IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hello Experts - I'm looking for a good MSP that can assist me with helpdesk and IT projects for a medium sized architecture firm in NJ and PA. We're also looking at acquiring an office in FL so a company that has a presence up and down the east coast would be ideal. Thanks in advance for any recommendations!
0
OWASP: Threats Fundamentals
LVL 13
OWASP: Threats Fundamentals

Learn the top ten threats that are present in modern web-application development and how to protect your business from them.

¿What is your opinion about this debate?¿What do you prefer like system administrator?

Best Regards,
David.
0
Hi All,

I am seeking your help on the below situation. Please advise me well defined solution to proceed further.I am  also looking for any documents/Workflows/PPT for references.

Objective :

•      Human errors are happening because of  using elevated privileged access
•      Excess rights given to L1 and L2 teams to perform the tasks
•      Accessing production environment with privileged rights, when is not needed /working on non prod environment
•      Usage of Privileged access on prod environment for non admin tasks, leading to human error

Current Status:

•      We have Verified few  projects internally they are using Tool Based PAM (Privileged Access management) Solution and defined process  
•      Most of the Projects don’t have tool based solution and all support team have privileged Access, few projects have role based access implemented and Few projects have
        customized solution for access management for specific towers like (Windows,Unix,Storage).

Target Status (or) Solution needed :  

•      We are looking for standard role based Access Management-PAM solution with Native Tools.


Thanks in Advance.
Madan.
0
Dear Experts
We have software development resources 3 users we have asked them to do development on the development server once the changes are accepted then they can commit to the production server. we are using BitBucket repository for version control, have following doubts
Production server administrator privileges of the application is disabled but development server  administrator credentials are enabled so that they develop, in this case is it recommend project manager will be as admin for the Bitbucket and once the developer develops and testing is done and user is accepted from the development server then project manager will execute the commit changes so that production server is updated, please suggest the best practice
0
I've got a really weird one here and I think I just need to talk it out to determine where things are going wrong so lets go over it.

I have three single domain Forests, lets call them A/B/C for short.
Domain B and C Trust Domain A so that Users can log into B and C, but A does not Trust B or C.

A = Contains ALL Users Logins
B and C = each Contain Servers accessed by Users from Domain A

Users log into all systems in Domains A/B/C as User@A / A\USER

SO, Normally, After logging in to any given Server attached to any given domain, they can reach the shares of any other server and open content there that they have been assigned rights to without being prompted for a UN /PW.

So a User logs into Server_B11.B as A\User then opens an explorer window types in \\Server_C99.C\Share and if they have rights to reach this server it just opens, no prompting.

Some new systems were added to Domain B, but they do not work in the process above as expected:

Instead, on the problem servers Lets Call one Server_B22.B, the User logs in to the server as A\user (which is a local admin on that server) , and when accessing \\Server_C99.C\Share they get the Windows Credential Prompt to Provide a Username and Password.

Of note, the Prompt Shows the Wrong Domain in the default (you would expect the User's domain "A" to be presented, but instead it shows the Computer's Domain "B")

The Prompt also …
0
I'm trying to do a reasonable job of planning for Users, Groups and User Rights in a new domain setting.
(That this is coming from a peer-to-peer setting makes it "different" but I'm not completely sure how?)

By now I know that there are some things to be done on at a joined workstation that appear to require a Domain Administrator.
So, that presents a bit of a challenge - as I would expect there to be User credentials that would be more "local" to accomplish these things.
And, expanding that challenge, I end up with this question:

What is a good set of users / user types for a small organization?
There will be the Domain ADMINISTRATOR which we will keep secret and hidden.
There will be the Users at the other end of things.
What else in between?
I can see the Groups but the list is just way too daunting to even consider.
I just need the minimal set so we can get our work done.

There are:
3 people with IT roles plus 5 people with Manager roles and about 30 users total.  These are spread over 3 sites
There is no strong "Department" separation.
The current IT "staff" is more or less: 1 senior half-to full time, 1 apprentice half time, 1 (otherwise manager) 15%.  

Beyond, that, please don't ask me what the spec's or needs are because you will likely know better than I!

I hope it's obvious that coming from a peer-to-peer network environment that I'm used to seeing the need for an "administrator" to make some changes and for the need to run an app "as …
0
Dear Experts

Can you please help with list of common security incidents , require this to prepare document for ISO 27001.thanks in advance.
0
Dear Experts
I am looking for few core points for ISMS objectives for IS027001 can you please on each of the section that it contains please. thanks in advance.
0
I need to audit ldap connexion application in our domain.
Is there a tool for that ?
Thanks
0
I just re-installed Windows Server 2003 Enterprise along with SP2.

I am unable to Activate Windows.

Message:
Unable to establish a connection with the activation server...
Message number: 32777

NOTE:
-Microsoft Internet Explorer's Enhanced Security Configuration is DISABLED on the server.
-No proxy is setup for Internet access
-On the Tools menu, Internet Options:
  Check for publisher’s certificate revocation = UN-CHECKED
  Check for server certificate revocation = UN-CHECKED
-This server has Internet access and DNS resolution works.

Please help

Thanks,
Rene
0
Exploring SharePoint 2016
LVL 13
Exploring SharePoint 2016

Explore SharePoint 2016, the web-based, collaborative platform that integrates with Microsoft Office to provide intranets, secure document management, and collaboration so you can develop your online and offline capabilities.

I have been directed to deploy a group of chrome books (30 or more) by a certain date.  My knowledge is limited =)  My thought is to get a Google admin console (gsuite) to manage the chromebook devices only, not users.  Another unit in the company already manages google user accounts.  

If I do get a Google admin console, and just enroll chromebooks with it (not create user accounts), can I also:

1. push security and functionality updates to the devices?
2. manage a central repository of approved "google play" apps, or push apps onto the chromebooks from a console?
3. prevent any user that is logged in from changing settings, adding unapproved apps, or removing apps that I have installed?  

Thank you!!
0
I have a file  from CA (certificate authority) .crt file with multiple BEGIN CERTIFICATE and END CERTIFICATE snippets inside.  I have a node js program to make my site https.
This program takes sslKey": "private-key.pem", sslCertificate": "lws-cert.pem". Now i assume i have the .crt file which can be renamed as lws-cert.pem and used in the program and what about private key ?
Am i missing something ? Is my aproach correct ?
0
Just wondering if know of a good way to add the Aerohive's Access Points to SolarWinds, perhaps through just the controller.  There are about 250 Access Points so trying to avoid having to add each AP separately but was thinking to just add the controller.  

The devices I'm using are Aerohive Hive Manager and AP250s

Is it possible with other vendor?
0
I have attempted to configure netflow v9, but I am not able to generate any flows within my 3750X switches. Should I add more configuration to my netflow module to get the flows to be read on my solarwinds NTA server? Or should I switch to netflow v5 to accomplish this task?

Here is my configuration & I am using IOS 15.2(4):

flow record Record
match datalink source-vlan-id
match datalink dot1q priority
match datalink mac source-address
match datalink mac destination-address
match ipv4 version
match ipv4 tos
match ipv4 ttl
match ipv4 protocol
match ipv4 source address
match ipv4 destination address
match transport source-port
match transport destination-port
match interface input physical snmp
collect interface output snmp
collect counter flows
collect counter bytes
collect counter packets
collect timestamp sys-uptime first
collect timestamp sys-uptime last
!
!
flow exporter Export
destination < Solarwinds Server IP >
source < Site VLAN >
transport udp 2055
option interface-table timeout 60
!
!
flow monitor Monitor
exporter Export
cache timeout active 60
statistics packet protocol
record Record
!
!
sampler NTA_Sampler
description NTA_Flows
mode random 1 out-of 32
!
interface GigabitEthernet2/2/2 < Netflow Module >
description **** NTA export ****
ip flow monitor Monitor layer2-switched input

sh flow interface
Interface GigabitEthernet2/2/2
FNF: checking sub traffic.
FNF: monitor: Monitor
direction: Input
traffic(ip): layer2-switched

Open in new window

0
My VM loses connectivity throughout my day, and when I do a repair, it says, Ethernet0 doesn't have a valid IP configuration ------ Fixed, but its not permanent.  

I'd like a permanent solution.

Thank you,
Mark
0
How can Munki be used to image Mac computers for upgrade or reinstallation  or change mac OS system over network like how pxe boot as in sccm for windows computers.

Could you provide step by step guide?
0
We have SolarWinds NTA and NPM installed but our devices are not sending flow information (that's what Solarwinds told me) to the database.  e.g. Netflow Sources.

We are the Society for the Prevention of Cruelty to Animals Los Angeles, non-profit.  I do not have much money to spend so I am hoping someone is willing to help us get this configured properly?

I can pay a little.
0
Product: Microsoft InTune Company Portal
Scenario: User is unable to authenticate when with InTune when they enter their e-mail address and active directory password.
Note: Multi-factor authentication is being used when enrolled in Microsoft InTune.
Additional information: The user was enabled with Multi-factor authentication with their e-mail address and then their username.

Things to try next: Disable Wi-Fi and authenticate with InTune with a cellular network via a hotspot from another phone.
OS: Arnold device

Confirmation: I confirmed that the user can login to the web based version of Microsoft InTune.
Things to be tried next, authenticate with InTune on another device, let say another Android or an iOS device.
I was also thinking of looking up Microsoft InTune FAQ
Any more ideas?
0
Based on your experience and understanding, which certifications listed in the link below is a MUST if I want to focus my career in information security.

https://www.infosec.gov.hk/english/technical/certifications.html

Do you recommend I shall join courses or I can self learn before taking the certification examinations?
0
Rowby Goren Makes an Impact on Screen and Online
LVL 13
Rowby Goren Makes an Impact on Screen and Online

Learn about longtime user Rowby Goren and his great contributions to the site. We explore his method for posing questions that are likely to yield a solution, and take a look at how his career transformed from a Hollywood writer to a website entrepreneur.

I have the need to reboot about 1,000 servers on a staggered schedule. I was wondering about the best way to approach this. Most of the servers are VM s. Most are in active directory but not all. Was wondering if a script via GPO or a scheduled task is the best method?
0
Hello,
I have a few questions about Inno Setup.
My native language is not English, so I have trouble to understand the documentation.

Can you please help me to answer these questions in simple words?

1) Where can I get the .isl file?
Name: "spanish"; MessagesFile: "spanish.isl"
http://www.jrsoftware.org/ishelp/index.php?topic=filessection

2) What does the parameter mean "{cm:CreateDesktopIcon}" in Description: "{cm:CreateDesktopIcon}"? Where is "cm" and "CreateDesktopIcon" defined?
http://www.jrsoftware.org/ishelp/index.php?topic=filessection

3) What does "Section" stand for in the [INI] Section?
Section: "Section";
http://www.jrsoftware.org/ishelp/index.php?topic=filessection

4) Where are {group}, {userdesktop} and {userappdata} defined and what they are?

5) What does this Parameter mean?
   Parameters: /quiet

Thank you
0
Dear Experts Hope you all are doing well,

I would like to know which is the best way or tool for granting the temporary local admin rights to the Domain users for a certain period of time (6-8 hrs) in AD.I am new in IT administration. I have google and found a method, Build a local admin group and writes a script to remove the user and force reboot the system. I am new in IT administration. Your suggestions will be highly appreciated.

Thanks
0
What in your opinion are the most cost effective remote environment providers, for a small environment such as I describe?

One of my customers has asked me for advice on hosted desktop solutions. Since he has two offices (three employees each), he has both offices remote into a hosted environment, where they share Quickbooks databases (it's an accounting firm) and run Proseries.

He is happy with the architecture, but not with his IT person, and would like me to move him to an identical solution and have me manage it.
0
I have an asp.net web forms applications that I want to host with a two different URLs , but same domain name.
say, one is abc.mycompany.com and other one xyz.mycompany.com. if possible, i want to deploy my application in one location but can be accessed via two different URLs.

Also, can we set something in IIS or web.config file of the application such that, users coming from abc.mycompany.com are directed to abc.aspx page in the application and
others to xyz.aspx.com ?
1
Looking for a good analogy to explain why using the local Windows Administrator account to perform all kinds of tasks works better than using any other domain account that is a member of the local Administrators group. I've read so many explanations of why there is a difference, but it is so hard so simply communicate the difference to other techs. Any thoughts?
0

IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.