We are trying to do some report for patch status of all servers in our domain - but due to firewall settings - the MBSA remote scans are not completing in full, Namely the security update status secti…
I have a new environment with windows 2012 R2 domain controllers. I would like to move the users laptops to this new domain.
Currently the users have full control on their laptops…
I'm looking for more questions for users which should cover areas like:
a) Spam emails
c) Malwares & AV
d) Physical security
e) Data Confidentiality
f) Password & password complexit…
Friend got this....
real or fake?
Nick should I trust this E-MAIL and do what is says?
-------- Forwarded Message -------- Subject: MICROSOFT SECURITY - CRITICAL ALERT
Date: Tue, 20…
one of the computers is a temporary web server. I had to put it outside of the firewall (DMZ) to make everything work because somehow the uverse router blocks everything even if I open all the ports.…
I have installed Visual studio on only 30 PCs. When they run the project , it says "Error while running the project: unable to start the program \\File server-a\Students\16\16asmith\visual stud…
Hi, I have a network with a few hundred users. Sometimes we need to log in as a particular user to troubleshoot something, sometimes overnight or on holiday weekends, etc when getting the user on the …
I am being asked to look at a Windows SBS 2008 server which has been decommissioned for some time. I am being asked to see if anyone has accessed the server / files since it has been decommissioned.…
I had very strange problem,
After Suyces a Migration PKI to SHA2
and deploy new certificat in GPO and 802.1x
I had this problem authentication with workstation with Win7, after depl…
I'm trying to sieve out which of the signatures / malwares in F-Secure is ransomware.
Anyone can get me a list?
Just like in gmail (& my Outlook) we can't attach an executable file, is there anyway
that we can scan & block if files uploaded (by Rdp copy & paste) is say an executable
& only allow text files?
I'm exploring to set up a VM running a Linux or x86 UNIX (say x86 Solaris or x86 SCO UNIX if it's still around)
that's dedicated to browsing the Internet : using a VM because I could scale the vRAM, …
Is RHEL or any specific OS that allows us to browse Internet and yet
highly not prone to ransomware & malware
Wanted to use it as 'jumphost' for browsing Internet
A Good linke: https://www.owasp.org/index.php/Mobile_Jailbreaking_Cheat_Sheet
We have a BYOD estate that's fairly large, approx 3000 devices, mainly iOS.
We enforce a minimum iOS version of 8 via our MAM software. That is, of the user isn't running iOS 8 or above, the corpor…
Can anyone here please help as to why the script below can display the rest of the column but not the time column ?
Am I missing anything here ?
I am setting up a remote virtual directory. The share has it's own permissions and I added all the users I want to access the share through the share permissons. The NTFS folder on the PC also has a…
Can anyone here share some script or explanation how can I use Powershell Get-WinEvent or Get-EventLog to get some list of AD security event ?
I need the below information to see if any …
I've managed to found this script (by SubSun), which sift through the Event logs for the Terminal Server:
So I wonder if it is can be configured / modified to filter the Securi…
Yes? Why do you use it?
No? Why don't you use it?
Can anyone here please share some steps or process to create secure access for the 3rd party support team ?
I have created the support account called DOMAIN\AS-Support in m…
I'd like to know if there is any Powershell script or software that can be used to test what my DOMAIN\Test-Account can do given certain privilege in my AD domain ?
For example: The AD a…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY.
How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a single click.
I used to download PDF & html pages & have several cases where there's
Adobe exploits & HTML infected pages.
If I'm browsing the Internet on a Linux desktop & do copy of the html or
PDF pages & t…