shows that for some of our PCs, the User field is populated with data which is not current whereas others displays the correct / last logged on User. There are multiple cases where the User field displays the names of employees who have not logged onto the PCs in years. The XML file in the data folder on the TrackIT server produced by the audit also contains this stale / incorrect Username.

Troubleshooting efforts:
-We’ve tried initiating the audit from within Inventory and tried manually running the Audit executable locally on the affected PCs
-Renaming the located in the root directory of the affected PCs.
-Replacing the Auditcfg.ini located on the server’s root folder

None of these resolved the issue.  Any thoughts would be appreciated.
I have a user that can not delete any files from here computer. He can't delete from her physical desktop or her virtual desktop unless I login and enter my admin credentials. I even tried to meke her an administrator o. the virtual desktop and she still can't delete files without my assistance.
Dear Experts
Servers having two PDU's and each power units connected to separate UPS if one UPS goes down server hardware will continue to work with other UPS, have following doubts
Does server hardware consumes power from both the PDU’s all the time equally OR  is there a concept that one PDU will be primary and if this goes down only then secondary PDU becomes active and this will keep the server running. please help me understand. Thanks in advance.
How can I let a standard user run a program that requires elevation without giving them admin access?
We have web servers in our production environment.  Sometimes as part of troubleshooting, a web server may need to have the IIS app pool recycled or a particular Windows service restarted. Currently only ops staff can do this because they have full admin rights and can remote into the server.

Is there a tool that we could use to allow other staff to perform these limited functions, without giving them remote desktop access and full admin rights to the web servers?
Hello, we have 3 domains in 3 forests with trusts allowing us to access resources between them. The users for the most part sign on to their computers authenticating in domain A in  Forest A, but they have credentials in domain b and c in Forests B and C – separate AD user accounts.

Since we have applications in each domain in each forest(A,B,C) that can only be accessed with the user/creds from the respective domain/forest, we were wondering if there is a way to have multiple accounts set up with a smart card. The goal is to mitigate AD-related password resets and increase security. We hope that with a smart card infrastructure we can have a user plug in, sign on and have access to the applications in other forests.

Can someone please give me an idea as to what it will take to achieve such a setup?
I know we have a CA in our forests but I am not exactly sure how this will tie into smart cards.

Thank you in advance
Dear Experts

We are planning to implement surveillance system in our factory for 24/7 recording footage and approximately 25 to 30 cameras  with feature of Night Motion Detection,  we prefer to have backups scheduled and replicated to head office our  factory and head office are connected with MPLS network. Synology has Surveillance solution would like understand does this serve the above requirement, it is also very much important for us to have every 4 hours backup and the same is secured and copy to the head office hence NAS box replication is required, please suggest.
Dear Experts
We are having head office and site office both are connected over MPLS VPN, it is very much essential for us to have video record the activities that happens at the remote site hence we must install CCTV system to monitor and record all the activities, the following is what I am planning
Setup local server install VMware ESXi and on VM install the backup software point the as destination storage device where all the recordings are stored and configure backup software to schedule the backup for every 30 mins , the moment the backup session is completed replicate the same to remote storage which is in head office
1.      please help me with best practice design , can I plan for above design or suggest the best practice.

As there will be continuous recordings 24/7 hence too much of data is stored locally and also gets replicated to remote site , please suggest  the best practice should I have to plan like

2.      Please help on the following approach which one to go for or any other suggestion
At the site backup destination as disk and at remote site replication source also disk
At the site backup destination as disk and remote site where the replication happens is tape
At the site backup destination as tape and remote where the replication happens also tape.

3.      Is it good idea to have one more recording where real time monitoring and backup of site office happens from head office as we are connected over MPLS vpn network.
Please help on above 1 , 2 and 3
I've got a client who's domain was registered by a former employee. The former employee has turned off their website and wont give access to the account on GoDaddy to control the domain. Does anyone know what he needs to do in order to prove ownership of the business so he can regain control over his domain?
Exploring ASP.NET Core: Fundamentals
LVL 19
Exploring ASP.NET Core: Fundamentals

Learn to build web apps and services, IoT apps, and mobile backends by covering the fundamentals of ASP.NET Core and  exploring the core foundations for app libraries.

Hello Experts - I'm looking for a good MSP that can assist me with helpdesk and IT projects for a medium sized architecture firm in NJ and PA. We're also looking at acquiring an office in FL so a company that has a presence up and down the east coast would be ideal. Thanks in advance for any recommendations!
Hi All,

I am seeking your help on the below situation. Please advise me well defined solution to proceed further.I am  also looking for any documents/Workflows/PPT for references.

Objective :

•      Human errors are happening because of  using elevated privileged access
•      Excess rights given to L1 and L2 teams to perform the tasks
•      Accessing production environment with privileged rights, when is not needed /working on non prod environment
•      Usage of Privileged access on prod environment for non admin tasks, leading to human error

Current Status:

•      We have Verified few  projects internally they are using Tool Based PAM (Privileged Access management) Solution and defined process  
•      Most of the Projects don’t have tool based solution and all support team have privileged Access, few projects have role based access implemented and Few projects have
        customized solution for access management for specific towers like (Windows,Unix,Storage).

Target Status (or) Solution needed :  

•      We are looking for standard role based Access Management-PAM solution with Native Tools.

Thanks in Advance.
I've got a really weird one here and I think I just need to talk it out to determine where things are going wrong so lets go over it.

I have three single domain Forests, lets call them A/B/C for short.
Domain B and C Trust Domain A so that Users can log into B and C, but A does not Trust B or C.

A = Contains ALL Users Logins
B and C = each Contain Servers accessed by Users from Domain A

Users log into all systems in Domains A/B/C as User@A / A\USER

SO, Normally, After logging in to any given Server attached to any given domain, they can reach the shares of any other server and open content there that they have been assigned rights to without being prompted for a UN /PW.

So a User logs into Server_B11.B as A\User then opens an explorer window types in \\Server_C99.C\Share and if they have rights to reach this server it just opens, no prompting.

Some new systems were added to Domain B, but they do not work in the process above as expected:

Instead, on the problem servers Lets Call one Server_B22.B, the User logs in to the server as A\user (which is a local admin on that server) , and when accessing \\Server_C99.C\Share they get the Windows Credential Prompt to Provide a Username and Password.

Of note, the Prompt Shows the Wrong Domain in the default (you would expect the User's domain "A" to be presented, but instead it shows the Computer's Domain "B")

The Prompt also …
I'm trying to do a reasonable job of planning for Users, Groups and User Rights in a new domain setting.
(That this is coming from a peer-to-peer setting makes it "different" but I'm not completely sure how?)

By now I know that there are some things to be done on at a joined workstation that appear to require a Domain Administrator.
So, that presents a bit of a challenge - as I would expect there to be User credentials that would be more "local" to accomplish these things.
And, expanding that challenge, I end up with this question:

What is a good set of users / user types for a small organization?
There will be the Domain ADMINISTRATOR which we will keep secret and hidden.
There will be the Users at the other end of things.
What else in between?
I can see the Groups but the list is just way too daunting to even consider.
I just need the minimal set so we can get our work done.

There are:
3 people with IT roles plus 5 people with Manager roles and about 30 users total.  These are spread over 3 sites
There is no strong "Department" separation.
The current IT "staff" is more or less: 1 senior half-to full time, 1 apprentice half time, 1 (otherwise manager) 15%.  

Beyond, that, please don't ask me what the spec's or needs are because you will likely know better than I!

I hope it's obvious that coming from a peer-to-peer network environment that I'm used to seeing the need for an "administrator" to make some changes and for the need to run an app "as …
I need to audit ldap connexion application in our domain.
Is there a tool for that ?
I just re-installed Windows Server 2003 Enterprise along with SP2.

I am unable to Activate Windows.

Unable to establish a connection with the activation server...
Message number: 32777

-Microsoft Internet Explorer's Enhanced Security Configuration is DISABLED on the server.
-No proxy is setup for Internet access
-On the Tools menu, Internet Options:
  Check for publisher’s certificate revocation = UN-CHECKED
  Check for server certificate revocation = UN-CHECKED
-This server has Internet access and DNS resolution works.

Please help

I have a file  from CA (certificate authority) .crt file with multiple BEGIN CERTIFICATE and END CERTIFICATE snippets inside.  I have a node js program to make my site https.
This program takes sslKey": "private-key.pem", sslCertificate": "lws-cert.pem". Now i assume i have the .crt file which can be renamed as lws-cert.pem and used in the program and what about private key ?
Am i missing something ? Is my aproach correct ?
Just wondering if know of a good way to add the Aerohive's Access Points to SolarWinds, perhaps through just the controller.  There are about 250 Access Points so trying to avoid having to add each AP separately but was thinking to just add the controller.  

The devices I'm using are Aerohive Hive Manager and AP250s

Is it possible with other vendor?
I have attempted to configure netflow v9, but I am not able to generate any flows within my 3750X switches. Should I add more configuration to my netflow module to get the flows to be read on my solarwinds NTA server? Or should I switch to netflow v5 to accomplish this task?

Here is my configuration & I am using IOS 15.2(4):

flow record Record
match datalink source-vlan-id
match datalink dot1q priority
match datalink mac source-address
match datalink mac destination-address
match ipv4 version
match ipv4 tos
match ipv4 ttl
match ipv4 protocol
match ipv4 source address
match ipv4 destination address
match transport source-port
match transport destination-port
match interface input physical snmp
collect interface output snmp
collect counter flows
collect counter bytes
collect counter packets
collect timestamp sys-uptime first
collect timestamp sys-uptime last
flow exporter Export
destination < Solarwinds Server IP >
source < Site VLAN >
transport udp 2055
option interface-table timeout 60
flow monitor Monitor
exporter Export
cache timeout active 60
statistics packet protocol
record Record
sampler NTA_Sampler
description NTA_Flows
mode random 1 out-of 32
interface GigabitEthernet2/2/2 < Netflow Module >
description **** NTA export ****
ip flow monitor Monitor layer2-switched input

sh flow interface
Interface GigabitEthernet2/2/2
FNF: checking sub traffic.
FNF: monitor: Monitor
direction: Input
traffic(ip): layer2-switched

Open in new window

Python 3 Fundamentals
LVL 19
Python 3 Fundamentals

This course will teach participants about installing and configuring Python, syntax, importing, statements, types, strings, booleans, files, lists, tuples, comprehensions, functions, and classes.

My VM loses connectivity throughout my day, and when I do a repair, it says, Ethernet0 doesn't have a valid IP configuration ------ Fixed, but its not permanent.  

I'd like a permanent solution.

Thank you,
How can Munki be used to image Mac computers for upgrade or reinstallation  or change mac OS system over network like how pxe boot as in sccm for windows computers.

Could you provide step by step guide?
We have SolarWinds NTA and NPM installed but our devices are not sending flow information (that's what Solarwinds told me) to the database.  e.g. Netflow Sources.

We are the Society for the Prevention of Cruelty to Animals Los Angeles, non-profit.  I do not have much money to spend so I am hoping someone is willing to help us get this configured properly?

I can pay a little.
Based on your experience and understanding, which certifications listed in the link below is a MUST if I want to focus my career in information security.

Do you recommend I shall join courses or I can self learn before taking the certification examinations?
I have the need to reboot about 1,000 servers on a staggered schedule. I was wondering about the best way to approach this. Most of the servers are VM s. Most are in active directory but not all. Was wondering if a script via GPO or a scheduled task is the best method?
I have a few questions about Inno Setup.
My native language is not English, so I have trouble to understand the documentation.

Can you please help me to answer these questions in simple words?

1) Where can I get the .isl file?
Name: "spanish"; MessagesFile: "spanish.isl"

2) What does the parameter mean "{cm:CreateDesktopIcon}" in Description: "{cm:CreateDesktopIcon}"? Where is "cm" and "CreateDesktopIcon" defined?

3) What does "Section" stand for in the [INI] Section?
Section: "Section";

4) Where are {group}, {userdesktop} and {userappdata} defined and what they are?

5) What does this Parameter mean?
   Parameters: /quiet

Thank you

IT Administration





IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.