IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.

Share tech news, updates, or what's on your mind.

Sign up to Post

Dear Experts
We have implemented CRM application( web based ).  our customer will login to this and this application for reports and analytics. our customer is in a different country hence they want the news/update on certain products that is in our country, they have asked to provide the solution for them. Our CRM developer says he can integrate certain news channels so that customer can login to CRM and see the news updates, As an IT security point of view I have asked which all websites but he is not sure at the moment which all websites will have to integrate ,
1.      I have informed them we may have to look for different solution instead of CRM application for this until technical approach or detailed tech specs are shared with me. However would like understand is it a right way, is the CRM application using for this is it as right tool
2.       instead should we have to develop a portal and store all the details and share the portal to them.
3.      As CRM has sensitive data integration with new sites will it be recommended , when it comes to integration please suggest the measures to be taken
4.      What solution we need to go for news capturing and store it and share it with customer please suggest .
please help with above , thanks in adance.
0
OWASP: Forgery and Phishing
LVL 19
OWASP: Forgery and Phishing

Learn the techniques to avoid forgery and phishing attacks and the types of attacks an application or network may face.

Hi,
How can we apply ICP Filing for a Chinese Web-site?
https://www.akamai.com/us/en/products/performance/icp-license.jsp

For one given web-site, how can we check/validate if it is having ICP Filing or not?
0
Question regarding gathering hardware ID. I was told that during the setup process of a new machine you can click on Shift F10 on the Regions page to get to the cmd prompt. Once there I typed the command powershell to run that and then set the proper execution policy. Once I get to the point that I install the WindowsAutoPilotInfo Script and run the Get-WindowsAutoPilotInfo.PS1 -OutputFile AutoPilotHWID.CSV I am wondering how do i extract that CSV File from the machine if its still in the middle of setup and i do not at that point have access to windows explorer. I tried to do the following but got credentials errors.
Get-WindowsAutoPilotInfo.PS1 -OutputFile \\ComputerName\HWID\AutoPilotHWID.CSV 

Open in new window

How can i use the -outputfile switch to put the file on a remote machine? On the remote machine I created a folder in the root of C and shared it. Also gave everyone full access to that folder.
0
Dear Experts
Please help understand the difference between Network architect and IT infrastructure architect, does both means the same or different and if different please list the scope of each, this will be great help. thanks in advance.
0
Dear Experts
We have project for 6 months where the data to be captured from the pdf document to captured and entered into excel and then imported into the application, it is found that the pdf documents in some sections are scanned some sections it is hand written, in some section it is table,  
1. looking for solution/software  please let us know the best solution to handle this work.
2.  also please suggest can we think of reading so that use some voice reorganization software if yes then please suggest the software
0
TOSHIBA e-STUDIO5005AC print codes.  Anyone know where to configure print codes in the web admin interface?  We like to track employee print jobs through code association.
0
We have an old laptop that has Windows 7 and some very specific software that our finance dept uses. We no longer have access to this software that was created by company that is no longer in business. Users typically remote into this machine to run this software that requires SOAP UI Utilities and Office 2003 to work. We would like to Clone this PC unto another similar PC so more than person can access this software and perform the same function. All that being said, can we close the hard drive of that laptop unto another laptop (Does it have to be the same make and model?) so we can have an exact duplicate of that system? I was thinking about using Clonezilla.
0
Say, My Android phone is backing up call log history to google drive. I can view the file under backups in Google Drive. How do I download this file and inspect it? I want to view the raw data.

Does Google keep older backups or each time over right them and if so is there a setting or way to keep a history of backup files?
0
Say, I have an android Black Berry Key one with Google Backups enabled. I'm after restoring a backup of my call logs from 5 months ago.
How do I go about this? tx Shaun
0
Hi,

I am restructuring my IT folder in my network and also tiding up access right. I thought you could advise me regarding "On how should I restructure my folders".

Can you please advice?


Best regards,
Mallony
0
Become a Certified Penetration Testing Engineer
LVL 19
Become a Certified Penetration Testing Engineer

This CPTE Certified Penetration Testing Engineer course covers everything you need to know about becoming a Certified Penetration Testing Engineer. Career Path: Professional roles include Ethical Hackers, Security Consultants, System Administrators, and Chief Security Officers.

Hello all,
I had double auth. using Microsoft authticator on my iPhone.
upon replacing my iPhone, I love my authenticator app, as I noticed I was supposed to enable icloud backup within the app settings itself.

anyways, I tried logging into Microsoft account, to notice I forgot my password, and I lost my authenticator app.
I can try guessing my password, but it would take the too many attempts.
I tried using the authentication with my alternate email address, but it wasn't enough, I had to use the app still as dual authentication.
I am unable to reach out to Microsoft for support.
although I still have access to my emails from outlook and ios mail.
any ideas?
0
I am working as an IT Specialist for a company. I do everything from IT Helpdesk, IT Network Engineer, IT Administrator, IT Technician, Website support, and IT Security. As far as I can recollect now I do anything else for the company related to IT and to Solve any issues.

I will renew my contract soon and I would like to change my Title from IT System Engineer and IT security. Now, I am not sure how I should ask for title. Maybe IT System Engineer/IT Security. (?)

Can you please advise?

Thanks,
Mallony
0
¿What is your opinion about this debate?¿What do you prefer like system administrator?

Best Regards,
David.
1
Dear Experts
We have software development resources 3 users we have asked them to do development on the development server once the changes are accepted then they can commit to the production server. we are using BitBucket repository for version control, have following doubts
Production server administrator privileges of the application is disabled but development server  administrator credentials are enabled so that they develop, in this case is it recommend project manager will be as admin for the Bitbucket and once the developer develops and testing is done and user is accepted from the development server then project manager will execute the commit changes so that production server is updated, please suggest the best practice
0
I am curious what technology trends are on Technology Officer's minds and what you think every company should be aware of right now.   What practices to you incorporate within your company to make sure your whole team is aware of these trends and making the right decisions?
1
Dear Experts
We have recently implemented veeam backup and replication solution, would like to set the best practice backup and retention policy for VM’s and files. Please suggest me to daily backups best way to rotate  and similarly weekly and monthly how many days retention to be set and rotate. please help me with best practice way to configure like first full backup and then daily incremental and weekly and monthy how to set please suggest the best backup policy and set the retention
0
Dear Experts

Can you please help with list of common security incidents , require this to prepare document for ISO 27001.thanks in advance.
0
Dear Experts
I am looking for few core points for ISMS objectives for IS027001 can you please on each of the section that it contains please. thanks in advance.
0
Hello all.

I am going to be tasked with deploying about 70 new machines to one of our client.   I am trying to figure out the best and most efficient way to do this.   They will all be HP machines running Windows 10 Pro.   I plan to provision 1 unit with every piece of application software they run.   This includes their EMR software, Trend Worry Free Business AV, Office 2016, our Remote monitoring software as well.   My question is because or product keys will it be a problem?  We are using the HP Desktop Minis for now and will probably use them going forward unless they become unavailable for purchase.  I am guessing the product key is built within the registry of the bios to activate the software.  

My question is what would be a best practice to roll out all these units.   I was thinking putting it on the domain, installing all the apps, updates, etc.   When completed?  Should I run sysprep?  I have no idea if that's even a thing anymore.   Reason being is computer name.   I will need all the new units to have new names once they are on the network and want to ensure the product keys for windows 10 are all specified to that machine.   Trend Worry Free comes from the web portal so there is no license key, same for RMM and their cloud EMR software.   Office is volume license so I don't need different keys for that.  

Also what would be a recommendation for a free tool to image the machine upon deployment so I can just plugin 5 machines at a time and boot of USB to…
0
Microsoft Azure 2017
LVL 19
Microsoft Azure 2017

Azure has a changed a lot since it was originally introduce by adding new services and features. Do you know everything you need to about Azure? This course will teach you about the Azure App Service, monitoring and application insights, DevOps, and Team Services.

I created custom a MMC Taskpad for ADUC, and before saving, selected the options below
console-setting.png
but when I log as a user, I can right click on the saved mmc and select 'author', which gives me the ability to change things. I can't figure out why I can't lock the mmc.
1
Does anyone know of a company that provides a hotspot device that will work international? Any type of internet connection. Asia preferred.
0
I have been directed to deploy a group of chrome books (30 or more) by a certain date.  My knowledge is limited =)  My thought is to get a Google admin console (gsuite) to manage the chromebook devices only, not users.  Another unit in the company already manages google user accounts.  

If I do get a Google admin console, and just enroll chromebooks with it (not create user accounts), can I also:

1. push security and functionality updates to the devices?
2. manage a central repository of approved "google play" apps, or push apps onto the chromebooks from a console?
3. prevent any user that is logged in from changing settings, adding unapproved apps, or removing apps that I have installed?  

Thank you!!
0
Management wants to know what employees are doing if working remotely. I would like to track and store their activity while they are connected to our work server via remote access.

I need to track all user activity such as select, insert, update and delete and put it into a table in order to create a report.

The Database we use is Microsoft SQL Server 2012.
0
Hi Experts,
How can I get to see the latest file I downloaded?
When I sort by date modified, it displays all folders first and after that many files, not necessary in order...
Thanks
0
I got a request to see the analytics of the trouble tickets over the last year.  What would be the best reports to show this? Meeting at 1:00 central time!
Any help would be most appreciated!
0

IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.