Can’t help wondering if someone missed a Flash update -- richard
From: [email protected] [mailto:[email protected]] On Behalf Of Ziots, Edward Sent: Friday, October 04, 2013 8:00 AM To: [email protected] Subject: [NTSysADM] Adobe Customer Data breached http://nakedsecurity.sophos.com/2013/10/04/adobe-owns-up-to-getting-pwned-login-and-credit-card-data-probably-stolen-all-passwords-reset/?utm_source=Naked+Security+-+Sophos+List&utm_medium=email&utm_campaign=93ed7d3d97-naked%252Bsecurity&utm_term=0_31623bb782-93ed7d3d97-454838729 Z Edward E. Ziots, CISSP, CISA, Security +, Network + Security Engineer Lifespan Organization [email protected]<mailto:[email protected]> Work:401-255-2497 This electronic message and any attachments may be privileged and confidential and protected from disclosure. If you are reading this message, but are not the intended recipient, nor an employee or agent responsible for delivering this message to the intended recipient, you are hereby notified that you are strictly prohibited from copying, printing, forwarding or otherwise disseminating this communication. If you have received this communication in error, please immediately notify the sender by replying to the message. Then, delete the message from your computer. Thank you. [Description: Description: Lifespan] From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Webster Sent: Friday, October 04, 2013 8:13 AM To: [email protected]<mailto:[email protected]> Subject: [NTSysADM] RE: Account Utility Very few (of the sites I go to) ever look at the privileged accounts. The last assessment I did had over 100 DA accounts and almost as many EA and SA accounts. The majority of their service accounts were in all three groups!!! Until I ran MBS’ script, they had no idea how many local SQL Server and SQL Express installs had been done using the domain’s SQL Service account and that account was a member of all three privileged groups. Webster From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Free, Bob Sent: Thursday, October 03, 2013 11:52 PM To: [email protected]<mailto:[email protected]> Subject: [NTSysADM] RE: Account Utility The first two I get, the third is really hard to comprehend. From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Webster Sent: Thursday, October 03, 2013 8:09 AM To: [email protected]<mailto:[email protected]> Subject: [NTSysADM] RE: Account Utility MBS’ script works like a charm. I have used it when doing assessments for AD migrations. I have NEVER seen an IT org that knew every service account used, where they were used or how many of those service accounts had domain admins privileges. Webster From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Michael B. Smith Sent: Thursday, October 03, 2013 11:00 AM To: [email protected]<mailto:[email protected]> Subject: [NTSysADM] RE: Account Utility http://theessentialexchange.com/blogs/michael/archive/2008/02/29/finding-services-using-non-system-accounts-with-powershell.aspx From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Steve Norton Sent: Thursday, October 3, 2013 8:10 AM To: [email protected]<mailto:[email protected]> Subject: [NTSysADM] Account Utility A long time ago I used a utility that showed me what account services were running under on all my servers. My environment is Windows 2003 and 2008 R2. Ideally this would be a utility that I can run from a Windows 7 workstation against servers. Suggestions appreciated. ________________________________ PG&E is committed to protecting our customers' privacy. To learn more, please visit http://www.pge.com/about/company/privacy/customer/ ________________________________ The information contained in this e-mail, and any attachments hereto, is from The American Society for the Prevention of Cruelty to Animals® (ASPCA®) and is intended only for use by the addressee(s) named herein and may contain legally privileged and/or confidential information. If you are not the intended recipient of this e-mail, you are hereby notified that any dissemination, distribution, copying or use of the contents of this e-mail, and any attachments hereto, is strictly prohibited. If you have received this e-mail in error, please immediately notify me by reply email and permanently delete the original and any copy of this e-mail and any printout thereof.
<<inline: image001.jpg>>

