http://www.papercut.com/
On 5/3/2010 11:48 AM, John Aldrich wrote:
In light of a similar thread going on here, I thought I'd post a related
question. Can anyone suggest any software to help with network print
accounting? We currently print primarily through our Win2k3 print server (at
least for
I would take a hard look at the Kerio product.
-Original Message-
From: Brian Desmond [mailto:br...@briandesmond.com]
Sent: Tuesday, May 04, 2010 1:50 AM
To: NT System Admin Issues
Subject: RE: Alternatives to Exchange
I've been to a number of customers that have significantly sized
We have one customer that uses PCounter.
http://www.andtechnologies.com/
I dont know much else about it, but it seems to work pretty good.
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
+1
-Original Message-
From: Angus Scott-Fleming [mailto:angu...@geoapps.com]
Sent: Tuesday, May 04, 2010 12:12 AM
To: NT System Admin Issues
Subject: Re: Symantec Acquires PGP
On 3 May 2010 at 9:23, David W. McSpadden wrote:
Pretty Good Protection
To
Probably Great POS
I think
Michael,
I just wanted to say “excellent” article in this months issue of Windows IT pro
magazine. I am going to send that to my Exchange Admin and review it again
before we do our Win2k8R2/Exchange 2010 Migration in a few months.
Kudos,
Z
Edward Ziots
CISSP,MCSA,MCP+I,Security
I can't begin to thank everyone enough for this discussion. You have clearly
pointed me in the right direction and saved me a ton of research time.
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
We used pcounter, but moved away from print accounting. We're an accounting
firm and made the decision that it was more efficient for us to allocate all
printing to overhead, and indirectly bill it through our rates than it was
to allocate directly to the client.
On Tue, May 4, 2010 at 7:05 AM,
Hey all;
So of my users are reporting getting a link to a PHP page in the Yahoo
Chats from Known contacts, once clicked (of course they did) it scans
through their IM contacts and sends the exact link to all of them. Just
a heads up, don't know if it's new or not but 1st time I've seen it.
We've been using Mdaemon for 10+ years now. Although for the past 4 or
so only as a secondary spam/virus gateway in front of Exchange. They
have some pretty impressive features now like BB syncing, etc. Haven't
paid much attention to the details since we aren't using it as anything
but a
Is there a way to view the contents within a Recycler file in XP?
_
Cameron Cooper
Network Administrator | CompTIA A+ Certified
Aurico Reports, Inc
Phone: 847-890-4021 | Fax: 847-255-1896
ccoo...@aurico.com mailto:ccoo...@aurico.com | www.aurico.com
~
Woot! NOD32 5080 and above is blocking the Worm :0 , We are Saved, Well
until someone else clicks on another one
From: Angus Scott-Fleming [mailto:angu...@geoapps.com]
Sent: Tuesday, May 04, 2010 9:42 AM
To: NT System Admin Issues
Subject: Re: Yahoo / IM Virus New??
So of my users
I've got a Dell PowerVault RAID 5 enclosure that had a hard drive conk out over
the weekend.
No biggie, I figured-there are multiple hotspares available. The system grabbed
one and rebuilt the array, but fussed that there was a consistency problem. I
ran a second, manual consistency check on
Hopefully Vipre blocks it as well. J
John-AldrichTile-Tools
From: Garcia-Moran, Carlos [mailto:cgarciamo...@spragueenergy.com]
Sent: Tuesday, May 04, 2010 10:14 AM
To: NT System Admin Issues
Subject: RE: Yahoo / IM Virus New??
Woot! NOD32 5080 and above is blocking the Worm :0 , We
Thanks!
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Tuesday, May 04, 2010 8:17 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations
Michael,
I just wanted to say “excellent”
Z when did that come out? I haven’t seen it yet.
From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Tuesday, May 04, 2010 8:43 AM
To: NT System Admin Issues
Subject: RE: Exchange server recommentations
Thanks!
Regards,
Michael B. Smith
Consultant and Exchange MVP
Shipped last Thursday. Should be in your mailbox yesterday/today. If you have
an online subscription, it’s also available there.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: Eldridge, Dave [mailto:d...@parkviewmc.com]
Sent: Tuesday, May 04, 2010
On 4 May 2010 at 8:34, N Parr wrote:
We've been using Mdaemon for 10+ years now. Although for the past 4 or
so only as a secondary spam/virus gateway in front of Exchange. They
have some pretty impressive features now like BB syncing, etc. Haven't
paid much attention to the details since
On Tue, May 4, 2010 at 10:26 AM, John Hornbuckle
john.hornbuc...@taylor.k12.fl.us wrote:
So, what gives? The array reports everything is fine. But obviously,
something is funky. I can restore the four corrupt files from a
backup—that’s no problem. But not if I can’t first delete the bad
Is there any way to have say 11 people in a department sync their
Outlook calendars to one Public Calendar they can all access?
Let me know if you need more details.
I appreciate the help!
Bob
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~
Windows IT Pro May 2010 Magazine, Instadoc ID 104657.
Actually in this months Magazine there is 3 articles focused on Exchange 2010,
looking at different parts namely, design, Implementation/Migration.
Z
Edward Ziots
CISSP,MCSA,MCP+I,Security +,Network +,CCA
Network Engineer
Not natively within Exchange, you'll have to go 3rd party. I've only done this
with Add2Exchange.
http://www.diditbetter.com/Add2Exchange.aspx
Shook
From: Chyka, Robert [mailto:bch...@medaille.edu]
Sent: Tuesday, May 04, 2010 11:14 AM
To: NT System Admin Issues
Subject: Exchange/Outlook -
They could always setup an address attached to this public calendar and
send it an invite.
Don Guyer
Systems Engineer - Information Services
Prudential, Fox Roach/Trident Group
431 W. Lancaster Avenue
Devon, PA 19333
Direct: (610) 993-3299
Fax: (610) 650-5306
don.gu...@prufoxroach.com
Thanks Shook. I will definitely check it out.
-BC
From: Andy Shook [mailto:andy.sh...@peak10.com]
Sent: Tuesday, May 04, 2010 11:19 AM
To: NT System Admin Issues
Subject: RE: Exchange/Outlook - Calendar Question
Not natively within Exchange, you'll have to go 3rd party. I've only
Yeah, I opened a case with Dell support before sending this message. Haven't
been blown away. The technician is Googling the error--not exactly the kind of
expertise I was expecting.
-Original Message-
From: Ben Scott [mailto:mailvor...@gmail.com]
Sent: Tuesday, May 04, 2010 11:16 AM
On 4 May 2010 at 8:49, Cameron Cooper wrote:
Is there a way to view the contents within a Recycler file in XP?
I have browsed the RECYCLER folders using Total Commander from
http://www.ghisler.com/. You have to set it to view Hidden/System Files
which is in the Display option.
You will
On the other list it would've been a different story :)
Regards
Tony Patton
Desktop Operations Cavan
Ext 8078
Direct Dial 049 435 2878
email: tony.pat...@quinn-insurance.com
From:
Don Guyer don.gu...@prufoxroach.com
To:
NT System Admin Issues ntsysadmin@lyris.sunbelt-software.com
Date:
http://www.darkreading.com/insiderthreat/security/attacks/showArticle.jhtml?articleID=224700541
More information on this latest IM threat.
Here is the write-up accordingly:
http://www.symantec.com/security_response/writeup.jsp?docid=2010-050209-1610-99tabid=2
Typical nastiest on the Trojan
Any certification on removing malware?? How about using and configuring and
setup of antimalware software.
--
Justin
IT-TECH
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
I've know some folks who should receive certifications for GETTING
malware...
On Tue, May 4, 2010 at 11:40 AM, justino garcia jgarciaitl...@gmail.comwrote:
Any certification on removing malware?? How about using and configuring and
setup of antimalware software.
--
Justin
IT-TECH
~
Anyone here got a good internet computer usage policy they'd be willing to
share? I just checked our company policy document and it says *nothing*
about computers or internet usage. Nada, zero, zip about computers or
internet.
John-AldrichTile-Tools
~ Finally, powerful endpoint security
http://www.sans.org/security-resources/policies/
http://www.sans.org/security-resources/policies/
-ASB: http://XeeSM.com/AndrewBaker
On Tue, May 4, 2010 at 11:43 AM, John Aldrich
jaldr...@blueridgecarpet.comwrote:
Anyone here got a good internet computer usage policy they’d be willing
to
lol
was that to mean as a joke, hahaha then I know some people personally who
should be awared.
On Tue, May 4, 2010 at 11:42 AM, Richard Stovall rich...@gmail.com wrote:
I've know some folks who should receive certifications for GETTING
malware...
On Tue, May 4, 2010 at 11:40 AM, justino
HI, did you have a recent firmware update.
HI phill hope all get worked out soon.
gopp
On Mon, May 3, 2010 at 10:58 AM, Phillip Partipilo p...@psnet.com wrote:
Is anybody else with a Firebox having all of your email getting
quarantined? This is a brilliant start to a week. After one of the
First off, we are running a Windows 2003 Native Active Directory. There are no
plans, or funds to move up to 2008.
We have an upcoming project that will require a location on our file server
that encrypts folders and documents stored there. This project could last only
a year, or up to 5, all
mDaemon from Alt-N We use that, it great and know it partialy owned by RIM.
It web client world client, does the group ware, and you can buy per user,
the outlook connector. BUt outlook connector fails to work for inboxes
larger then 2 gigs.
I have setup BIS intergration (since now they are
We have been using Kerio for a few years here. We very much like the product.
Kerio's biggest boast is their excellent web client. Using any modern browser,
you get full (or nearly full) outlook functionality. This means any user
anywhere can access their mail, calendars, contact lists, task
On 4 May 2010 at 8:33, Angus Scott-Fleming wrote:
On 4 May 2010 at 8:49, Cameron Cooper wrote:
Is there a way to view the contents within a Recycler file in XP?
I have browsed the RECYCLER folders using Total Commander from
http://www.ghisler.com/. You have to set it to view
I think based on the flexibility of encryption Options and some of the
items, you might want to look at the PGP Universal Suite of Products. I
just hope that Symantec doesn't screw it up.
Z
Edward Ziots
CISSP,MCSA,MCP+I,Security +,Network +,CCA
Network Engineer
Lifespan Organization
What restrictions, if any, do your organizations place on things like IM or
social networking sites? I sent out a warning to the office personnel this
morning regarding the new IM Virus and got an email back from the CEO
basically stating shouldn't that be a violation of company policy anyway?
and
It all depends if there is a business or productivity reason for it. We use
IM in some of the departments for meetings, quick conversations, etc. But
if it is used for wasting time, I would not allow it.
On Tue, May 4, 2010 at 11:38 AM, John Aldrich
jaldr...@blueridgecarpet.comwrote:
What
Given budget and flexibility, I would say that TrueCrypt will give you some
of the best options, especially since you'll have external parties adding
files to the server.
TrueCrypt is easy to setup, and has many options for configuration, and
won't require a whole lot in the way of key
If the CEO is willing to sign off on a policy banning the use of social
networking and IM then, there should be controls in place to enforce the
policy, a policy without the associated controls and punishments (
Administrative, enacted by Management/HR) then the policy isn't worth
the paper its
Hello Everyone,
I am currently trying to get my head around the new Windows 2008 GPO
policies Mgmt.
Here is the scenario:
windows 2008 R2 ( All MS Updates applied )
1. Configure Central Store and created the Policy Def folder in Sysvol.
2. Copied the entire folder of Policy definitions
Why are you as the 'IT Manager' coming up with the companies policy?
Shouldn't this be a business decision?
In any case, technically here we have a NO EXTERNAL IM policy. The reality
is that 'certain' senior management use it so no actual blocking occurs. At
some point we will get the OCS edge
Well, I think that management is going to want my input, and if I have a
nice template, I will be shaping the discussion and making it something I
can be comfortable enforcing. Unfortunately, from a technical standpoint,
there's not a lot we can do to enforce a no IM and no social networking
other
Hi everyone,
We recently replaced our AV (McAfee) with Trend for both clients and Exchange
2007 (sorry Sunbelt - we came REALLY close to choosing VIPRE). We did not
purchase the spam filtering option with Trend ScanMail, but are now considering
it. We've been running GFI MailEssentials for
Up until last month we blocked all the social networking sites. Now our
firm is marketing on them. We are adjusting our policies for this. It will
be on a user-by-user basis though.
Devin
On Tue, May 4, 2010 at 11:38 AM, John Aldrich
jaldr...@blueridgecarpet.comwrote:
What restrictions, if
Also we don't block anything. We have an AUP and a disclaimer at logon..
We do log all activity and that's explained up front. We hire professionals
and they are supposed to act that way. This is an HR issue so IS just
reports lists of visited websites upon request.
On Tue, May 4, 2010 at
How can you tell definition version on a workstation?
Trying to figure out how to manage this stuff, and it's definitely not friendly.
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/ ~
Well, as long as we're discussing IM, we don't allow it currently. But,
I have trouble understanding how IM is better than either email or a
meeting, or using a telephone to accomplish the very same thing as an
IM. Can someone explain that to me. Oh, we've recently adopted social
networking for
IHateSpam from the sponsor (they renamed it, I've forgotten the new name, but
I've got it at several clients) works pretty well.
So does Postini. So does websense.
All price attractive.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: Raper,
It's not at all strange for the IT Manager to be responsible for
consolidating or initiating the acceptable use policy in an organization.
No matter which party is responsible for putting it together, it cannot be
done in a vacuum. So, either IT does it with input from HR and the business
iHateSpam became Ninja and is now VIPRE for Exchange.
From: Michael B. Smith [mailto:mich...@smithcons.com]
Sent: Tuesday, May 04, 2010 1:49 PM
To: NT System Admin Issues
Subject: RE: Sort of OT: SPAM - should I stick with GFI MailEssentials?
IHateSpam from the sponsor (they renamed it, I've
Just a quick heads up. I am hosting a webcast on TechNet in 5 minutes with
Bryan Porter from Microsoft on upgrading to SharePoint 2010. I know it is late
notice but if you can attend it is your chance to ask questions directly to
Microsoft about the product.
Registration link is here:
On Tue, May 4, 2010 at 1:54 PM, Alex Eckelberry
al...@sunbelt-software.com wrote:
iHateSpam became Ninja and is now VIPRE for Exchange.
Careful, keep renaming your products like that and Microsoft will
get you for patent infringement. ;-)
-- Ben
~ Finally, powerful endpoint security that
Anyone know offhand of a tool / have a query line to compare two Active
Directory accounts? Group and DL membership, assigned delegates/calendar
permissions, etc...
David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764
~ Finally, powerful
Right click, properties
Shook
From: David Lum [mailto:david@nwea.org]
Sent: Tuesday, May 04, 2010 2:00 PM
To: NT System Admin Issues
Subject: Compare two AD / Exchange accounts
Anyone know offhand of a tool / have a query line to compare two Active
Directory accounts? Group and DL
Doesn't exist.
I'm getting ready to release a tool to deal with delegate reporting.
For the AD stuff, use adfind or dsquery.
Regards,
Michael B. Smith
Consultant and Exchange MVP
http://TheEssentialExchange.com
From: David Lum [mailto:david@nwea.org]
Sent: Tuesday, May 04, 2010 2:00 PM
How did you block them? Do you have an appliance or did you put in some sort
of DNS entries?
John-AldrichTile-Tools
From: Devin Meade [mailto:devin.me...@gmail.com]
Sent: Tuesday, May 04, 2010 1:21 PM
To: NT System Admin Issues
Subject: Re: Internet Policies
Up until last month we
Agreed. As a department, we all use IM. I have coworkers in other
physical locations that I interact with all day. No one answers their
desk phones, because it's usually a vendor or sales call.
J
E-mail is great for communicating certain things that require a record,
or are too long winded
When not in the cloud, I generally prefer antispam appliances, rather than
server-based software.
I've used http://www.sendio.com in the past, as well as MailFrontier (now
owned by SonicWall)
-ASB: http://XeeSM.com/AndrewBaker
On Tue, May 4, 2010 at 1:19 PM, Raper, Jonathan - Eagle
They can be blocked via DNS, via Firewalls, via Web Filtering technologies.
-ASB: http://XeeSM.com/AndrewBaker
On Tue, May 4, 2010 at 2:11 PM, John Aldrich
jaldr...@blueridgecarpet.comwrote:
How did you block them? Do you have an appliance or did you put in some
sort of DNS entries?
I was aware of that, but I was wondering what Devin's company used. J
Personally, I'd go for either DNS (if there was a blackhole or something
easily implemented like that) or web filtering appliance.
John-AldrichTile-Tools
From: Andrew S. Baker [mailto:asbz...@gmail.com]
Sent: Tuesday,
I have 2 thoughts on the matter:
a) I'm sure you're familiar with the saying devil you know vs the devil
you don't. You know the GFI product works. Your other options are
unknown quantities.
b) Consider defense in depth. These days most anti-spam implementations
also include anti-virus. If you
Very good points...
-ASB: http://XeeSM.com/AndrewBaker
On Tue, May 4, 2010 at 2:30 PM, Phil Brutsche p...@optimumdata.com wrote:
I have 2 thoughts on the matter:
a) I'm sure you're familiar with the saying devil you know vs the devil
you don't. You know the GFI product works. Your other
I used a fake DNS entry for twitter.com and the others that I found in the
ISA log. I made a new forward lookup zone for each one in our Active Dir
integrated DNS system. I know it wont block sub-domains but it made the
point. It has since been removed. I can use Trend micro officescan if we
IM isn't just chat. Especially if you have OCS installed.
There are tons of things that can be dispensed with a quick 2-3 line IM
session that would require waiting and delays for other things. With IM you
can see if a user if actually present and can be contacted now. It's faster
then email
Ahh. We don't have an ISA server. I suppose I could enable logging on the
ASA and check those logs and do similar things.Hmm. something to think
about.
John-AldrichTile-Tools
From: Devin Meade [mailto:devin.me...@gmail.com]
Sent: Tuesday, May 04, 2010 2:44 PM
To: NT System Admin Issues
If you have ISA, you can also make a rule to deny access to the domain
or URL.
From: Devin Meade [mailto:devin.me...@gmail.com]
Sent: Tuesday, May 04, 2010 2:44 PM
To: NT System Admin Issues
Subject: Re: Internet Policies
I used a fake DNS entry for
I seem to remember that if you call up the interface on the client it will
tell you date and time of last update. If it does just compare the server
and client. Otherwise look in the logs under application for when the last
update was.
Jon
On Tue, May 4, 2010 at 1:36 PM, Joseph Heaton
Do you actually believe they will leave a good product alone? Go with
something other than PGP unless you are not going to be updating it then it
will be safe to use.
Jon
On Tue, May 4, 2010 at 12:32 PM, Ziots, Edward ezi...@lifespan.org wrote:
I think based on the flexibility of encryption
When you open the console on the workstation, click on the Home button
and it is listed on the bottom as Antivirus definition
Bob
From: Jon Harris [mailto:jk.har...@gmail.com]
Sent: Tuesday, May 04, 2010 2:49 PM
To: NT System Admin Issues
Subject: Re: Microsoft Forefront question
I run both when the environment / client permits. If you can keep the bulk of
it off your network all the better. I have one cluent with both a Barracuda AND
Trend's anti-spam. The 'Cuda is upstream and catches 99% of the spam, Trend
catches the occasional leaker but since it doesn't have much
On 4 May 2010 at 16:36, tony patton wrote:
On the other list it would've been a different story :)
What other list?
--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
Security Blog: http://geoapps.com/
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~
On 4 May 2010 at 12:39, Murray Freeman wrote:
Well, as long as we're discussing IM, we don't allow it currently. But, I
have trouble understanding how IM is better than either email or a meeting,
or using a telephone to accomplish the very same thing as an IM. Can someone
explain that to me.
On 4 May 2010 at 9:16, Matthew W. Ross wrote:
I would recommend anyone who is looking for a mail suite to take a good look
at Kerio.
Thanks for the feedback. WRT multi-server, do you know if it supports
distributed subdomains (e.g. tucson.mydomain.com, denver.mydomain.com, etc.)
with
I'd probably just use adfind and kick each one to a text file (Joe has a switch
to sort the attribute names alphabetically, you want this) and then windiff the
two text files. This is what I usually do.
Thanks,
Brian Desmond
br...@briandesmond.com
c - 312.731.3132
From: David Lum
You can do this in Exchange but you will need to create and account and
allow all the users that will post meetings/what not to add and/or delete.
Major pain to maintain but it does work you will just have to trust the
users will not use it for something they are not supposed to do like send
It is also a security risk but that goes without saying.
Jon
On Tue, May 4, 2010 at 3:01 PM, Jon Harris jk.har...@gmail.com wrote:
You can do this in Exchange but you will need to create and account and
allow all the users that will post meetings/what not to add and/or delete.
Major pain to
We use web marshal. http://www.8e6security.com/webmarshal.asp
Works pretty well and is pretty cheap.You can add antivirus and anit spyware scanning modules as well.
There is also a fairly robust reporting engine for it.
I had it enabled for 60 users and it was running on Windows Xp. I have since
It sounds like the telephone may become extinct, doesn't it! Our
organization is small, all in one bldg on one floor, so it's very easy
to just walk down to an office. When I get a help desk call, I always
walk to the requestor's office. The young man who works with me uses
Remote Assistance and
When you are building the policy put everything you can in it to deal with
as many issues as possible. Issues like who can and can not install
software, what kind of monitoring is allowed on the clients or in the
network traffic, get HR involved early on and make sure there is some real
teeth in
Yep the good old blackhole technique, most of the naughty domains are
going to 127.0.0.1 which helps if the malware is programmed to go back
to a specific domain name, but that doesn't help those malware that is
using google or other public available sites, that might have been
compromised to get
One advantage of IM over phone conversations is proof of what is said in the
conversation. Some times it is quite useful when you need to CYA.
Jon
On Tue, May 4, 2010 at 3:19 PM, Murray Freeman mfree...@alanet.org wrote:
It sounds like the telephone may become extinct, doesn't it! Our
Interesting. Might actually be something to look into, although I’d prefer an
“appliance” so I don’t have to buy a server (we don’t have any Win2K8
servers…only 2003 R2)
John-AldrichTile-Tools
From: Chad Leeper [mailto:c...@capitalcityfruit.com]
Sent: Tuesday, May 04, 2010 3:15 PM
To:
We redirect ours to an internal webpage that lets the user know the site was
blocked and then we can look thru the logs to see who has been trying to go
where.
...Tim
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Tuesday, May 04, 2010 12:22 PM
To: NT System Admin Issues
Subject: RE:
I've just got to disagree with one comment, ...less disruptive then a
phone call... The person receiving a phone call, an IM or email, not to
mention a tweet is ALWAYS distracted. One thing we've done is put a Do
Not Disturb button on our phones, so you know if a person is busy and
doesn't want to
Phil makes a good point, specifically regarding defense in depth. If you're
relying on the same engine/dats, it doesn't matter how many gateways or
levels of software protection you have. We made the same mistake here when
management decided a certain vendors total protection suite was a good idea
Actually, Policies are broad reaching statements of what Senior
Management views are on security, they are not all encompassing
documents, nor do they have all the details of how the controls are to
be applied, those are done in the process and procedures of the
implementation of the controls (
Well, it's somewhat of a moot point now as HR came to me with a paper copy
of a document they have all new employees sign (I never signed it, though.
J) and I scanned and converted it via OCR and added a few tweaks, such as
specifying that AIM, Yahoo and other instant messaging clients are not
Jon,
I don't think that can constitute as Primary/Best evidence in a court of law,
especially when electronic communications is usually considered Heresay, and
therefore needs to be corroborated with other sources.
Also: The evidence only shows a communication from the source
Rock on, thanks everyone.
Dave
From: Brian Desmond [mailto:br...@briandesmond.com]
Sent: Tuesday, May 04, 2010 12:00 PM
To: NT System Admin Issues
Subject: RE: Compare two AD / Exchange accounts
I'd probably just use adfind and kick each one to a text file (Joe has a switch
to sort the
Are you suggesting that IM is treated differently than email under the laws of
evidence?
Murray
From: Ziots, Edward [mailto:ezi...@lifespan.org]
Sent: Tuesday, May 04, 2010 2:48 PM
To: NT System Admin Issues
Subject: RE: Internet Policies -- Benefits of
I think you misunderstand - I'm not saying you shouldn't run some sort
of mail gateway protection. I'm simply saying you shouldn't use the same
product on your desktops *and* the mail gateway.
On 5/4/2010 1:53 PM, David Lum wrote:
I run both when the environment / client permits. If you can keep
Webmarshal will run on an old PC, Win 2003, Win 2008. It also ties into ISA if need be.
Interesting. Might actually be something to look into, although I’d prefer an “appliance” so I don’t have to buy a server (we don’t have any Win2K8 servers…only 2003 R2)
From: Chad Leeper
I think the difference is where you want to do your filtering.
With significantly smaller environments than yours, I opted to move
filtering to the cloud with Postini for two organizations and it was
great. The threats and junk are removed before they hit your circuit
- 90+% of incoming SMTP
It would depend on your company and corporate culture. If someone sends me
an IM, it is in place of a phone call or email. So a 'distraction' will
occur. In the case of IM, it's generally 30 seconds or less. Not unlike
checking email technical lists from work instead of working.
We used some
The only certification I know for removing malware is fdisk.
On Tue, May 4, 2010 at 08:40, justino garcia jgarciaitl...@gmail.com wrote:
Any certification on removing malware?? How about using and configuring and
setup of antimalware software.
--
Justin
IT-TECH
~ Finally, powerful
Just came across this while searching for some other Best practice
documents.
http://support.citrix.com/article/ctx118256
Deployment Best Practices for Citrix XenApp over Hughes Satellite Networks
Carl Webster
Citrix Technology Professional
http://dabcc.com/Webster
-Original
Trying to find files that a user (who was let go) might have deleted on
their computer (email) altho, this would be more on the exchange
server.
_
Cameron Cooper
Network Administrator | CompTIA A+ Certified
Aurico Reports, Inc
Phone: 847-890-4021 | Fax: 847-255-1896
1 - 100 of 129 matches
Mail list logo